Actually I don't think the environment variables matter in this case. Your .py files are associated with the Python 2.7 exe, not another version?
No other version, anyway the files worked grate anyway , So no matter .
Actually I don't think the environment variables matter in this case. Your .py files are associated with the Python 2.7 exe, not another version?
No other version, anyway the files worked grate anyway , So no matter .
Oh, duh. I just figured it out.
When you right click the link and save, it saves as ctrKeyGen.py, but what you're actually saving is the webpage: https://github.com/Relys/3DS_Multi_Decryptor/blob/master/ctrKeyGen.py
I just go here and click the Download ZIP button.
They can be usd in plain text , did you not know that ???
All the phython scripts i use are plain text and working , so you can change things in them.
Download Link: https://github.com/Relys/3DS_Multi_Decryptor
Every File Explorer by Gericom:
http://gbatemp.net/threads/release-every-file-explorer.373615/
sm4sh data tools by comex:
https://github.com/comex/smash-stuff
No. The decryptor runs with full kernel access, which it needs. 3DS and CIA format applications run in "userland", without access to things like the AES module, so no decryption can take place that can be controlled via the application.Is any way modify Decryptor to working from Gateway (3DS or CIA format) or from Ninjhax? For Gateway because now is not possible decrypt content on SD card, when sysNAND was formatted. And for Ninjhax to decrypt content 3DS with FW above 4.x.
No. The decryptor runs with full kernel access, which it needs. 3DS and CIA format applications run in "userland", without access to things like the AES module, so no decryption can take place that can be controlled via the application.
Counter generation(info from http://3dbrew.org/wiki/Extdata):
First, take the path of the file you want you want to decrypt.
Let's use 'X:/Nintendo 3DS/<ID0>/<ID1>/extdata/00000000/0000008f/00000000/00000001' ('00000001' is the file, it has no extension)
We only need what's after X:/Nintendo 3DS/<ID0>/<ID1>
So, '/extdata/00000000/0000008f/00000000/00000001'
Convert that to UTF16, add two null bytes to the end, then take the SHA256.
The counter is then CTRword = Hashword ^ Hashword[4+i]
For the example file, the counter is {0x24, 0xE2, 0xF7, 0x91, 0x92, 0x6A, 0xDC, 0x96, 0x49, 0x4E, 0x81, 0xA9, 0x7B, 0x3C, 0x90, 0xCF}
This works for anything in 'extdata', 'dbs', 'title', and possibly 'backups'(haven't tested this one)
Hey guys, I created a program to make editing your Mega Evolution Tables easier. Goes great with [user]SciresM[/user]'s Personal editor.
![]()
Just open your decrypted Garc folder at a/1/9/3, make your edits, then click save. You can find a list of item ID's here.
Download: https://github.com/Huntereb/MEE/releases
Source: https://github.com/Huntereb/MEE
By the way, the source is kinda messy. This is my first C# project, so that's to be expected I suppose.
Enjoy!
EDIT: Updated with new picture. It now allows for three evolution slots.
It's for XY or ORAS ?
>Scire in charge of improving code[user]HunterEB[/user]
I just made a pull request that vastly improves all of the code in your project. I made it use way more iteration, and rely less on hardcoded stuff. Also, the Species box is sorted alphabetically by Mon Name now.![]()
I just made a pull request that vastly improves all of the code in your project. I made it use way more iteration, and rely less on hardcoded stuff. Also, the Species box is sorted alphabetically by Mon Name now.![]()
>Scire in charge of improving code
Dohohoho
You just rewrote the whole thing, it can't even be compared to what it was before.
Also, your commit is based on an older build.

