70w ago - Following up on the previous news that the PS3 v3.60+ keys were incoming, today the PS3 3.60 keys appear to have been leaked from fckyoudh on Spanish site Elotrolado (linked above) which has lead to new decrypted PlayStation 3 EBOOT fixes for CFW users.
For those curious, below are some PlayStation 3 games which are reported as being 3.6 Firmware titles, however, some of them have already been fixed and are working on PS3 Custom Firmware:
Air Conflicts: Secret Wars
Alice: Madness Returns
Ape Escape On The Move
Arcana Heart 3
Atelier Meruru: The Apprentice of Arland (Japanese release)
Captain America: Super Soldier
Deus Ex: Human Revolution
Duke Nukem Forever
Dynasty Warriors Gundam 3
Earth Defense Force: Insect Armageddon
El Shaddai: Ascension of the Metatron
Green Lantern: Rise of the Manhunters
Harry Potter and the Deathly Hallows: Part 2
Hunted: The Demons Forge
inFAMOUS 2: Festival of Blood
Kung Fu Panda 2
LEGO Pirates of the Caribbean: The Video Game
Let's Dance with Mel B
MLB 2011: The Show
MX vs. ATV Alive
Naruto Shippuden: Ultimate Ninja Storm 2
Nascar The Game 2011
National Geographic Challenge
NCAA Football 12
Need for Speed: Shift 2 - Unleashed
Operation Flashpoint: Red River
Phineas and Ferb Across the 2nd Dimension
Prince of Persia Trilogy 3d
Record of Agarest War Zero
Red Faction: Armageddon
Sniper: Ghost Warrior
The Penguins of Madagascar: Dr. Blowhole Returns
Thor: God of Thunder
Transformers: Dark of the Moon
Warriors: Legends of Troy
White Knight Chronicles II
From the PlayStation 3 Developer Wiki (via ps3devwiki.com/wiki/KaKaRoTo_Kind_of_%C2%B4Jailbreak%C2%B4#3.60_keys_Update):
PS3 3.60 keys Update
Q: Recently 3.60 keys surfaced (lv1ldr, lv2ldr, isoldr, appldr), what does this mean for this release and the future?
A: That is actually a multiparted answer: Now that several binairies (Iso module + CoreOS minus the loaders that are inside lv0) can be decrypted, more investigation can be done in them, which give a new boost in (unrelated to the HeN) other targets, like:
Hardwareless downgrades : Downgrading with PSgrade Dongle (lv1.self)
QA Flagging / systemtokens (spu_token_processor.self) and usertokens (spu_utoken_processor.self)
Getting per_console_root_key_1 / EID_root_key on 3.56+/slim3K (lv1.self , aim_spu_module.self)
Backsigning applications for <=3.55 and patch sys_proc_param_version (appldr.self , lv2_kernel.self)
Q: So does this mean a future release would be sooner?
A: Only God knows But it can also be that because of the above, it would become meaningless/surpassed by better progress. So lets all hope for the best
Also from PS3 Dev Wiki (ps3devwiki.com/wiki/Talk:Playstation_Update_Package_%28PUP%29#Adding_new_keys_to_older_firmwares):
Adding new keys to older firmware
Patch the loaders
Add keys to appldr keys index & tables
There are also npdrm keys inside appldr as well, add the 3.56++ ones
appldr,. lv2.self and game_ext_plugin need patching for new games support
vsh.self maybe too
Note: PlayStation 3 developer Rogero has confirmed he started working already.. stating eventually it will be possible to do a new PS3 CFW so EBOOT converters are not necessary.
From Sony PS3 hacker deank: They also posted my ebootFIX/ebootMOD tools prepackaged (linked above) with the keys in .ps3 folder, so it is ready to be used like in the old 3.41/3.55 days.
Have in mind that some games (like Sniper Ghost Warrior) have additional .self/.sprx files and it is better to use ebootFIX by dragging the PS3_GAME folder to it - it will find and fix all necessary files. If you use ebootMOD you'll have to search for these files yourself and 'fix' them one by one.
