
When initializing, it loads some essential informations from your NAND and launches the FAT fs functions.And is it normal that when I launch exploit, it stucks on "INITIALIZE"
I have RxTools.dat, slot0x25KeyX.bin and firmware.bin at the root of my SD Card and I don't have EmuNAND installed yet.
PS: I've a 5.1 3DS XL, so I could run the exploit without Web Navigator?
kernel exploit was patched in 5.x, but the actual MSET entry point wasn't patched until 7.x, so its still present in the 6.x MSET appBut I thought that MSET was patched above 4.X...
It doesn't work at all...
Do I have to format EmuNAND before?
Obviouslywhenever i try to inject ticket.db/secureinfo etc. it says (Dumping) instead of (injecting)
will this be fixed in the next update?
Now i get the error 022-2634 wen accesing nnid help me
To give a quick explanation, i protected both nand and emunand from writing, for secure/debug porpuses, ans turned out keeking tem disabled while releasing.As far as I can tell all the injection features are bugged right now. It doesn't actually inject anything. The "dumping" text is a cosmetic bug most likely. It's not dumping anything. But it's not injecting anything either....
By the way it's been quite awhile so...any progress on getting TWL partition export/injection working? I recall you had that in a really early version, but it didn't decrypt them for some reason so you pulled it saying that you're still working on it....![]()
