Sponsored Links

Sponsored Links

Page 1 of 7 123 ... LastLast
Results 1 to 10 of 69



  1. #1
    Forum Moderator PS3 News's Avatar
    Join Date
    Apr 2005
    Posts
    27,459
    Sponsored Links

    PS3 3.60 Keys Leaked, New PlayStation 3 EBOOTs Decrypted & More!

    Sponsored Links
    Following up on the previous news that the PS3 v3.60+ keys were incoming, today the PS3 3.60 keys appear to have been leaked from fckyoudh on Spanish site Elotrolado (linked above) which has lead to new decrypted PlayStation 3 EBOOT fixes for CFW users.

    Download: [Register or Login to view links] / [Register or Login to view links] (Mirror) / [Register or Login to view links] (Mirror #2) / [Register or Login to view links] (Mirror #3) / [Register or Login to view links] (Mirror #4) / [Register or Login to view links] (Mirror #5) / [Register or Login to view links] (Mirror #6) / [Register or Login to view links] (Mirror #7) / [Register or Login to view links] (Mirror #8) / [Register or Login to view links] / [Register or Login to view links] (Mirror) / [Register or Login to view links] (Mirror #2) / [Register or Login to view links] (Mirror #3) / [Register or Login to view links] (Mirror #4) / [Register or Login to view links] (Mirror #5) / [Register or Login to view links] (Mirror #6) / [Register or Login to view links] (Mirror #7) / [Register or Login to view links] (Mirror #8) / [Register or Login to view links] (Mirror #9) / [Register or Login to view links] (Mirror #10) / [Register or Login to view links] (Mirror #11) / [Register or Login to view links] (Mirror #12) / [Register or Login to view links] (Mirror #13) / [Register or Login to view links] (Mirror #14) / [Register or Login to view links] (Mirror #15) / [Register or Login to view links] (Mirror #16) / [Register or Login to view links] / [Register or Login to view links] by nathan_r32_69 / [Register or Login to view links] / [Register or Login to view links] by PsDev / [Register or Login to view links] by coreylad / [Register or Login to view links] by Attila

    To quote, roughly translated: [Register or Login to view links] (aka [Register or Login to view links])

    fck you .... demonhades I told you you were in your place guapeton these strings do you like most? Anti-e3 people.

    PS3 3.60 Keys:
    Code:
    type=app
    version=3.60
    revision=0010
    riv=7A203D5112F799979DF0E1B8B5B52AA4
    erk=A5E51AD8F32FFBDE808972ACEE46397F2D3FE6BC823C8218EF875EE3A9B0584F
    pub=50597B7F680DD89F6594D9BDC0CBEE03666AB53647D0487F7F452FE2DD02694631EA755548C9E934
    priv=
    ctype=25
    
    type=npdrm
    version=3.60
    revision=0010
    riv=C0F2AB86E6E0457552DB50D7219371C5
    erk=4B3CD10F6A6AA7D99F9B3A660C35ADE08EF01C2C336B9E46D1BB5678B4261A61
    pub=64A5C60BC2AD18B8A237E4AA690647E12BF7A081523FAD4F29BE89ACAC72F7AB43C74EC9AFFDA213
    priv=
    ctype=27
    
    type=lv1
    version=3.60
    revision=0000
    riv=DF0F50EC3C4743C5B17839D7B49F24A4
    erk=5FF17D836E2C4AD69476E2614F64BDD05B9115389A9A6D055B5B544B1C34E3D5
    pub=1CDABE30833823F461CA534104115FFF60010B710631E435A7D915E82AE88EDE667264656CB7062E
    priv=
    ctype=05
    
    type=iso
    version=3.60
    revision=0000
    riv=FFF9CACCC4129125CAFB240F419E5F39
    erk=8474ADCA3B3244931EECEB9357841442442A1C4A4BCF4E498E6738950F4E4093
    pub=098E1A53E59A95316B00D5A29C05FFEBAE41D1A8A386F9DA96F98858FD25E07BB7A3BC96A5D5B556
    priv=
    ctype=03
    
    type=lv2
    version=3.60
    revision=0000
    riv=8D18E8E525230E63DE10291C9DD615BF
    erk=88AD367EDEC2FEED3E2F99B1C685075C41BDEC90C84F526CAF588F89BBD1CBCC
    pub=86EED1D65E58890ABDA9ACA486A2BDDB9C0A529C2053FAE301F0F698EAF443DA0F60595A597A7027
    priv=
    ctype=32
    
    type=self
    revision=0010
    version=0003006000000000
    self_type=NPDRM
    erk=A5E51AD8F32FFBDE808972ACEE46397F2D3FE6BC823C82 18EF875EE3A9B0584F
    riv=7A203D5112F799979DF0E1B8B5B52AA4
    pub=50597B7F680DD89F6594D9BDC0CBEE03666AB53647D048 7F7F452FE2DD02694631EA755548C9E934
    priv=
    ctype=25
    From eussNL: I wonder if anyone is even considering adding the 3.56 and 3.60 keys to appldr to make 3.60 content playable

    3.60 Keys, ready for use with Naehrwert SCETool: [Register or Login to view links]
    Code:
    ## scetool/data/keys (for Scetool: ps3devwiki.com/files/devtools/scetool/data/ and for fail0verflow/ps3tools : mir.cr/WULDKSIG)
    
    [NP_tid]
    type=OTHER
    key=9B515FEACF75064981AA604D91A54E97
    
    [NP_ci]
    type=OTHER
    key=6BA52976EFDA16EF3C339FB2971E256B
    
    [NP_klic_free]
    type=OTHER
    key=72F990788F9CFF745725F08E4C128387
    
    [NP_klic_key]
    type=OTHER
    key=F2FBCA7A75B04EDC1390638CCDFDD1EE
    
    [NP_sig]
    type=OTHER
    pub=E6792E446CEBA27BCADF374B99504FD8E80ADFEB3E66DE73FFE58D3291221C65018C038D3822C3C9
    priv=000000000000000000000000000000000000000000
    ctype=2
    
    [pkg]
    type=PKG
    revision=00
    erk=A97818BD193A67A16FE83A855E1BE9FB5640938D4DBCB2CB52C5A2F8B02B1031
    riv=4ACEF01224FBEEDF8245F8FF10211E6E
    pub=41DA1A8F74FF8D3F1CE20EF3E9D8865C96014FE373CA143C9BADEDF2D9D3C7573307115CCFE04F13
    priv=00542D46E7B3DAAC8AEB81E533873AABD6D74BB710
    ctype=23
    
    [pkg]
    type=PKG
    revision=01
    erk=F8F99006F1C007D5D0B1909E9566E0E70B569399FC3394A811809FDB5CAE92CD
    riv=59D28DB4ADDFB40B7D768BC9667C67B1
    pub=5432BDDD1F97418147AFF016EAA6100834F2CAA8C498B88965689EE44DF349B066CD43CBF4F2C5D0
    priv=
    ctype=17
    
    [spp]
    type=SPP
    revision=00
    erk=56C655747A4B6957A2D8BB9AC605C297E6AC9871932BFECDDE066CEE5B29470A
    riv=007E6B268EF1E986D10A9889CF93A8CB
    pub=265C04E7F20C3B8ACAC90E7C9D12757ED7ACBC01AA6624A2A927E719A4AA1222F87D917005F6072A
    priv=0001608EF3BACAFFB8C3A5958A24F758325B62B08C
    ctype=22
    
    [spp]
    type=SPP
    revision=01
    erk=7FD222B3FEF467DF7E3F63AC8B77501A3B38752411E96AFEDA6587B5CD5E91B0
    riv=B889290922B002F57086B818A8FDE3CC
    pub=71E12CB3D81AFA79670AF4FAC4BBE41AA7F7DDF368F5615E933CB1C21A783B73C085CA49986CCF63
    priv=
    ctype=22
    
    [rvk]
    type=RVK
    revision=00
    version=0003005500000000
    erk=03AF06FD1CE6DA366361682CDF59F9708B5D7876F40A9E1E9AC2B22F51B60BDF
    riv=8B5D7876F40A9E1E9AC2B22F51B60BDF
    pub=9ADE7830EB74245EC357CE4F6401633E5A8048FD865F9D8F1A9189535A37623E2921427463A754F7
    priv=00245E673B039D656DA206BDAE4EAEFCBF2A8D5EAF
    ctype=29
    
    [rvk]
    type=RVK
    revision=01
    version=0003005600000000
    erk=22628A9EC4C414D5B32F2B4BA4926089DE9A461B190FB3E4392D057C525535DE
    riv=D5D4B8ED62B6CCA0249A79776E136975
    pub=51751B9F1DA58638D2D99F67E20A1D4A454C5B042CD1D0A449A2989808002BA68FB5B7F4B5B4E63B
    priv=
    ctype=32
    
    [metldr]
    type=SELF
    revision=00
    self_type=LDR
    erk=C0CEFE84C227F75BD07A7EB846509F93B238E770DACB9FF4A388F812482BE21B
    riv=47EE7454E4774CC9B8960C7B59F4C14D
    pub=C2D4AAF319355019AF99D44E2B58CA29252C89123D11D6218F40B138CAB29B7101F3AEB72A975019
    priv=00C5B2BFA1A413DD16F26D31C0F2ED4720DCFB0670
    ctype=20
    
    [isoldr]
    type=SELF
    version=0003001500000000
    self_type=ISO
    erk=8860D0CFF4D0DC688D3223321B96B59A777E6914961488E07048DAECB020ECA4
    riv=C82D015D46CF152F1DD0C16F18B5B1E5
    pub=733918D7C888130509346E6B4A8B6CAA357AB557E814E8122BF102C14A314BF9475B9D70EAF9EC29
    priv=009BE892E122A5C943C1BB7403A67318AA9E1B286F
    ctype=36
    
    [isoldr]
    type=SELF
    version=0003003100000000
    self_type=ISO
    erk=8860D0CFF4D0DC688D3223321B96B59A777E6914961488E07048DAECB020ECA4
    riv=C82D015D46CF152F1DD0C16F18B5B1E5
    pub=733918D7C888130509346E6B4A8B6CAA357AB557E814E8122BF102C14A314BF9475B9D70EAF9EC29
    priv=009BE892E122A5C943C1BB7403A67318AA9E1B286F
    ctype=36
    
    [isoldr]
    type=SELF
    version=0003004100000000
    self_type=ISO
    erk=101E27F3FA2FB53ACA924F783AD553162D56B975D05B81351A1111799F20254D
    riv=8D2E9C6297B8AD252998458296AC773C
    pub=128446EE0BDDA638F97328C8956E6489CBBFE57C5961D40DD5C43BB4138F1C400A8B27204A5D625
    priv=00849DBC57D3B92F01864E6E82EB4EF0EF6311E122
    ctype=32
    
    [isoldr]
    type=SELF
    version=0003005000000000
    self_type=ISO
    erk=3F2604FA27AEADFBE1AC69EB00BB16EF196C2193CBD62900FFD8C25041680843
    riv=A414AC1DB7987E43777651B330B899E1
    pub=1F4633AFDE18614D6CEF38A2FD6C4CCAC7B6EB8109D72CD066ECEBA0193EA3F43C37AE83179A4E5F
    priv=0085B4B05DEBA7E6AD831653C974D95149803BB272
    ctype=33
    
    [isoldr]
    type=SELF
    version=0003005500000000
    self_type=ISO
    erk=BDB74AA6E3BA2DC10B1BD7F17198399A158DBE1FA0BEA68C90FCACBE4D04BE37
    riv=0207A479B1574F8E7F697528F05D5435
    pub=917E1F1DC48A54EB5F10B38E7569BB5383628A7C906F0DCA62FDA33805C15FAB270016940A09DB58
    priv=00294411363290975BA551336D3965D88AF029A17B
    ctype=03
    
    [isoldr]
    type=SELF
    version=0003005600000000
    self_type=ISO
    erk=311C015F169F2A1E0757F7064B14C7C9F3A3FFEE015BD4E3A22401A2667857CE
    riv=7BB8B3F5AC8E0890E3148AE5688C7350
    pub=3F040EFA2335FED5670BA4D5C3AB2D9D0B4BA695154A0062EA995A7D21DBAF0DC5A0DAD333D1C1DD
    ctype=
    
    [isoldr]
    type=SELF
    version=0003006000000000
    self_type=ISO
    erk=8474ADCA3B3244931EECEB9357841442442A1C4A4BCF4E498E6738950F4E4093
    riv=FFF9CACCC4129125CAFB240F419E5F39
    pub=098E1A53E59A95316B00D5A29C05FFEBAE41D1A8A386F9DA96F98858FD25E07BB7A3BC96A5D5B556
    priv=
    ctype=03
    
    [lv1ldr]
    type=SELF
    version=0003001500000000
    self_type=LV1
    erk=B9F3F9E6107CFF2680A91E118C2403CF4A6F18F3C7EFD7D13D1AC4DB760BD222
    riv=B43661B9A79BAD9D8E2B046469CDA1E7
    pub=4C870BE86DDD996A92A3F7F404F33604244A1D02AB5B78BC9DAF030B78BE8867CF586171B7D45D20
    priv=002CC736C7AD06D264E9AB663EB1F35F5DC159248C
    ctype=33
    
    [lv1ldr]
    type=SELF
    version=0003004100000000
    self_type=LV1
    erk=B880593856C8C6D2037585626A12977F50DCFCF3F132D2C89AA6E670EAFC1646
    riv=A79B05D4E37B8117A95E6E7C14FB640E
    pub=7454C7CCBFC2F66C142D78A730A3A6F673CC0FB75A46FCBB390790138910A0CAC78E5E21F4DA3375
    priv=00033A699FDD2DA6CDD6CCC03B2C6145F998706F74
    ctype=34
    
    [lv1ldr]
    type=SELF
    version=0003005000000000
    self_type=LV1
    erk=1E8EEEA9E80A729F3FA52CF523B25941EA44B4155D94E5DADC5C5A77847620C7
    riv=E034D31A80316960024D1B3D3164FDC3
    pub=7E3A196f4A5879F3A7B091A2263F7C24E1716129B580566D308D9C2254B36AEE53DEF30EC85F8398
    priv=005815D17125D04C33790321DE29EB6241365100B5
    ctype=35
    
    [lv1ldr]
    type=SELF
    version=0003005500000000
    self_type=LV1
    erk=53ABDF84BE08B0351B734F2B97D2BE1621BC6C889E4362E5C70F39D6C3ED9F23
    riv=44E652661AC7584DBE08ECB810FB5FC0
    pub=733198A7759BC07323755BC9773A8A17C8A7043C7BDAB83D88EC30512E2EA3852D7DA4263A7E97F9
    priv=004312C65347ACBE95CC306442FEFD0AF4C2935EB3
    ctype=5
    
    [lv1ldr]
    type=SELF
    version=0003005600000000
    self_type=LV1
    erk=48793EBDDA1AF65D737DA2FDA2DD104447A698F8A82CAAEE992831711BA94E83
    riv=15DCF3C67147A45D09DE7521EECA07A1
    pub=85A8868C320127F10B6598964C69221C086702021D31803520E21FDE4DBE827766BE41825CB7328C
    priv=
    ctype=7
    
    [lv1ldr]
    type=SELF
    version=0003006000000000
    self_type=LV1
    erk=5FF17D836E2C4AD69476E2614F64BDD05B9115389A9A6D055B5B544B1C34E3D5
    riv=DF0F50EC3C4743C5B17839D7B49F24A4
    pub=1CDABE30833823F461CA534104115FFF60010B710631E435A7D915E82AE88EDE667264656CB7062E
    priv=
    ctype=05
    
    [lv2ldr]
    type=SELF
    version=0000000800000000
    self_type=LV2
    erk=014485445EC9926C50F613AE77D9C37AA99838CCEB6F75FA78E29A8C622E8011
    riv=A17D6A522CB1B08F97DA8A82E97C12F7
    
    [lv2ldr]
    type=SELF
    version=0003001500000000
    self_type=LV2
    erk=94303F69513572AB5AE17C8C2A1839D2C24C28F65389D3BBB11894CE23E0798F
    riv=9769BFD187B90990AE5FEA4E110B9CF5
    pub=AFAF5E96AF396CBB69071082C46A8F34A030E8EDB799E0A7BE00AA264DFF3AEBF7923920D559404D
    priv=0070ABF9361B02291829D479F56AB248203CD3EB46
    ctype=20
    
    [lv2ldr]
    type=SELF
    version=0003004100000000
    self_type=LV2
    erk=575B0A6C4B4F2760A03FE4189EBAF4D947279FD982B14070349098B08FF92C10
    riv=411CB18F460CE50CAF2C426D8F0D93C8
    pub=3FEE313954CB3039C321A7E33B97FFDEC8988A8B55759161B04DBF4731284E4A8191E3F17D32B0EA
    priv=0073076441A08CD179E5FACE349B86DA58B5B7BA78
    ctype=21
    
    [lv2ldr]
    type=SELF
    version=0003005000000000
    self_type=LV2
    erk=6DBD48D787C58803A8D724DA5ACF04FF8FCE91D7545D2322F2B7ABF57014AF68
    riv=603A36213708520ED5D745DEC1325BA5
    pub=5888CB83AC3CCA9610BC173C53141C0CA58B93719E744660CA8823D5EAEE8F9BF736997054E4B7E3
    priv=0009EBC3DE442FA5FBF6C4F3D4F9EAB07778A142BD
    ctype=22
    
    [lv2ldr]
    type=SELF
    version=0003005500000000
    self_type=LV2
    erk=84015E90FA23139628A3C75CC09714E6427B527A82D18ABC3E91CD8D7DDAFF17
    riv=5B240444D645F2038118F97FD5A145D5
    pub=B266318245266B2D33641CD8A864066D077FAC60B7E27399099A70A683454B70F9888E7CC0C2BF72
    priv=009D4CBA2BFB1A8330D3E20E59D281D476D231C73A
    ctype=32
    
    [lv2ldr]
    type=SELF
    version=0003005600000000
    self_type=LV2
    erk=EAE15444048EFDE7A831BFA9F5D96F047C9FCFF50723E292CF50F5417D81E359
    riv=9CA9282DC7FA9F315EF3156D970B7CD4
    pub=0D58938CB47598A6A672874F1768068F8B80D8D17014D2ABEBAC85E5B0993D9FB6F307DDC3DDA699
    priv=
    ctype=33
    
    [lv2ldr]
    type=SELF
    version=0003006000000000
    self_type=LV2
    erk=88AD367EDEC2FEED3E2F99B1C685075C41BDEC90C84F526CAF588F89BBD1CBCC
    riv=8D18E8E525230E63DE10291C9DD615BF
    pub=86EED1D65E58890ABDA9ACA486A2BDDB9C0A529C2053FAE301F0F698EAF443DA0F60595A597A7027
    priv=
    ctype=32
    
    [appldr]
    type=SELF
    revision=0000
    version=0000008000000000
    self_type=APP
    erk=95F50019E7A68E341FA72EFDF4D60ED376E25CF46BB48DFDD1F080259DC93F04
    riv=4A0955D946DB70D691A640BB7FAECC4C
    pub=6F8DF8EBD0A1D1DB08B30DD3A951E3F1F27E34030B42C729C55555232D61B834B8BDFFB07E54B343
    priv=006C3E4CCB2C69A5AD7C6F60448E50C7F9184EEAF4
    ctype=21
    
    [appldr]
    type=SELF
    revision=0001
    version=0003001500000000
    self_type=APP
    erk=79481839C406A632BDB4AC093D73D99AE1587F24CE7E69192C1CD0010274A8AB
    riv=6F0F25E1C8C4B7AE70DF968B04521DDA
    pub=94D1B7378BAFF5DFED269240A7A364ED68446741622E50BC6079B6E606A2F8E0A4C56E5CFF836526
    priv=003DE80167D2F0E9D30F2145144A558D1174F5410C
    ctype=11
    
    [appldr]
    type=SELF
    revision=0002
    version=0003001500000000
    self_type=APP
    erk=4F89BE98DDD43CAD343F5BA6B1A133B0A971566F770484AAC20B5DD1DC9FA06A
    riv=90C127A9B43BA9D8E89FE6529E25206F
    pub=8CA6905F46148D7D8D84D2AFCEAE61B41E6750FC22EA435DFA61FCE6F4F860EE4F54D9196CA5290E
    priv=
    ctype=13
    
    [appldr]
    type=SELF
    revision=0003
    version=0003001500000000
    self_type=APP
    erk=C1E6A351FCED6A0636BFCB6801A0942DB7C28BDFC5E0A053A3F52F52FCE9754E
    riv=E0908163F457576440466ACAA443AE7C
    pub=50022D5D37C97905F898E78E7AA14A0B5CAAD5CE8190AE5629A10D6F0CF4173597B37A95A7545C92 
    priv=
    ctype=0B
    
    [appldr]
    type=SELF
    revision=0004
    version=0003004100000000
    self_type=APP
    erk=838F5860CF97CDAD75B399CA44F4C214CDF951AC795298D71DF3C3B7E93AAEDA
    riv=7FDBB2E924D182BB0D69844ADC4ECA5B
    pub=1F140E8EF887DAB52F079A06E6915A6460B75CD256834A43FA7AF90C23067AF412EDAFE2C1778D69
    priv=0074E922FDEE5DC4CDF22FC8D7986477F813400860
    ctype=14
    
    [appldr]
    type=SELF
    revision=0005
    version=0003004100000000
    self_type=APP
    erk=C109AB56593DE5BE8BA190578E7D8109346E86A11088B42C727E2B793FD64BDC
    riv=15D3F191295C94B09B71EBDE088A187A
    pub=B6BB0A84C649A90D97EBA55B555366F52381BB38A84C8BB71DA5A5A0949043C6DB249029A43156F7
    priv=
    ctype=15
    
    [appldr]
    type=SELF
    revision=0006
    version=0003004100000000
    self_type=APP
    erk=6DFD7AFB470D2B2C955AB22264B1FF3C67F180983B26C01615DE9F2ECCBE7F41
    riv=24BD1C19D2A8286B8ACE39E4A37801C2
    pub=71F46AC33FF89DF589A100A7FB64CEAC244C9A0CBBC1FDCE80FB4BF8A0D2E66293309CB8EE8CFA95
    priv=
    ctype=2C
    
    [appldr]
    type=SELF
    revision=0007
    version=0003005000000000
    self_type=APP
    erk=945B99C0E69CAF0558C588B95FF41B232660ECB017741F3218C12F9DFDEEDE55
    riv=1D5EFBE7C5D34AD60F9FBC46A5977FCE
    pub=AB284CA549B2DE9AA5C903B75652F78D192F8F4A8F3CD99209415C0A84C5C9FD6BF3095C1C18FFCD
    priv=002CF896D35DB871D0E6A252E799876A70D043C23E
    ctype=15
    
    [appldr]
    type=SELF
    revision=0008
    version=0003005000000000
    self_type=APP
    erk=2C9E8969EC44DFB6A8771DC7F7FDFBCCAF329EC3EC070900CABB23742A9A6E13
    riv=5A4CEFD5A9C3C093D0B9352376D19405
    pub=6E82F6B54A0E9DEBE4A8B3043EE3B24CD9BBB62B4416B0482582E419A2552E29AB4BEA0A4D7FA2D5
    priv=
    ctype=16
    
    [appldr]
    type=SELF
    revision=0009
    version=0003005000000000
    self_type=APP
    erk=F69E4A2934F114D89F386CE766388366CDD210F1D8913E3B973257F1201D632B
    riv=F4D535069301EE888CC2A852DB654461
    pub=1D7B974D10E61C2ED087A0981535904677EC07E96260F89565FF7EBDA4EE035C2AA9BCBDD5893F99
    priv=
    ctype=2D
    
    [appldr]
    type=SELF
    revision=000A
    version=0003005500000000
    self_type=APP
    erk=29805302E7C92F204009161CA93F776A072141A8C46A108E571C46D473A176A3
    riv=5D1FAB844107676ABCDFC25EAEBCB633
    pub=09301B6436C85B53CB1585300A3F1AF9FB14DB7C30088C4642AD66D5C148B8995BB1A698A8C71827
    priv=0010818ED8A666051C6198662C3D6DDE2CA4901DDC
    ctype=25
    
    [appldr]
    type=SELF
    revision=000B
    version=0003005500000000
    self_type=APP
    erk=A4C97402CC8A71BC7748661FE9CE7DF44DCE95D0D58938A59F47B9E9DBA7BFC3
    riv=E4792F2B9DB30CB8D1596077A13FB3B5
    pub=2733C889D289550FE00EAA5A47A34CEF0C1AF187610EB07BA35D2C09BB73C80B244EB4147700D1BF
    priv=
    ctype=26
    
    [appldr]
    type=SELF
    revision=000C
    version=0003005500000000
    self_type=APP
    erk=9814EFFF67B7074D1B263BF85BDC8576CE9DEC914123971B169472A1BC2387FA
    riv=D43B1FA8BE15714B3078C23908BB2BCA
    pub=7D1986C6BEE6CE1E0C5893BD2DF203881F40D5056761CC3F1F2E9D9A378617A2DE40BA5F09844CEB
    priv=
    ctype=3D
    
    [appldr]
    type=SELF
    revision=000D
    version=0003005600000000
    self_type=APP
    erk=03B4C421E0C0DE708C0F0B71C24E3EE04306AE7383D8C5621394CCB99FF7A194
    riv=5ADB9EAFE897B54CB1060D6885BE22CF
    pub=71502ADB5783583AB88B2D5F23F419AF01C8B1E72FCA1E694AD49FE3266F1F9C61EFC6F29B351142
    priv=
    ctype=12
    
    [appldr]
    type=SELF
    revision=000E
    version=0003005600000000
    self_type=APP
    erk=39A870173C226EB8A3EEE9CA6FB675E82039B2D0CCB22653BFCE4DB013BAEA03
    riv=90266C98CBAA06C1BF145FF760EA1B45
    pub=84DE5692809848E5ACBE25BE548F6981E3DB14735A5DDE1A0FD1F475866532B862B1AB6A004B7255
    priv=
    ctype=27
    
    [appldr]
    type=SELF
    revision=000F
    version=0003005600000000
    self_type=APP
    erk=FD52DFA7C6EEF5679628D12E267AA863B9365E6DB95470949CFD235B3FCA0F3B
    riv=64F50296CF8CF49CD7C643572887DA0B
    pub=0696D6CCBD7CF585EF5E00D547503C185D7421581BAD196E081723CD0A97FA40B2C0CD2492B0B5A1
    priv=
    ctype=3A
    
    [appldr]
    type=SELF
    revision=0010
    version=0003006000000000
    self_type=APP
    version=3.60
    revision=0010
    riv=7A203D5112F799979DF0E1B8B5B52AA4
    erk=A5E51AD8F32FFBDE808972ACEE46397F2D3FE6BC823C8218EF875EE3A9B0584F
    pub=50597B7F680DD89F6594D9BDC0CBEE03666AB53647D0487F7F452FE2DD02694631EA755548C9E934
    priv=
    ctype=25
    
    [appldr]
    type=SELF
    revision=0000
    version=0000009200000000
    self_type=NPDRM
    erk=D91166973979EA8694476B011AC62C7E9F37DA26DE1E5C2EE3D66E42B8517085
    riv=DC01280A6E46BC674B81A7E8801EBE6E
    pub=A0FC44108236141BF3517A662B027AFC1AC513A05690496C754DEB7D43BDC41B80FD75C212624EE4
    priv=
    ctype=11
    
    [appldr]
    type=SELF
    revision=0001
    version=0001000000000000
    self_type=NPDRM
    erk=F9EDD0301F770FABBA8863D9897F0FEA6551B09431F61312654E28F43533EA6B
    riv=A551CCB4A42C37A734A2B4F9657D5540
    pub=B05F9DA5F9121EE4031467E74C505C29A8E29D1022379EDFF0500B9AE480B5DAB4578A4C61C5D6BF
    priv=00040AB47509BED04BD96521AD1B365B86BF620A98
    ctype=11
    