How to Use SCETool to Decrypt a PS3 3.60 EBOOT.BIN File Guide:
[vcdLAKERS] for those of you who want to decrypt a 3.60 EBOOT.BIN use scetool
[vcdLAKERS] download scetool_0.2.7.zip unzip it to C:\scetool
[vcdLAKERS] create a new folder inside scetool and name it data
[vcdLAKERS] and download these files here:
[vcdLAKERS] and put them inside data folder
[vcdLAKERS] put your EBOOT.BIN file in scetool folder
[vcdLAKERS] go to start - run - cmd and cd to the folder were scetool is
[vcdLAKERS] for example "cd C:\scetool"
[vcdLAKERS] then type this command to decrypt the EBOOT.BIN:
[vcdLAKERS] scetool -d EBOOT.BIN EBOOT.ELF
[vcdLAKERS] and use this one to encrypt it to 3.41 :
[vcdLAKERS] C:\scetool>scetool -0=SELF -5=APP -6=0003004100000000 -e EBOOT.elf E
From Billal (aka S.B.M) comes a few corrections to the above guide, as follows:
You have to leave a space between an (abbreviated) option and a parameter not an equal sign "="
It lacks the option for key revision "-2 0004" or "--key-revision=0004"
This is the correct command: C:\scetool>scetool -0 SELF -1 TRUE -s TRUE -2 0004 -3 1010000001000003 -4 01000002 -5 APP -6 0003004100000000 -e EBOOT.elf EBOOT.self
How to Use SCETool to Decrypt a PS3 3.60 EBOOT.BIN File (Revised) Guide:
For those of you who want to decrypt a 3.60 EBOOT.BIN use scetool by naehrwert.
Download scetool_0.2.7.zip unzip it to C:\scetool
Create a new folder inside scetool and name it data and download the data files from the previous guide and put them inside data folder
Put your EBOOT.BIN file in scetool folder
Go to start > run > cmd and cd to the folder were scetool is for example "cd C:\scetool"
Then type this command to decrypt the EBOOT.BIN: scetool -d EBOOT.BIN EBOOT.ELF
And use this one to encrypt it to 3.41: C:\scetool>scetool -0 SELF -1 TRUE -s TRUE -2 0004 -3 1010000001000003 -4 01000002 -5 APP -6 0003004100000000 -e EBOOT.elf EBOOT.self
Or you can use ScetoolGui (ps3devwiki.com/files/devtools/scetool/ScetoolGui.exe)
Download and copy ScetoolGui.exe to your scetool folder
Open it > click browse file and select your game EBOOT.BIN
Then click decrypt, scetool will decrypt your "eboot.bin" and create a new file "eboot.elf" (decrypted eboot.bin)
To resign "eboot.elf" for lower fw (3.41) activate enable encryption: in self type choose APP and in SELF fw version write 3.41 and click encrypt.
Drag PS3_GAME folder from 3.60 game info the ebootfix.exe
From andreus: Ok, so for the updates do this:
1. So first go get the scetool (ps3devwiki.com/files/devtools/scetool/) Download the entire directory and subdirectories and unzip the latest version 0.2.7
2. Create a batch file named "eboot360npdrmfix.bat" in scetool folder with this code:
It pauses when you encrypt the file and them shows the info of the new EBOOT.BIN for you to check.
6. You should now have an EBOOT.BIN NPDRM signed. If you want to put it in the package, use psn_package_npdrm.exe to create the package.
How to Use AldosTools Applications Guide:
1. For retail disks signed with 3.60 keys: Copy all eboot.bin/SPRX/SELF/SFO files to the tool directory and run eboot_fix.bat, them copy the reasigned files to your game backup directory. This tool will reasign all files with 3.40+ keys (works on 3.40+ cfw), reasign the sys_proc_param to 3.40 and change the sfo to 3.40
2. For game updates signed with 3.60 keys: Extract the package, copy EBOOT.BIN/PARAM.SFO and all SPRX/SELF files to the bruteforce tool directory
2.1 If it only uses EBOOT.BIN and PARAM.SFO, just run eboot_fix.bat
2.2 If also have SPRX/SELF files
2.2.1 If SELF file is equal to eboot.bin use bruteforce tool and it will autodetect and just create a reassigned copy of EBOOT.BIN (deank method)
2.2.2 Else, you have to bruteforce with bruteforce tool to get the klic so you can decrypt the SELF/SPRX files and them reassign them
When you have all files reasigned, them create a fix update package. Extra: If do not want to be disturbed with game updates with 3.65+ keys change PARAM.SFO APP_VERSION to 9.99. Note: This tool can't manage sdat, edat files
Convert PS3 3.60 Games / Patches to 3.55 Guide By JayDee78
Download and unrar to a folder. Also, use sfoedit to change the param.sfo to 3.55/3.41 instead of 3.60. I'll use Dirt 3 (BLES01287) in this example. Get the EP4001-BLES01287_00-DIRT3PATCHEU0101-A0101-V0100-PE.pkg patch and start Pkgview 1.3.
