Sponsored Links

Sponsored Links

PS3Tools GUI Edition v3.1 - PS3 SPU Emulation and .SELF Encryption


Sponsored Links
109w ago - Just a few days since his PS3Tools GUI Edition v3.0 release, PsDev has now updated the homebrew application to version 3.1 which includes PS3 SPU emulation changes, .SELF encryption and more as outlined below.

Download: [Register or Login to view links]

To quote: Just finished my latest update for PS3Tools GUI Edition. I added quite a bit of changes in this version, scroll down to the Change log to see.

  • .SPU is now extension for emulator
  • SPU editor
  • Edit SPU files for emulator
  • Save SPU files for emulator whilst the program still open for faster emulation
  • A label that tells whether it’s currently emulating or not
  • SPU emulator has message boxes now upon successeions or errors
  • SPU refreshed button fixed
  • Changed interface for LS and codewatcher
  • Debug pkg decryption temporarily removed
  • Checks pkg type now
  • SELF encryption added
  • Filter added to opening SPU file on editor and emulator so it narrows it down to just .SPU files
  • CEX2DEX now will tell if validation is done
  • Test.SPU included for testing
  • Included missing .dll for SPU emulation

I had some reports the Debug pkg decryption wasn’t working, so I removed until further notice.

TEST.SPU:

Nice little example I made up, I commented on it to give you a little understanding. Still gotta give props to KDSBest for original creation.

Finally, below are some guides from PsDev (via psx-scene.com/forums/content/tutorial-2471/) for those interested:

PS3 PUP Unpacker:

1. Make sure the PUP is named "PS3UPDAT.PUP"
2. Click the drop down menu in PUP Tools
3. Click "PUP unpacker"
4. Now click do it and your down, you will receive a output like below:


Dev_flash Tool:

1. Name the PUP "PS3UPDAT.PUP"
2. Click the drop down menu in PUP Tools
3. Click Dev_flash unpacker, and hit Do It. You will get output like below (Note, It will be a lot longer, that's just a example):


Readself Tool:

1. Just place one of the following, lv0, lv1ldr, lv2ldr, appldr, isoldr or EBOOT.BIN in root of program folder
2. Click drop down menu
3. Click the one you want to use and click Do it, you will get the following output (Note, Different for other files selected):


Core_os Tool:

1. Make sure the Core_os is named original.
2. Click Drop down menu
3. Then click decrypt and do it.
4. You will be outputed with a file called decrypted_core_os_package
5. Then click extract you will be presented with a extracted core_os
6. Then you can encrypt it and you will be presented with a encrypted core_os
7. Output below for decrypted log:


Fix Tar Tool:

1. After modifying the tar file you need to fix it for it to be correct, so have it named "Update_files.tar"
2. Click drop down menu
3. Click the following options on the screen that apply to the tar you want to fix
4. Click do it, you will get a output similar like below:


SCE Info Tool:

1. Have one of the following file in root folder, lv0, ld1ldr, lv2ldr, appldr, isoldr or eboot.bin
2. Click the option that applys
3. Click do it and you will get output similar like below:


SFO Reader Tool:

1. Name the file PARAM.SFO
2. Click drop dow menu and click sfo reader
3. Click do it and you will be presented with similar output like below:


RCO Tool:

1. Have the original name of one of the rco that are optioned in the drop down menu
2. Make sure that specific rco file is in your root of your folder
3. Click it then click do it, you will have a dumped rco in RCO folder along with following output:


C2D Tool:

1. Have the eid_root_key named this "eid_root_key.bin"
2. Name the Flash or your Nor, CEXFLASH
3. Have openssl installed under C:/opensll
4. Then click drop down menu
5. Click only option
6. Click do it and get output plus DEXFLASH like below:





Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!

Comments 43 Comments - Go to Forum Thread »

• Please Register at PS3News.com or Login to make comments on Site News articles. Thanks!

StanSmith's Avatar
#33 - StanSmith - 113w ago
Can this decrypt 3.6+ eboots? If so then we can start making our own 3.55 eboots.

PS3 News's Avatar
#32 - PS3 News - 113w ago
Following up on his previous release, this weekend PlayStation 3 developer PsDev has updated PS3Tools GUI Edition to version 2.0 which now incorporates the PS3 EDAT Tools with the complete changelog detailed below.

Download: [Register or Login to view links]

To quote: I collaborated now listen, PsDev back with the brand new edition. Yes, yes. Me and SnowyDew have collaborated and I added his magnificant tools to mine It was a struggle getting it to execute properly, but I finally got rid of all the errors and combined them for the best experience.

  • Changes, Decrypt and Re-encrypt edat's successfully
  • iso.bin.edat extraction
  • Decrypt eboot.pbp's / eboot.bins for further game modifiying
  • Decryption of act.dat and rif keys
  • Print coreos image info

Snowydew: so the decryption as it stands right now, an do iso.bin.edat, requires idps, rif and act.dat for the games. re-encryption i believe it needs the “fake” signed ones, as well as an idps (not sure on the idps) however the second method only requires the idps and the .rap file. this does not cover licenseing games i believe (It could, but we haven’t tested it) the re-encryption algo is in the encryption one, but again haven’t been able to test it completely (reason I was asking around on twitter awhile back)

Thanks to naehwert, snowydew, KaKaRoToKS, geohot, math and any one else I forgot.

Finally, in related news today belioc has leaked what he claims are some PlayStation 3 Lv0 Opcodes (below) and has credited PsDev for them, as stated below:

Although I am leaking this, I am still gonna give credit to who got these, that is PsDev. OpCodes (Operation codes) are the operation to be performed in a instruction set of the processor.

Here are the lv0 operation codes. A lot are unknown so it's really hard to say what function they're doing, but the function offset is provided. When I recieved the file it has about 10MB of NOP (No operation performed) about 1MB of operations being performed.

First Set:

Second Set:

Shortly afterwards, PsDev stated the following rebuttal though: Lol this is false, me and naehwert talked it over the opcodes are just a reading that is false due to the lv0 being encrypted. the BL is what decrypt the lv0. How would I dissemble a encrypted lv0?

Haha last time I share something that could have potential (it don't) with someone.

Just run the lv0 in a DisArm decoder (don't have to be DisArm) it will bot the self and tell the opcodes (that are false).

Thanks naehwert. Good bye.

More PlayStation 3 News...

sigmaphi's Avatar
#31 - sigmaphi - 120w ago
a good release

Thanks

Ezio's Avatar
#30 - Ezio - 120w ago
why ? this gui tool can decrypt all files 3.60+ to 4.10 .! or do we need public key ?
We need 3.60+ keys to decrypt eboots, the parts of newer firmwares (i.e. loaders), etc... This tool lets you do everything you can do today with the convenience of using a GUI.

hasham11's Avatar
#29 - hasham11 - 120w ago
thanks for this, appreciate it!

Sponsored Links

Sponsored Links
Sponsored Links

Sponsored Links







Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2014 PlayStation 3 News