    [appldr]
    type=SELF
    revision=0002
    version=0001000000000000
    self_type=NPDRM
    erk=8E737230C80E66AD0162EDDD32F1F774EE5E4E187449F19079437A508FCF9C86
    riv=7AAECC60AD12AED90C348D8C11D2BED5
    pub=05BF09CB6FD78050C78DE69CC316FF27C9F1ED66A45BFCE0A1E5A6749B19BD546BBB4602CF373440
    priv=
    ctype=0A
    
    [appldr]
    type=SELF
    revision=0003
    version=0003001500000000
    self_type=NPDRM
    erk=1B715B0C3E8DC4C1A5772EBA9C5D34F7CCFE5B82025D453F3167566497239664
    riv=E31E206FBB8AEA27FAB0D9A2FFB6B62F
    pub=3F51E59FC74D6618D34431FA67987FA11ABBFACC7111811473CD9988FE91C43FC74605E7B8CB732D
    priv=
    ctype=08
    
    [appldr]
    type=SELF
    revision=0004
    version=0003004000000000
    self_type=NPDRM
    erk=BB4DBF66B744A33934172D9F8379A7A5EA74CB0F559BB95D0E7AECE91702B706
    riv=ADF7B207A15AC601110E61DDFC210AF6
    pub=9C327471BAFF1F877AE4FE29F4501AF5AD6A2C459F8622697F583EFCA2CA30ABB5CD45D1131CAB30
    priv=00B61A91DF4AB6A9F142C326BA9592B5265DA88856
    ctype=16
    
    [appldr]
    type=SELF
    revision=0005
    version=0003004000000000
    self_type=NPDRM
    erk=B73111B0B00117E48DE5E2EE5E534C0F0EFFA4890BBB8CAD01EE0F848F91583E
    riv=86F56F9E5DE513894874B8BA253334B1
    pub=B0BA1A1AB9723BB4E87CED9637BE056066BC56E16572D43D0210A06411DBF8FEB8885CD912384AE5
    priv=
    ctype=12
    
    [appldr]
    type=SELF
    revision=0006
    version=0003004000000000
    self_type=NPDRM
    erk=8B4C52849765D2B5FA3D5628AFB17644D52B9FFEE235B4C0DB72A62867EAA020
    riv=05719DF1B1D0306C03910ADDCE4AF887
    pub=2A5D6C6908CA98FC4740D834C6400E6D6AD74CF0A712CF1E7DAE806E98605CC308F6A03658F2970E
    priv=
    ctype=29
    
    [appldr]
    type=SELF
    revision=0007
    version=0003005000000000
    self_type=NPDRM
    erk=3946DFAA141718C7BE339A0D6C26301C76B568AEBC5CD52652F2E2E0297437C3
    riv=E4897BE553AE025CDCBF2B15D1C9234E
    pub=A13AFE8B63F897DA2D3DC3987B39389DC10BAD99DFB703838C4A0BC4E8BB44659C726CFD0CE60D0E
    priv=009EF86907782A318D4CC3617EBACE2480E73A46F6
    ctype=17
    
    [appldr]
    type=SELF
    revision=0008
    version=0003005000000000
    self_type=NPDRM
    erk=8E944267C02E69A4FE474B7F5FCD7974A4F936FF4355AEC4F80EFA123858D8F6
    riv=908A75754E521EAC2F5A4889C6D7B72D
    pub=91201DA7D79E8EE2563142ECBD646DA026C963AC09E760E5390FFE24DAE6864310ABE147F8204D0B
    priv=
    ctype=13
    
    [appldr]
    type=SELF
    revision=0009
    version=0003005000000000
    self_type=NPDRM
    erk=0786F4B0CA5937F515BDCE188F569B2EF3109A4DA0780A7AA07BD89C3350810A
    riv=04AD3C2F122A3B35E804850CAD142C6D
    pub=A1FE61035DBBEA5A94D120D03C000D3B2F084B9F4AFA99A2D4A588DF92B8F36327CE9E47889A45D0
    priv=
    ctype=2A
    
    [appldr]
    type=SELF
    revision=000A
    version=0003005500000000
    self_type=NPDRM
    erk=03C21AD78FBB6A3D425E9AAB1298F9FD70E29FD4E6E3A3C151205DA50C413DE4
    riv=0A99D4D4F8301A88052D714AD2FB565E
    pub=3995C390C9F7FBBAB124A1C14E70F9741A5E6BDF17A605D88239652C8EA7D5FC9F24B30546C1E44B
    priv=009AC6B22A056BA9E0B6D1520F28A57A3135483F9F
    ctype=27
    
    [appldr]
    type=SELF
    revision=000B
    version=0003005500000000
    self_type=NPDRM
    erk=BB31DF9A6F62C0DF853075FAA65134D9CE2240306C1731D1F7DA9B5329BD699F
    riv=263057225873F83940A65C8C926AC3E4
    pub=BC3A82A4F44C43A197070CD236FDC94FCC542D69A3E803E0AFF78D1F3DA19A79D2F61FAB5B94B437
    priv=
    ctype=23
    
    [appldr]
    type=SELF
    revision=000C
    version=0003005500000000
    self_type=NPDRM
    erk=337A51416105B56E40D7CAF1B954CDAF4E7645F28379904F35F27E81CA7B6957
    riv=8405C88E042280DBD794EC7E22B74002
    pub=9BFF1CC7118D2393DE50D5CF44909860683411A532767BFDAC78622DB9E5456753FE422CBAFA1DA1
    ctype=18
    
    [appldr]
    type=SELF
    revision=000D
    version=0003005600000000
    self_type=NPDRM
    erk=357EBBEA265FAEC271182D571C6CD2F62CFA04D325588F213DB6B2E0ED166D92
    riv=D26E6DD2B74CD78E866E742E5571B84F
    pub=00DCF5391618604AB42C8CFF3DC304DF45341EBA4551293E9E2B68FFE2DF527FFA3BE8329E015E57
    priv=
    ctype=3A
    
    [appldr]
    type=SELF
    revision=000D
    version=0003005600000000
    self_type=NPDRM
    erk=337A51416105B56E40D7CAF1B954CDAF4E7645F28379904F35F27E81CA7B6957
    riv=8405C88E042280DBD794EC7E22B74002
    pub=9BFF1CC7118D2393DE50D5CF44909860683411A532767BFDAC78622DB9E5456753FE422CBAFA1DA1
    ctype=18
    
    [appldr]
    type=SELF
    revision=000E
    version=0003005600000000
    self_type=NPDRM
    erk=71AA75C70A255580E4AE9BDAA0B08828C53EAA713CD0713797F143B284C1589B
    riv=9DED878CB6BA07121C0F50E7B172A8BF
    pub=387FCDAEAFF1B59CFAF79CE6215A065ACEAFFAF4048A4F217E1FF5CE67C66EC3F089DB235E52F9D3
    priv=
    ctype=29
    
    [appldr]
    type=SELF
    revision=000F
    version=0003005600000000
    self_type=NPDRM
    erk=135C098CBE6A3E037EBE9F2BB9B30218DDE8D68217346F9AD33203352FBB3291
    riv=4070C898C2EAAD1634A288AA547A35A8
    pub=BBD7CCCB556C2EF0F908DC7810FAFC37F2E56B3DAA5F7FAF53A4944AA9B841F76AB091E16B231433
    priv=
    ctype=3B
    
    [appldr]
    type=SELF
    revision=0010
    version=0003006000000000
    self_type=NPDRM
    erk=A5E51AD8F32FFBDE808972ACEE46397F2D3FE6BC823C8218EF875EE3A9B0584F
    riv=7A203D5112F799979DF0E1B8B5B52AA4
    pub=50597B7F680DD89F6594D9BDC0CBEE03666AB53647D0487F7F452FE2DD02694631EA755548C9E934
    priv=
    ctype=25
    For those curious, below are some PlayStation 3 games which are reported as being 3.6 Firmware titles, however, some of them have already been fixed and are working on PS3 Custom Firmware:
    • Air Conflicts: Secret Wars
    • Alice: Madness Returns
    • Ape Escape On The Move
    • Arcana Heart 3
    • Atelier Meruru: The Apprentice of Arland (Japanese release)
    • Brink
    • Captain America: Super Soldier
    • Catherine
    • Crysis
    • Deus Ex: Human Revolution
    • Dirt 3
    • Duke Nukem Forever
    • Dynasty Warriors Gundam 3
    • Earth Defense Force: Insect Armageddon
    • El Shaddai: Ascension of the Metatron
    • F.E.A.R 3
    • Green Lantern: Rise of the Manhunters
    • Harry Potter and the Deathly Hallows: Part 2
    • Hunted: The Demons Forge
    • inFAMOUS 2
    • inFAMOUS 2: Festival of Blood
    • Kung Fu Panda 2
    • LA Noir
    • LEGO Pirates of the Caribbean: The Video Game
    • Let's Dance with Mel B
    • MLB 2011: The Show
    • MX vs. ATV Alive
    • Naruto Shippuden: Ultimate Ninja Storm 2
    • Nascar The Game 2011
    • National Geographic Challenge
    • NCAA Football 12
    • Need for Speed: Shift 2 - Unleashed
    • Operation Flashpoint: Red River
    • Phineas and Ferb Across the 2nd Dimension
    • Portal 2
    • Prince of Persia Trilogy 3d
    • Record of Agarest War Zero
    • Red Faction: Armageddon
    • Sniper: Ghost Warrior
    • Supremacy MMA
    • The Penguins of Madagascar: Dr. Blowhole Returns
    • Thor: God of Thunder
    • Transformers: Dark of the Moon
    • Warriors: Legends of Troy
    • White Knight Chronicles II

    From the PlayStation 3 Developer Wiki (via ps3devwiki.com/wiki/KaKaRoTo_Kind_of_%C2%B4Jailbreak%C2%B4#3.60_keys_U pdate):

    PS3 3.60 keys Update

    Q: Recently 3.60 keys surfaced (lv1ldr, lv2ldr, isoldr, appldr), what does this mean for this release and the future?
    A: That is actually a multiparted answer: Now that several binairies (Iso module + CoreOS minus the loaders that are inside lv0) can be decrypted, more investigation can be done in them, which give a new boost in (unrelated to the HeN) other targets, like:
    • Hardwareless downgrades : Downgrading with PSgrade Dongle (lv1.self)
    • QA Flagging / systemtokens (spu_token_processor.self) and usertokens (spu_utoken_processor.self)
    • PS2 compatibility (mc_iso_spu_module.self , me_iso_for_ps2emu.self , sv_iso_for_ps2emu.self)
    • Getting per_console_root_key_1 / EID_root_key on 3.56+/slim3K (lv1.self , aim_spu_module.self)
    • Backsigning applications for <=3.55 and patch sys_proc_param_version (appldr.self , lv2_kernel.self)

    Q: So does this mean a future release would be sooner?
    A: Only God knows But it can also be that because of the above, it would become meaningless/surpassed by better progress. So lets all hope for the best

    Also from PS3 Dev Wiki (ps3devwiki.com/wiki/Talk:Playstation_Update_Package_%28PUP%29#Adding_n ew_keys_to_older_firmwares):

    Adding new keys to older firmware
    • Patch the loaders
    • Add keys to appldr keys index & tables
    • There are also npdrm keys inside appldr as well, add the 3.56++ ones
    • appldr,. lv2.self and game_ext_plugin need patching for new games support
    • vsh.self maybe too

    Note: PlayStation 3 developer Rogero has confirmed he started working already.. stating eventually it will be possible to do a new PS3 CFW so EBOOT converters are not necessary.

    From Sony PS3 hacker deank: They also posted my ebootFIX/ebootMOD tools prepackaged (linked above) with the keys in .ps3 folder, so it is ready to be used like in the old 3.41/3.55 days.

    Have in mind that some games (like Sniper Ghost Warrior) have additional .self/.sprx files and it is better to use ebootFIX by dragging the PS3_GAME folder to it - it will find and fix all necessary files. If you use ebootMOD you'll have to search for these files yourself and 'fix' them one by one.

    How to Use SCETool to Decrypt a PS3 3.60 EBOOT.BIN File Guide:

    [vcdLAKERS] for those of you who want to decrypt a 3.60 EBOOT.BIN use scetool
    [vcdLAKERS] download scetool_0.2.7.zip unzip it to C:\scetool
    [vcdLAKERS] create a new folder inside scetool and name it data
    [vcdLAKERS] and download these files here:
    • keys: ps3devwiki.com/files/devtools/scetool/data/keys
    • ldr_curves: ps3devwiki.com/files/devtools/scetool/data/ldr_curves
    • vsh_curves: ps3devwiki.com/files/devtools/scetool/data/vsh_curves

    [vcdLAKERS] and put them inside data folder
    [vcdLAKERS] put your EBOOT.BIN file in scetool folder
    [vcdLAKERS] go to start - run - cmd and cd to the folder were scetool is
    [vcdLAKERS] for example "cd C:\scetool"
    [vcdLAKERS] then type this command to decrypt the EBOOT.BIN:
    [vcdLAKERS] scetool -d EBOOT.BIN EBOOT.ELF
    [vcdLAKERS] and use this one to encrypt it to 3.41 :
    [vcdLAKERS] C:\scetool>scetool -0=SELF -5=APP -6=0003004100000000 -e EBOOT.elf E
    [vcdLAKERS] BOOT.BIN

    From Billal (aka S.B.M) comes a few corrections to the above guide, as follows:

    You have to leave a space between an (abbreviated) option and a parameter not an equal sign "="
    It lacks the option for key revision "-2 0004" or "--key-revision=0004"

    This is the correct command: C:\scetool>scetool -0 SELF -1 TRUE -s TRUE -2 0004 -3 1010000001000003 -4 01000002 -5 APP -6 0003004100000000 -e EBOOT.elf EBOOT.self

    How to Use SCETool to Decrypt a PS3 3.60 EBOOT.BIN File (Revised) Guide:
    • For those of you who want to decrypt a 3.60 EBOOT.BIN use scetool by naehrwert.
    • Download scetool_0.2.7.zip unzip it to C:\scetool
    • Create a new folder inside scetool and name it data and download the data files from the previous guide and put them inside data folder
    • Put your EBOOT.BIN file in scetool folder
    • Go to start > run > cmd and cd to the folder were scetool is for example "cd C:\scetool"
    • Then type this command to decrypt the EBOOT.BIN: scetool -d EBOOT.BIN EBOOT.ELF
    • And use this one to encrypt it to 3.41: C:\scetool>scetool -0 SELF -1 TRUE -s TRUE -2 0004 -3 1010000001000003 -4 01000002 -5 APP -6 0003004100000000 -e EBOOT.elf EBOOT.self
    • Or you can use ScetoolGui (ps3devwiki.com/files/devtools/scetool/ScetoolGui.exe)
    • Download and copy ScetoolGui.exe to your scetool folder
    • Open it > click browse file and select your game EBOOT.BIN
    • Then click decrypt, scetool will decrypt your "eboot.bin" and create a new file "eboot.elf" (decrypted eboot.bin)
    • To resign "eboot.elf" for lower fw (3.41) activate enable encryption: in self type choose APP and in SELF fw version write 3.41 and click encrypt.
    • Don't forget to rename EBOOT.self to EBOOT.BIN.

    From defaultdnb comes another brief How-To Guide:
    • Download the keys folder for 3.60.
    • Download deank's ebootfix.
    • Add keys to eboot fix .PS3 folder.
    • Drag PS3_GAME folder from 3.60 game info the ebootfix.exe
    • Profit.

    From andreus: Ok, so for the updates do this:

    1. So first go get the scetool (ps3devwiki.com/files/devtools/scetool/) Download the entire directory and subdirectories and unzip the latest version 0.2.7
    2. Create a batch file named "eboot360npdrmfix.bat" in scetool folder with this code:
    Code:
    scetool.exe --decrypt EBOOT.BIN EBOOT.ELF
    rename EBOOT.BIN EBOOT_ORIGINAL.BIN
    scetool.exe --sce-type=SELF --compress-data=TRUE --skip-sections=TRUE --key-revision=00,01 --self-auth-id=1010000001000003 --self-vendor-id=01000002 --self-type=NPDRM --self-fw-version=0003004100000000 --np-license-type=FREE --np-content-id=%~1 --np-app-type=EXEC --np-real-fname=EBOOT.BIN --encrypt EBOOT.ELF EBOOT.BIN
    del /Q EBOOT.ELF
    pause
    scetool -i EBOOT.BIN
    pause
    3. Put the EBOOT.BIN in the scetool main folder
    4. Do this command
    Code:
    scetool.exe -i EBOOT.BIN
    And get the ContentID
    5. Run from dos prompt
    Code:
    eboot360npdrmfix.bat <ContentID-you-got-in-step-4>
    It pauses when you encrypt the file and them shows the info of the new EBOOT.BIN for you to check.
    6. You should now have an EBOOT.BIN NPDRM signed. If you want to put it in the package, use psn_package_npdrm.exe to create the package.

    How to Use AldosTools Applications Guide:

    1. For retail disks signed with 3.60 keys: Copy all eboot.bin/SPRX/SELF/SFO files to the tool directory and run eboot_fix.bat, them copy the reasigned files to your game backup directory. This tool will reasign all files with 3.40+ keys (works on 3.40+ cfw), reasign the sys_proc_param to 3.40 and change the sfo to 3.40

    2. For game updates signed with 3.60 keys: Extract the package, copy EBOOT.BIN/PARAM.SFO and all SPRX/SELF files to the bruteforce tool directory

    2.1 If it only uses EBOOT.BIN and PARAM.SFO, just run eboot_fix.bat
    2.2 If also have SPRX/SELF files
    2.2.1 If SELF file is equal to eboot.bin use bruteforce tool and it will autodetect and just create a reassigned copy of EBOOT.BIN (deank method)
    2.2.2 Else, you have to bruteforce with bruteforce tool to get the klic so you can decrypt the SELF/SPRX files and them reassign them

    When you have all files reasigned, them create a fix update package. Extra: If do not want to be disturbed with game updates with 3.65+ keys change PARAM.SFO APP_VERSION to 9.99. Note: This tool can't manage sdat, edat files

    Convert PS3 3.60 Games / Patches to 3.55 Guide By JayDee78

    Download this, it contains all the tools need:

    Download and unrar to a folder. Also, use sfoedit to change the param.sfo to 3.55/3.41 instead of 3.60. I'll use Dirt 3 (BLES01287) in this example. Get the EP4001-BLES01287_00-DIRT3PATCHEU0101-A0101-V0100-PE.pkg patch and start Pkgview 1.3.

    Drag and drop the Dirt 3 pkg patch in the left window, right click in it, and "extract to source directory"

    Cut the eboot.bin from the "PkgView_1.3\EP4001-BLES01287_00-DIRT3PATCHEU0101-A0101-V0100-PE\BLES01287\USRDIR" and paste it in the SCETOOL folder. In the SCETool folder hold down the shift button+right click in the window and choose "open cmd window"

    Write "ebootfix EP4001-BLES01287_00-DIRT3PATCHEU0101" and it starts decrypting the file. Take the EBOOT.bin (not ORGINAL_EBOOT.bin) and copy it back to the USRDIR folder you first got it.

    Now cut the BLES01287 folder and paste it in the psn_package_npdrm folder (package.conf in here needs to change package version from 1.04 to 1.01 but the rest is already setup for DIRT3). Again, open a cmd window (shift+right click) and write "psn_package_npdrm.exe package.conf BLES01287"

    Wait until finished, install the new pkg and play Dirt 3. Guide works for all 3.60 games/patches (WITHOUT selfs & sprx files These are ten times harder to decrypt and fix up to a proper retail level...) Hope someone gets some use from this

    From Spanish site [Register or Login to view links] comes [Register or Login to view links] with a brief guide (roughly translated) as follows:

    Here are the manuals:
    • You must copy the keys (. Ps3keys) in your user folder (C: \ Users \ XXXX \. Ps3keys) if you have Windows, if you want to use Cygwin or Linux you get the keys (. Ps3) in your user folder (home \ XXXXXX \. PS3), you should copy the two folders.
    • Just put in the command (cmd / terminal) the command to decrypt would be: EBOOT.BIN unself EBOOT.ELF
    • To encrypt this: EBOOT.ELF make_self EBOOT.BIN
    • The easiest is to drag the console, otherwise you must move the directories to where the exe / bin and decrypt / fix are.




    PsDev has made available [Register or Login to view links] followed by the [Register or Login to view links] from coreylad which may be of use to those seeking a PlayStation 3 version 3.60 Custom Firmware (CFW) update

    To quote: The files in the download below are all from the 3.60 Core_OS and I decrypted using the 3.60 keys.

    The files that were unselfed were:
    • aim_spu_module
    • emer_init
    • lv1.self
    • lv2_kernal
    • manu_info_spu_module
    • mc_iso_spu_module
    • me_iso_spu_module
    • sb_iso_spu_module
    • sc_iso
    • spp_verifier
    • spu_pkg_rvk_verifier
    • spu_token_processor
    • spu_utoken_processor
    • sv_iso_spu_module

    Also like to thanks naehrwert.

    PS3 developer SiLENTGame has made available PS3 Hack Checker v0.1 followed by [Register or Login to view links] stating:

    I was bored and so I have written a little tool which grabs the latest "hack status" of the PS3. I think the screenshot below says everything. I hope you like it. I'm thankful for suggestions, bug reports or anything else. So long.

    It's important to note that currently PS3 CECH-3nnnX/CECH-4nnnX (and some CECH-2500X) console models cannot be downgraded though.

    v0.2 Changelog:
    • hackable firmware fixed
    • firmware downgrade information added
    • key information added
    • DEX converting information added

    PlayStation 3 developer Deviance has made available [Register or Login to view links] followed by [Register or Login to view links] which is a PS3 EBoot Grabber with the following features:

    This application is designed to make life easier to download Eboots. Since it’s the initial release, The database is still quite small but will be updated over time to add more additions. Very simple to use. Click the game and press go!

    What's new?
    • Initial release

    Notes
    • Planning on adding descriptions and make sure you are using the latest eboot
    • Buy me a beer! (Info in about tab)
    • If the eboot download gets removed. Just wait and a new link will be in the db.

    Update
    • Database updated
    • If you’re experiencing graphical issues when running the application, try [Register or Login to view links] version.

    About
    • Freeloader is an app for windows that has a database full of the latest 3.60 Eboots to be easily downloadable.

    What's new in V0.2?
    • Spiffy Gui
    • PS ID’s added
    • Regions Added
    • Descriptions Added
    • (Bugfix) Corrected how it grabbed the database
    • A new database layout. (Lots of new titles added)
    • The db will have even more titles soon. (Only a one man band)

    PlayStation 3 developer aryaei (aka aryasoft2872) has made available [Register or Login to view links] (requires [Register or Login to view links]) followed by [Register or Login to view links] which assists users in fixing PS3 3.6 games automatically.

    You have to just enter the title ID and after click on "Do It!" it will automatically download patches and then fix the latest one for you. This app also has an option that will fix EBOOT.BIN without downloading updates.

    FYI:

    1- if you have downloaded files before and you just want to fix them put them in application's folder.after checking the sony server if file exists it will skip that file and will start to fix
    2- to copy download Download Link double click on it
    3- this app doesn't changes PARAM.SFO (Some times changing PARAM.SFO causes some problem in packing) to prevent Update error enable the spoof on your cfw
    4- here is a example of which files to install
    for example i want to update and install Gran Turismo 5

    1- Enter BCES00569
    2- it will automatically download the 9 files:
    Code:
    "EP9001-BCES00569_00-0000000000000000-A0105-V0100-PE.pkg"
    ...
    "EP9001-BCES00569_00-0000000000000000-A0113-V0100-PE.pkg"
    After download finished the application will automatically fix the latest patch (in this case:"EP9001-BCES00569_00-0000000000000000-A0113-V0100-PE.pkg") and will make a new file which is fixed for 3.55 with following name: EP9001-BCES00569_00-0000000000000000.pkg (The last part of name has been removed.)

    Now you have to install following 8 files:
    Code:
    EP9001-BCES00569_00-0000000000000000-A0105-V0100-PE.pkg
    ...
    EP9001-BCES00569_00-0000000000000000-A0112-V0100-PE.pkg
    And then install the latest update which is fixed by application (EP9001-BCES00569_00-0000000000000000.pkg)

    Changelog v1.2:
    Version 1.2 is ready to download...
    • Added:Sign and repack specific PKG.
    • Fixed: 8001003C error
    • Improvements in fixing and file managing.
    • Fixed: blur bog
    • Minor UI Changes.
    • Fixed: some of minor bugs

    Changelog v1.1:
    • Fixed some bugs
    • Updated scetool to latest version to have better fixing.
    • Added Option to just fix EBOOT.BIN.
    • Some minor improvements in code.

    Asure (via pastie.org/4407666) has made a [Register or Login to view links] that can bruteforce the klic key from PS3 EBOOTs that use/load SELF/SPRX files stating the followng:
    Code:
    @Echo
     off
    SET OFFSET=0
    :START
    FOR /F "tokens=*" %%i in ('"od -j%OFFSET% -N16 -w16 -t x1 eboot.elf | cut -c 8- |sed 's/ //g'"') do SET KEY=%%i
    if %KEY% == 00000000000000000000000000000000 (
    echo Skipped 10 bytes of blank/useless key at %OFFSET%
    set /a OFFSET+=10
    ) else (
    ECHO Trying Key: %KEY% from decimal offset: %OFFSET%
    scetool.exe -l %KEY% -d default.self selfout.elf >nul
    set /a OFFSET+=1
    )
    IF EXIST selfout.elf GOTO END
    goto START
    :end
    echo Done! Key used was: %KEY%
    You need to put this into a folder with scetool, data / keys etc. working. Then drop an eboot.bin and decrypt it with scetool into eboot.elf. The drop an encrypted self, or sprx and modify the bat file a little perhaps.

    The needed linux tools like od.exe, sed.exe, can all be found in the package above. If you want to test with say, portal 2 sprx files, you can try starting at offset 608600. MW3 around offset 54272.. The batch file is not perfect. On large files, the CUT command starts to malfunction as i don't take this into account with the sed/cut combo. Some PS3 game key examples are located HERE and also below in full.

    From deank: The other day someone sent me eboot+self for "Ryu ga Gotoku of the End" (Yakuza). It is one of these games (like Rock Band 3) which cannot be 'decrypted' using a k_lic, so here is the "ogrez.self" patched for 3.55.

    Download: [Register or Login to view links]

    You can prepare a fixed update pkg by using the original pkg + the fixed eboot.bin and this fixed ogrez.self. It is pretty simple once you figure it out

    You will notice that in some game updates you have:
    • EBOOT.BIN
    • blabla.self

    Where both files are "the same". They are not 1:1 the same, because they're encrypted with different keys, but if you look at the prog/data sections and the offsets - you will see what I mean. Also the sizes are the same. I noticed this 'update' approach back in 2010 with "Prince of Persia TFS" and with some other games, so I decided to try that. Both in this game and Rock Band there are no references to the .self and no k_lic... either.