Drag and drop the Dirt 3 pkg patch in the left window, right click in it, and "extract to source directory"
Cut the eboot.bin from the "PkgView_1.3\EP4001-BLES01287_00-DIRT3PATCHEU0101-A0101-V0100-PE\BLES01287\USRDIR" and paste it in the SCETOOL folder. In the SCETool folder hold down the shift button+right click in the window and choose "open cmd window"
Write "ebootfix EP4001-BLES01287_00-DIRT3PATCHEU0101" and it starts decrypting the file. Take the EBOOT.bin (not ORGINAL_EBOOT.bin) and copy it back to the USRDIR folder you first got it.
Now cut the BLES01287 folder and paste it in the psn_package_npdrm folder (package.conf in here needs to change package version from 1.04 to 1.01 but the rest is already setup for DIRT3). Again, open a cmd window (shift+right click) and write "psn_package_npdrm.exe package.conf BLES01287"
Wait until finished, install the new pkg and play Dirt 3. Guide works for all 3.60 games/patches (WITHOUT selfs & sprx files These are ten times harder to decrypt and fix up to a proper retail level...) Hope someone gets some use from this
You must copy the keys (. Ps3keys) in your user folder (C: \ Users \ XXXX \. Ps3keys) if you have Windows, if you want to use Cygwin or Linux you get the keys (. Ps3) in your user folder (home \ XXXXXX \. PS3), you should copy the two folders.
Just put in the command (cmd / terminal) the command to decrypt would be: EBOOT.BIN unself EBOOT.ELF
To encrypt this: EBOOT.ELF make_self EBOOT.BIN
The easiest is to drag the console, otherwise you must move the directories to where the exe / bin and decrypt / fix are.
To quote: The files in the download below are all from the 3.60 Core_OS and I decrypted using the 3.60 keys.
The files that were unselfed were:
Also like to thanks naehrwert.
PS3 developer SiLENTGame has made available PS3 Hack Checker v0.1 followed by PS3 Hack Checker v0.2 stating:
I was bored and so I have written a little tool which grabs the latest "hack status" of the PS3. I think the screenshot below says everything. I hope you like it. I'm thankful for suggestions, bug reports or anything else. So long.
It's important to note that currently PS3 CECH-3nnnX/CECH-4nnnX (and some CECH-2500X) console models cannot be downgraded though.
hackable firmware fixed
firmware downgrade information added
key information added
DEX converting information added
PlayStation 3 developer Deviance has made available FreeLoader v0.1 followed by FreeLoader v0.2 which is a PS3 EBoot Grabber with the following features:
This application is designed to make life easier to download Eboots. Since it's the initial release, The database is still quite small but will be updated over time to add more additions. Very simple to use. Click the game and press go!
Planning on adding descriptions and make sure you are using the latest eboot
Buy me a beer! (Info in about tab)
If the eboot download gets removed. Just wait and a new link will be in the db.
If you're experiencing graphical issues when running the application, try this version.
Freeloader is an app for windows that has a database full of the latest 3.60 Eboots to be easily downloadable.
What's new in V0.2?
PS ID's added
(Bugfix) Corrected how it grabbed the database
A new database layout. (Lots of new titles added)
The db will have even more titles soon. (Only a one man band)
You have to just enter the title ID and after click on "Do It!" it will automatically download patches and then fix the latest one for you. This app also has an option that will fix EBOOT.BIN without downloading updates.
1- if you have downloaded files before and you just want to fix them put them in application's folder.after checking the sony server if file exists it will skip that file and will start to fix
2- to copy download Download Link double click on it
3- this app doesn't changes PARAM.SFO (Some times changing PARAM.SFO causes some problem in packing) to prevent Update error enable the spoof on your cfw
4- here is a example of which files to install
for example i want to update and install Gran Turismo 5
1- Enter BCES00569
2- it will automatically download the 9 files:
After download finished the application will automatically fix the latest patch (in this case:"EP9001-BCES00569_00-0000000000000000-A0113-V0100-PE.pkg") and will make a new file which is fixed for 3.55 with following name: EP9001-BCES00569_00-0000000000000000.pkg (The last part of name has been removed.)
