To quote: The major addition is a Retail PKG decryption and extraction tool. I also removed the extra tools as it wasn't needed, and wasted space, most external programs are gonna be taken out and be coded so it's internal. That way space, folder size and your Computers memory is more free.
I need to thank math because, this uses his AES engine and without it I would have had to code one on my own. (Don't worry I had his permission). It was truly a pain incorporating this into my program, much harder than the EDAT tools.
Fixed bugs and added some little features in EDAT tool
Doesn't take up as much memory
Also if I can port Rcomage to c# then expect that to be next release, it's hard porting c++ to c# though, but I'm trying, it has alot of code that needs converter.
Thanks to naehwert, KaKaRoToKS, geohot, Math, eussNL and of course Fail0verFlow! and anyone else I forgot.
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
Following up on his PS3Tools GUI Edition v3.1 release, today PlayStation 3 homebrew developer PsDev has updated the homebrew application to version 3.2 which includes a PS3 EBOOT Re-Signer followed by version 3.3 and v3.5 / v3.6 / v3.7 by Ac1DMoDz as detailed below.
To quote: It's about time for another update to my program, this time around I added a scetool section. It has 3 new options with one favorite thanks to andreus for a script that I use, I also update the SFO Reader tool and fix some bugs. See official changelog below.
PS3Tools GUI Edition v3.2 Changes:
Added scetool section
Show curent keylist
Decrypt EBOOT.BIN up to 3.60
Decrypt and resign EBOOT.BIN automatically
Fixed SFOREADER bug
When ever you get a output it autp copys to clipboard
Minor bug fixes through out program to make it run a little more fluently.
Just to elaborate some on the auto EBOOT.BIN re-signer, just put the 3.60 EBOOT.BIN in the root of folder run the tool it will decrypt it and re-sign it for use on lower Firmware.
Note: Dropping a SPRX file and clicking decrypt will not decrypt it, nor error out, but report success and magically delete the SPRX file from the folder it was in.
Soon after the 3.2 release, he released 3.3 (via psx-scene.com/forums/content/releases-2479/), but claims it will be his final update, and the source code will be also released in the near future. To quote:
It has been fun making this program, it has gone threw 12 awesome updates. I'm sad to stop working on it, but I'm happy to see what you guys can continue to make it into. I will release the source code, but not today.
Lets leave that for another time and focus on this release. This is also the most stable version, all features have been tested not only by me but other people too, (Dcnigma, Industerialcode) and all features work properly.
v3.3 Final Changes:
SCETool v0.28 added
New keys added to keyset
New script for EBOOT resigning
New file system layout
Removed do it button
Now everytime you select a option from one of the drop down menu it does that option right away
Removed SELF tool
Every option has its individual message box completion of operation
There is a new way that the file system works. There is a individual folder for all the tools (PUP Tools, scetool, Core_os Tool ect) And when you want to use the tool just place the file in the correct folder and use the GUI. This system is cleaner and allows me to not use as much code.
There is a script in the scetool folder called fix. This script is what can be edited to your standards for the EBOOT resigning. I did this so if you want to sign for 3.41 ect or change compression or anything just edit the script and run the GUI no need for new update, much more efficient.
FOR /F "tokens=1,2 delims= " %%A IN ('scetool.exe -i EBOOT.BIN') DO (
if [%%A]==[ContentID] set CID=%%B
scetool.exe --decrypt EBOOT.BIN EBOOT.ELF
rename EBOOT.BIN ORIGINAL_EBOOT.BIN > NUL
scetool.exe --sce-type=SELF --compress-data=FALSE --skip-sections=TRUE --key-revision=0A --self-auth-id=1010000001000003 --self-add-shdrs=TRUE --self-vendor-id=01000002 --self-type=NPDRM --self-fw-version=0003005500000000 --np-license-type=FREE --np-content-id=%CID% --np-app-type=EXEC --np-real-fname=EBOOT.BIN --encrypt EBOOT.ELF EBOOT.BIN
del /Q EBOOT.ELF > NUL
scetool -i EBOOT.BIN
There is no more "Do It" button, since I change the way the files are modified I thought I will just make every option a button it self, is when you click the option you like from the drop down menu it will do the operation. Note: After click may take a sec for the operation to start be patient.
About PS3Tools GUI Edition v3.5 Ac1DMoDz Version, to quote (via psx-scene.com/forums/content/exclusive-2499/):
PS3Tools 3.5 GUI Edition is finally here! Ac1DMoDz has released a new sleek version of PS3Tools GUI Edition. This update includes a new layout and design. He plans on adding more tools and a theme in version 3.6.
Thanks to PsDev, Snowydew, Geohot, Fail0verFlow and everyone else who made this possible.
How to use:
Put the PS3UPDAT file into the PUP Tools folder and select PUP unpack in the GUI same with all the other files.
PS3Tools 3.6 GUI Edition: Some improvements were to add a SFO Editor under the SFO Tools category. I also added a Package Viewer to the tools along with a new category named Package Tools. The Core_os HexDump was removed because this feature was disabled in version 3.3 any ways, and along with all of them improvements I added very nice looking theme!