    What you have to do is:

    1) Decrypt the EBOOT.BIN to .elf
    2) Use scetool to create NPDRM NPTYPE=UPDATE with key 00, contentID=game-update-content-id, and np-original-name=name_of_the_self.
    3) You get the new blabla.self and use it

    For example for this yakuza game you'll notice that the info for the eboot.bin and the ogrez.self are the same:
    Code:
    ELF64 Program Headers:
     Idx Type     Offset   VAddr    PAddr    FileSize MemSize  PPU SPU RSX Align
     000 LOAD     00000000 00010000 00010000 012FF068 012FF068 X-R --R --- 00010000
     001 LOAD     01300000 01310000 01310000 001E31F8 00405B08 -WR -WR --- 00010000
     002 LOAD     014E31F8 00000000 00000000 00000000 00000000 --R --- --- 00010000
     003 LOAD     014E31F8 00000000 00000000 00000000 00000000 -WR --- --- 00010000
     004 LOAD     014E31F8 00000000 00000000 00000000 00000000 -WR -WR -WR 00010000
     005 TLS      013401AC 013501AC 013501AC 00000008 000002A0 --R --- --- 00000008
     006 PARAMS   012FF000 0130F000 0130F000 00000028 00000028 --- --- --- 00000008
     007 PRX      012FF028 0130F028 0130F028 00000040 00000040 --- --- --- 00000004
    
    ELF64 Section Headers:
    
     Idx Name Type          Flags Address    Offset   Size     ES   Align    LK
     000 0000 NULL          ---   00000000   00000000 00000000 0000 00000000 000
     001 000B PROGBITS      -AE   00010200   00000200 0000002C 0000 00000004 000
     002 001F PROGBITS      -AE   00010230   00000230 010E31E8 0000 00000010 000
     003 0011 PROGBITS      -AE   010F3418   010E3418 00000024 0000 00000004 000
     004 0017 PROGBITS      -AE   010F343C   010E343C 00002D20 0000 00000004 000
     005 0025 PROGBITS      -AE   010F6160   010E6160 00016A7C 0000 00000004 000
     006 002C PROGBITS      -A-   0110CBDC   010FCBDC 00002894 0000 00000004 000
     007 0040 PROGBITS      -A-   0110F470   010FF470 000005A4 0000 00000004 000
     008 0050 PROGBITS      -A-   0110FA14   010FFA14 00000004 0000 00000004 000
     009 005D PROGBITS      -A-   0110FA18   010FFA18 00000038 0000 00000004 000
     010 0066 PROGBITS      -A-   0110FA50   010FFA50 00000004 0000 00000004 000
     011 0073 PROGBITS      -A-   0110FA54   010FFA54 00000004 0000 00000004 000
     012 0081 PROGBITS      -A-   0110FA58   010FFA58 000003F4 0000 00000004 000
     013 008B PROGBITS      -A-   0110FE4C   010FFE4C 00000004 0000 00000004 000
     014 0099 PROGBITS      -A-   0110FE80   010FFE80 0012FE68 0000 00000080 000
     015 00A1 PROGBITS      WA-   0123FD00   0122FD00 000CF300 0000 00000080 000
     016 00AC PROGBITS      WA-   0130F000   012FF000 00000028 0000 00000008 000
     017 00BC PROGBITS      -A-   0130F028   012FF028 00000040 0000 00000004 000
     018 00D0 PROGBITS      WA-   01310000   01300000 000014DC 0000 00000004 000
     019 00D7 PROGBITS      WA-   013114DC   013014DC 000000E8 0000 00000004 000
     020 00DE PROGBITS      WA-   013115C4   013015C4 00000004 0000 00000004 000
     021 00E3 PROGBITS      WA-   013115C8   013015C8 0000328C 0000 00000008 000
     022 00F0 PROGBITS      WA-   01314854   01304854 000005A4 0000 00000004 000
     023 00FF PROGBITS      WA-   01314DF8   01304DF8 00034B20 0000 00000008 000
     024 0104 PROGBITS      WA-   01349918   01339918 00006894 0000 00000008 000
     025 0109 PROGBITS      WA-   013501AC   013401AC 00000008 0000 00000004 000
     026 0110 NOBITS        WA-   013501B8   013401B4 00000294 0000 00000008 000
     027 0116 PROGBITS      WA-   01350480   01340480 001A2D78 0000 00000080 000
     028 011C NOBITS        WA-   014F3200   014E31F8 00222908 0000 00000080 000
     029 0121 PROGBITS      ---   00000000   014E31F8 00000CA8 0000 00000004 000
     030 0130 PROGBITS      ---   00000000   014E3EA0 00004A52 0000 00000001 000
     031 0001 STRTAB        ---   00000000   014E88F2 0000013C 0000 00000001 000
    There is no universal approach. Sizes must be equal (not more or less) and to be sure that there is no k_license involved you can either check if the .self is referenced in the eboot.bin or you'll have to use IDA to make sure that NP functions use NULL k_lic... (or find the k_license location in IDA using the NP functions).

    A simple bat/cmd script to compare the PROGBITS sections of 2 files (like EBOOT.BIN and ogrez.self): check.cmd
    Code:
    @scetool -i %1 | find " PROGBITS">1.txt
    @scetool -i %2 | find " PROGBITS">2.txt
    @type 1.txt
    @echo ===============
    @type 2.txt
    @echo ===============
    @fc /b 1.txt 2.txt | find "FC: no diff"
    @del /q 1.txt 2.txt
    Code:
    C:\>check YAK4-BLJM60316-EBOOT.BIN YAK4-BLJM60316-ogrez.self
    
    FC: no differences encountered
    If they match (i.e. no differences) then there is a very good chance that you only need to re-self the eboot.bin to the desired .self without the need of a license key.

    From aldostools.org/temp/klics.txt:
    Code:
    00000000000000000000000000000000 No_klic
    72F990788F9CFF745725F08E4C128387 NP_klic_free
    34EC7BB9F4BAEE7312C373008BD3CDD6 Alice Madness [NPUB30545]
    12345678901233456654643654654646 Alien Spidy [NPEB01022] [EP4365-NPEB01022_00-ALIENSPIDYTRIAL0]
    78BEA6D6EBF0D74C676BED0EB9CE74FB Alpha Mission 2 [NPUB30263]
    01255725585727598445648785573384 Arcana Heart 3 [BLES01295] [BLJM60248] [BCAS20162] [JP0036-BLJM60248_00-AH30UPDATEDATA01]
    51BE4195553454C45535350415443481 Army of TWO™ The 40th Day (1.03) [BLUS30408] [BLES00659] [BLJM60216] [BLAS50174] [BLJM60308] [UP0006-BLUS30408_00-PATCH03NTSC00000]
    00000000000000000000000000000000 Army of TWO The Devil's Cartel [BLUS31069] [BLES01763] [BLES01767] [BLJM60578] [EP0006-BLES01763_00-AO4PATCH00000001-A0101-V0100-PE]
    CBFD3382C28193A18FCBDA55A0790037 Art Of Fighting [NPUB30261]
    B71AD35199684E25A7E75AFA7DE062BA Assassin's Creed 2 [BLUS30364] [BLUS30446] [BLES00897] [BLES00751] [BLES00669] [BLES00670] [BLJM60233] [BLAS50359] [BLKS20167] [BLAS50159] [BLJM60185] [BLES00899] [NPUB30423] [UP0001-BLUS30364_00-AC2PATCH00000002]
    b72ae85131684e25a78f5a007de06211 Assassin's Creed 2 [NPUB30423] [UP0001-NPUB30423_00-ASSASSINS2BLURAY]
    1193590B4DDE4F5B8E44F5F14877D0B6 Assassin's Creed Brotherhood [BLUS30537] [BLES00900] [BLES00909] [BLES00910] [BLES00911] [BLKS20231] [BLAS50278] [BLJM60250] [BLJM60995]
    6192A450CF1047340358847650057061 Assassin's Creed Brotherhood [NPUB30522] 
    1193590B4DDE4F5B8E44F5F14877D0B6 Assassin's Creed : Revelations [BLUS30905] [BLES01466] [BLES01385] [BLES01467] [BLES01384] [BLUS30808] [BLJM60412] [BLAS50418] [NPUB30707] [EP0001-BLES01467_00-ACRTITLEUPDATE04]
    B6D07748F1F5448E5B4FDE4D0B599311 Assassin's Creed : Revelations [BLUS30905] [BLES01466] [BLES01385] [BLES01467] [BLES01384] [BLUS30808] [BLJM60412] [BLAS50418] [NPUB30707]
    101F0773FF5E491BA7320268119B1A0E Assassin's Creed ™ 3 [BLUS30991] [BLES01667] [BLES01668] [BLES01669] [BLJM60516] [EP0001-BLES01667_00-AC3TITLEUPDATE10]
    2D50F83BD7C631C2239ADC2BA4DF252F Baseball Stars Professional [NPUB30262]
    00000000000000000000000000000000 BATTLEFIELD 3 (1.05) [BLUS30762] [BLES01275] [BLAS50380] [BLAS50384] [BLJM60384] [NPEB00723]
    52603623339298839913596131407815 BioShock [NPUB90156] [NPJB90159] [NPEB90102] [BLUS30166] [BLES00317] [BLES00316] [BLJS10041] [EP1001-NPEB90102_00-BIOSHOCKDEMO0001]
    643F1B7BB3550335CF2D6051864F270B BioShock 2 [BLUS30420] [BLUS30486] [BLES00728] [BCJS10078] [BLJS10078] [BLAS50179] [BLKS20146] [UP1001-BLUS30420_00-BS2PATCHSCEAF003]
    0DEEDFB225F65975E685B78206537EF2 BioShock Infinite [BLUS30629] [NPUB31128] [BLES01705] [NPEB01290] [BLJS10207] [EP1001-BLES01705_00-BSIDSCPATCHPSCEE] [UP1001-BLUS30629_00-BSIDSCPATCHPSCEA]
    01255725585727598445648785573384 BlazBlue Continuum Shift (1.04) [BLUS30576] [BLES01119] [BLJM60237] [BLJM60238] [UP1024-BLUS30576_00-BBCSUPDATEDATA04]
    00000000000000000000000000000000 Burnout Crash [NPUB30464] [NPEB00529] [NPJB00139]
    388D8E0B5D2D11F9F300F94073082FDE Buzz! Junior: Jungle Party [NPEA00112] [NPEA00092] [EP9000-NPEA00092_00-PBUZZJUNIO000001] [EP9000-NPEA00112_00-DINOPARTY0000000]
    8E04D2B229D4FC4DA48D08EC815E9267 Call Of Duty® Classic [NPUB30065] [UP0002-NPUB30065_00-CALLOFDUTYCLSCEN]
    AF0A8F0A8909F09234091AFADF909AF0 Call of Duty® Black Ops (1.13) [BLUS30591] [BLUS30625] [BLUS30638] [BLES01031] [BLES01032] [BLES01033] [BLES01034] [BLES01035] [BLES01105] [BLJM60286] [BLJM60287] [BLJM60536] [BLJM60537] [BLJM61004] [BLJM61005] [BLKS20228] [BLES00356]
    8C10AC1473DF38ADD7A4F2EE8C838DAB Call of Duty® Black Ops II (1.03) [BLUS31011] [BLUS31140] [BLES01717] [BLES01718] [BLES01720] [BLUS31141] [NPUB31054] [EP0002-BLES01717_00-CODBLOPS2PATCH03]
    E7646A32C4F34762C1F58241DD8374F2 Call of Duty® ELITE [NPUB30607] [NPEB00801] [UP0002-NPUB30607_00-CODELITE00000000]
    496E66696E697479576172644B657900 Call of Duty: Modern Warfare 2 [BLUS30377] [BLUS30429] [BLUS30450] [BLES00683] [BLES00684] [BLES00685] [BLES00686] [BLES00687] [BLES00690] [BLES00691] [BLJM60191] [BLJM60269] [BLJM61006] [BLKS20159]
    496E66696E697479576172644B657900 Call of Duty: Modern Warfare 3 [BLUS30838] [BLUS30887] [BLES01428] [BLES01429] [BLES01430] [BLES01431] [BLES01432] [BLES01433] [BLES01434] [BLJM60404] [BLJM60422]
    31323334353637383941424344454600 Call of Duty: Modern Warfare 3 (1.23) [BLUS30838] [BLUS30887] [BLES01428] [BLES01429] [BLES01430] [BLES01431] [BLES01432] [BLES01433] [BLES01434] [BLJM60404] [BLJM60422] [UP0002-BLUS30838_00-MW3P000000000123]
    C8E0234D149E4549BC1B086FEFD7282A Call of Duty: World at War [BLUS30192] [BLES00354] [BLES00355] [BLES00404] [BLES00457] [BLKS20098] [BLES00357] [EP0002-BLES00354_00-CODWAWMAPPACK105]
    36BAD25595801CDCA6E30319AF7826CE CAPCOM Arcade cabinet [NPUB30769] [NPUB90178] [UP0102-NPUB30769_00-CACC0255PACKALLX]
    90394BD86C745DA84D0E4209F073E100 Call of Juarez: Bound in Blood [BLUS30347] [BLES00556] [BLAS50114] [BLJM60153] [NPUB30637] [UP0001-BLUS30347_00-COJBIB0000000020]
    BD93AFFFE240424297A2D86414D3FA5C Castlevania: Harmony of Despair [NPUB30505] [NPEB00563] [EP0101-NPEB00563_00-CASTHARMONYOFDES]
    218A6FBF2865464A79399B6EEF54632A Champion Jockey: G1 Jockey & Gallop Racer [BLUS30863] [BLES01235] [BLJM60367] [JP0106-BLJM60367_00-GXGJPNPATCH00102]
    D84D248D58EEA66FAC705893E7C0865D Champion Jockey: G1 Jockey & Gallop Racer [BLJM60367] [BLES01235] [BLUS30863]
    F0370E82EFD9E0249D63FFDEC323A6A8 Conflict: Denied Ops [NPEB90055] [NPUB90078] [BLUS30107] [BLES00182] [BLES00183] [UP0776-NPUB90078_00-CONFLICTDOUSDEMO]
    90A06A5252A4B702F3242E584C27D542 Darksiders II [NPUB30979] [UP1005-NPUB30979_00-DARKSIDERS2DIGIT]
    5A6170686F64426565626C6562726F78 DC Universe Online (1.43) [BLUS30583] [BCES01048] [UP0017-BLUS30583_00-DCUOLPS3LIVE0001]
    00000000000000000000000000000000 Defiance [NPUB31094] [UP2025-NPUB31094_00-DEFIANCE00000001]
    E17337F73830F67826927A6071C61DA1 Devil May Cry HD Collection [NPUB30998] [NPEB01188] [BLUS30764] [BLES01228] [BLJM60363] [BLJM60569] [EP0102-NPEB01188_00-DMCCHDDIGITAL000]
    4034250AB9018EF901C098E1790A907F DmC: Devil May Cry [NPUB90929] [NPEB90473] [UP0102-NPUB90929_00-DMCDEMO000000001]
    3E5A737B7D7D6F242D3F305873647153 Deus Ex Human Revolution (1.01) [BLUS30476] [BLUS30733] [BLES01150] [BLES01151] [BLES01152] [BLJM60353] [BLAS50367] 
    58A4BADB96035258C54DDE01F210CBDD Doom 3 BFG Edition [BLUS31024] [BLES01679] [UP1003-BLUS31024_00-D3BFGDAYONEPATCH]
    0D381309CBF64D8DC3B411EFBFD4648B Dragon Age Origins [BLUS30415] [BLES00721] [BLES00699] [BLJS10103] [UP0006-BLUS30415_00-DAOPATCH106POST0]
    CBB2EAB0E2925A89DF06A843B7F2221B Dragons Age II (1.05) [BLUS30645] [BLES01084] [NPUB30476] [BLJS10161] [BLAS50317] [BLAS50329]
    00000000000000000000000000000000 Dungeons And Dragons Daggerdale [NPUB30318] [UP0182-NPUB30318_00-0000111122223332]
    69A455FE5D23E0F7BA79C1AF8065BEFE ELEVATOR ACTION DELUXE [NPUB30428] [UP0082-NPUB30428_00-ELEVATORACTIONDX]
    1E14C49F03FCE2E01A8BB8BF0BCA6F12 Everybody's Golf: World Tour [BCES00068] [EP9000-BCES00068_00-EGWTPATCH0000013]
    7613AB8E948211DD8203AE9856D89593 Far Cry® 2 [BLUS30178] [BLES00324] [BLES00325] [NPUB30523] [NPEB00599] [BLAS50076] [BLJM60108] [BLKS20084] [UP0001-BLUS30178_00-FARCRY2PATCHV104]
    6892cb500f10473d5758847650054357 Far Cry® 2 [NPUB30523] [UP0001-NPUB30523_00-FC2ORIGS3REMPKG1]
    3D761CF97D8FFDEAA1DA883ECB0B0F75 Far Cry® 3 [BLUS30687] [BLES01137] [BLES01138] [EP0001-BLES01137_00-FC3SCEEDISCTU001] [EP0001-BLES01138_00-FC3SCEEUKDISC001] [UP0001-BLUS30687_00-FC3SCEADISCTU001]
    119CE34694764D31B59A99275AD60751 Fairytale Fights® [NPEB90208] [NPUB90343] [BLUS30456] [BLES00696] [EP4005-NPEB90208_00-FFGAMETEASERDEMO]
    E9C055A4A666ACB84BB19BD38D36E6A6 Fatal Fury [NPUB30260]
    EA82CD9815FAE8325521AA9DD7E08134 Fat Princess [NPUA80139] [NPEA00111] [NPHA80066] [NPJA00048] [NPJA90120] [UP9000-NPUA80139_00-FATPRINCESS00001]
    12345678901234567890123456789012 FIFA 10 (1.04) [BLUS30385] [BLES00615] [BLAS50145] [BLKS20153] [BLES00165] [BLJM60175] [UP0006-BLUS30385_00-PATCH0NA0ZF01040]
    12345678901234567890123456789012 FIFA 11 (1.06) [BLUS30630] [BLJM60274] [BLES01059] [BLJM61011] [BLAS50339] [UP0006-BLUS30630_00-FIFA110000000000]
    12345678901234567890123456789012 FIFA 12 [BLUS30809] [BLES01381] [BLES01382] [BLAS50370] [BLJM60996] [NPEB00688] [EP0006-BLES01381_00-FIFA120000000000]
    12345678901234567890123456789012 FIFA 13 [BLUS30998] [BLES01676] [BLAS50514] [BLJM60514]
    12345678901234567890123456789012 FIFA Street [BLES01493] [BLUS30882] [BLJM60457]
    E7783598211CF63424B94EE94E4A5D2C Final Fantasy XIII-2 [BLES01269] [BLJM60382] [BLUS30776] [BLUS30925] [BCAS20196] [BCAS20223] [BCAS20224] [BCAS20225] [EP0082-BLES01269_00-PATCHVERSION0106]
    00000000000000000000000000000000 Final Fantasy XIII-2 [BLES01269] [BLJM60382] [BLUS30776] [BLUS30925] [BCAS20196] [BCAS20223] [BCAS20224] [BCAS20225]
    2E21302E362F202731596153304A5C4A Flower [NPUA80083] [UP9000-NPUA80083_00-FLOWERPS3PRIVATE]
    32204F4157407953737C2D25406F2C54 Flower [NPEA00094] [UP9000-NPUA80083_00-FLOWERPS3PRIVATE]
    483466396b2f5b703c743f463044565f Flowery [NPJA00039] [JP9000-NPJA00039_00-FLOWERPS3PRIVATE]
    00070907030706030304080108010107 Formula One Championship Edition (1.10) [BCUS98142] [BCAS20009] [BCJS30005] [BCES00005] [UP9000-BCUS98142_00-F1CHAMPIONSHIPED]
    17834BFF12174E4CE2F0B5CD8BB37FBD Free Realms [NPUA30048] [NPEA00299]
    7D524E1C9EFE4A36B08BBD4DA340D300 From Dust [NPUB30418] [UP0001-NPUB30418_00-FROMDUSTTRIAL001]
    96F4F8047346EB130E78933C3D1BDBBB Ghostbusters (1.03) [BCES00642] [BLUS30307] [BLAS50120] [EP9000-BCES00642_00-PROTON103PATCH01]
    183EF1DCA2B44DA893D2ADBAE1CA36F2 God of War® Ascension [BCUS98232] [BCES01741] [BCES01742] [BCES01838] [BCJS37008] [BCAS25016] [NPUA70216] [EP9000-BCES01741_00-GOWABDPATCH00001]
    9812F06A923E442DBD3B8CF7AFBC2E87 God of War® HD Collection (1.01) [BCUS98229] [BCUS98230] [BCUS98253] [BCES00791] [BCES00800] [BCJS30080] [BCAS20102] [BLJM60200] [UP9000-BCUS98229_00-GOWHDCLSHIP02222]
    A93233BBBBBBBBBBBBBBCB2AB3BB3B44 Harry Potter and the Deathly Hallows™: Part 2 [BLES01307] [BLUS30768] [BLAS50361]
    C0A3B3641C2AD1EF23153A48A3E12FE7 HEAVY RAIN™ [BCUS98164] [BCES00458] [BCES00802] [BCES00797] [NPJA90119] [BCAS20107] [BCJS30040] [NPEA90053] [NPUA70088] [NPHA80086] [BCUS98280] [BCJS70017] [BCAS25006] [BCKS15006
    00000000000000000000000000000000 Homefront [NPUB30572] [UP1005-NPUB30572_00-HFDIGITAL0000001]
    8450021620413F2EBC5234937B5A0701 Hulu Plus [NPUP00046] [UT0008-NPUP00046_00-2010101201639300]
    D0FCBA9BA75621DFAA69A2280D1E51CF ICO™ & Shadow of the Colossus™ Classics HD (1.01) [BCUS98259] [BCES01097] [BCES01115] [BCAS20202] [BCJS30070] [BCJS30073] [BCAS20150]
    24060411149EE10A9E2ADE1EAE2BDE00 Jikkyou Powerful Pro Yakyuu 2011 Ketteiban [BLJM60424] [JP0101-BLJM60424_00-PAWAPROPATCH0001]
    19FF3B56117305CCA57992408EFEB001 Jikkyou Powerful Pro Yakyuu 2012 [BLJM60469] [JP0101-BLJM60469_00-PW2012P3PATCH005]
    B0090227200902272009022720090227 Journey [NPEA00288] [EP9000-NPEA00288_00-DJOURNEYXX0000A1]
    A0090227200902272009022720090227 Journey Collector's Edition [BCUS98377]
    4176616C616E63686553747564696F73 Just Cause 2 [NPUB30606] [UP0082-NPUB30606_00-JUSTCAUSE2PSNVER]
    011F13B1FC2EA3DD4C05BC00188A4BB8 Just Dance 4 [BLUS31033] [BLES01722] [EP0001-BLES01722_00-JUSTDANCE04PKG01]
    DDFF5D43F9D44216C67B9ACAD636F313 Karateka [NPUB31078] [UP2072-NPUB31078_00-KARATEKAGAME0000]
    12B8A6467A58DEBA316F0C0A4A386422 Kidou Senshi Gundam: Extreme VS [BLJS10131] [BLAS50423] [JP0700-BLJS10131_00-GAMEDISCPATCH002]
    406EEA4E78D8F408167443BDD8803721 League Bowling [NPUB30257]
    3FD24924948AE94A3FD9999999975FF7 Legasista [NPUB30860] [NPEB01082] [BLJS10157] [UP1063-NPUB30860_00-HDDBOOTLEGASI001]
    C0A3B3641C2AD1EF23153A48A3E12345 Life with Playstation [NPIA00007] [IP9100-NPIA00007_00-0000111122223333]
    AAC128FEB22AB31ACA2697EE91879DB1 LocoRoco Coccorecho [NPEA00036] [EP9000-NPEA00036_00-LOCOROCOEURO0001]
    E73591C6F8A08C5BAFE8E0DEF4F552EA MAG (2.12) [BCUS98110] [BCES00818] [BCAS20081] [BCJS30036] [BCES00558] [UP9000-BCUS98110_00-MAGPATCH00000001]
    C71D19C60B98BA5A1F024202145C75DD Magician Lord [NPUB30264]
    D6D4506DB5B5455BA98A11EA9426BCD9 Marvel Ultimate Alliance 2 (1.02) [BLUS30294] [BLES00546] [UP0002-BLUS30294_00-MUA2PATCH0124176]
    304BB4852BD12D02D499F2268D9A3270 Mesmerize [NPEA00030] [EP9000-NPEA00030_00-MESMERIZEPACK002]
    E3A152EF3624CF89ABCDB1317D57CC6B Metal Gear Solid HD Collection (1.03) [BLUS30847] [BLUS30906] [BLES01419] [BLJM61001] [BLKS20316] [BLAS50383] [EP0101-BLES01419_00-MGSHDCOLLECTION0]
    B608E78018A335E494B972A6B717A166 Metal Gear Solid HD Collection (1.01) [BLUS30847] [BLUS30906] [BLES01419] [BLJM61001] [BLKS20316] [BLAS50383]
    730D29E299832687471B6AB80FB83BF5 Metal Gear Solid Collection [NPEB00684] [EP0101-NPEB00684_00-EUSMGS3HG0013340]
    6D1BBD1669D900CC4A00CC6EE8061B4E Metal Gear Solid 4 Update (2.00) [BLUS30109] [BLUS30148] [BLES00246] [BLKS25001] [BLJM67004] [BLKS25002] [BLJM67001] [BLKS25003] [BLJM57001] [BLJM67003] [BLJM67002] [EP0101-BLES00246_00-PATCH00000000000]
    201397B3F71CDD69A2154DCCEBC23F4D Metal Slug [NPUB30258]
    040C4A90168B503F0254504A04FD308E Medal of Honor [BLUS30436] [BLES01067] [BLES01106] [BLES01107] [BLES01108] [BLES00860] [BLJM60275] [NPUJ00974] [NPUB90366] [BLET70010] [BLJM60344] [BLAS50238] [BLAS50232] [UP0006-BLUS30436_00-MOHPATCHNAV00001]
    00000000000000000000000000000000 Medal of Honor Warfighter [BLUS30990] [BLES01636] [UP0006-BLUS30990_00-MOHWPATCH0000001]
    0F00200B013370000000500700020090 Mirror's Edge [BLUS30179] [BLES00322] [BLJM60104] [BLKS20094] [BLAS50073] [NPEL00074] [NPEB00052] [NPUB90119] [NPJB90140] [NPHB00057] [NPEB90114] [BLJM60181] [EP0006-NPEB90114_00-MIEDDEMOEU000001]
    123456789012345678901234567890AB MONOPOLY STREETS [BLUS30533] [BLES00954] [BLAS50253][NPUB30592] [UP0006-NPUB30592_00-MONOPOLYPSNNA000]
    6CB297786AEB68D761FABEC8E1CD1437 Mortal Kombat [NPUB30668] [UP1018-NPUB30668_00-MK9HDDCONVERSION]
    90394BD86C745DA84D0E4209F073E100 nail'd (1.02) [BLUS30544] [BLES00914] [BLJM60331] [BLJM60461] [UP2047-BLUS30544_00-NAILDGAMEPNPATCH]
    569F9349D9C594C0A04ED2FD5CBB158E Namco Museum [NPUB30086] [NPJB00012] [UP0700-NPUB30086_00-NAMCOMUSEUMFULLV]
    6F46772AC2C84BA59484A73BB13B26BB NBA 2K12 (1.05) [BLUS30830] [BLES01418] [BLJS10136]
    0C444C567EEF42D9FFE28991AEB867EE Need for Speed: The Run [NPEB00851] [EP0006-NPEB00851_00-NFSTHERUNPSN0000]
    00000000000000000000000000000000 Need for Speed: The Run [BLUS30757] [BLES01298] [BLAS50337] [BLJM60386]
    7AC7E325735C754B8C7F7984819B0A48 NETFLIX [NPUP00030] [UT0007-NPUP00030_00-NETFLIXRIGEL01NA]
    A0FFF31F6A94046AF61550C7AC1F5DB3 NETFLIX [NPEB00874] [EP4350-NPEB00874_00-NETFLIXRIGEL01EU]
    4D4D8F2D0C106FEA46A9123952B9F66A Ni No Kuni: Wrath Of The White Witch [BLUS30947] [NPUB30932] [NPUB90846] [BLES01555] [NPEB01158] [BCAS20218] [BLJS10150] [BLJS10185] [NPJB00238] [UP0700-NPUB30932_00-NNKDLFULLGAMEPTA]
    38019393387F7F7F7F7F7F7F7F7F7F7F Ni No Kuni: Wrath Of The White Witch [BLUS30947] [NPUB30932] [NPUB90846] [BLES01555] [NPEB01158] [BCAS20218] [BLJS10150] [BLJS10185] [NPJB00238] [UP0700-NPUB30932_00-NNKDLFULLGAMEPTA]
    CFCB51DC22CAE8C2659082F7EFB2C881 OKABU [NPEB00621] [EP4334-NPEB00621_00-HCOKABUGAME00000]
    8D5B3D9ACE0BAC2794A1434D92E689F7 Okami HD [BLJM60467] [BLAS50523] [JP0102-BLJM60467_00-0000000000000000]
    559A80C1274F4BDBE829ACF076BA2D96 Orange Box (1.01) [BLUS30055] [BLES00171] [BLES00153] [BLES00172] [BLKS20015] [BLAS50034] [UP0006-BLUS30055_00-OBOXPATCH0000001]
    C0A3B3641C2AD1EF23153A48A3E12FE7 Pain [BCES00548] [BCUS98211] [EP9000-BCES00548_00-PAIN000100000000]
    31410A8B3C8B4AA0BA0E9D23BB6598F4 PlayMemories Studio™ [EP4288-NPEB00873_00-HDDBOOTDEMO00001]
    19089CBAF948487F9530832BF477B369 Portal 2 (1.01) [BLUS30732] [BLES01222] [BLJM60352] [BLAS50331] [BLJM60473]
    D13BFAED3399C4D578C16B6718AA88DE Prince of Persia [BLUS30214] [BLES00389] [BLES00390] [BLAS50085] [BLJM60107] [NPUB30424] [NPEL00079] [BLKS20100] [UP0001-BLUS30214_00-POP0GAMEUPDATE01]
    E014D827F94402348A97429477BDFFCB Prince of Persia The Forgotten Sands [BLUS30401] [BLES00839] [BLES00840] [BLAS50207] [BLKS20193] [BLJM60234] [NPUB90370] [NPUB30632] [UP0001-BLUS30401_00-POPTFSUPDATE0001]
    50455332303038455550415443483032 Pro Evolution 2008 [BLUS30111] [BLES00110] [BLES00111] [BLES00100] [EP0101-BLES00110_00-PES2008EUPATCH02]
    50455332303130455550415443480000 Pro Evolution 2010 [BLUS30404] [BLES00689] [BLES00688] [EP0101-BLES00688_00-PES2010EUPATCH02]
    E39570A1398E61F5806CC3F07DEC630D Prototype [NPUB30389] [UP0002-NPUB30389_00-PROTOHDDBOOT0001]
    3467652D383862652D38646161623232 Qriocity: Music Unlimited [IP9100-NPIA09002_00-0000111122223333]
    9FFEA6C8DE7A437DA5AC578D2E444977 Quantum of Solace [BLUS30198] [BLES00411] [BLES00406] [BLJM60137] [BLKS20088] [BLUS30199]
    C0A3B3641C2AD1EF23153A48A3E12FE7 Rag Doll Kung Fu™: Fists of Plastic [NPUA80217] [NPEO50015] [NPJA00038] [NPHA80055] [NPEK00161] [NPEA00103] [NPUA70058] [NPEA00142] [NPJA90107] [UP9000-NPUA80217_00-PRAGDOLLKU000004]
    58A4BADB96035258C54DDE01F210CBDD Rage (01.01) [BLUS30485] [BLES01377] [BLES01378] [BLES01426] [BLAS50374] [BLJM60994]
    9F2941A09733FEDC77183735A069347C Ratchet & Clank: QForce [NPUA80642] [BCES01594] [EP9000-BCES01594_00-RATCHETQFORCE001]
    7FE7048BC7E4299916881A3A0E08CD73 Real Steel [NPUB30605] [NPEB00754] [NPJB00169] [EP0728-NPEB00754_00-RSGAMEEUR0000000]
    C0A3B3641C2AD1EF23153A48A3E12FE7 Renegade Ops [NPEB00446] [NPUB30406]
    729A4F5EE376794650782D0CCD7DCB72 Red Dead Redemption (1.07) [BLUS30418] [BLUS30711] [BLUS30758] [BLES00630] [BLES00680] [BLES01179] [BLES01294] [BLJM60265] [BLJM60314] [BLJM60403] [BLKS20202] [BLKS20315] [BLAS50203] [BLAS50296] [BLAS50382] [NPEL00137] [NPUB90270]
    F62B9A1EC187E5BB061FCDD715E3F6BE RESIDENT EVIL™ THE DARKSIDE CHRONICLES [NPEB00816]
    00875F084DF2B8D68AA06D55335E1276 RESIDENT EVIL™ Operation Raccoon City (1.01-1.03) [BLUS30750] [BLUS30929] [BLES01288] [BLES01417] [BLAS50431] [NPUB30767] [NPEB00984] [BLJM60342] [EP0102-BLES01288_00-PATCH00000000003]
    00000000000000000000000000000000 Ridge Racer 7 [BLUS30001] [BCES00009] [BLJS10001] [BCAS20001] [BCKS10001] [BLKS10039] [NPUB30457] [BLJS50010] [BCKS10039]
    925B973965C5AD25A57F25D4398EFAFA R.U.S.E. (1.01) [BLUS30478] [BLES00785] [UP0001-BLUS30478_00-RUSEPS3XPATCH001]
    3429F83C6487D365486FFC805379D686 Sacred 2 (1.02) [BLUS30312] [BLES00410] [BLJS10071] [BLJS50016] [UP2013-BLUS30312_00-GAMEUPDATEPATCH2]
    49FEE8AB793A2DE84C2C9D22E2D3564D Samurai Shodown [NPUB30265] [NPEB00247]
    2B5C6D1E6F90A53C7831F38A1B0B198B Samuraidou 4 [BLJS10107] [JP0604-BLJS10107_00-PATCH00000000003]
    C9FA33C26F68FBA0E70BF147B9CACF6F Silent Hill HD Collection (1.02) [BLUS30810] [BLES01504] [BLAS50432] [BLJM60425] [EP0101-BLES01504_00-SHHDPATCH00000EU]
    00000000000000000000000000000000 Silent Hill: Downpour [BLUS30565] [BLES01446] [BLAS50456] [UP0101-BLUS30565_00-SHGAMEPATCH00001]
    90394BD86C745DA84D0E4209F073E100 Sniper Ghost Warrior (1.01) [BLUS30796] [BLES01286] [BLES01281] [BLJM60374]
    08727DF80102030431C855B900000101 SOCOM Special Forces (1.05) [BCES00938] [BCES00939]
    08727DF80102030431C855B900000101 SOCOM 4 US Navy SEALs (1.05) [BCUS98135] [BCUS98213] [BCUS98305] [BCUS98315] [BCJS30052] [BCKS10137] [BCAS20121]
    C0A3B7641C2AD1EF20133A28A3E15FE3 Splinter Cell Trilogy HD (1.01) [BLUS30761] [BLES01146] [BLAS50360]
    2160B28ABBB5348BAD25704E4CEFBD4E Super Sidekicks [NPUB30259] [UP0576-NPUB30259_00-NEOGEOSTATION008]
    89CC36FC34B1D7DEB23D6744A9D05A51 Supersonic Acrobatic Rocket-Powered Battle-Cars [NPUB30035] [NPEB00062] [NPUB90169] [EP2002-NPEB00062_00-SARBATTLECARS001]
    79D442BAAB63593C8EBC4536AE434D9B Starhawk™ [BCUS98181] [BCES00907] [BCES01234] [BCAS20171] [BCJS30076] [EP9000-BCES01234_00-STARHAWKBDPATCH1]
    15454864315343513216315346265612 Test Drive unlimited 2 (1.02-1.06) [BLUS30527] [BLES00884] [BLJM60318] [BLJM60460]
    0147457A89FDCDA8CFCDAB8967452804 The Adventures of Tin Tin [BLUS30747] [NPUB30805] [BLES01306] [UP0001-NPUB30805_00-TINTINPS3REMPKG1]
    B61FCC0BC911462BF414EBE67733A9FF The King Of Fighters '94 [NPUB30266]
    5CFBAB50B816133654F06B16199AC409 The Punisher: No Mercy [NPUB30070] [NPEB00112] [NPEP50032] [NPEB00098] [NPEB90179] [NPUB90198] [UP4042-NPUB30070_00-PUNISHERNOMERCY1]
    0A351302CCF64D7DC3B312DEBFD7749B The Sims 3 (1.02) [BLUS30609] [BLES01016] [BLAS50257] [BLJM60285] [BLJM60399] [UP0006-BLUS30609_00-PATCH00000000002]
    30F1BABB519FB240CA8C1A1451802644 The Walking Dead [NPUB30741] [NPEB00957] [UP2026-NPUB30741_00-WD104000001PATCH]
    A87B6A987FB6A09D87FBA097D6AE8807 TIME CRISIS: RAZING STORM (1.01) [BLUS30528] [BCES01070] [BLJS10091] [UP0700-BLUS30528_00-TCRS0100PATCHPKG]
    C3B3B674202DE1F326253D58A6F130F7 TMNT: Turtles in Time Re-Shelled [NPUB30107] [NPEB00149] [NPHB00134] [UP0001-NPUB30107_00-TMNTRESHELLED001]
    7613AB8E948211DD8203AE9856D89593 Tom Clancy's Endwar (1.03) [BLUS30180] [BLES00376] [BLES00487] [BLKS20092] [BLJM60136] [UP0001-BLUS30180_00-TRHDRM0000000103]
    0147457A89FDCDA8CFCDAB89674528FF Tom Clancy's Endwar [NPUB30913] [UP0001-NPUB30913_00-ENDWARPS3REMPKG1]
    00000000000000000000000000000000 Tom Clancy's Endwar Demo [NPUB90171] [NPEB90118] [UP0001-NPUB90171_00-TCEWPS3DEMOPACK1]
    6692C4500F10473D5758847650054351 Tom Clancy's Ghost Recon Advanced Warfighter 2 [NPUB30502] [BLUS30034] [BLES00067] [BCAS20022] [BLKS20080] [BCKS10019] [BLJM60040] [UP0001-NPUB30502_00-GRAW2PS3REMPKG01]
    32A8003E48F711E1A53025E64724019B Tom Clancy's Ghost Recon Future Soldier™ [BLUS30521] [BLES00924] [BLES00922] [UP0001-BLUS30521_00-GRFSTITLEUPDAT02]
    E5EB14BEB3074EB4180B51A9B22B9734 Tom Clancy's Ghost Recon Future Soldier™ [BLUS30521] [BLES00924] [BLES00922]
    1FBADF00D726101632A11DA1CAFEACAC Tom Clancy's H.A.W.X [BLUS30186] [BLES00330] [BLAS50101] [BLJM60144]
    0123456789ABCDEFEFCDAB8967452301 Tom Clancy's H.A.W.X 2 [BLUS30488] [BLES00928] [BLAS50225] [BLJM60242] [BLES00929] [BLJM60375]
    6825CB560F13743D7758847650014357 Tom Clancy's Rainbow Six Vegas [UP0001-NPUB30633_00-VEGAS1BLURAYPKG1[
    584244534F204E3D575882205FF54C5A Tom Clancy's Rainbow Six Vegas 2 [NPUB30503] [UP0001-NPUB30503_00-VEGAS2PS3REMPKG1]
    442C5AF691E51010C1D05AC5E7984CAB Tom Clancy's Rainbow Six Vegas 2 [BLUS30125] [BLAS50045] [BLES00248] [BLES00237] [BLKS20067] [BLJM60074] [BLES00755] [UP0001-BLUS30125_00-UBIR6V2PATCH0003]
    C0A3B7641C2AD1EF20133A28A3E15FE3 Tom Clancy's Splinter Cell Trilogy HD (1.01) [BLUS30761] [BLES01146] [BLES01146] [BLAS50360]
    B825CB507FA3723D5758847350054351 Tom Clancy's Splinter Cell: Double Agent [NPUB30636] [UP0001-NPUB30636_00-SCDA1BLURAYPKG01]
    998760D7EBBB8D43242BB466DF501C7E Torne [BCJB95006] [IP9100-BCJB95006_00-TORNE410X120628R]
    20907958910945634589173450891352 The Tomb Raider Trilogy [BLUS30718] [BLES01195] [EP0082-BLES01195_00-TRTRILOGYPTCH100]
    040030081C232D0B408080091C1C2D0A Tour de France 2011 [BLES01296]
    007BAD666BED00BABE00B0B05AD0B173 Tour de France 2011 (1.01) [BLES01296]
    007BAD666BED00BABE00B0B05AD0B173 Tour de France 2012 (1.01) [BLES01562]
    F492C65EFD8DC810692D8E18E82A5507 Viaplay [EP4345-NPEB00863_00-VIAPLAYFULLAPP00]
    ED46FA7B9BF91880AE79BB75C5A35F8E WipEout® HD Fury [NPUA80105] [NPEA00057] [EP9000-NPEA00057_00-WHDPATCH22000000]
    1A4B5C0D5E8F942B6720E2790AFA0869 Way of the Samurai 3 [BLUS30398] [BLES00712] [BCAS20101] [EP4109-BLES00712_00-PATCH00000000000]
    B23466764DC34BB5AEDD210391F591AF Wolfenstein [BLUS30298] [BLES00661] [BLES00564] [BLES00566] [BLKS20133] [UP0002-BLUS30298_00-PATCHWOLF0000002]
    7FE7048BC7E4299916881A3A0E08CD73 WWE 12 (1.02) [BLUS30841] [BLES01439] [BLJM60436]
    E8904B0B875AFC47CCA39EA260CD0771 YAKUZA 3 (Ryu Ga Gotoku 3: Kenzan!) [NPJB90169] [JP0177-NPJB90169_00-0000000000000000]
    3045F03D49BB2144848AABCCCD469DF8 YAKUZA 3: Battle Engine [NPJB90072] [JP0177-NPJB90072_00-0000000000000000]
    9F1DDD43C5D239B14471B98A20CD45A1 YAKUZA 4 (1.08) [BLUS30643] [BLES01081] [NPUB90512] [BLJM60208] [BLJM55032] [BLJM55021] [BLJM60316] [BLAS50310] [NPJB90071] [JP0177-BLJM60316_00-GAMEVER0108WEEK8]
    B91AC830D023F9320BA7771935C9C9A0 YAKUZA 5 (Ryu ga Gotoku 5) [BLJM60489] [JP0177-BLJM60489_00-GAMEVER0101WEEK1]
    BCCA80BADFA4CCFCF69CF0C7ACE90E7B Zone of the Enders HD Edition [BLUS30937] [BLJM60511] [UP0101-BLUS30937_00-ZOEHDDVDPATCH001]
    8AA0C4C2F0D13E64E3589787D3D83188 Zone of the Enders HD Edition [BLJM60451] [JP0101-BLJM60451_00-ZOEHDDVDPATCH001]
    66113E697A8A65EC5D58B1F62CC62606 Zone of the Enders HD Edition [NPEB01186] [EP0101-NPEB01186_00-ZOEHDMAINGAME001]
    Note: This is just a proof-of-concept, I wanted to know how the whole SELF/SPRX stuff worked. It doesn't contain keys or any proprietary tools from Sony, and as far as I know, it's not doing anything illegal.