And then install the latest update which is fixed by application (EP9001-BCES00569_00-0000000000000000.pkg)
Version 1.2 is ready to download...
Added:Sign and repack specific PKG.
Fixed: 8001003C error
Improvements in fixing and file managing.
Fixed: blur bog
Minor UI Changes.
Fixed: some of minor bugs
Fixed some bugs
Updated scetool to latest version to have better fixing.
Added Option to just fix EBOOT.BIN.
Some minor improvements in code.
Asure (via pastie.org/4407666) has made a small .bat file that can bruteforce the klic key from PS3 EBOOTs that use/load SELF/SPRX files stating the followng:
FOR /F "tokens=*" %%i in ('"od -j%OFFSET% -N16 -w16 -t x1 eboot.elf | cut -c 8- |sed 's/ //g'"') do SET KEY=%%i
if %KEY% == 00000000000000000000000000000000 (
echo Skipped 10 bytes of blank/useless key at %OFFSET%
set /a OFFSET+=10
) else (
ECHO Trying Key: %KEY% from decimal offset: %OFFSET%
scetool.exe -l %KEY% -d default.self selfout.elf >nul
set /a OFFSET+=1
IF EXIST selfout.elf GOTO END
echo Done! Key used was: %KEY%
You need to put this into a folder with scetool, data / keys etc. working. Then drop an eboot.bin and decrypt it with scetool into eboot.elf. The drop an encrypted self, or sprx and modify the bat file a little perhaps.
The needed linux tools like od.exe, sed.exe, can all be found in the package above. If you want to test with say, portal 2 sprx files, you can try starting at offset 608600. MW3 around offset 54272.. The batch file is not perfect. On large files, the CUT command starts to malfunction as i don't take this into account with the sed/cut combo. Some PS3 game key examples are located HERE and also below in full.
From deank: The other day someone sent me eboot+self for "Ryu ga Gotoku of the End" (Yakuza). It is one of these games (like Rock Band 3) which cannot be 'decrypted' using a k_lic, so here is the "ogrez.self" patched for 3.55.
You can prepare a fixed update pkg by using the original pkg + the fixed eboot.bin and this fixed ogrez.self. It is pretty simple once you figure it out
You will notice that in some game updates you have:
Where both files are "the same". They are not 1:1 the same, because they're encrypted with different keys, but if you look at the prog/data sections and the offsets - you will see what I mean. Also the sizes are the same. I noticed this 'update' approach back in 2010 with "Prince of Persia TFS" and with some other games, so I decided to try that. Both in this game and Rock Band there are no references to the .self and no k_lic... either.
What you have to do is:
1) Decrypt the EBOOT.BIN to .elf
2) Use scetool to create NPDRM NPTYPE=UPDATE with key 00, contentID=game-update-content-id, and np-original-name=name_of_the_self.
3) You get the new blabla.self and use it
For example for this yakuza game you'll notice that the info for the eboot.bin and the ogrez.self are the same:
There is no universal approach. Sizes must be equal (not more or less) and to be sure that there is no k_license involved you can either check if the .self is referenced in the eboot.bin or you'll have to use IDA to make sure that NP functions use NULL k_lic... (or find the k_license location in IDA using the NP functions).
A simple bat/cmd script to compare the PROGBITS sections of 2 files (like EBOOT.BIN and ogrez.self): check.cmd
C:\>check YAK4-BLJM60316-EBOOT.BIN YAK4-BLJM60316-ogrez.self
FC: no differences encountered
If they match (i.e. no differences) then there is a very good chance that you only need to re-self the eboot.bin to the desired .self without the need of a license key.
