To quote: The major addition is a Retail PKG decryption and extraction tool. I also removed the extra tools as it wasn't needed, and wasted space, most external programs are gonna be taken out and be coded so it's internal. That way space, folder size and your Computers memory is more free.
I need to thank math because, this uses his AES engine and without it I would have had to code one on my own. (Don't worry I had his permission). It was truly a pain incorporating this into my program, much harder than the EDAT tools.
Fixed bugs and added some little features in EDAT tool
Doesn't take up as much memory
Also if I can port Rcomage to c# then expect that to be next release, it's hard porting c++ to c# though, but I'm trying, it has alot of code that needs converter.
Thanks to naehwert, KaKaRoToKS, geohot, Math, eussNL and of course Fail0verFlow! and anyone else I forgot.
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
Following up on his previous release, this weekend PlayStation 3 developer PsDev has updated PS3Tools GUI Edition to version 2.0 which now incorporates the PS3 EDAT Tools with the complete changelog detailed below.
To quote: I collaborated now listen, PsDev back with the brand new edition. Yes, yes. Me and SnowyDew have collaborated and I added his magnificant tools to mine It was a struggle getting it to execute properly, but I finally got rid of all the errors and combined them for the best experience.
Changes, Decrypt and Re-encrypt edat's successfully
Decrypt eboot.pbp's / eboot.bins for further game modifiying
Decryption of act.dat and rif keys
Print coreos image info
Snowydew: so the decryption as it stands right now, an do iso.bin.edat, requires idps, rif and act.dat for the games. re-encryption i believe it needs the “fake” signed ones, as well as an idps (not sure on the idps) however the second method only requires the idps and the .rap file. this does not cover licenseing games i believe (It could, but we haven’t tested it) the re-encryption algo is in the encryption one, but again haven’t been able to test it completely (reason I was asking around on twitter awhile back)
Thanks to naehwert, snowydew, KaKaRoToKS, geohot, math and any one else I forgot.
Finally, in related news today belioc has leaked what he claims are some PlayStation 3 Lv0 Opcodes (below) and has credited PsDev for them, as stated below:
Although I am leaking this, I am still gonna give credit to who got these, that is PsDev. OpCodes (Operation codes) are the operation to be performed in a instruction set of the processor.
Here are the lv0 operation codes. A lot are unknown so it's really hard to say what function they're doing, but the function offset is provided. When I recieved the file it has about 10MB of NOP (No operation performed) about 1MB of operations being performed.
Shortly afterwards, PsDev stated the following rebuttal though: Lol this is false, me and naehwert talked it over the opcodes are just a reading that is false due to the lv0 being encrypted. the BL is what decrypt the lv0. How would I dissemble a encrypted lv0?
Haha last time I share something that could have potential (it don't) with someone.
Just run the lv0 in a DisArm decoder (don't have to be DisArm) it will bot the self and tell the opcodes (that are false).