    From JLM: In case anyone is not sure how to use the script:

    1. Use scetool to decrypt the eboot.bin, copy eboot.bin to the scetool folder, use command scetool -v -d eboot.bin eboot.elf, screen output should be (brackets removed from around *'s because it screws up the post formatting):
    Code:
    scetool 0.2.8 <public build> (C) 2011-2012 by naehrwert
    NP local license handling (C) 2012 by flatz
    * Loaded keysets     
    * Loaded loader curves
    * Loaded vsh curves
    * Using keyset [appldr 0x0010 03.60]
    * Header decrypted
    * Data decrypted
    * Elf Written to eboot.elf
    2. Use scetool to decrypt the sprx with Asure's script, unpack his bruteforce.zip in the scetool directory, copy the sprx to the scetool directory, use his script or the following which is slightly different: rename the sprx to exactly this: game.sprx, using notepad create a text file and paste the script contents:
    Code:
    @echo off
    for %%S in (eboot.elf) do SET /a LAST_OFFSET=%%~zS-16
    for %%S in (eboot.elf) do SET /a MAX_OFFSET=%%~zS-16
    :START
    set CUT=8
    if %LAST_OFFSET% gtr 1000000 (
    set /a CUT+=2
    )
    rem echo Cut val: %CUT%
    FOR /F "tokens=*" %%i in ('"od -j%LAST_OFFSET% -N16 -w16 -t x1 eboot.elf | cut -c %CUT%- |sed 's/ //g'"') do SET KEY=%%i
    if %KEY% == 00000000000000000000000000000000 (
    echo Skipped 10 bytes of blank/useless key at %LAST_OFFSET%
    set /a LAST_OFFSET-=10
    ) else (
    ECHO Trying Key: %KEY% from decimal offset: %LAST_OFFSET% / %MAX_OFFSET%
    scetool.exe -l %KEY% -d game.sprx game.prx >nul
    set /a LAST_OFFSET-=1
    )
    IF EXIST game.prx GOTO END
    goto START
    :end
    echo Done! Key used was: %KEY%
    Save the file as sprxdecrypt.bat, open a command prompt window, type: sprxdecrypt.bat wait a long time.. ONLY FOR THE VERY PATIENT.

    Tiny changes to Asure's script: changed filename to game.sprx and game.prx, change it to whatever you like (remember to use the same name in the test line after "IF EXIST") also removed extra -l %key% in the scetool command line.

    Finally, from aldostools comes a Quick Tutorial for Converting PS3 3.60 Games to 3.55 Using PS3 Tools, a [Register or Login to view links] for the above batch file followed by [Register or Login to view links] who states:

    It has a slider for a more convenient selection of the offset. The cut.exe / dd.exe / od.exe / sed.exe / batch files are not needed. Just put it in the same folder of the scetool.exe, with the EBOOT.BIN and the .self or .sprx to be decrypted, start the BruteForce.exe and press the Start button. Tested working with Red Dead Redemption. Added support for command line parameters.

    Example: BruteForce.exe 332300 /start

    Anyway I improved the BruteForce.exe a bit more:
    • Added additional checks when the program starts
    • Now the tool auto-resigns the EBOOT.BIN and the self/sprx with the 3.55 keys when it finds the klic
    • Small GUI changes
    • Included all the tools in a 7z archive

    In Portal 2, the klic key is not aligned to 4. Thus the faster method (4X) will not find it. So, I made BruteForce 1.4: It first try to find the key in a range aligned to 4. If it doesn't find the key, then it retries using the original method (1 byte at a time).

    The method is similar to the original batch, but bytes aligned to 4 are tested first. Keys already tested, are ignored. In this version also it is possible to define the range to parse (start and stop addresses). Additionally, I added other data aligments: 1, 2, 4, 8 and 16. So in some cases, it could be up to 16X faster than the original method

    Updated to [Register or Login to view links] (ignored keys/offsets are refreshed on screen every 1/2 second, added a clean_folder.bat)

    For those interested, posted here are the BruteForce/SCETool Decrypter Build Changelogs and additional updates as they are available.

    PS3 3.60 Keys Leaked, New PlayStation 3 EBOOTs Decrypted & More!

    PS3 3.60 Keys Leaked, New PlayStation 3 EBOOTs Decrypted & More!

    PS3 3.60 Keys Leaked, New PlayStation 3 EBOOTs Decrypted & More!

    More PlayStation 3 News...
    Attached Images<br><br> Attached Images

    Attached Files Attached Files

  2. #2
    Senior Member Foo's Avatar
    Join Date
    Sep 2011
    Posts
    332
    Sponsored Links
    Sponsored Links
    Finally! Good news.

  3. #3
    Senior Member ConsoleDev's Avatar
    Join Date
    Nov 2010
    Posts
    257
    Sponsored Links
    Sponsored Links
    Is this legit?

    PS3 game key examples:
    Code:
    InfinityWardKey - COD MW3 klic key: 496E66696E697479576172644B657900 / Call of Duty Black OPS update 1.11: af0a8f0a8909f09234091afadf909af0 / Read Dead Redemption klic key: 729a4f5ee376794650782d0ccd7dcb72 / Dragons Age II BLUS 1.05): cbb2eab0e2925a89df06a843b7f2221b / Tour de France 2011: 007bad666bed00babe00b0b05ad0b173 / Portal 2: 19089CBAF948487F9530832BF477B369 / Rage klic: 58A4BADB96035258C54DDE01F210CBDD / Champion Jockey: G1 Jockey & Gallop Racer (BLES01235) key: D84D248D58EEA66FAC705893E7C0865D / Yakuza 4 (YAK4-BLJM60316-EBOOT) the key for ogrez_shader_ps3.ppu.sprx is: 9F1DDD43C5D239B14471B98A20CD45A1 / WWE 12 - BLES01439: Decrypt: ReBoot.self Done! Offset: 19298944 -> 0x01267A80 Key found: 7FE7048BC7E4299916881A3A0E08CD73 / Test Drive Unlimited 2 (1.02) (BLES00884): 15454864315343513216315346265612 / Socom Special Forces (1.05) (BCES00938): 08727DF80102030431C855B900000101 / Sniper Ghost Warrior Update 1.01 (BLUS30796) klicensee: 90394BD86C745DA84D0E4209F073E100 / Assassins Creed Brotherhood (BLES00909 / NPUB30522): 1193590B4DDE4F5B8E44F5F14877D0B6 / Splinter Cell Trilogy HD (1.01) (BLES01146): C0A3B7641C2AD1EF20133A28A3E15FE3 / Assassins Creed Brotherhood PS3 BLES00909 klic: 1193590B4DDE4F5B8E44F5F14877D0B6 / Assassins Creed Brotherhood PSN NPUB30522 klic: 6192A450CF1047340358847650057061 / The Tomb Raider Trilogy BLES01195 klic: Decrypt: TR7.SELF, Content ID: EP0082-BLES01195_00-TRTRILOGYPTCH100, Done! Offset: 462040 -> 0x00070CD8, Key found: 20907958910945634589173450891352 / L.E. Supersonic Acrobatic Rocket-Powered Battle-Cars NPUB30035 klic: Decrypt: SPUJOBS.SPRX, Content ID: EP2002-NPEB00062_00-SARBATTLECARS001, Done! Offset: 21318596 -> 0x01454BC4, Key found: 89CC36FC34B1D7DEB23D6744A9D05A51 / Dungeons And Dragons Daggerdale NPUB30318: Decrypt: DND.SELF, Content ID: UP0182-NPUB30318_00-0000111122223332, Done!, Key found: 00000000000000000000000000000000 / Tom Clancy's Rainbow Six Vegas 2 NPUB30503: Decrypt: libdcp_ps3.sprx, Content ID: UP0001-NPUB30503_00-VEGAS2PS3REMPKG1, Done! Offset: 24717072 -> 0x01792710, Key found: 584244534F204E3D575882205FF54C5A / Homefront NPUB30572: Decrypt: SPUJOBS.SPRX, Content ID: UP1005-NPUB30572_00-HFDIGITAL0000001, Done!, Key found: 00000000000000000000000000000000 / Ghostbusters v1.03: Decrypt: ghost_ps3_disc_eu.self, Content ID: EP9000-BCES00642_00-PROTON103PATCH01, Done! Key found: 96F4F8047346EB130E78933C3D1BDBBB / Dragon Age Origins BLUS30415: Decrypt: eclipse.self, Content ID: UP0006-BLUS30415_00-DAOPATCH106POST0, Done! Offset: 133676 -> 0x00020A2C, Key found: 0D381309CBF64D8DC3B411EFBFD4648B / Arcana Heart 3 BLJM60248: Decrypt: DFEngine.sprx, Content ID: JP0036-BLJM60248_00-AH30UPDATEDATA01, Done! Offset: 7305232 -> 0x006F7810, Key found: 01255725585727598445648785573384 / Tom Clancy's Rainbow Six Vegas 2 BLUS30125: Decrypt: game.self, Content ID: UP0001-BLUS30125_00-UBIR6V2PATCH0003, Done! Offset: 24717200 -> 0x01792790, Key found: 442C5AF691E51010C1D05AC5E7984CAB / Metal Gear Solid HD Collection 1.03: Decrypt: mg1.sprx, Content ID: EP0101-BLES01419_00-MGSHDCOLLECTION0, Done! Offset: 2491896 -> 0x002605F8, Key found: E3A152EF3624CF89ABCDB1317D57CC6B / FIFA Street BLES01493: Decrypt: fifazf.self, Content ID: EP0006-BLES01493_00-FIFASTREET000000, Done! Key found: 12345678901234567890123456789012 / Orange Box Update 1.01: Decrypt: APP_CHOOSER.SELF, Content ID: UP0006-BLUS30055_00-OBOXPATCH0000001, Done! Offset: 5047640 -> 0x004D0558, Key found: 559A80C1274F4BDBE829ACF076BA2D96 / Tom Clancy's Endwar Update 1.03: Decrypt: LinkApp.ppu.self, Content ID: UP0001-BLUS30180_00-TRHDRM0000000103, Done! Key found: 7613AB8E948211DD8203AE9856D89593 / Ghost Recon Future Soldier Update 1.02: Decrypt: AIClass_PS3_F.sprx, Content ID: UP0001-BLUS30521_00-GRFSTITLEUPDAT02, Done! Offset: 14393488 -> 0x00DBA090, Key found: 32A8003E48F711E1A53025E64724019B / Tom Clancy's H.A.W.X BLES00330 klic: 1fbadf00d726101632a11da1cafeacac / Tom Clancy's H.A.W.X. 2 BLES00928 klic: 0123456789ABCDEFEFCDAB8967452301 / Wolfenstein Update: Decrypt: wolfmp.self, Content ID: UP0002-BLUS30298_00-PATCHWOLF0000002, Done! Offset: 15643552 -> 0x00EEB3A0, Key found: B23466764DC34BB5AEDD210391F591AF
    Some more below:
    Code:
    Flower NPUA80083
    Decrypt: JobBladeCull.sprx
    Content ID: UP9000-NPUA80083_00-FLOWERPS3PRIVATE
    Done! Offset: 7390098 -> 0x0070C392
    Key found: 2E21302E362F202731596153304A5C4A
    
    Army of Two Update 1.03
    
    Decrypt: AO3Game-PS3ReleaseFinal_SNC.self
    Content ID: UP0006-BLUS30408_00-PATCH03NTSC00000
    Done! Offset: 67008 -> 0x000105C0
    Key found: 51BE4195553454C45535350415443481 
    
    R.U.S.E. Update 1.01
    
    Decrypt: spursJobs.PS3 Release.sprx
    Content ID: UP0001-BLUS30478_00-RUSEPS3XPATCH001
    Done! Offset: 25907752 -> 0x018B5228
    Key found: 925B973965C5AD25A57F25D4398EFAFA 
    
    Marvel Ultimate Alliance 2 Update 1.02
    
    Decrypt: MUA2.SELF
    Content ID: UP0002-BLUS30294_00-MUA2PATCH0124176
    Done! Offset: 18443148 -> 0x01196B8C
    Key found: D6D4506DB5B5455BA98A11EA9426BCD9 
    
    DC Universe Online Update 1.43
    
    Decrypt: PS3Installer.sprx
    Content ID: UP0017-BLUS30583_00-DCUOLPS3LIVE0001
    Done! Offset: 877675 -> 0x000D646B
    Key found: 5A6170686F64426565626C6562726F78 
    
    Formula One Championship Edition Update 1.10
    
    Decrypt: OFFLINE.SELF
    Content ID: UP9000-BCUS98142_00-F1CHAMPIONSHIPED
    Done! Offset: 7471944 -> 0x00720348
    Key found: 00070907030706030304080108010107 
    
    Sims 3 Update 1.02
    
    Decrypt: Sims3.ppu.self
    Content ID: UP0006-BLUS30609_00-PATCH00000000002
    Done! Offset: 132188 -> 0x0002045C
    Key found: 0A351302CCF64D7DC3B312DEBFD7749B 
    