PS3Tools 3.7 GUI Edition Changelog:
PS3 HDD Studio Added!
Added HDD Section (I plan on adding more tools to this once Naehrwert releases his HDD Decryption tools? )
Updated the SCETool
Just a few days since his PS3Tools GUI Edition v3.0 release, PsDev has now updated the homebrew application to version 3.1 which includes PS3 SPU emulation changes, .SELF encryption and more as outlined below.
To quote: Just finished my latest update for PS3Tools GUI Edition. I added quite a bit of changes in this version, scroll down to the Change log to see.
.SPU is now extension for emulator
Edit SPU files for emulator
Save SPU files for emulator whilst the program still open for faster emulation
A label that tells whether it’s currently emulating or not
SPU emulator has message boxes now upon successeions or errors
SPU refreshed button fixed
Changed interface for LS and codewatcher
Debug pkg decryption temporarily removed
Checks pkg type now
SELF encryption added
Filter added to opening SPU file on editor and emulator so it narrows it down to just .SPU files
CEX2DEX now will tell if validation is done
Test.SPU included for testing
Included missing .dll for SPU emulation
I had some reports the Debug pkg decryption wasn’t working, so I removed until further notice.
# to make a comment use #
This is how to load a file
#elf,file.elf,true #the ext first the comma then the file name and ext.
#place the file to load in program folder
#now just load this test.SPU file and in r3
#here is how you would test a register
#r,3,0,0xdead0000 #meaning r3 #shows in leftside
1. Name the PUP "PS3UPDAT.PUP"
2. Click the drop down menu in PUP Tools
3. Click Dev_flash unpacker, and hit Do It. You will get output like below (Note, It will be a lot longer, that's just a example):
1. Just place one of the following, lv0, lv1ldr, lv2ldr, appldr, isoldr or EBOOT.BIN in root of program folder
2. Click drop down menu
3. Click the one you want to use and click Do it, you will get the following output (Note, Different for other files selected):
1. Make sure the Core_os is named original.
2. Click Drop down menu
3. Then click decrypt and do it.
4. You will be outputed with a file called decrypted_core_os_package
5. Then click extract you will be presented with a extracted core_os
6. Then you can encrypt it and you will be presented with a encrypted core_os
7. Output below for decrypted log:
Metadata Key: D7 1D 9A 12 BB E6 D9 87 8F 72 AB 59 F1 ED D4 44
Metadata IV: 7E 05 A9 79 FF 64 DC FC 46 87 02 5B 69 82 AE E2
Metadata Size: 544 bytes
Data Start: 0x00000300
Data Size: 5778777 bytes (5.51 MB)
PKG Key: F8 72 19 EC FE 95 EF 1F 51 22 3D 04 A3 E2 37 5E
PKG IV: F7 1E 03 B6 9D 5D 74 D7 7B 03 F6 14 00 00 00 00
PKG Size: 7340000 bytes (7.00 MB)
Fix Tar Tool:
1. After modifying the tar file you need to fix it for it to be correct, so have it named "Update_files.tar"
2. Click drop down menu
3. Click the following options on the screen that apply to the tar you want to fix
4. Click do it, you will get a output similar like below:
1. Name the file PARAM.SFO
2. Click drop dow menu and click sfo reader
3. Click do it and you will be presented with similar output like below:
| HEADER |
| PARAMETERS |
TITLE: Modern Warfare┬� 3
1. Have the original name of one of the rco that are optioned in the drop down menu
2. Make sure that specific rco file is in your root of your folder
3. Click it then click do it, you will have a dumped rco in RCO folder along with following output:
1. Have the eid_root_key named this "eid_root_key.bin"
2. Name the Flash or your Nor, CEXFLASH
3. Have openssl installed under C:/opensll
4. Then click drop down menu
5. Click only option
6. Click do it and get output plus DEXFLASH like below:
Shortly following his last release, today PlayStation 3 developer PsDev has now updated PS3Tools GUI Edition to version 3.0 which now adds PS3 SPU emulation, SELF decryption and Debug PKG decryption as detailed below.
To quote: Hi everyone, here with a new update to my program. Added SPU Emulation, Self Decryption and debug pkg decryption. Along with more accurate loading bars and a interface change to pkg tool, spu emulation, self decryption, edat tool.
SPU emulation added
Debug PKG decryption added
SELF decryption added
Logging Errors/successes added to EDAT tool
Logging Errors/succession added to PKG tool
Loading bars code adjustment, more accurate now
Originally by KDSBest, SPU emulation has been incorporated in my GUI. It was quite easy, we both coded our programs in C# (Sharp) so I didn't really have much trouble.
Self decryption is know possible. Just browse for your self/bin file and hit decrypt or, drag and drop. Yes I added it.
Now Debug PKG decryption is a option too, just name the file debugpkg.pkg put in root of program folder and run the tool and it decrypts.