74w ago - Following up on his previous release, this weekend PlayStation 3 homebrew developer PsDev has updated PS3Tools GUI Edition to version 2.5 which now includes a new PS3 GUI and features as outlined below.
To quote: To jump right into it, I have added a lot into this version. RCO dumper SFO reader and a whole new GUI form and GUI improvements.
When the program first loads, you're going to be opted to choose the GUI, well remember the original GUI for the main screen? Well I added a new one that took out the Command prompt emulator, made the form smaller and sleeker.
Once you choose the GUI you want it will take you too the specific form, but wait, you want to use the other GUI after your done with your first selection? Well I though of that and instead of having it close after selection it stay's alive until you're done!
Added loading bar on both GUI
Added dialogs to see completion
Add messageboxes for errors and PUP completion
Fixed minor bugs
Fixed Core_os image reader tool
Side Note: All RCO's that are dumped will be shown in the RCO folder.
If you repack any .PKG with they will install on 4.11 DEX. I have had a great deal of fun learning TCL TK and some python to try and make this tool as easy to use as possible for those who don't want to install Macports. Read README and how to use included.
PS3Tools v2 for OSX:
New: no more X11 needed all GUI is written in tcl tk.
Edit Read and Create PARAM.SFO files.
Fail0verFlow make self tool
As of now you can:
unself : F0F unself
unself2 : F0F unself2 See README.txt for mallory instructions.
readself : F0F readself and readself2<
make_self : This is geohot's make_self.
make_self_F0F : F0F make self tool<
make_self_npdrm : This is geohot's make_self_npdrm tool.
package_finalize : This is geohot's tool to make any .pkg installable on WutangrzaCFW.
norunpack : F0F to unpack NOR.BIN.
pupunpack : This will unpack any PS3UPDAT.PUP
pupexplode : This will unarchive all the files from the PS3UPDAT.PUP
ungpkg : This is for unpkg npdrm pkg (works on some .pkg not on others)
unpkg : This is for unpkg of regular pkg (works on some .pkg not on others)
unpack_devflash : it's a simple dev_flash extractor for 3.56+ PUPs --thanks Wargio
make_pkg : This is HACKERSCHANNEL-PS3Py's python script that will make a npdrm .pkg that will install on your PS3.
Extract CoreOs : it's a simple CoreOs extractor for 3.56+ PUPs --thanks Wargio
Edit PARAM.SFO : Edit or read a Game PARAM.SFO file. <
New PARAM.SFO : create a New PARAM.SFO file for your homebrew. <
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
Following up on his previous release, this weekend PlayStation 3 developer PsDev has updated PS3Tools GUI Edition to version 2.0 which now incorporates the PS3 EDAT Tools with the complete changelog detailed below.
To quote: I collaborated now listen, PsDev back with the brand new edition. Yes, yes. Me and SnowyDew have collaborated and I added his magnificant tools to mine It was a struggle getting it to execute properly, but I finally got rid of all the errors and combined them for the best experience.
Changes, Decrypt and Re-encrypt edat's successfully
Decrypt eboot.pbp's / eboot.bins for further game modifiying
Decryption of act.dat and rif keys
Print coreos image info
Snowydew: so the decryption as it stands right now, an do iso.bin.edat, requires idps, rif and act.dat for the games. re-encryption i believe it needs the “fake” signed ones, as well as an idps (not sure on the idps) however the second method only requires the idps and the .rap file. this does not cover licenseing games i believe (It could, but we haven’t tested it) the re-encryption algo is in the encryption one, but again haven’t been able to test it completely (reason I was asking around on twitter awhile back)
Thanks to naehwert, snowydew, KaKaRoToKS, geohot, math and any one else I forgot.
Finally, in related news today belioc has leaked what he claims are some PlayStation 3 Lv0 Opcodes (below) and has credited PsDev for them, as stated below:
Although I am leaking this, I am still gonna give credit to who got these, that is PsDev. OpCodes (Operation codes) are the operation to be performed in a instruction set of the processor.
Here are the lv0 operation codes. A lot are unknown so it's really hard to say what function they're doing, but the function offset is provided. When I recieved the file it has about 10MB of NOP (No operation performed) about 1MB of operations being performed.
Shortly afterwards, PsDev stated the following rebuttal though: Lol this is false, me and naehwert talked it over the opcodes are just a reading that is false due to the lv0 being encrypted. the BL is what decrypt the lv0. How would I dissemble a encrypted lv0?
Haha last time I share something that could have potential (it don't) with someone.
Just run the lv0 in a DisArm decoder (don't have to be DisArm) it will bot the self and tell the opcodes (that are false).