    Time Crisis Razing Storm Update 1.01
    
    Decrypt: launcher.self
    Content ID: UP0700-BLUS30528_00-TCRS0100PATCHPKG
    Done! Offset: 66848 -> 0x00010520
    Key found: A87B6A987FB6A09D87FBA097D6AE8807 
    
    Sacred 2 Update 1.02
    
    Decrypt: s2xserver.sprx
    Content ID: UP2013-BLUS30312_00-GAMEUPDATEPATCH2
    Done! Offset: 21388160 -> 0x01465B80
    Key found: 3429F83C6487D365486FFC805379D686 
    
    Nail'd Update 1.02
    
    Decrypt: engine_jobs.sprx
    Content ID: UP2047-BLUS30544_00-NAILDGAMEPNPATCH
    Done!
    Key found: 90394BD86C745DA84D0E4209F073E100
    
    FIFA 10 Update 1.04
    
    Decrypt: CardsDLLzf.sprx
    Content ID: UP0006-BLUS30385_00-PATCH0NA0ZF01040
    Done!
    Key found: 12345678901234567890123456789012 
    
    FIFA 11 Update 1.06
    
    Decrypt: CardsDLLr2zf.sprx
    Content ID: UP0006-BLUS30630_00-FIFA110000000000
    Done!
    Key found: 12345678901234567890123456789012 
    
    BlazBlue Continuum Shift Update 1.04
    
    Decrypt: DFEngine.sprx
    Content ID: UP1024-BLUS30576_00-BBCSUPDATEDATA04
    Done!
    Key found: 01255725585727598445648785573384 
    
    MAG Update 2.12
    
    Decrypt: libpacePrx_g.sprx
    Content ID: UP9000-BCUS98110_00-MAGPATCH00000001
    Done! Offset: 2820136 -> 0x002B0828
    Key found: E73591C6F8A08C5BAFE8E0DEF4F552EA
    
    From Dust NPUB30418
    Decrypt: dustai.ps3.f.sprx
    Content ID: UP0001-NPUB30418_00-FROMDUSTTRIAL001
    Done! Offset: 7595660 -> 0x0073E68C
    Key found: 7D524E1C9EFE4A36B08BBD4DA340D300
    
    Alpha Mission 2 NPUB30263
    78BEA6D6EBF0D74C676BED0EB9CE74FB
    
    Art Of Fighting NPUB30261
    CBFD3382C28193A18FCBDA55A0790037
    
    Baseball Stars Professional NPUB30262
    2D50F83BD7C631C2239ADC2BA4DF252F
    
    Fatal Fury NPUB30260
    E9C055A4A666ACB84BB19BD38D36E6A6
    
    KOF 94 NPUB30266
    B61FCC0BC911462BF414EBE67733A9FF
    
    League Bowling NPUB30257
    406EEA4E78D8F408167443BDD8803721
    
    Magician Lord NPUB30264
    C71D19C60B98BA5A1F024202145C75DD
    
    Metal Slug NPUB30258
    201397B3F71CDD69A2154DCCEBC23F4D
    
    Samurai Shodown NPUB30265
    49FEE8AB793A2DE84C2C9D22E2D3564D
    
    FiFA 13 klic: 
    12345678901234567890123456789012
    
    Free Realms NPUA30048 NPEA00299
    Decrypt: game.self
    Content ID: UP0017-NPUA30048_00-FREEREALMS000001
    Done! Offset: 866667 -> 0x000D396B
    Key found: 17834BFF12174E4CE2F0B5CD8BB37FBD
    
    Call of Juarez: Bound in Blood NPUB30637
    Decrypt: engine_jobs.sprx
    Content ID: UP0001-NPUB30637_00-COJBIB0000000001
    Done!
    Key found: 90394BD86C745DA84D0E4209F073E100
    
    L.E. new klic: ELEVATOR ACTION DELUXE NPUB30428
    Decrypt: ELEVAOR_ELF.ppu_NR.self
    Content ID: UP0082-NPUB30428_00-ELEVATORACTIONDX
    Done! Offset: 54585 -> 0x0000D539
    Key found: 69A455FE5D23E0F7BA79C1AF8065BEFE
    
    90394BD86C745DA84D0E4209F073E100 Call of Juarez: Bound in Blood [BLUS30347] [BLES00556] [BLAS50114] [BLJM60153] [NPUB30637] [UP0001-BLUS30347_00-COJBIB0000000020]
    
    69A455FE5D23E0F7BA79C1AF8065BEFE ELEVATOR ACTION DELUXE [NPUB30428] [UP0082-NPUB30428_00-ELEVATORACTIONDX]
    
    Mortal Kombat NPUB30668
    Decrypt: DFENGINENPDRM.SPRX
    Content ID: UP1018-NPUB30668_00-MK9HDDCONVERSION
    Done! Offset: 26578388 -> 0x01958DD4
    Key found: 6CB297786AEB68D761FABEC8E1CD1437
    
    The Punisher: No Mercy NPUB30070
    Decrypt: SPUJOBS.SPRX
    Content ID: UP4042-NPUB30070_00-PUNISHERNOMERCY1
    Done! Offset: 32644480 -> 0x01F21D80
    Key found: 5CFBAB50B816133654F06B16199AC409
    
    Just Cause 2 NPUB30606
    Decrypt: PathEngine.sprx
    Content ID: UP0082-NPUB30606_00-JUSTCAUSE2PSNVER
    Done! Offset: 21023912 -> 0x0140CCA8
    Key found: 4176616C616E63686553747564696F73
    this klic means "AvalancheStudios"
    
    4176616C616E63686553747564696F73 Just Cause 2 [NPUB30606] [UP0082-NPUB30606_00-JUSTCAUSE2PSNVER]
    
    C0A3B3641C2AD1EF23153A48A3E12FE7 Renegade Ops [NPEB00446]
    
    Renegade Ops is also from Avalanche Studios but different klic (it's the same used for PAIN)
    
    Mesmerize [NPEA00030] 
    Done! Offset: 262152 -> 0x00040008
    Key found: 304BB4852BD12D02D499F2268D9A3270
    
    Burnout Crash
    00000000000000000000000000000000 Burnout Crash [NPUB30464] [NPEB00529] [NPJB00139]
    
    klicensee for Castlevania: Harmony of Despair [NPEB00563]
    
        Decrypt: dllshotfcbone.ppu.sprx
        Content ID: EP0101-NPEB00563_00-CASTHARMONYOFDES
        Done! Offset: 11959764 -> 0x00B67DD4
        Key found: BD93AFFFE240424297A2D86414D3FA5C
    
    klicensee for Okabu [NPEB00621]
        Decrypt: libflash.ppu.sprx
        Content ID: EP4334-NPEB00621_00-HCOKABUGAME00000
        Done! Offset: 6931512 -> 0x0069C438
        Key found: CFCB51DC22CAE8C2659082F7EFB2C881
    
    Real Steel [NPUB30605] [NPEB00754] [NPJB00169] [EP0728-NPEB00754_00-RSGAMEEUR0000000]
    
    Decrypt: REBOOT.SELF
    Content ID: EP0728-NPEB00754_00-RSGAMEEUR0000000
    Done! Offset: 4343808 -> 0x424800
    Key found: 7FE7048BC7E4299916881A3A0E08CD73
    
    9FFEA6C8DE7A437DA5AC578D2E444977 Quantum of Solace [BLUS30198] [BLES00411] [BLES00406] [BLJM60137] [BLKS20088] [BLUS30199]
    
    for BLES00330 klic is 1FBADF00D726101632A11DA1CAFEACAC
    
    for BLES00928 klic is 0123456789ABCDEFEFCDAB8967452301
    
    Super Sidekicks NPUB30259
    
    Decrypt: libacc_neogeo.sprx
    Content ID: UP0576-NPUB30259_00-NEOGEOSTATION008
    Done! Offset: 2576250 -> 0x00274F7A
    Key found: 2160B28ABBB5348BAD25704E4CEFBD4E
    
    Resident evil Operation Raccoon City KLIC KEY: 72F990788F9CFF745725F08E4C128387 
    
    AC3 Update 1.01
    
    Decrypt: ac3mp_e_ps3_f.self
    Content ID: EP0001-BLES01667_00-AC3TITLEUPDATE10
    Done! Offset: 67012 -> 0x000105C4
    Key found: 101F0773FF5E491BA7320268119B1A0E 
    
    Doom 3 Update 1.01
    
    Decrypt: doom.self
    Content ID: UP1003-BLUS31024_00-D3BFGDAYONEPATCH
    Done! Offset: 10326 -> 0x00002856
    Key found: 58A4BADB96035258C54DDE01F210CBDD 
    
    God of War Collection Update 1.01
    
    Decrypt: GOW1.self
    Content ID: UP9000-BCUS98229_00-GOWHDCLSHIP02222
    Done! Offset: 1520608 -> 0x001733E0
    Key found: 9812F06A923E442DBD3B8CF7AFBC2E87 
    
    ICO & Shadow of the Colossus Classics HD Update 1.01
    
    Decrypt: ICO.self
    Content ID: EP9000-BCES01097_00-SPATCHCOLL003331
    Done! Offset: 1578896 -> 0x00181790
    Key found: D0FCBA9BA75621DFAA69A2280D1E51CF 
    
    Metal Gear Solid HD Collection Update 1.03
    
    Decrypt: MGS_PW.self
    Content ID: UP0101-BLUS30847_00-NASMGSPATCH13307
    Done! Offset: 7686 -> 0x00001E06
    Key found: B608E78018A335E494B972A6B717A166 
    
    Silent Hill HD Collection Update 1.02
    
    Decrypt: sh2game.ppu.self
    Content ID: UP0101-BLUS30810_00-SHHDPATCH00000US
    Done! Offset: 734173 -> 0x000B33DD
    Key found: C9FA33C26F68FBA0E70BF147B9CACF6F 
    
    Assassin's Creed 3 Update 1.01
    
    Decrypt: ac3mp_e_ps3_f.self
    Content ID: EP0001-BLES01667_00-AC3TITLEUPDATE10
    Done! Offset: 67012 -> 0x000105C4
    Key found: 101F0773FF5E491BA7320268119B1A0E 
    
    Journey Collector's Edition - Journey SPRX Files
    
    Decrypt: elfUAGold.sprx
    Done! Offset: 5350226 -> 0x0051A352
    Key found: A0090227200902272009022720090227 
    
    Metal Gear Solid 4 Update 2.00
    
    Decrypt: fr.self
    Content ID: EP0101-BLES00246_00-PATCH00000000000
    Done! Offset: 67456 -> 0x00010780
    Key found: 6D1BBD1669D900CC4A00CC6EE8061B4E
    
    Resident Evil Operation Raccoon City 1.00: 255350555253204A4F4220494E464F25 
    
    Metal Gear Solid 4 (2.00) [BLES00246]: 6D1BBD1669D900CC4A00CC6EE8061B4E
    
    Ratchet.And.Clank.Full.Frontal.Assault.PSN.PS3.NPU A80642 
    Decrypt: game.selfContent ID: UP9000-NPUA80642_00-RATCHETQFORCE001
    Done! Offset: 13335 -> 0x00003417
    Key found: 9F2941A09733FEDC77183735A069347C
    
    4034250AB9018EF901C098E1790A907F DmC: Devil May Cry [NPUB90929] [NPEB90473] [UP0102-NPUB90929_00-DMCDEMO000000001]
    1E14C49F03FCE2E01A8BB8BF0BCA6F12 Everybody's Golf: World Tour [BCES00068] [EP9000-BCES00068_00-EGWTPATCH0000013]
    3D761CF97D8FFDEAA1DA883ECB0B0F75 Far Cry® 3 [BLES01137] [EP0001-BLES01137_00-FC3SCEEDISCTU001]
    569F9349D9C594C0A04ED2FD5CBB158E Namco Museum [NPUB30086] [NPJB00012] [UP0700-NPUB30086_00-NAMCOMUSEUMFULLV]
    A0FFF31F6A94046AF61550C7AC1F5DB3 NETFLIX [NPEB00874] [EP4350-NPEB00874_00-NETFLIXRIGEL01EU]
    8D5B3D9ACE0BAC2794A1434D92E689F7 Okami HD [BLJM60467] [BLAS50523] [JP0102-BLJM60467_00-0000000000000000]
    9F2941A09733FEDC77183735A069347C Ratchet & Clank: QForce [NPUA80642] [BCES01594] [EP9000-BCES01594_00-RATCHETQFORCE001]
    
    12B8A6467A58DEBA316F0C0A4A386422 Kidou Senshi Gundam: Extreme VS [BLJS10131] [BLAS50423] [JP0700-BLJS10131_00-GAMEDISCPATCH002]
    50455332303038455550415443483032 Pro Evolution 2008 [BLUS30111] [BLES00110] [BLES00111] [BLES00100] [EP0101-BLES00110_00-PES2008EUPATCH02]
    50455332303130455550415443480000 Pro Evolution 2010 [BLUS30404] [BLES00689] [BLES00688] [EP0101-BLES00688_00-PES2010EUPATCH02]
    
    b72ae85131684e25a78f5a007de06211 Assassin's Creed 2 [NPUB30423] [UP0001-NPUB30423_00-ASSASSINS2BLURAY]
    6892cb500f10473d5758847650054357 Far Cry 2 [NPUB30523] [UP0001-NPUB30523_00-FC2ORIGS3REMPKG1]
    
    4d4d8f2d0c106fea46a9123952b9f66a Ni No Kuni [UP0700-NPUB30932_00-NNKDLFULLGAMEPTA]

  4. #4
    Forum Moderator PS3 News's Avatar
    Join Date
    Apr 2005
    Posts
    27,459
    Sponsored Links

    BruteForce/SCETool Decrypter Build Changelogs

    Sponsored Links
    Yep it's legit, in a bit I will link to the other thread in the main post with the new decrypted games and so on once they are added.

    BruteForce/SCETool Decrypter Builds: aldostools.org/temp/scetool_0.2.9_bruteforce.7z
    Code:
    ## portal2 launcher eboot.bin with appldr 3.60 key :
    scetool 0.2.7 <ps3devwiki.com build> (C) 2011-2012 by naehrwert
    NP local license handling (C) 2012 by flatz
    
    SCE Header:
     Magic           0x53434500 [OK]
     Version         0x00000002
     Key Revision    [3.60 - 3.61]
     Header Type     [SELF]
     Metadata Offset 0x00000410
     Header Length   0x0000000000000980
     Data Length     0x00000000000AC650
    
    SELF Header:
     Header Type         0x0000000000000003
     App Info Offset     0x0000000000000070
     ELF Offset          0x0000000000000090
     PH Offset           0x00000000000000D0
     SH Offset           0x000000000004DE90
     Section Info Offset 0x0000000000000290
     SCE Version Offset  0x0000000000000390
     Control Info Offset 0x00000000000003C0
     Control Info Size   0x0000000000000070
    
    Application Info:
     Auth-ID   0x1010000001000003
     Vendor-ID 0x01000002 [normal]
     SELF-Type [Application]
     Version   01.00
    
    SCE Version:
     Header Type 0x00000001
     Present     [TRUE]
     Size        0x00000030
     unknown_3   0x00000000
    
    Control Info
     Type      Flags
     Size      0x00000030
     Next      [TRUE]
     Flags 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
           00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
    
    Control Info
     Type      Digest
     Size      0x00000040
     Next      [FALSE]
     Digest 1   62 7C B1 80 8A B9 38 E3 2C 8C 09 17 08 72 6A 57 
                9E 25 86 E4 
     Digest 2   BC 7B 00 1E E0 3F 1A EC 9B 9C 90 FF E2 5F 1A 89 
                9D 05 E7 13 
     FW Version 36000 [03.60]
    
    Section Infos:
     Idx Offset   Size     Compressed unk0     unk1     Encrypted
     000 00000980 00041231 [YES]      00000000 00000000 [YES]
     001 000474E0 0000398E [YES]      00000000 00000000 [YES]
     002 0004AE74 00000000 [NO ]      00000000 00000000 [YES]
     003 0004AE74 00000000 [NO ]      00000000 00000000 [YES]
     004 0004AE74 00000000 [NO ]      00000000 00000000 [YES]
     005 00000000 000000E0 [NO ]      00000000 00000000 [NO ]
     006 00000000 00000028 [NO ]      00000000 00000000 [NO ]
     007 00000000 00000040 [NO ]      00000000 00000000 [NO ]
    
    ELF64 Header:
     Type                   [EXEC]
     Machine                [PPC64]
     Version                0x00000001
     Entry                  0x00000000000B1180
     Program Headers Offset 0x0000000000000040
     Section Headers Offset 0x00000000000ABED0
     Flags                  0x00000000
     Program Headers Count  0008
     Section Headers Count  0030
     SH String Index        0029
    
    ELF64 Program Headers:
     Idx Type     Offset   VAddr    PAddr    FileSize MemSize  PPU SPU RSX Align
     000 LOAD     00000000 00010000 00010000 0009A6E0 0009A6E0 X-R --R --- 00010000
     001 LOAD     000A0000 000B0000 000B0000 00008EB4 0004B508 -WR -WR --- 00010000
     002 LOAD     000A8EB4 00000000 00000000 00000000 00000000 --R --- --- 00010000
     003 LOAD     000A8EB4 00000000 00000000 00000000 00000000 -WR --- --- 00010000
     004 LOAD     000A8EB4 00000000 00000000 00000000 00000000 -WR -WR -WR 00010000
     005 TLS      000A70A0 000B70A0 000B70A0 000000E0 00000374 --R --- --- 00000008
     006 PARAMS   0009A678 000AA678 000AA678 00000028 00000028 --- --- --- 00000008
     007 PRX      0009A6A0 000AA6A0 000AA6A0 00000040 00000040 --- --- --- 00000004
    
    ELF64 Section Headers:
     Idx Name Type          Flags Address    Offset   Size     ES   Align    LK
     000 0000 NULL          ---   00000000   00000000 00000000 0000 00000000 000
     001 000B PROGBITS      -AE   00010200   00000200 0000002C 0000 00000004 000
     002 001F PROGBITS      -AE   00010230   00000230 0008F0D4 0000 00000008 000
     003 0011 PROGBITS      -AE   0009F304   0008F304 00000024 0000 00000004 000
     004 0017 PROGBITS      -AE   0009F328   0008F328 000006A0 0000 00000004 000
     005 0025 PROGBITS      -A-   0009F9C8   0008F9C8 000047C0 0000 00000004 000
     006 0039 PROGBITS      -A-   000A4188   00094188 000000D4 0000 00000004 000
     007 0049 PROGBITS      -A-   000A425C   0009425C 00000004 0000 00000004 000
     008 0056 PROGBITS      -A-   000A4260   00094260 00000054 0000 00000004 000
     009 005F PROGBITS      -A-   000A42B4   000942B4 00000004 0000 00000004 000
     010 006C PROGBITS      -A-   000A42B8   000942B8 00000004 0000 00000004 000
     011 007A PROGBITS      -A-   000A42BC   000942BC 000000DC 0000 00000004 000
     012 0084 PROGBITS      -A-   000A4398   00094398 00000004 0000 00000004 000
     013 0092 PROGBITS      -A-   000A43A0   000943A0 000062B8 0000 00000010 000
     014 009A PROGBITS      -A-   000AA658   0009A658 00000020 0000 00000008 000
     015 00A3 PROGBITS      WA-   000AA678   0009A678 00000028 0000 00000008 000
     016 00B3 PROGBITS      -A-   000AA6A0   0009A6A0 00000040 0000 00000004 000
     017 00C7 PROGBITS      WA-   000B0000   000A0000 00000030 0000 00000004 000
     018 00CE PROGBITS      WA-   000B0030   000A0030 00000014 0000 00000004 000
     019 00D5 PROGBITS      WA-   000B0044   000A0044 00000004 0000 00000004 000
     020 00DA PROGBITS      WA-   000B0048   000A0048 00000FC4 0000 00000008 000
     021 00E7 PROGBITS      WA-   000B100C   000A100C 000000D4 0000 00000004 000
     022 00F6 PROGBITS      WA-   000B10E0   000A10E0 00003150 0000 00000008 000
     023 00FB PROGBITS      WA-   000B4230   000A4230 00002E70 0000 00000008 000
     024 0100 PROGBITS      WA-   000B70A0   000A70A0 000000E0 0000 00000004 000
     025 0107 NOBITS        WA-   000B7180   000A7180 00000294 0000 00000008 000
     026 010D PROGBITS      WA-   000B7418   000A7418 00001A9C 0000 00000008 000
     027 0113 NOBITS        WA-   000B8EB8   000A8EB4 00042650 0000 00000008 000
     028 0118 PROGBITS      ---   00000000   000A8EB4 00002EF1 0000 00000001 000
     029 0001 STRTAB        ---   00000000   000ABDA5 00000124 0000 00000001 000
    
