are you running it from sysnand?i am trying to run this app , but every time i click on the app on my homebrew channel , it send me back to select boot menu from CTRbootmanager
from emunand using cubic ninja as .ciaare you running it from sysnand?
Decrypt9 only works from sysnand.from emunand using cubic ninja as .cia
oh , is there anyway to extract the DLC and title.db and xorpad from my emunand ?Decrypt9 only works from sysnand.
There is no difference between EmuNAND and SysNAND XORpads... installed stuff (on the SD card) can be directly decrypted (EmuNAND and SysNAND)... and you can get the title.db for both. You should at least read the opening post before asking .oh , is there anyway to extract the DLC and title.db and xorpad from my emunand ?
the NAND is unlinked.
--------------------- MERGED ---------------------------
oh cool , i can get the title key of the emunand from entering the app from sysnand
i thought i can only do that from emunand.
yah, my badThere is no difference between EmuNAND and SysNAND XORpads... installed stuff (on the SD card) can be directly decrypted (EmuNAND and SysNAND)... and you can get the title.db for both. You should at least read the opening post before asking .
I assume you didn't correctly select your title to decrypt in the SD Decryptor, correct? You should have used the arrow keys (that's left/right, too). Guess I might set that up differently, because decrypting the whole titles folder makes little sense. For you there are only two ways out (1) wait it out or (2) force shutdown your console (hold power). If you choose the later I recommend you check your SD card with Windows command line chkdsk afterwards. Dataloss is highly unlikely, but you might have an incomplete file on your SD card afterwards.yah, my bad
now there is another problem
i clicked on file or title Dump and he found more then 500 title and started to dump them
it's very very slow , 1 hour and he still in 50
how to cancel it?
This is only the name you choose for the output file... And the title.db is not the same as the decrypted title keys. Isuggest you at least give the readme file a quick glance, maybe even using STRG+F?ok , turned off my 3DS and thankfully , nothing happened
it was generation XORPAD files for every title in my 3DS
i want to extract the ticket.db to use it in FunkyCIA2 , but i only find decrypt option for the title.db
and it decrypt several files like
decTitleKeys_emu.bin
emudecTitleKeys.bin
and others , i assume they are the same?
i managed to get the right file after some fighting with rxtoolsThis is only the name you choose for the output file... And the title.db is not the same as the decrypted title keys. Isuggest you at least give the readme file a quick glance, maybe even using STRG+F?
Check the tutorials section, you'll find a guide there for thati managed to get the right file after some fighting with rxtools
now i need to learn how to use FunkyCIA2 correctly
@d0k3 Him im trying to follow this guide https://plailect.github.io/OTP/ to dump my OTP and it calls for me to dump "CTRNAND Padgen 0x4" to nand.fat16.xorpad but im not seeing that as an option any ideas?
Compile from source, it is already in there, there is just no release.Does anyone know of the option "CTRNAND PADGen 0x4"?
No, there are better options to do that. CIA conversion is quite a complicated process.can decrypt9 be used to repack system apps files to cia?(system files extracted from ctrnand to cia)
can you explain please? or give any direction to get the cias? if it's from a gamecartridge , then the update partition has only 47 cia of 117 fiiles neededNo, there are better options to do that. CIA conversion is quite a complicated process.
ok, I going to reboot in linux...Compile from source, it is already in there, there is just no release.
No, there are better options to do that. CIA conversion is quite a complicated process.
Here is the new build https://mega.nz/#!CVwQlZaZ!NrUoYYPGbQGsWtsVDIVlJKYQhqqcF9Z0lqWLWmnSeeAok, I going to reboot in linux...
Here is the new build https://mega.nz/#!CVwQlZaZ!NrUoYYPGbQGsWtsVDIVlJKYQhqqcF9Z0lqWLWmnSeeA