Yeah, that's how I imagined it, too. I also fixed the text from the console overwriting part of the UI with my last pull request (you started this but forgot it in some places), so it should be good now. If there was not my issue, of course. Will try out your latest release now, and give you feedback.
In the meantime...
No rxtools just pulls the ticket.db from the nand i believe, there's no generating xorpads, decrypting etc involved.
I think rxTools does it in part - dump part of the NAND, make the XORpad for that (even if it is just in memory), decrypt what we got, ...
Anyways, I don't even understand how XORpads work (pulling the FAT16 partition from the NAND.bin would be trivial, pulling the ticket.db out of that at least manageable if it was decrypted). XORpads are not simply files of the same size to XOR the encrypted files with, it is not that simple. The rxTools source code is somehow badly readable (no offense meant, roxas75), and I didn't find any better information on 3DBrew. There'S a tool called padxorer, but I haven't found the source code for that. Duh... Do you know of some place with better infos on that?