    ## decrypts fine:
    00094130  00 00 00 00 63 65 6C 6C 47 63 6D 53 79 73 00 00  ....cellGcmSys..
    00094140  00 00 00 00 63 65 6C 6C 53 79 73 6D 6F 64 75 6C  ....cellSysmodul
    00094150  65 00 00 00 00 00 00 00 63 65 6C 6C 53 79 73 75  e.......cellSysu
    00094160  74 69 6C 00 00 00 00 00 63 65 6C 6C 47 61 6D 65  til.....cellGame
    00094170  00 00 00 00 00 00 00 00 73 79 73 50 72 78 46 6F  ........sysPrxFo
    00094180  72 55 73 65 72 00 00 00 15 BA E4 6B 21 39 78 18  rUser....ºäk!9x.
    ...
    000943A0  25 78 00 00 25 73 2F 25 73 5F 70 73 33 2E 73 70  %x..%s/%s_ps3.sp
    000943B0  72 78 00 00 00 00 00 00 2D 6E 6F 4D 6C 61 61 00  rx......-noMlaa.
    000943C0  2D 65 72 72 6F 72 72 65 6E 64 65 72 6C 6F 6F 70  -errorrenderloop
    000943D0  00 00 00 00 00 00 00 00 2D 64 65 76 68 64 64 63  ........-devhddc
    000943E0  66 67 6F 6E 6C 79 00 00 2D 6E 6F 6C 61 75 6E 63  fgonly..-nolaunc
    000943F0  68 65 72 6D 61 69 6E 00 2D 73 79 73 63 61 63 68  hermain.-syscach
    00094400  65 63 6C 65 61 72 00 00 2D 70 61 74 68 5F 72 65  eclear..-path_re
    00094410  74 61 69 6C 00 00 00 00 2D 70 61 74 68 5F 70 72  tail....-path_pr
    00094420  78 5F 00 00 00 00 00 00 2D 70 61 74 68 5F 69 6D  x_......-path_im
    00094430  67 5F 00 00 00 00 00 00 2D 64 65 76 00 00 00 00  g_......-dev....
    00094440  2D 70 73 33 68 64 00 00 2D 6E 6F 70 73 33 68 64  -ps3hd..-nops3hd
    00094450  00 00 00 00 00 00 00 00 2D 64 65 76 5F 62 64 76  ........-dev_bdv
    00094460  64 00 00 00 00 00 00 00 74 69 65 72 30 00 00 00  d.......tier0...
    00094470  76 73 74 64 6C 69 62 00 73 74 65 61 6D 5F 61 70  vstdlib.steam_ap
    00094480  69 00 00 00 00 00 00 00 6C 61 75 6E 63 68 65 72  i.......launcher
    00094490  00 00 00 00 6D 6F 64 65 6C 56 69 65 77 50 72 6F  ....modelViewPro
    000944A0  6A 00 00 00 70 6F 73 69 74 69 6F 6E 00 00 00 00  j...position....
    000944B0  00 00 00 00 6E 6F 72 6D 61 6C 00 00 63 6F 6C 6F  ....normal..colo
    000944C0  72 00 00 00 75 6E 6B 6E 6F 77 6E 20 61 73 70 65  r...unknown aspe
    000944D0  63 74 20 72 61 74 69 6F 20 25 78 0A 00 00 00 00  ct ratio %x.....
    000944E0  45 6E 74 65 72 69 6E 67 20 45 72 72 6F 72 20 52  Entering Error R
    000944F0  65 6E 64 65 72 20 6C 6F 6F 70 2C 20 49 4F 20 6D  ender loop, IO m
    00094500  65 6D 6F 72 79 20 40 25 70 2E 2E 2E 0A 00 00 00  emory @%p.......
    00094510  45 78 69 74 69 6E 67 20 45 72 72 6F 72 20 52 65  Exiting Error Re
    00094520  6E 64 65 72 20 6C 6F 6F 70 2C 20 25 75 20 66 72  nder loop, %u fr
    00094530  61 6D 65 73 20 72 65 6E 64 65 72 65 64 00 00 00  ames rendered...
    00094540  2E 0A 00 00 43 45 4C 4C 5F 47 41 4D 45 5F 52 45  ....CELL_GAME_RE
    00094550  54 5F 4F 4B 00 00 00 00 00 00 00 00 48 44 44 20  T_OK........HDD 
    00094560  61 63 63 65 73 73 20 65 72 72 6F 72 00 00 00 00  access error....
    00094570  00 00 00 00 54 68 65 20 63 61 6C 6C 20 6F 66 20  ....The call of 
    00094580  61 6E 20 61 63 63 65 73 73 20 70 72 65 70 61 72  an access prepar
    00094590  69 6E 67 20 66 75 6E 63 74 69 6F 6E 20 77 61 73  ing function was
    000945A0  20 72 65 70 65 61 74 65 64 00 00 00 50 72 6F 63   repeated...Proc
    000945B0  65 73 73 69 6E 67 20 63 61 6E 6E 6F 74 20 62 65  essing cannot be
    000945C0  20 65 78 65 63 75 74 65 64 20 62 65 63 61 75 73   executed becaus
    000945D0  65 20 61 70 70 6C 69 63 61 74 69 6F 6E 20 74 65  e application te
    000945E0  72 6D 69 6E 61 74 69 6F 6E 20 69 73 20 62 65 69  rmination is bei
    000945F0  6E 67 20 70 72 6F 63 65 73 73 65 64 00 00 00 00  ng processed....
    00094600  00 00 00 00 46 61 74 61 6C 20 65 72 72 6F 72 20  ....Fatal error 
    00094610  6F 63 63 75 72 72 65 64 20 69 6E 20 74 68 65 20  occurred in the 
    00094620  75 74 69 6C 69 74 79 00 00 00 00 00 54 68 65 72  utility.....Ther
    00094630  65 20 69 73 20 61 6E 20 65 72 72 6F 72 20 69 6E  e is an error in
    00094640  20 74 68 65 20 61 72 67 75 6D 65 6E 74 20 28 61   the argument (a
    00094650  70 70 6C 69 63 61 74 69 6F 6E 20 62 75 67 29 00  pplication bug).
    00094660  00 00 00 00 50 61 74 68 6E 61 6D 65 20 6F 66 20  ....Pathname of 
    00094670  62 6F 6F 74 65 64 20 70 72 6F 67 72 61 6D 20 66  booted program f
    00094680  69 6C 65 20 69 73 20 74 6F 6F 20 6C 6F 6E 67 00  ile is too long.
    00094690  00 00 00 00 54 72 69 65 64 20 74 6F 20 6C 6F 61  ....Tried to loa
    000946A0  64 20 61 6E 20 75 6E 6B 6E 6F 77 6E 20 50 52 58  d an unknown PRX
    000946B0  00 00 00 00 53 79 73 6D 6F 64 75 6C 65 20 50 52  ....Sysmodule PR
    000946C0  58 20 6C 6F 61 64 20 66 61 69 6C 65 64 00 00 00  X load failed...
    000946D0  00 00 00 00 54 68 65 20 73 70 65 63 69 66 69 65  ....The specifie
    000946E0  64 20 67 61 6D 65 20 63 6F 6E 74 65 6E 74 20 69  d game content i
    000946F0  73 20 63 6F 72 72 75 70 74 65 64 00 55 6E 6B 6E  s corrupted.Unkn
    00094700  6F 77 6E 20 65 72 72 6F 72 20 63 6F 64 65 00 00  own error code..
    00094710  43 50 73 33 43 6F 6E 74 65 6E 74 50 61 74 68 49  CPs3ContentPathI
    00094720  6E 66 6F 20 69 73 20 62 65 69 6E 67 20 69 6E 69  nfo is being ini
    00094730  74 69 61 6C 69 7A 65 64 20 74 77 69 63 65 21 0A  tialized twice!.
    00094740  00 00 00 00 00 00 00 00 54 68 65 20 53 59 53 55  ........The SYSU
    00094750  54 49 4C 5F 47 41 4D 45 20 6D 6F 64 75 6C 65 20  TIL_GAME module 
    00094760  69 73 20 61 6C 72 65 61 64 79 20 6C 6F 61 64 65  is already loade
    00094770  64 20 2D 2D 20 72 65 76 69 73 74 20 6C 6F 61 64  d -- revist load
    00094780  20 6F 72 64 65 72 20 6C 6F 67 69 63 20 69 6E 20   order logic in 
    00094790  43 50 73 33 43 6F 6E 74 65 6E 74 50 61 74 68 49  CPs3ContentPathI
    000947A0  6E 66 6F 3A 3A 49 6E 69 74 28 29 0A 00 00 00 00  nfo::Init().....
    000947B0  46 61 69 6C 65 64 20 74 6F 20 6C 6F 61 64 20 73  Failed to load s
    000947C0  79 73 75 74 69 6C 5F 67 61 6D 65 3A 20 25 73 0A  ysutil_game: %s.
    000947D0  00 00 00 00 00 00 00 00 63 65 6C 6C 47 61 6D 65  ........cellGame
    000947E0  42 6F 6F 74 43 68 65 63 6B 20 66 61 69 6C 65 64  BootCheck failed
    000947F0  20 28 6C 69 6E 65 20 25 64 2C 20 63 6F 64 65 20   (line %d, code 
    00094800  25 64 29 3A 20 25 73 0A 00 00 00 00 00 00 00 00  %d): %s.........
    00094810  25 73 3A 20 25 73 0A 00 50 41 52 41 4D 2E 53 46  %s: %s..PARAM.SF
    00094820  4F 20 67 65 74 50 61 72 61 6D 28 20 43 45 4C 4C  O getParam( CELL
    00094830  5F 47 41 4D 45 5F 50 41 52 41 4D 49 44 5F 54 49  _GAME_PARAMID_TI
    00094840  54 4C 45 20 29 00 00 00 50 41 52 41 4D 2E 53 46  TLE )...PARAM.SF
    00094850  4F 20 67 65 74 50 61 72 61 6D 28 20 43 45 4C 4C  O getParam( CELL
    00094860  5F 47 41 4D 45 5F 50 41 52 41 4D 49 44 5F 54 49  _GAME_PARAMID_TI
    00094870  54 4C 45 5F 49 44 20 29 00 00 00 00 00 00 00 00  TLE_ID )........
    00094880  50 41 52 41 4D 2E 53 46 4F 20 67 65 74 50 61 72  PARAM.SFO getPar
    00094890  61 6D 28 20 43 45 4C 4C 5F 47 41 4D 45 5F 50 41  am( CELL_GAME_PA
    000948A0  52 41 4D 49 44 5F 41 50 50 5F 56 45 52 20 29 00  RAMID_APP_VER ).
    000948B0  50 41 52 41 4D 2E 53 46 4F 20 67 65 74 50 61 72  PARAM.SFO getPar
    000948C0  61 6D 28 20 43 45 4C 4C 5F 47 41 4D 45 5F 50 41  am( CELL_GAME_PA
    000948D0  52 41 4D 49 44 5F 50 41 52 45 4E 54 41 4C 5F 4C  RAMID_PARENTAL_L
    000948E0  45 56 45 4C 20 29 00 00 50 41 52 41 4D 2E 53 46  EVEL )..PARAM.SF
    000948F0  4F 20 67 65 74 50 61 72 61 6D 28 20 43 45 4C 4C  O getParam( CELL
    00094900  5F 47 41 4D 45 5F 50 41 52 41 4D 49 44 5F 52 45  _GAME_PARAMID_RE
    00094910  53 4F 4C 55 54 49 4F 4E 20 29 00 00 00 00 00 00  SOLUTION )......
    00094920  50 41 52 41 4D 2E 53 46 4F 20 67 65 74 50 61 72  PARAM.SFO getPar
    00094930  61 6D 28 20 43 45 4C 4C 5F 47 41 4D 45 5F 50 41  am( CELL_GAME_PA
    00094940  52 41 4D 49 44 5F 53 4F 55 4E 44 5F 46 4F 52 4D  RAMID_SOUND_FORM
    00094950  41 54 20 29 00 00 00 00 2F 61 70 70 5F 68 6F 6D  AT )..../app_hom
    00094960  65 00 00 00 00 00 00 00 2F 61 70 70 5F 68 6F 6D  e......./app_hom
    00094970  65 2F 50 53 33 5F 47 41 4D 45 00 00 00 00 00 00  e/PS3_GAME......
    00094980  2F 61 70 70 5F 68 6F 6D 65 2F 50 53 33 5F 47 41  /app_home/PS3_GA
    00094990  4D 45 2F 55 53 52 44 49 52 00 00 00 00 00 00 00  ME/USRDIR.......
    000949A0  4F 6E 6C 79 20 64 69 73 6B 20 62 6F 6F 74 20 69  Only disk boot i
    000949B0  73 20 73 75 70 70 6F 72 74 65 64 20 69 6E 20 52  s supported in R
    000949C0  45 54 41 49 4C 20 6D 6F 64 65 21 20 28 62 6F 6F  ETAIL mode! (boo
    000949D0  74 6D 6F 64 65 3D 25 64 29 0A 00 00 00 00 00 00  tmode=%d).......
    000949E0  63 65 6C 6C 47 61 6D 65 44 61 74 61 43 68 65 63  cellGameDataChec
    000949F0  6B 20 66 61 69 6C 65 64 20 28 6C 69 6E 65 20 25  k failed (line %
    00094A00  64 2C 20 63 6F 64 65 20 25 64 29 3A 20 25 73 0A  d, code %d): %s.
    00094A10  00 00 00 00 00 00 00 00 50 41 52 41 4D 2E 53 46  ........PARAM.SF
    00094A20  4F 20 50 41 54 43 48 20 67 65 74 50 61 72 61 6D  O PATCH getParam
    00094A30  28 20 43 45 4C 4C 5F 47 41 4D 45 5F 50 41 52 41  ( CELL_GAME_PARA
    00094A40  4D 49 44 5F 41 50 50 5F 56 45 52 20 29 00 00 00  MID_APP_VER )...
    00094A50  63 65 6C 6C 47 61 6D 65 50 61 74 63 68 43 68 65  cellGamePatchChe
    00094A60  63 6B 20 66 61 69 6C 65 64 20 28 6C 69 6E 65 20  ck failed (line 
    00094A70  25 64 2C 20 63 6F 64 65 20 25 64 29 3A 20 25 73  %d, code %d): %s
    00094A80  0A 00 00 00 00 00 00 00 2F 68 64 64 70 61 74 68  ......../hddpath
    00094A90  2F 69 6E 76 61 6C 69 64 00 00 00 00 00 00 00 00  /invalid........
    00094AA0  2F 64 65 76 5F 62 64 76 64 2F 50 53 33 5F 47 41  /dev_bdvd/PS3_GA
    00094AB0  4D 45 2F 55 53 52 44 49 52 00 00 00 00 00 00 00  ME/USRDIR.......
    00094AC0  25 73 2F 62 69 6E 00 00 2F 61 70 70 5F 68 6F 6D  %s/bin../app_hom
    00094AD0  65 2F 50 53 33 5F 47 41 4D 45 2F 55 53 52 44 49  e/PS3_GAME/USRDI
    00094AE0  52 2F 62 69 6E 00 00 00 2F 64 65 76 5F 62 64 76  R/bin.../dev_bdv
    00094AF0  64 2F 50 53 33 5F 47 41 4D 45 2F 55 53 52 44 49  d/PS3_GAME/USRDI
    00094B00  52 2F 62 69 6E 00 00 00 2F 74 65 6D 70 73 61 76  R/bin.../tempsav
    00094B10  65 2F 00 00 00 00 00 00 3A 41 4D 3A 50 4D 00 00  e/......:AM:PM..
    00094B20  3A 53 75 6E 3A 53 75 6E 64 61 79 3A 4D 6F 6E 3A  :Sun:Sunday:Mon:
    00094B30  4D 6F 6E 64 61 79 3A 54 75 65 3A 54 75 65 73 64  Monday:Tue:Tuesd
    00094B40  61 79 3A 57 65 64 3A 57 65 64 6E 65 73 64 61 79  ay:Wed:Wednesday
    00094B50  3A 54 68 75 3A 54 68 75 72 73 64 61 79 3A 46 72  :Thu:Thursday:Fr
    00094B60  69 3A 46 72 69 64 61 79 3A 53 61 74 3A 53 61 74  i:Friday:Sat:Sat
    00094B70  75 72 64 61 79 00 00 00 3A 4A 61 6E 3A 4A 61 6E  urday...:Jan:Jan
    00094B80  75 61 72 79 3A 46 65 62 3A 46 65 62 72 75 61 72  uary:Feb:Februar
    00094B90  79 3A 4D 61 72 3A 4D 61 72 63 68 3A 41 70 72 3A  y:Mar:March:Apr:
    00094BA0  41 70 72 69 6C 3A 4D 61 79 3A 4D 61 79 3A 4A 75  April:May:May:Ju
    00094BB0  6E 3A 4A 75 6E 65 3A 4A 75 6C 3A 4A 75 6C 79 3A  n:June:Jul:July:
    00094BC0  41 75 67 3A 41 75 67 75 73 74 3A 53 65 70 3A 53  Aug:August:Sep:S
    00094BD0  65 70 74 65 6D 62 65 72 3A 4F 63 74 3A 4F 63 74  eptember:Oct:Oct
    00094BE0  6F 62 65 72 3A 4E 6F 76 3A 4E 6F 76 65 6D 62 65  ober:Nov:Novembe
    00094BF0  72 3A 44 65 63 3A 44 65 63 65 6D 62 65 72 00 00  r:Dec:December..
    00094C00  7C 25 61 20 25 62 20 25 65 20 25 54 20 25 59 7C  |%a %b %e %T %Y|
    00094C10  25 6D 2F 25 64 2F 25 79 7C 25 48 3A 25 4D 3A 25  %m/%d/%y|%H:%M:%
    00094C20  53 7C 25 49 3A 25 4D 3A 25 53 20 25 70 00 00 00  S|%I:%M:%S %p...
    ...
    000966A0  6F 63 00 00 00 00 00 00 65 72 00 00 00 00 00 00  oc......er......
    000966B0  00 00 00 00 00 00 00 00 6E 00 00 00 00 00 00 00  ........n.......
    000966C0  53 74 39 62 61 64 5F 61 6C 6C 6F 63 00 00 00 00  St9bad_alloc....
    000966D0  63 61 74 6F 72 45 00 00 42 4C 55 53 33 30 37 33  catorE..BLUS3073
    000966E0  32 00 00 00 00 00 00 00 61 62 6F 72 74 28 29 20  2.......abort() 
    000966F0  69 73 20 63 61 6C 6C 65 64 20 66 72 6F 6D 20 30  is called from 0
    00096700  78 00 00 00 00 00 00 00 0A 00 00 00 00 00 00 00  x...............
    00096710  20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20                  
    00096720  20 20 66 72 6F 6D 20 30 78 00 00 00 00 00 00 00    from 0x.......
    00096730  0A 0A 43 6F 6E 74 69 6E 75 65 2E 2E 2E 20 28 4C  ..Continue... (L
    00096740  76 2D 32 20 69 73 20 73 74 69 6C 6C 20 72 75 6E  v-2 is still run
    00096750  6E 69 6E 67 2E 29 0A 00 25 63 0A 00 00 00 00 00  ning.)..%c......
    00096760  2E 00 00 00 00 00 00 00 66 61 6C 73 65 00 00 00  ........false...
    00096770  74 72 75 65 00 00 00 00 00 00 00 00 00 00 00 00  true............
    00096780  3A 20 00 00 00 00 00 00 43 00 00 00 00 00 00 00  : ......C.......
    00096790  00 00 00 00 00 00 00 00 63 6F 6C 6C 61 74 65 3A  ........collate:
    000967A0  00 00 00 00 00 00 00 00 63 74 79 70 65 3A 00 00  ........ctype:..
    000967B0  6D 6F 6E 65 74 61 72 79 3A 00 00 00 00 00 00 00  monetary:.......
    000967C0  6E 75 6D 65 72 69 63 3A 00 00 00 00 00 00 00 00  numeric:........
    000967D0  74 69 6D 65 3A 00 00 00 6D 65 73 73 61 67 65 73  time:...messages
    000967E0  3A 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  :...............
    000967F0  00 00 00 00 00 00 00 00 74 6F 6C 6F 77 65 72 00  ........tolower.
    00096800  74 6F 75 70 70 65 72 00 43 00 00 00 00 00 00 00  toupper.C.......
    00096810  20 09 00 00 00 00 00 00 30 00 00 00 00 00 00 00   .......0.......
    00096820  2B 3A 00 00 00 00 00 00 25 6D 2F 25 64 2F 25 79  +:......%m/%d/%y
    00096830  00 00 00 00 00 00 00 00 25 59 2D 25 6D 2D 25 64  ........%Y-%m-%d
    00096840  00 00 00 00 00 00 00 00 0A 00 00 00 00 00 00 00  ................
    00096850  25 48 3A 25 4D 00 00 00 09 00 00 00 00 00 00 00  %H:%M...........
    00096860  25 48 3A 25 4D 3A 25 53 00 00 00 00 00 00 00 00  %H:%M:%S........
    00096870  3A 00 00 00 00 00 00 00 25 00 00 00 00 00 00 00  :.......%.......
    00096880  3A 3B 00 00 00 00 00 00 3B 00 00 00 00 00 00 00  :;......;.......
    00096890  3A 00 00 00 00 00 00 00 4E 41 4E 00 00 00 00 00  :.......NAN.....
    000968A0  6E 61 6E 00 00 00 00 00 49 4E 46 00 00 00 00 00  nan.....INF.....
    000968B0  69 6E 66 00 00 00 00 00 30 31 32 33 34 35 36 37  inf.....01234567
    000968C0  38 39 61 62 63 64 65 66 00 00 00 00 00 00 00 00  89abcdef........
    000968D0  30 31 32 33 34 35 36 37 38 39 41 42 43 44 45 46  0123456789ABCDEF
    000968E0  00 00 00 00 00 00 00 00 4C 4F 43 41 4C 45 00 00  ........LOCALE..
    000968F0  4E 4F 54 45 00 00 00 00 53 45 54 00 00 00 00 00  NOTE....SET.....
    00096900  63 6F 6C 6C 61 74 65 00 77 63 6F 6C 6C 61 74 65  collate.wcollate
    00096910  00 00 00 00 00 00 00 00 63 74 79 70 65 00 00 00  ........ctype...
    00096920  74 6F 6C 6F 77 65 72 00 74 6F 75 70 70 65 72 00  tolower.toupper.
    00096930  6D 62 5F 63 75 72 5F 6D 61 78 00 00 00 00 00 00  mb_cur_max......
    00096940  6D 62 74 6F 77 63 00 00 77 63 74 6F 6D 62 00 00  mbtowc..wctomb..
    00096950  77 63 74 72 61 6E 73 00 77 63 74 79 70 65 00 00  wctrans.wctype..
    00096960  63 75 72 72 65 6E 63 79 5F 73 79 6D 62 6F 6C 00  currency_symbol.
    00096970  69 6E 74 5F 63 75 72 72 5F 73 79 6D 62 6F 6C 00  int_curr_symbol.
    00096980  6D 6F 6E 5F 64 65 63 69 6D 61 6C 5F 70 6F 69 6E  mon_decimal_poin
    00096990  74 00 00 00 00 00 00 00 6D 6F 6E 5F 67 72 6F 75  t.......mon_grou
    000969A0  70 69 6E 67 00 00 00 00 6D 6F 6E 5F 74 68 6F 75  ping....mon_thou
    000969B0  73 61 6E 64 73 5F 73 65 70 00 00 00 00 00 00 00  sands_sep.......
    000969C0  6E 65 67 61 74 69 76 65 5F 73 69 67 6E 00 00 00  negative_sign...
    000969D0  70 6F 73 69 74 69 76 65 5F 73 69 67 6E 00 00 00  positive_sign...
    000969E0  66 72 61 63 5F 64 69 67 69 74 73 00 00 00 00 00  frac_digits.....
    000969F0  6E 5F 63 73 5F 70 72 65 63 65 64 65 73 00 00 00  n_cs_precedes...
    00096A00  6E 5F 73 65 70 5F 62 79 5F 73 70 61 63 65 00 00  n_sep_by_space..
    00096A10  6E 5F 73 69 67 6E 5F 70 6F 73 6E 00 00 00 00 00  n_sign_posn.....
    00096A20  70 5F 63 73 5F 70 72 65 63 65 64 65 73 00 00 00  p_cs_precedes...
    00096A30  70 5F 73 65 70 5F 62 79 5F 73 70 61 63 65 00 00  p_sep_by_space..
    00096A40  70 5F 73 69 67 6E 5F 70 6F 73 6E 00 00 00 00 00  p_sign_posn.....
    00096A50  69 6E 74 5F 66 72 61 63 5F 64 69 67 69 74 73 00  int_frac_digits.
    00096A60  69 6E 74 5F 6E 5F 63 73 5F 70 72 65 63 65 64 65  int_n_cs_precede
    00096A70  73 00 00 00 00 00 00 00 69 6E 74 5F 6E 5F 73 65  s.......int_n_se
    00096A80  70 5F 62 79 5F 73 70 61 63 65 00 00 00 00 00 00  p_by_space......
    00096A90  69 6E 74 5F 6E 5F 73 69 67 6E 5F 70 6F 73 6E 00  int_n_sign_posn.
    00096AA0  69 6E 74 5F 70 5F 63 73 5F 70 72 65 63 65 64 65  int_p_cs_precede
    00096AB0  73 00 00 00 00 00 00 00 69 6E 74 5F 70 5F 73 65  s.......int_p_se
    00096AC0  70 5F 62 79 5F 73 70 61 63 65 00 00 00 00 00 00  p_by_space......
    00096AD0  69 6E 74 5F 70 5F 73 69 67 6E 5F 70 6F 73 6E 00  int_p_sign_posn.
    00096AE0  64 65 63 69 6D 61 6C 5F 70 6F 69 6E 74 00 00 00  decimal_point...
    00096AF0  67 72 6F 75 70 69 6E 67 00 00 00 00 00 00 00 00  grouping........
    00096B00  74 68 6F 75 73 61 6E 64 73 5F 73 65 70 00 00 00  thousands_sep...
    00096B10  66 72 61 63 5F 67 72 6F 75 70 69 6E 67 00 00 00  frac_grouping...
    00096B20  66 72 61 63 5F 73 65 70 00 00 00 00 00 00 00 00  frac_sep........
    00096B30  66 61 6C 73 65 00 00 00 74 72 75 65 00 00 00 00  false...true....
    00096B40  61 6D 5F 70 6D 00 00 00 64 61 79 73 00 00 00 00  am_pm...days....
    00096B50  61 62 64 61 79 00 00 00 64 61 79 00 00 00 00 00  abday...day.....
    00096B60  6D 6F 6E 74 68 73 00 00 61 62 6D 6F 6E 00 00 00  months..abmon...
    00096B70  6D 6F 6E 00 00 00 00 00 74 69 6D 65 5F 66 6F 72  mon.....time_for
    00096B80  6D 61 74 73 00 00 00 00 64 5F 74 5F 66 6D 74 00  mats....d_t_fmt.
    00096B90  64 5F 66 6D 74 00 00 00 74 5F 66 6D 74 00 00 00  d_fmt...t_fmt...
    00096BA0  74 5F 66 6D 74 5F 61 6D 70 6D 00 00 00 00 00 00  t_fmt_ampm......
    00096BB0  65 72 61 5F 74 69 6D 65 5F 66 6F 72 6D 61 74 73  era_time_formats
    00096BC0  00 00 00 00 00 00 00 00 65 72 61 5F 64 5F 74 5F  ........era_d_t_
    00096BD0  66 6D 74 00 00 00 00 00 65 72 61 5F 64 5F 66 6D  fmt.....era_d_fm
    00096BE0  74 00 00 00 00 00 00 00 65 72 61 5F 74 5F 66 6D  t.......era_t_fm
    00096BF0  74 00 00 00 00 00 00 00 65 72 61 5F 74 5F 66 6D  t.......era_t_fm
    00096C00  74 5F 61 6D 70 6D 00 00 65 72 61 00 00 00 00 00  t_ampm..era.....
    00096C10  61 6C 74 5F 64 69 67 69 74 73 00 00 00 00 00 00  alt_digits......
    00096C20  64 73 74 5F 72 75 6C 65 73 00 00 00 00 00 00 00  dst_rules.......
    00096C30  74 69 6D 65 5F 7A 6F 6E 65 00 00 00 00 00 00 00  time_zone.......
    00096C40  6E 6F 00 00 00 00 00 00 79 65 73 00 00 00 00 00  no......yes.....
    00096C50  0A 20 2D 2D 20 69 6E 76 61 6C 69 64 20 6C 6F 63  . -- invalid loc
    00096C60  61 6C 65 20 66 69 6C 65 20 6C 69 6E 65 0A 00 00  ale file line...
    00096C70  20 09 00 00 00 00 00 00 68 6A 6C 74 7A 4C 00 00   .......hjltzL..
    00096C80  63 43 6E 5B 00 00 00 00 2E 00 00 00 00 00 00 00  cCn[............
    00096C90  69 6D 70 72 6F 70 65 72 20 6C 69 6E 6B 00 00 00  improper link...
    00096CA0  6E 6F 20 65 72 72 6F 72 00 00 00 00 00 00 00 00  no error........
    00096CB0  61 72 67 75 6D 65 6E 74 20 6C 69 73 74 20 74 6F  argument list to
    00096CC0  6F 20 6C 6F 6E 67 00 00 70 65 72 6D 69 73 73 69  o long..permissi
    00096CD0  6F 6E 20 64 65 6E 69 65 64 00 00 00 00 00 00 00  on denied.......
    00096CE0  72 65 73 6F 75 72 63 65 20 74 65 6D 70 6F 72 61  resource tempora
    00096CF0  72 69 6C 79 20 75 6E 61 76 61 69 6C 61 62 6C 65  rily unavailable
    00096D00  00 00 00 00 00 00 00 00 62 61 64 20 66 69 6C 65  ........bad file
    00096D10  20 64 65 73 63 72 69 70 74 6F 72 00 00 00 00 00   descriptor.....
    00096D20  62 61 64 20 6D 65 73 73 61 67 65 00 00 00 00 00  bad message.....
    00096D30  72 65 73 6F 75 72 63 65 20 62 75 73 79 00 00 00  resource busy...
    00096D40  6F 70 65 72 61 74 69 6F 6E 20 63 61 6E 63 65 6C  operation cancel
    00096D50  65 64 00 00 00 00 00 00 6E 6F 20 63 68 69 6C 64  ed......no child
    00096D60  20 70 72 6F 63 65 73 73 65 73 00 00 00 00 00 00   processes......
    00096D70  72 65 73 6F 75 72 63 65 20 64 65 61 64 6C 6F 63  resource deadloc
    00096D80  6B 20 61 76 6F 69 64 65 64 00 00 00 00 00 00 00  k avoided.......
    00096D90  64 6F 6D 61 69 6E 20 65 72 72 6F 72 00 00 00 00  domain error....
    00096DA0  66 69 6C 65 20 65 78 69 73 74 73 00 00 00 00 00  file exists.....
    00096DB0  62 61 64 20 61 64 64 72 65 73 73 00 00 00 00 00  bad address.....
    00096DC0  66 69 6C 65 20 74 6F 6F 20 6C 61 72 67 65 00 00  file too large..
    00096DD0  66 69 6C 65 20 70 6F 73 69 74 69 6F 6E 69 6E 67  file positioning
    00096DE0  20 65 72 72 6F 72 00 00 6D 75 6C 74 69 62 79 74   error..multibyt
    00096DF0  65 20 65 6E 63 6F 64 69 6E 67 20 65 72 72 6F 72  e encoding error
    00096E00  00 00 00 00 00 00 00 00 6F 70 65 72 61 74 69 6F  ........operatio
    00096E10  6E 20 69 6E 20 70 72 6F 67 72 65 73 73 00 00 00  n in progress...
    00096E20  69 6E 74 65 72 72 75 70 74 65 64 20 66 75 6E 63  interrupted func
    00096E30  74 69 6F 6E 20 63 61 6C 6C 00 00 00 00 00 00 00  tion call.......
    00096E40  69 6E 76 61 6C 69 64 20 61 72 67 75 6D 65 6E 74  invalid argument
    00096E50  00 00 00 00 00 00 00 00 69 6E 70 75 74 2F 6F 75  ........input/ou
    00096E60  74 70 75 74 20 65 72 72 6F 72 00 00 00 00 00 00  tput error......
    00096E70  69 73 20 61 20 64 69 72 65 63 74 6F 72 79 00 00  is a directory..
    00096E80  74 6F 6F 20 6D 61 6E 79 20 6F 70 65 6E 20 66 69  too many open fi
    00096E90  6C 65 73 00 00 00 00 00 74 6F 6F 20 6D 61 6E 79  les.....too many
    00096EA0  20 6C 69 6E 6B 73 00 00 62 61 64 20 6D 65 73 73   links..bad mess
    00096EB0  61 67 65 20 62 75 66 66 65 72 20 6C 65 6E 67 74  age buffer lengt
    00096EC0  68 00 00 00 00 00 00 00 66 69 6C 65 6E 61 6D 65  h.......filename
    00096ED0  20 74 6F 6F 20 6C 6F 6E 67 00 00 00 00 00 00 00   too long.......
    00096EE0  74 6F 6F 20 6D 61 6E 79 20 66 69 6C 65 73 20 6F  too many files o
    00096EF0  70 65 6E 20 69 6E 20 73 79 73 74 65 6D 00 00 00  pen in system...
    00096F00  6E 6F 20 73 75 63 68 20 64 65 76 69 63 65 00 00  no such device..
    00096F10  6E 6F 20 73 75 63 68 20 66 69 6C 65 20 6F 72 20  no such file or 
    00096F20  64 69 72 65 63 74 6F 72 79 00 00 00 00 00 00 00  directory.......
    00096F30  65 78 65 63 20 66 6F 72 6D 61 74 20 65 72 72 6F  exec format erro
    00096F40  72 00 00 00 00 00 00 00 6E 6F 20 6C 6F 63 6B 73  r.......no locks
    00096F50  20 61 76 61 69 6C 61 62 6C 65 00 00 00 00 00 00   available......
    00096F60  6E 6F 74 20 65 6E 6F 75 67 68 20 73 70 61 63 65  not enough space
    00096F70  00 00 00 00 00 00 00 00 6E 6F 20 73 70 61 63 65  ........no space
    00096F80  20 6C 65 66 74 20 6F 6E 20 64 65 76 69 63 65 00   left on device.
    00096F90  66 75 6E 63 74 69 6F 6E 20 6E 6F 74 20 69 6D 70  function not imp
    00096FA0  6C 65 6D 65 6E 74 65 64 00 00 00 00 00 00 00 00  lemented........
    00096FB0  6E 6F 74 20 61 20 64 69 72 65 63 74 6F 72 79 00  not a directory.
    00096FC0  64 69 72 65 63 74 6F 72 79 20 6E 6F 74 20 65 6D  directory not em
    00096FD0  70 74 79 00 00 00 00 00 6E 6F 74 20 73 75 70 70  pty.....not supp
    00096FE0  6F 72 74 65 64 00 00 00 62 61 64 20 49 2F 4F 20  orted...bad I/O 
    00096FF0  63 6F 6E 74 72 6F 6C 20 6F 70 65 72 61 74 69 6F  control operatio
    00097000  6E 00 00 00 00 00 00 00 6E 6F 20 73 75 63 68 20  n.......no such 
    00097010  64 65 76 69 63 65 20 6F 72 20 61 64 64 72 65 73  device or addres
    00097020  73 00 00 00 00 00 00 00 6F 70 65 72 61 74 69 6F  s.......operatio
    00097030  6E 20 6E 6F 74 20 70 65 72 6D 69 74 74 65 64 00  n not permitted.
    00097040  62 72 6F 6B 65 6E 20 70 69 70 65 00 00 00 00 00  broken pipe.....
    00097050  72 61 6E 67 65 20 65 72 72 6F 72 00 00 00 00 00  range error.....
    00097060  72 65 61 64 2D 6F 6E 6C 79 20 66 69 6C 65 20 73  read-only file s
    00097070  79 73 74 65 6D 00 00 00 69 6E 76 61 6C 69 64 20  ystem...invalid 
    00097080  73 65 65 6B 00 00 00 00 6E 6F 20 73 75 63 68 20  seek....no such 
    00097090  70 72 6F 63 65 73 73 00 6F 70 65 72 61 74 69 6F  process.operatio
    000970A0  6E 20 74 69 6D 65 64 20 6F 75 74 00 00 00 00 00  n timed out.....
    000970B0  65 72 72 6F 72 20 30 78 78 78 78 78 78 78 78 78  error 0xxxxxxxxx
    000970C0  00 00 00 00 00 00 00 00 74 6F 6C 6F 77 65 72 00  ........tolower.
    000970D0  74 6F 75 70 70 65 72 00 61 6C 6E 75 6D 00 00 00  toupper.alnum...
    000970E0  61 6C 70 68 61 00 00 00 63 6E 74 72 6C 00 00 00  alpha...cntrl...
    000970F0  64 69 67 69 74 00 00 00 67 72 61 70 68 00 00 00  digit...graph...
    00097100  6C 6F 77 65 72 00 00 00 70 72 69 6E 74 00 00 00  lower...print...
    00097110  70 75 6E 63 74 00 00 00 73 70 61 63 65 00 00 00  punct...space...
    00097120  75 70 70 65 72 00 00 00 78 64 69 67 69 74 00 00  upper...xdigit..
    00097130  62 6C 61 6E 6B 00 00 00 00 00 00 00 00 00 00 00  blank...........
    00097140  00 00 00 9E 00 00 00 9E 00 00 00 9E 00 00 00 9E  ...ž...ž...ž...ž
    00097150  00 00 00 17 00 00 00 17 00 00 00 17 00 00 00 17  ................
    00097160  68 6A 6C 74 7A 4C 76 00 00 28 00 6E 00 75 00 6C  hjltzLv..(.n.u.l
    00097170  00 6C 00 29 00 00 00 00 28 6E 75 6C 6C 29 00 00  .l.)....(null)..
    00097180  49 6E 20 66 75 6E 63 74 69 6F 6E 20 00 00 00 00  In function ....
    00097190  20 2D 2D 20 00 00 00 00 20 2D 2D 20 61 73 73 65   -- .... -- asse
    000971A0  72 74 69 6F 6E 20 66 61 69 6C 65 64 0A 00 00 00  rtion failed....
    000971B0  28 6E 75 6C 6C 29 00 00 68 6A 6C 74 7A 4C 00 00  (null)..hjltzL..
    000971C0  28 6E 75 6C 6C 29 00 00 68 6A 6C 74 7A 4C 00 00  (null)..hjltzL..
    000971D0  5F 6C 63 5F 73 70 66 00 5F 53 50 55 5F 70 72 69  _lc_spf._SPU_pri
    000971E0  6E 74 66 5F 73 65 72 76 65 72 00 00 00 00 00 00  ntf_server......
    000971F0  72 65 61 64 3A 20 72 65 61 64 69 6E 67 20 66 72  read: reading fr
    00097200  6F 6D 20 73 74 64 6F 75 74 20 6F 72 20 73 74 64  om stdout or std
    00097210  65 72 72 20 28 66 64 20 31 20 26 20 32 29 20 6E  err (fd 1 & 2) n
    00097220  6F 74 20 61 6C 6C 6F 77 65 64 0A 00 00 00 00 00  ot allowed......
    00097230  77 72 69 74 65 3A 20 77 72 69 74 69 6E 67 20 66  write: writing f
    00097240  72 6F 6D 20 73 74 64 69 6E 20 28 66 64 20 30 29  rom stdin (fd 0)
    00097250  20 6E 6F 74 20 61 6C 6C 6F 77 65 64 0A 00 00 00   not allowed....
    00097260  2F 68 6F 6D 65 2F 6B 61 6E 65 65 2F 73 76 6E 77  /home/kanee/svnw
    00097270  6F 72 6B 2F 70 73 33 2D 73 76 6E 2F 73 76 6E 2F  ork/ps3-svn/svn/
    00097280  73 79 73 2F 74 72 75 6E 6B 2F 64 69 6E 6B 75 6D  sys/trunk/dinkum
    00097290  77 61 72 65 2F 64 69 6E 6B 75 6D 2D 70 75 2F 73  ware/dinkum-pu/s
    000972A0  6F 75 72 63 65 2F 73 79 73 2F 6C 76 32 2F 6D 61  ource/sys/lv2/ma
    000972B0  6C 6C 6F 63 5F 6C 76 32 2E 63 3A 33 33 32 32 20  lloc_lv2.c:3322 
    000972C0  70 20 21 3D 20 42 00 00 2F 68 6F 6D 65 2F 6B 61  p != B../home/ka
    000972D0  6E 65 65 2F 73 76 6E 77 6F 72 6B 2F 70 73 33 2D  nee/svnwork/ps3-
    000972E0  73 76 6E 2F 73 76 6E 2F 73 79 73 2F 74 72 75 6E  svn/svn/sys/trun
    000972F0  6B 2F 64 69 6E 6B 75 6D 77 61 72 65 2F 64 69 6E  k/dinkumware/din
    00097300  6B 75 6D 2D 70 75 2F 73 6F 75 72 63 65 2F 73 79  kum-pu/source/sy
    00097310  73 2F 6C 76 32 2F 6D 61 6C 6C 6F 63 5F 6C 76 32  s/lv2/malloc_lv2
    00097320  2E 63 3A 33 33 32 32 20 70 20 21 3D 20 46 00 00  .c:3322 p != F..
    00097330  2F 68 6F 6D 65 2F 6B 61 6E 65 65 2F 73 76 6E 77  /home/kanee/svnw
    00097340  6F 72 6B 2F 70 73 33 2D 73 76 6E 2F 73 76 6E 2F  ork/ps3-svn/svn/
    00097350  73 79 73 2F 74 72 75 6E 6B 2F 64 69 6E 6B 75 6D  sys/trunk/dinkum
    00097360  77 61 72 65 2F 64 69 6E 6B 75 6D 2D 70 75 2F 73  ware/dinkum-pu/s
    00097370  6F 75 72 63 65 2F 73 79 73 2F 6C 76 32 2F 6D 61  ource/sys/lv2/ma
    00097380  6C 6C 6F 63 5F 6C 76 32 2E 63 3A 33 33 32 32 20  lloc_lv2.c:3322 
    00097390  63 68 75 6E 6B 73 69 7A 65 28 70 29 20 3D 3D 20  chunksize(p) == 
    000973A0  73 6D 61 6C 6C 5F 69 6E 64 65 78 32 73 69 7A 65  small_index2size
    000973B0  28 49 29 00 00 00 00 00 2F 68 6F 6D 65 2F 6B 61  (I)...../home/ka
    000973C0  6E 65 65 2F 73 76 6E 77 6F 72 6B 2F 70 73 33 2D  nee/svnwork/ps3-
    000973D0  73 76 6E 2F 73 76 6E 2F 73 79 73 2F 74 72 75 6E  svn/svn/sys/trun
    000973E0  6B 2F 64 69 6E 6B 75 6D 77 61 72 65 2F 64 69 6E  k/dinkumware/din
    000973F0  6B 75 6D 2D 70 75 2F 73 6F 75 72 63 65 2F 73 79  kum-pu/source/sy
    00097400  73 2F 6C 76 32 2F 6D 61 6C 6C 6F 63 5F 6C 76 32  s/lv2/malloc_lv2
    00097410  2E 63 3A 33 33 35 38 20 6E 65 78 74 20 21 3D 20  .c:3358 next != 
    00097420  42 00 00 00 00 00 00 00 2F 68 6F 6D 65 2F 6B 61  B......./home/ka
    00097430  6E 65 65 2F 73 76 6E 77 6F 72 6B 2F 70 73 33 2D  nee/svnwork/ps3-
    00097440  73 76 6E 2F 73 76 6E 2F 73 79 73 2F 74 72 75 6E  svn/svn/sys/trun
    00097450  6B 2F 64 69 6E 6B 75 6D 77 61 72 65 2F 64 69 6E  k/dinkumware/din
    00097460  6B 75 6D 2D 70 75 2F 73 6F 75 72 63 65 2F 73 79  kum-pu/source/sy
    00097470  73 2F 6C 76 32 2F 6D 61 6C 6C 6F 63 5F 6C 76 32  s/lv2/malloc_lv2
    00097480  2E 63 3A 33 33 35 38 20 6E 65 78 74 20 21 3D 20  .c:3358 next != 
    00097490  46 00 00 00 00 00 00 00 2F 68 6F 6D 65 2F 6B 61  F......./home/ka
    000974A0  6E 65 65 2F 73 76 6E 77 6F 72 6B 2F 70 73 33 2D  nee/svnwork/ps3-
    000974B0  73 76 6E 2F 73 76 6E 2F 73 79 73 2F 74 72 75 6E  svn/svn/sys/trun
    000974C0  6B 2F 64 69 6E 6B 75 6D 77 61 72 65 2F 64 69 6E  k/dinkumware/din
    000974D0  6B 75 6D 2D 70 75 2F 73 6F 75 72 63 65 2F 73 79  kum-pu/source/sy
    000974E0  73 2F 6C 76 32 2F 6D 61 6C 6C 6F 63 5F 6C 76 32  s/lv2/malloc_lv2
    000974F0  2E 63 3A 33 33 35 38 20 63 68 75 6E 6B 73 69 7A  .c:3358 chunksiz
    00097500  65 28 6E 65 78 74 29 20 3D 3D 20 73 6D 61 6C 6C  e(next) == small
    00097510  5F 69 6E 64 65 78 32 73 69 7A 65 28 49 29 00 00  _index2size(I)..
    00097520  2F 68 6F 6D 65 2F 6B 61 6E 65 65 2F 73 76 6E 77  /home/kanee/svnw
    00097530  6F 72 6B 2F 70 73 33 2D 73 76 6E 2F 73 76 6E 2F  ork/ps3-svn/svn/
    00097540  73 79 73 2F 74 72 75 6E 6B 2F 64 69 6E 6B 75 6D  sys/trunk/dinkum
    00097550  77 61 72 65 2F 64 69 6E 6B 75 6D 2D 70 75 2F 73  ware/dinkum-pu/s
    00097560  6F 75 72 63 65 2F 73 79 73 2F 6C 76 32 2F 6D 61  ource/sys/lv2/ma
    00097570  6C 6C 6F 63 5F 6C 76 32 2E 63 3A 33 33 36 38 20  lloc_lv2.c:3368 
    00097580  70 73 69 7A 65 20 3E 3D 20 4D 49 4E 5F 43 48 55  psize >= MIN_CHU
    00097590  4E 4B 5F 53 49 5A 45 00 2F 68 6F 6D 65 2F 6B 61  NK_SIZE./home/ka
    000975A0  6E 65 65 2F 73 76 6E 77 6F 72 6B 2F 70 73 33 2D  nee/svnwork/ps3-
    000975B0  73 76 6E 2F 73 76 6E 2F 73 79 73 2F 74 72 75 6E  svn/svn/sys/trun
    000975C0  6B 2F 64 69 6E 6B 75 6D 77 61 72 65 2F 64 69 6E  k/dinkumware/din
    000975D0  6B 75 6D 2D 70 75 2F 73 6F 75 72 63 65 2F 73 79  kum-pu/source/sy
    000975E0  73 2F 6C 76 32 2F 6D 61 6C 6C 6F 63 5F 6C 76 32  s/lv2/malloc_lv2
    000975F0  2E 63 3A 33 31 38 35 20 63 68 75 6E 6B 73 69 7A  .c:3185 chunksiz
    00097600  65 28 70 29 20 3D 3D 20 73 6D 61 6C 6C 5F 69 6E  e(p) == small_in
    00097610  64 65 78 32 73 69 7A 65 28 69 64 78 29 00 00 00  dex2size(idx)...
    00097620  2F 68 6F 6D 65 2F 6B 61 6E 65 65 2F 73 76 6E 77  /home/kanee/svnw
    00097630  6F 72 6B 2F 70 73 33 2D 73 76 6E 2F 73 76 6E 2F  ork/ps3-svn/svn/
    00097640  73 79 73 2F 74 72 75 6E 6B 2F 64 69 6E 6B 75 6D  sys/trunk/dinkum
    00097650  77 61 72 65 2F 64 69 6E 6B 75 6D 2D 70 75 2F 73  ware/dinkum-pu/s
    00097660  6F 75 72 63 65 2F 73 79 73 2F 6C 76 32 2F 6D 61  ource/sys/lv2/ma
    00097670  6C 6C 6F 63 5F 6C 76 32 2E 63 3A 33 31 38 36 20  lloc_lv2.c:3186 
    00097680  70 20 21 3D 20 62 00 00 2F 68 6F 6D 65 2F 6B 61  p != b../home/ka
    00097690  6E 65 65 2F 73 76 6E 77 6F 72 6B 2F 70 73 33 2D  nee/svnwork/ps3-
    000976A0  73 76 6E 2F 73 76 6E 2F 73 79 73 2F 74 72 75 6E  svn/svn/sys/trun
    000976B0  6B 2F 64 69 6E 6B 75 6D 77 61 72 65 2F 64 69 6E  k/dinkumware/din
    000976C0  6B 75 6D 2D 70 75 2F 73 6F 75 72 63 65 2F 73 79  kum-pu/source/sy
    000976D0  73 2F 6C 76 32 2F 6D 61 6C 6C 6F 63 5F 6C 76 32  s/lv2/malloc_lv2
    000976E0  2E 63 3A 33 31 38 36 20 70 20 21 3D 20 46 00 00  .c:3186 p != F..
    000976F0  2F 68 6F 6D 65 2F 6B 61 6E 65 65 2F 73 76 6E 77  /home/kanee/svnw
    00097700  6F 72 6B 2F 70 73 33 2D 73 76 6E 2F 73 76 6E 2F  ork/ps3-svn/svn/
    00097710  73 79 73 2F 74 72 75 6E 6B 2F 64 69 6E 6B 75 6D  sys/trunk/dinkum
    00097720  77 61 72 65 2F 64 69 6E 6B 75 6D 2D 70 75 2F 73  ware/dinkum-pu/s
    00097730  6F 75 72 63 65 2F 73 79 73 2F 6C 76 32 2F 6D 61  ource/sys/lv2/ma
    00097740  6C 6C 6F 63 5F 6C 76 32 2E 63 3A 33 31 38 36 20  lloc_lv2.c:3186 
    00097750  63 68 75 6E 6B 73 69 7A 65 28 70 29 20 3D 3D 20  chunksize(p) == 
    00097760  73 6D 61 6C 6C 5F 69 6E 64 65 78 32 73 69 7A 65  small_index2size
    00097770  28 69 64 78 29 00 00 00 2F 68 6F 6D 65 2F 6B 61  (idx).../home/ka
    00097780  6E 65 65 2F 73 76 6E 77 6F 72 6B 2F 70 73 33 2D  nee/svnwork/ps3-
    00097790  73 76 6E 2F 73 76 6E 2F 73 79 73 2F 74 72 75 6E  svn/svn/sys/trun
    000977A0  6B 2F 64 69 6E 6B 75 6D 77 61 72 65 2F 64 69 6E  k/dinkumware/din
    000977B0  6B 75 6D 2D 70 75 2F 73 6F 75 72 63 65 2F 73 79  kum-pu/source/sy
    000977C0  73 2F 6C 76 32 2F 6D 61 6C 6C 6F 63 5F 6C 76 32  s/lv2/malloc_lv2
    000977D0  2E 63 3A 33 32 30 33 20 63 68 75 6E 6B 73 69 7A  .c:3203 chunksiz
    000977E0  65 28 70 29 20 3D 3D 20 73 6D 61 6C 6C 5F 69 6E  e(p) == small_in
    000977F0  64 65 78 32 73 69 7A 65 28 69 29 00 00 00 00 00  dex2size(i).....
    00097800  2F 68 6F 6D 65 2F 6B 61 6E 65 65 2F 73 76 6E 77  /home/kanee/svnw
    00097810  6F 72 6B 2F 70 73 33 2D 73 76 6E 2F 73 76 6E 2F  ork/ps3-svn/svn/
    00097820  73 79 73 2F 74 72 75 6E 6B 2F 64 69 6E 6B 75 6D  sys/trunk/dinkum
    00097830  77 61 72 65 2F 64 69 6E 6B 75 6D 2D 70 75 2F 73  ware/dinkum-pu/s
    00097840  6F 75 72 63 65 2F 73 79 73 2F 6C 76 32 2F 6D 61  ource/sys/lv2/ma
    00097850  6C 6C 6F 63 5F 6C 76 32 2E 63 3A 33 32 30 34 20  lloc_lv2.c:3204 
    00097860  70 20 21 3D 20 62 00 00 2F 68 6F 6D 65 2F 6B 61  p != b../home/ka
    00097870  6E 65 65 2F 73 76 6E 77 6F 72 6B 2F 70 73 33 2D  nee/svnwork/ps3-
    00097880  73 76 6E 2F 73 76 6E 2F 73 79 73 2F 74 72 75 6E  svn/svn/sys/trun
    00097890  6B 2F 64 69 6E 6B 75 6D 77 61 72 65 2F 64 69 6E  k/dinkumware/din
    000978A0  6B 75 6D 2D 70 75 2F 73 6F 75 72 63 65 2F 73 79  kum-pu/source/sy
    000978B0  73 2F 6C 76 32 2F 6D 61 6C 6C 6F 63 5F 6C 76 32  s/lv2/malloc_lv2
    000978C0  2E 63 3A 33 32 30 34 20 70 20 21 3D 20 46 00 00  .c:3204 p != F..
    000978D0  2F 68 6F 6D 65 2F 6B 61 6E 65 65 2F 73 76 6E 77  /home/kanee/svnw
    000978E0  6F 72 6B 2F 70 73 33 2D 73 76 6E 2F 73 76 6E 2F  ork/ps3-svn/svn/
    000978F0  73 79 73 2F 74 72 75 6E 6B 2F 64 69 6E 6B 75 6D  sys/trunk/dinkum
    00097900  77 61 72 65 2F 64 69 6E 6B 75 6D 2D 70 75 2F 73  ware/dinkum-pu/s
    00097910  6F 75 72 63 65 2F 73 79 73 2F 6C 76 32 2F 6D 61  ource/sys/lv2/ma
    00097920  6C 6C 6F 63 5F 6C 76 32 2E 63 3A 33 32 30 34 20  lloc_lv2.c:3204 
    00097930  63 68 75 6E 6B 73 69 7A 65 28 70 29 20 3D 3D 20  chunksize(p) == 
    00097940  73 6D 61 6C 6C 5F 69 6E 64 65 78 32 73 69 7A 65  small_index2size
    00097950  28 69 29 00 00 00 00 00 2F 68 6F 6D 65 2F 6B 61  (i)...../home/ka
    00097960  6E 65 65 2F 73 76 6E 77 6F 72 6B 2F 70 73 33 2D  nee/svnwork/ps3-
    00097970  73 76 6E 2F 73 76 6E 2F 73 79 73 2F 74 72 75 6E  svn/svn/sys/trun
    00097980  6B 2F 64 69 6E 6B 75 6D 77 61 72 65 2F 64 69 6E  k/dinkumware/din
    00097990  6B 75 6D 2D 70 75 2F 73 6F 75 72 63 65 2F 73 79  kum-pu/source/sy
    000979A0  73 2F 6C 76 32 2F 6D 61 6C 6C 6F 63 5F 6C 76 32  s/lv2/malloc_lv2
    000979B0  2E 63 3A 33 32 31 33 20 69 73 5F 73 6D 61 6C 6C  .c:3213 is_small
    000979C0  28 44 56 53 29 00 00 00 2F 68 6F 6D 65 2F 6B 61  (DVS).../home/ka
    000979D0  6E 65 65 2F 73 76 6E 77 6F 72 6B 2F 70 73 33 2D  nee/svnwork/ps3-
    000979E0  73 76 6E 2F 73 76 6E 2F 73 79 73 2F 74 72 75 6E  svn/svn/sys/trun
    000979F0  6B 2F 64 69 6E 6B 75 6D 77 61 72 65 2F 64 69 6E  k/dinkumware/din
    00097A00  6B 75 6D 2D 70 75 2F 73 6F 75 72 63 65 2F 73 79  kum-pu/source/sy
    00097A10  73 2F 6C 76 32 2F 6D 61 6C 6C 6F 63 5F 6C 76 32  s/lv2/malloc_lv2
    00097A20  2E 63 3A 33 32 31 33 20 44 56 53 20 3E 3D 20 4D  .c:3213 DVS >= M
    00097A30  49 4E 5F 43 48 55 4E 4B 5F 53 49 5A 45 00 00 00  IN_CHUNK_SIZE...
    00097A40  2F 68 6F 6D 65 2F 6B 61 6E 65 65 2F 73 76 6E 77  /home/kanee/svnw
    00097A50  6F 72 6B 2F 70 73 33 2D 73 76 6E 2F 73 76 6E 2F  ork/ps3-svn/svn/
    00097A60  73 79 73 2F 74 72 75 6E 6B 2F 64 69 6E 6B 75 6D  sys/trunk/dinkum
    00097A70  77 61 72 65 2F 64 69 6E 6B 75 6D 2D 70 75 2F 73  ware/dinkum-pu/s
    00097A80  6F 75 72 63 65 2F 73 79 73 2F 6C 76 32 2F 6D 61  ource/sys/lv2/ma
    00097A90  6C 6C 6F 63 5F 6C 76 32 2E 63 3A 32 38 34 38 20  lloc_lv2.c:2848 
    00097AA0  63 68 75 6E 6B 73 69 7A 65 28 76 29 20 3D 3D 20  chunksize(v) == 
    00097AB0  72 73 69 7A 65 20 2B 20 6E 62 00 00 00 00 00 00  rsize + nb......
    00097AC0  2F 68 6F 6D 65 2F 6B 61 6E 65 65 2F 73 76 6E 77  /home/kanee/svnw
    00097AD0  6F 72 6B 2F 70 73 33 2D 73 76 6E 2F 73 76 6E 2F  ork/ps3-svn/svn/
    00097AE0  73 79 73 2F 74 72 75 6E 6B 2F 64 69 6E 6B 75 6D  sys/trunk/dinkum
    00097AF0  77 61 72 65 2F 64 69 6E 6B 75 6D 2D 70 75 2F 73  ware/dinkum-pu/s
    00097B00  6F 75 72 63 65 2F 73 79 73 2F 6C 76 32 2F 6D 61  ource/sys/lv2/ma
    00097B10  6C 6C 6F 63 5F 6C 76 32 2E 63 3A 32 38 35 36 20  lloc_lv2.c:2856 
    00097B20  69 73 5F 73 6D 61 6C 6C 28 44 56 53 29 00 00 00  is_small(DVS)...
    00097B30  2F 68 6F 6D 65 2F 6B 61 6E 65 65 2F 73 76 6E 77  /home/kanee/svnw
    00097B40  6F 72 6B 2F 70 73 33 2D 73 76 6E 2F 73 76 6E 2F  ork/ps3-svn/svn/
    00097B50  73 79 73 2F 74 72 75 6E 6B 2F 64 69 6E 6B 75 6D  sys/trunk/dinkum
    00097B60  77 61 72 65 2F 64 69 6E 6B 75 6D 2D 70 75 2F 73  ware/dinkum-pu/s
    00097B70  6F 75 72 63 65 2F 73 79 73 2F 6C 76 32 2F 6D 61  ource/sys/lv2/ma
    00097B80  6C 6C 6F 63 5F 6C 76 32 2E 63 3A 32 38 35 36 20  lloc_lv2.c:2856 
    00097B90  44 56 53 20 3E 3D 20 4D 49 4E 5F 43 48 55 4E 4B  DVS >= MIN_CHUNK
    00097BA0  5F 53 49 5A 45 00 00 00 2F 68 6F 6D 65 2F 6B 61  _SIZE.../home/ka
    00097BB0  6E 65 65 2F 73 76 6E 77 6F 72 6B 2F 70 73 33 2D  nee/svnwork/ps3-
    00097BC0  73 76 6E 2F 73 76 6E 2F 73 79 73 2F 74 72 75 6E  svn/svn/sys/trun
    00097BD0  6B 2F 64 69 6E 6B 75 6D 77 61 72 65 2F 64 69 6E  k/dinkumware/din
    00097BE0  6B 75 6D 2D 70 75 2F 73 6F 75 72 63 65 2F 73 79  kum-pu/source/sy
    00097BF0  73 2F 6C 76 32 2F 6D 61 6C 6C 6F 63 5F 6C 76 32  s/lv2/malloc_lv2
    00097C00  2E 63 3A 32 38 30 39 20 63 68 75 6E 6B 73 69 7A  .c:2809 chunksiz
    00097C10  65 28 76 29 20 3D 3D 20 72 73 69 7A 65 20 2B 20  e(v) == rsize + 
    00097C20  6E 62 00 00 00 00 00 00 2F 68 6F 6D 65 2F 6B 61  nb....../home/ka
    00097C30  6E 65 65 2F 73 76 6E 77 6F 72 6B 2F 70 73 33 2D  nee/svnwork/ps3-
    00097C40  73 76 6E 2F 73 76 6E 2F 73 79 73 2F 74 72 75 6E  svn/svn/sys/trun
    00097C50  6B 2F 64 69 6E 6B 75 6D 77 61 72 65 2F 64 69 6E  k/dinkumware/din
    00097C60  6B 75 6D 2D 70 75 2F 73 6F 75 72 63 65 2F 73 79  kum-pu/source/sy
    00097C70  73 2F 6C 76 32 2F 6D 61 6C 6C 6F 63 5F 6C 76 32  s/lv2/malloc_lv2
    00097C80  2E 63 3A 32 34 35 39 20 28 63 68 61 72 2A 29 6F  .c:2459 (char*)o
    00097C90  6C 64 66 69 72 73 74 20 3E 20 28 63 68 61 72 2A  ldfirst > (char*
    00097CA0  29 71 00 00 00 00 00 00 2F 68 6F 6D 65 2F 6B 61  )q....../home/ka
    00097CB0  6E 65 65 2F 73 76 6E 77 6F 72 6B 2F 70 73 33 2D  nee/svnwork/ps3-
    00097CC0  73 76 6E 2F 73 76 6E 2F 73 79 73 2F 74 72 75 6E  svn/svn/sys/trun
    00097CD0  6B 2F 64 69 6E 6B 75 6D 77 61 72 65 2F 64 69 6E  k/dinkumware/din
    00097CE0  6B 75 6D 2D 70 75 2F 73 6F 75 72 63 65 2F 73 79  kum-pu/source/sy
    00097CF0  73 2F 6C 76 32 2F 6D 61 6C 6C 6F 63 5F 6C 76 32  s/lv2/malloc_lv2
    00097D00  2E 63 3A 32 34 36 30 20 70 69 6E 75 73 65 28 6F  .c:2460 pinuse(o
    00097D10  6C 64 66 69 72 73 74 29 00 00 00 00 00 00 00 00  ldfirst)........
    00097D20  2F 68 6F 6D 65 2F 6B 61 6E 65 65 2F 73 76 6E 77  /home/kanee/svnw
    00097D30  6F 72 6B 2F 70 73 33 2D 73 76 6E 2F 73 76 6E 2F  ork/ps3-svn/svn/
    00097D40  73 79 73 2F 74 72 75 6E 6B 2F 64 69 6E 6B 75 6D  sys/trunk/dinkum
    ...
    BruteForce/SCETool Decrypter Build Changelogs:

    Updated to version 1.5.1:
    • Added real-time switching from hex to dec and vice-versa
    • Patterns 01xxxxxx01xxxxxx01xxxxxx01xxxxxx are ignored (in addition to 00xxxxxx00xxxxxx00xxxxxx00xxxxxx, *0000* and *FFFFFFFFFFFF*)
    • Added credits please let me know if I'm missing someone
    • Added display info for SELF/SPRX
    • Added F2 shortcut to open program's folder
    • Added find to DOS box (use F3)
    • Double click on an offset value in the DOS box sets the offset field
    • Stop address field can be set from the DOS box selecting an initial address then double click on the final address

    Updated to version 1.5.2:
    • Solved the issue finding the key for SOCOM 4 (the real key contains *0000* which was in the ignored patterns)
    • Now the patterns to ignore can me defined in the file "ignore_patterns.txt". It includes 4 by default, but you can add all/remove the patterns that you want.

    TIP: If you use data alignment 16, if the klic key is not found in the selected range, the tool will retry automatically using data alignment 4, then data alignment 1. The BruteForce 1.6 has the "pre-database of known keys" already implemented. It now first tries the known keys first (read from klics.txt). I went further: the program now first extracts the ContentID, and puts the klic for the TitleID as the first in the list.

    I uploaded version 1.6.1 and 1.6.2 is up:
    • Added Asure to the credits.
    • This version now has an experimental dynamic section alignment (it first tries using the alignment of the section).
    • The section index is now displayed.

    I changed the &H to 0x in build 1.6.5 (available online) Added the KLIC for Tom Clancy Splinter Cell Trilogy HD (1.01) [BLES01146] (thanks to andreus and PatrickBatman for all the klic keys in the database). Added the patterns for the above scenario.

    BruteForce/SCETool Decrypter Build 1.6.7
    • Added 2 new klic keys to the database: G1 Jockey and Sniper Ghost Warrior
    • The used keys are now saved to a file. The file name includes the ContentID and ELF size to prevent conflicts with other files decrypted. (these keys are not tested the next time you run the program.)

    BruteForce/SCETool Decrypter Build 1.6.8
    • I added a timeout of 1 minute. If in that time scetool.exe does not finish, the program will terminate the task and retry again. If it crashes again, it continues with the next keys!

    BruteForce/SCETool Decrypter Build 1.7.0
    • The default view was changed from decimal to hex
    • Press SPACE key in the EBOOT info to jump to the section offset addresses
    • When you change the offset address, it now hilights the address in the EBOOT info window
    • Press ENTER near an address in the EBOOT info window to use it as offset address
    • The timeout is now set to 30 secs (in 1.6.9 it was set to 10 mins by mistake)
    • Added support to choose encryption keys: 3.40 or 3.55 (default)
    • Added option to compress encrypted Data (active by default)
    • If the PARAM.SFO is found in the folder, it sets the PS3_SYSTEM_VER to 3.55 (or 3.40)
    • Program's version and ContentID are now displayed
    • Count of ignored keys is now shown while processing
    • Added FixELF (36 --> 34 / 35 --> 34) before SPRX/SELF encryption
    • If EBOOT.BIN or SELF/SPRX is not found, it tries to use the *_ORIGINAL files if present in the folder
    • Added Test drive unlimited 2 (1.06) to the database of klics (thanks to PatrickBatman)
    • Fixed some incorrect addresses caused by automatic coersion (VB uses int16 instead of int32 when the value fits in 2 bytes. Example: 0xFFFF was converted to -1 instead of 65,535)

    BruteForce/SCETool Decrypter Build 1.7.1:
    • Display the key revision
    • Warning for EBOOT.BIN with key revision <= 3.55
    • Cleaned the internal source code a bit (just a bit)
    • FixELF is applied for key revisions up to 4.20. Example if key revision is 4.00, it applies:

    Code:
    24 13 BC C5 F6 00 33 00 00 00 40 -> 24 13 BC C5 F6 00 33 00 00 00 34
    24 13 BC C5 F6 00 33 00 00 00 37 -> 24 13 BC C5 F6 00 33 00 00 00 34
    24 13 BC C5 F6 00 33 00 00 00 36 -> 24 13 BC C5 F6 00 33 00 00 00 34
    24 13 BC C5 F6 00 33 00 00 00 35 -> 24 13 BC C5 F6 00 33 00 00 00 34
    (41 --> 34 and 42 --> 42 --> 34 are not applied, because 4.1x and 4.2x are higher than 4.00)
    BruteForce/SCETool Decrypter Build 1.7.2:
    • I tested MW3 with this version and it works fine now.
    • Settings are now remembered when the program is closed
    • Added setting for skip sections

    BruteForce/SCETool Decrypter Build 1.7.3:
    • it fixes a bug introduced fixing the coersion bug in version 1.6.10?

    BruteForce/SCETool Decrypter Build 1.7.5:
    • I tested the new version and i saw you encrypt with the klincensee. yes, now it is encrypting with the klicensee and SPRX (and compress=true and skip sections=fase are now the defaults)
    • I removed almost all the windows updates while it is minimized and made small code optimizations to create/move less strings while it's processing. I don't think they will make much difference, but at least I tried
    • BTW: Notice that same klic is used in different regions.

    BruteForce/SCETool Decrypter Build 1.7.6:
    • If they match (i.e. no differences) then there is a very good chance that you only need to re-self the eboot.bin to the desired .self without the need of a license key.
    • It can suggest to the user that it is possible to create the .self for testing.

    BruteForce/SCETool Decrypter Build 1.7.7:
    • In my tests it worked 10-20% faster

    BruteForce/SCETool Decrypter Build 1.7.11:
    • I updated the FixELF.exe so in a single call like this: FixELF.exe EBOOT.elf "24 13 BC C5 F6 00 33 00 00 00 36" "24 13 BC C5 F6 00 33 00 00 00 34" it will search: "24 13 BC C5 F6 00 33 00 00 00 xx ??" -> "24 13 BC C5 F6 00 33 00 00 00 34 00" where xx is any char between 0x35 and 0x99 (inclusive). if the value is found, it stop the search/replace.
    • This build 1.7.11 now supports another tool (aldostools.org/temp/testklic.rar) developed by andreus to test the klicensee. Extract the content of the rar in the same folder of the BruteForce.exe. In our tests it worked faster than scetool. The user can select which tool want to use to find the klicensee (scetool or testklic).

    BruteForce/SCETool Decrypter Build 1.7.12: A klicensee finder using scetool (based on Asure's brute force script) with heuristic algorythms for brute force attack. Once it finds the klicensee, the tool resign the EBOOT/SPRX/SELF with 3.55/3.40 keys. It also includes my FixELF tool.
    • I have updated the BruteForce to version 1.7.12 and my PS3 Tools to use the lowest key revision (01) and 3.40 by default.
    • For BruteForce, the default option now will be 3.40 (it can be switch to 3.55)
    • If the PARAM.SFO is copied to the BruteForce-scetool's folder the BruteForce.exe will auto-patch the sfo's PS3_SYSTEM_VER to 3.40.
    • If you use my PS3 Tools to make the PKG (just right-clicking of the folder), now it will auto-patch the PARAM.SFO to 3.40 if PS3_SYSTEM_VER is higher than 3.40.
    • If you need to patch a PARAM.SFO from a batch file, use my latest PARAM.SFO Editor 2.5.3 like this:
      Code:
      PARAM_SFO_Editor.exe "PARAM.SFO" "PS3_SYSTEM_VER" "3.40"
      It accepts more pairs of paremeters. example:
      Code:
      PARAM_SFO_Editor.exe "C:\PARAM.SFO" "PS3_SYSTEM_VER" "03.4000" "APP_VER" "99.99" "TITLE_ID" "BLES99999"

    The BruteForce is a tool designed mainly to *FIND* the klicensee used to encrypt the NPDRM self/sprx files found in game patches/updates. Currently it supports files signed with up to 3.6 keys (mainly 3.56 and 3.60). If 3.7+ keys are available, the tool should also work (updating the keys in the data folder).

    To find the klicensee you will need to copy the EBOOT.BIN, the self/sprx files and the PARAM.SFO to the BruteForce/scetool's folder.

    If the klicensee is already known, it will take few seconds to resign the EBOOT.BIN and the self/sprx files. Otherwise it will use optimized methods to try to *guess* the klicensee in few hours.

    Once the klicensee is found, the files are resigned with the keys from key revision 01 [0.92 - 3.30], which should be supported by ALL firmware versions available.

    To resign files and repack PKG, I suggest that use the PS3 Tools Collection (which also includes the BruteForce).

    To resign a disc EBOOT.BIN/self/sprx, just press Ctrl+Enter on the file and it will be resigned. If you double click (or press Enter) on the EBOOT.BIN or *.self or *.sprx you will see the file's information (including key version used).

    To resign NPDRM files, extract the PKG (use the right click menu), browse to the USRDIR and press Ctrl+Enter on the EBOOT.BIN/self/sprx files. Then return to the folder where the PKG is located and right click on the extracted folder and select Make PKG.

    It will modify automatically the PARAM.SFO to work with 3.40/3.55+. It will also detect the type of PKG being created (disc patch, game data or hard disk game). So there is not need at all for batch files or edit package.conf. Everything is automated.

    The PS3 Tools Collection integrates strongly with Windows Explorer, so you can view/edit files (PKG, PUP, SFO, SFX, HIP, HIS, RAP, edat, SFB, BIN, SELF, SPRX, MD5, SFV, SHA1, MTH, 66600) and perform many other tasks just double clicking on the files or using the context menu.

    Another nice feature is the repack of retail PKGs for use with DEX converted consoles. Just press Ctrl+Shift+Enter on a PKG and the tool will automatically extract the PKG and repack it as a debug PKG. To extract a PKG, just press Shift+Enter on the PKG. And to view it's Content ID, press Ctrl+Enter on the PKG.

    TIPS:
    • If you select Make PKG on a PS3_GAME folder, it will call the PS3RIP tool.
    • If you select Make PKG on a PS3_UPDATE folder, it will call the Create_PS3_EXTRA tool.
    • All tools are accessed from the PS3 Tools Menu. You can use it from other PS3 related tasks, like add links to your favorite scene news sites or open folders where you put your PS3 files. You can return to the menu clicking on the blue jewel icon.
    • For the PS3 Game Updates, it is suggested to set the target version to 3.60
    • If you need to remove ALL the file associations created by the tool, there is a .reg file in the tools folder.
    • For BruteForce, try extracting this AddOn (developed by andreus) in the scetool's folder (it should help to make the brute force work faster).

    Big thanks to Asure, naehrwert, flatz, deank, andreus, PatrickBatman, BLKDTH, JLM, opoisso893, Matsumot0, catalinnc, and many others that I could be forgetting.

    PS. The BruteForce/scetool does NOT crack NPDRM files (DLC or games) that require RIF/RAP/edats.

    BruteForce/SCETool Decrypter Build 1.7.13:
    • I just updated the BruteForce to version 1.7.13 with the new option "Dont use tried_keys list"

    BruteForce/SCETool Decrypter Build 1.7.14:
    • The testklic was using the default key version (I was not passing the key version as parameter).

    BruteForce/SCETool Decrypter Build 1.7.15:
    • This new version has the "shutdown" option and prompt to auto-update the database when a new klic is found.
    • If shutdown option is active, it will not prompt and will auto-update the online database automatically.
    • A new button "Update KLICS.TXT" will download the latest klic.txt

    BruteForce/SCETool Decrypter Build 1.8.0:
    • It should support SCETool 0.2.8 and 0.2.9.

    BruteForce/SCETool Decrypter (Build 0.2.9 SCETool): aldostools.org/temp/scetool_0.2.9_bruteforce.7z
    • (updated FixELF)
    Code:
    if FixELF is called with any of the following options:
    FixELF "24 13 BC C5 F6 00 33 00 00 00 36" "24 13 BC C5 F6 00 33 00 00 00 34"
    FixELF "13 BC C5 F6 00 33 00 00 00 36" "13 BC C5 F6 00 33 00 00 00 34"
    FixELF
    it will actually do the following search/replace:
    Code:
    "13 BC C5 F6 00 33 00 00 00 xx xx" --> "13 BC C5 F6 00 33 00 00 00 34 00"
    "13 BC C5 F6 00 00 00 01 00 xx xx" --> "13 BC C5 F6 00 00 00 01 00 34 00"
    "13 BC C5 F6 00 00 84 00 00 xx xx" --> "13 BC C5 F6 00 00 84 00 00 34 00"
    "13 BC C5 F6 00 00 90 00 00 xx xx" --> "13 BC C5 F6 00 00 90 00 00 34 00"
    (only if xx xx > 34 00 and the found address is aligned to 4)

    BruteForce/SCETool Decrypter Build 1.8.1:
    • I updated the PKG Content ID (it also resigns SELF/SPRX/EBOOT)
    • The tool now first checks the current app type of each SELF/SPRX/EBOOT, then use it for resign the file.
    • I also rearranged a bit the options.

    BruteForce/SCETool Decrypter Build 1.8.5:
    • Includes the new KLICS.TXT and can decrypt DEBUG EBOOT.BIN) - Everyone should say THANKS to Deank for the tip.

    BruteForce/SCETool Decrypter Build 1.8.6:
    • Updated command line parameters for new klics.txt

    BruteForce/SCETool Decrypter Build 1.9.0:
    • Added 2 new heuristic algorythms
    • Find the "drmKey" string in the decrypted EBOOT.ELF and test the text klicensee next to it
    • Test klicensees stored as text strings (ansi or unicode)

    BruteForce/SCETool Decrypter Build 1.9.0.1:
    • There was a bug in the algorythm for "drmKey" (it was considering the klics in lower case as invalid)... but the 2nd algorythm should have worked.
    • Now it accepts the game folder as parameter, and scans all the sprx/self/eboot.bin. If the klic is found, the resigned files are moved to the original location.
    • If there is not an EBOOT.BIN in the BruteForce folder, it will ask for the game folder.
    • Also changed the priority of the tried keys validations... I hope that it helps a bit to improve the speed.

    BruteForce/SCETool Decrypter Build 1.9.0.1a:
    • Updated the .ps3 with the proper keys provided by andreus in the testklic app (I'm still going to double check them)
    • Updated klics.txt with at least the following new klicensees (thanks to Omnomnom, catalinc and av)
    Code:
    51BE4195553454C45535350415443481 Army of TWO The 40th Day (1.03) [BLUS30408] [BLES00659] [BLJM60216] [BLAS50174] [BLJM60308] [UP0006-BLUS30408_00-PATCH03NTSC00000]
    2E21302E362F202731596153304A5C4A Flower [NPUA80083] [UP9000-NPUA80083_00-FLOWERPS3PRIVATE]
    32204F4157407953737C2D25406F2C54 Flower [NPEA00094] [UP9000-NPUA80083_00-FLOWERPS3PRIVATE]
    483466396b2f5b703c743f463044565f Flowery [NPJA00039] [JP9000-NPJA00039_00-FLOWERPS3PRIVATE]
    D6D4506DB5B5455BA98A11EA9426BCD9 Marvel Ultimate Alliance 2 (1.02) [BLUS30294] [BLES00546] [UP0002-BLUS30294_00-MUA2PATCH0124176]
    00000000000000000000000000000000 Ridge Racer 7 [BLUS30001] [BCES00009] [BLJS10001] [BCAS20001] [BCKS10001] [BLKS10039]
    925B973965C5AD25A57F25D4398EFAFA R.U.S.E. (1.01) [BLUS30478] [BLES00785] [UP0001-BLUS30478_00-RUSEPS3XPATCH001]
    32A8003E48F711E1A53025E64724019B Tom Clancy's Ghost Recon Future Soldier™ [BLUS30521] [BLES00924] [BLES00922] [UP0001-BLUS30521_00-GRFSTITLEUPDAT02]
    7613AB8E948211DD8203AE9856D89593 Tom Clancy's Endwar (1.03) [BLUS30180] [BLES00376] [BLES00487] [BLKS20092] [BLJM60136] [UP0001-BLUS30180_00-TRHDRM0000000103]
    1FBADF00D726101632A11DA1CAFEACAC Tom Clancy's H.A.W.X [BLUS30186] [BLES00330] [BLAS50101] [BLJM60144]
    0123456789ABCDEFEFCDAB8967452301 Tom Clancy's H.A.W.X 2 [BLUS30488] [BLES00928] [BLAS50225] [BLJM60242] [BLES00929] [BLJM60375]
    B23466764DC34BB5AEDD210391F591AF Wolfenstein [BLUS30298] [BLES00661] [BLES00564] [BLES00566] [BLKS20133] [UP0002-BLUS30298_00-PATCHWOLF0000002]
    Tested the Ridge Racer 7 with the updated .ps3 keys and it seems to be working fine again using testklic app by andreus.

    BruteForce/SCETool Decrypter Build 1.9.0.2:
    • Updated the .ps3 keys folder based on ps3devwiki.com/wiki/Keys#Appldr
    • There was still errors in the proper keys included yesterday from testklic app by andreus. The drm-key-55 and drm-iv-355 were the 3.50 (rev 0x07 np). I also found other errors in the keys. Also included the keys in "key revision" format.
    • The BruteForce now calls the testklic app using "key revision" instead of "firmware version" (as requested by andreus).
    • Added BruteForce association to folders. Now you can decrypt/resign a PS3 game folder using Right-click -> BruteForce...
    • Internal changes: changed some static values to parametric values read from the registry.
    • Reverted the resign files (when encrypt: 3.55 option is selected) to use the keyset 0x0A (retail type 0). It was changed it in 1.9.0.1 to 0x0B (retail), but I forgot to revert it to 0x0A.
    • Updated the klics.txt with the klics of MAG update 2.12 (found Omnomnom) and Final Fantasy XIII-2 update 1.06 (posted to the online database)

    BruteForce/SCETool Decrypter Build 1.9.0.3:
    • A minor validation to ensure that testklic is used only for NPDRM files

    BruteForce/SCETool Decrypter Build 2.0:
    • I updated BruteForce to version 2.0... Sorry, but no fancy features. This new build now includes make_fself.exe and the GUI let you set the target system (CEX or DEX) for re-encryption.
    • The klic.txt also includes a new klicense collected through online database update 218A6FBF2865464A79399B6EEF54632A Champion Jockey: G1 Jockey & Gallop Racer [BLUS30863] [BLES01235] [BLJM60367] [JP0106-BLJM60367_00-GXGJPNPATCH00102]

    BruteForce/SCETool Decrypter Build 2.0.1:
    • It now uses make_fself_npdrm.exe for NPDRM content and make_fself.exe for retail content.
    • The program uses make_fself_npdrm.exe or make_fself.exe when DEX is selected (depending if the files are NPDRM or retail). For CEX it still uses scetool.exe.

    BruteForce/SCETool Decrypter Build 2.0.2:

    Today I updated the BruteForce 2.0.2 package again... but this time the update is not related to any of the tools, but related to the ps3 keys (both .ps3 and SCETool's keys file).

    Here is the background: Yesterday I decided to recheck the .ps3 keys and realized that it was a bit difficult to edit/fix the keys using just an hex editor. So I created this tool to review the keys and edit them with a little more ease.

    BruteForce/SCETool Decrypter Build 2.0.3:
    • I can't believe that I missed the most simple KLIC test... (test decryption of SPRX/SELF without KLIC)... fixed in BruteForce 2.0.3

    BruteForce/SCETool Decrypter Build 2.1.0:
    • Added conversion to fself (DEX), fixed issue with files with space in the file name

    BruteForce/SCETool Decrypter Build 2.2.0:
    • It now integrates the "blazing fast" test tool by MAGIC333X
    • If the tool does not find it using this new tool, it continues using the old methods
    • If the key is found, the BruteForce resigns the EBOOT and self/sprx as usual.
    • Indeed I already integrated it in the scetool-BruteForce version 2.2.0.

    BruteForce/SCETool Decrypter Build 2.2.3:

    So I tweaked the tool in version 2.2.3, to set it to the improper parameter --self-app-version=0000100050000000, which returns the proper "App Version" 01.05. Other changes in version 2.2.3 are:
    • FixELF is now applied always to the EBOOT.ELF (before it was applied only if the key version was higher than 3.40)
    • testklic now uses the key revision from the SELF/SPRX (before it was using the key revision from the EBOOT.BIN)
    • Now using the KLicence Brute-force Tool v1.2 (2012/10/07) and showing a progress bar
    • Small speed improvement: if TITLEID is found in KLICS.TXT, it's the first klic to try (before it always tested first noklic)

    BruteForce/SCETool Decrypter Build 2.2.5:
    • Setting the Self App version from PARAM.SFO is now an option
      (if the SelfAppVersion is unchecked, the tool will use the App Version from the SPRX/SELF)
    • Testklic now uses the key revision from the SELF/SPRX (before it was using the key revision from the EBOOT.BIN) was not working properly... fixed in 2.2.5
    • Updated for klicensee detection tool by MAGIC333X (v1.2), always applies FixELF, now uses key rev from sprx/self

    BruteForce/SCETool Decrypter Build 2.3.0:
    • Includes the klicencebruteforce 1.3 and an option to use (or not) the address range.

    BruteForce/SCETool Decrypter Build 2.3.1:
    • Fixed some minor issues and tweaks
    • Added keys to KLICS.TXT

    BruteForce/SCETool Decrypter Build 2.3.2:
    • Updated for klicensee detection tool by MAGIC333X (v1.3.1), updated KLICS.TXT

    BruteForce/SCETool Decrypter Build 2.3.3:
    • It also includes my FixELF tool.

    BruteForce/SCETool Decrypter Build 3.1.0:
    • It now has support for download the patch files on demand from the online database at github maintained by gingerbread.
    • The database currently has the patches for approximately 170 game ids. And considering that some patches can be used also on other versions/regions of the same game, it could grow easily to near 500 game ids.
    • I also added support for listing of grouped cheats.

    BruteForce/SCETool Decrypter Build 3.8.14: New in this version: added to the patch engine a new function for ADD calculation in a range of bytes (ADD, WADD, DWADD, QWADD).

    Tip: After you resign and replace your trophies, it is required to Rebuild Database through Recovery Menu, and launch a game that will do "Sync Trophies" on it's startup in order to get the trophies working properly.

    PS3 Keys 1.0 - A tool to manage your PS3 keys

    Download: [Register or Login to view links]

    Update: I have updated the PS3 keys tool to version 1.1. Now it can convert SCETool's keys file to .ps3 (click on the big blue icon) I used the .ps3, data/keys and ps3devwiki Keys article for a three-way comparison. And found some mistakes in SCETool's data/keys file and some missing keys in ".ps3" and others keys were wrong. Not to talk about all the mistakes in the PS3 dev wiki already discussed here some days ago. So I did the best that I could do and fixed the files included in the updated archive of BruteForce 2.0.2.
    • BruteForce 2.0.2 now uses unfself.exe to unself DEX files and unself.exe + scetool.exe for CEX files.

    PS3 Keys 1.2

    The tool now shows a visual alert (a red cross icon) when the key if found in the scetool's Keys file, but the revision in the file name doesn't match the revision found in the section of the Keys file. A green check mark icon means that it was found in the Keys file and matched the version/revision.

    Since version 1.1, the tool allows to convert the scetool's Keys into .ps3 keys binary format. Click on the big blue icon for the menu... I know that menu it is not intuitive but I love to hide features.

    PS3 Keys 1.3
    • Version 1.3 adds a report of keys in HTML and 'next' button to find the bad keys.

    PS3 Keys 1.5
    • Bruteforce + Testklic not working key set problem fixed

    PS3 Keys 1.5.1 / 1.5.2
    • Updated keys again

    I just discovered that unself2 also can decrypt with klic. A little nasty, but it can.

    1. Go to github.com/granberro/ps3tools, download and compile the tools with Cygwin.
    Code:
    ./autogen.sh
    make
    2. Add the keys (ps3devwiki.com/files/devtools/ps3keys/) to your /home/xxxx/.ps3 folder
    3. Add the missing npdrm keys (app-iv-102f, app-key-102f, app-pub-102f, app-priv-356, free_klicensee-key, klic-key, npdrm-const and rif-key) to .ps3 folder
    4. Hex edit /.ps3/free_klicensee-key and put the klic there
    5. Then "unself2 xxxx.self xxxx.elf" (it will give a warning, but compare the elfs with this and scetool, you will see they are the same)

    So it does the same scetool does. Don't know if this is faster, but it works.

    Finally of note, HoNo posted (via ps3club.ru/forum/showpost.php?&p=721795&postcount=1) what he claims were 3.70 keys (below) but they were quickly deemed fake as pictured HERE.
    Code:
    [appldr]
    type=SELF
    revision=0016
    version=0003007000000000
    self_type=APP
    erk=796F752061726520612072617468657220737475706964 20617373686F6C6521
    riv=666F726576657220796F75206C6F7365
    pub=6920666F756768742074686520656C6974652070733320 6861636B65727320616E64206C6F737421
    priv=000000000000000000000000000000000000000000
    ctype=12
    
    [appldr]
    type=SELF
    revision=0017
    version=0003007000000000
    self_type=APP
    erk=74656872756C6572207375636B7320636F636B20616C6C 20646179206C6F6E67
    riv=69206C6F737420707333646576213A28
    pub=67616D6573206172652020666F72206C6F736572732020 6C696B6520796F7520617373686F6C6521
    priv=000000000000000000000000000000000000000000
    ctype=18
    Attached Images<br><br> Attached Images


  5. #5
    Junior Member pandulce1's Avatar
    Join Date
    Jul 2012
    Posts
    54
    Outstanding! I'll have to learn how to mess with this stuff.

  6. #6
    Senior Member Foo's Avatar
    Join Date
    Sep 2011
    Posts
    332
    I went ahead and put all the keys into a folder. This includes about all of them... app, lv1, lv2, spp, rvk, iso... [Register or Login to view links]

  7. #7
    Junior Member muny21's Avatar
    Join Date
    Dec 2007
    Posts
    96
    Nice. Is there a proper English guide to doing this? Just would like to know how to decrypt and encrypt these EBOOTS myself just to know. Already have all the tools and can make psn packages but never tried to mess with EBOOTs before. Thanks.

  8. #8
    Senior Member elser1's Avatar
    Join Date
    Oct 2010
    Posts
    2,419
    how kool is this eh. thanks for this awesome news!! i hope a new rebug can come out of this.

    also does this mean all keys can now be gotten for all the newer firmwares?

  9. #9
    Registered User alvarito8910's Avatar
    Join Date
    Feb 2009
    Posts
    3
    Great!

  10. #10
    Contributor ezzitdus's Avatar
    Join Date
    Jan 2011
    Posts
    16
    does this mean that soon a cfw 3.60 comes out?... i hope so because i some how update to 3.60 of a wrong install...

 

Sponsored Links

Page 1 of 7 123 ... LastLast
Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2014 PlayStation 3 News