34EC7BB9F4BAEE7312C373008BD3CDD6 Alice Madness [NPUB30545]
12345678901233456654643654654646 Alien Spidy [NPEB01022] [EP4365-NPEB01022_00-ALIENSPIDYTRIAL0]
78BEA6D6EBF0D74C676BED0EB9CE74FB Alpha Mission 2 [NPUB30263]
01255725585727598445648785573384 Arcana Heart 3 [BLES01295] [BLJM60248] [BCAS20162] [JP0036-BLJM60248_00-AH30UPDATEDATA01]
51BE4195553454C45535350415443481 Army of TWO€ The 40th Day (1.03) [BLUS30408] [BLES00659] [BLJM60216] [BLAS50174] [BLJM60308] [UP0006-BLUS30408_00-PATCH03NTSC00000]
00000000000000000000000000000000 Army of TWO The Devil's Cartel [BLUS31069] [BLES01763] [BLES01767] [BLJM60578] [EP0006-BLES01763_00-AO4PATCH00000001-A0101-V0100-PE]
CBFD3382C28193A18FCBDA55A0790037 Art Of Fighting [NPUB30261]
B71AD35199684E25A7E75AFA7DE062BA Assassin's Creed 2 [BLUS30364] [BLUS30446] [BLES00897] [BLES00751] [BLES00669] [BLES00670] [BLJM60233] [BLAS50359] [BLKS20167] [BLAS50159] [BLJM60185] [BLES00899] [NPUB30423] [UP0001-BLUS30364_00-AC2PATCH00000002]
b72ae85131684e25a78f5a007de06211 Assassin's Creed 2 [NPUB30423] [UP0001-NPUB30423_00-ASSASSINS2BLURAY]
1193590B4DDE4F5B8E44F5F14877D0B6 Assassin's Creed Brotherhood [BLUS30537] [BLES00900] [BLES00909] [BLES00910] [BLES00911] [BLKS20231] [BLAS50278] [BLJM60250] [BLJM60995]
6192A450CF1047340358847650057061 Assassin's Creed Brotherhood [NPUB30522]
1193590B4DDE4F5B8E44F5F14877D0B6 Assassin's Creed : Revelations [BLUS30905] [BLES01466] [BLES01385] [BLES01467] [BLES01384] [BLUS30808] [BLJM60412] [BLAS50418] [NPUB30707] [EP0001-BLES01467_00-ACRTITLEUPDATE04]
B6D07748F1F5448E5B4FDE4D0B599311 Assassin's Creed : Revelations [BLUS30905] [BLES01466] [BLES01385] [BLES01467] [BLES01384] [BLUS30808] [BLJM60412] [BLAS50418] [NPUB30707]
101F0773FF5E491BA7320268119B1A0E Assassin's Creed € 3 [BLUS30991] [BLES01667] [BLES01668] [BLES01669] [BLJM60516] [EP0001-BLES01667_00-AC3TITLEUPDATE10]
2D50F83BD7C631C2239ADC2BA4DF252F Baseball Stars Professional [NPUB30262]
00000000000000000000000000000000 BATTLEFIELD 3 (1.05) [BLUS30762] [BLES01275] [BLAS50380] [BLAS50384] [BLJM60384] [NPEB00723]
52603623339298839913596131407815 BioShock [NPUB90156] [NPJB90159] [NPEB90102] [BLUS30166] [BLES00317] [BLES00316] [BLJS10041] [EP1001-NPEB90102_00-BIOSHOCKDEMO0001]
643F1B7BB3550335CF2D6051864F270B BioShock 2 [BLUS30420] [BLUS30486] [BLES00728] [BCJS10078] [BLJS10078] [BLAS50179] [BLKS20146] [UP1001-BLUS30420_00-BS2PATCHSCEAF003]
0DEEDFB225F65975E685B78206537EF2 BioShock Infinite [BLUS30629] [NPUB31128] [BLES01705] [NPEB01290] [BLJS10207] [EP1001-BLES01705_00-BSIDSCPATCHPSCEE] [UP1001-BLUS30629_00-BSIDSCPATCHPSCEA]
01255725585727598445648785573384 BlazBlue Continuum Shift (1.04) [BLUS30576] [BLES01119] [BLJM60237] [BLJM60238] [UP1024-BLUS30576_00-BBCSUPDATEDATA04]
00000000000000000000000000000000 Burnout Crash [NPUB30464] [NPEB00529] [NPJB00139]
388D8E0B5D2D11F9F300F94073082FDE Buzz! Junior: Jungle Party [NPEA00112] [NPEA00092] [EP9000-NPEA00092_00-PBUZZJUNIO000001] [EP9000-NPEA00112_00-DINOPARTY0000000]
8E04D2B229D4FC4DA48D08EC815E9267 Call Of Duty® Classic [NPUB30065] [UP0002-NPUB30065_00-CALLOFDUTYCLSCEN]
AF0A8F0A8909F09234091AFADF909AF0 Call of Duty® Black Ops (1.13) [BLUS30591] [BLUS30625] [BLUS30638] [BLES01031] [BLES01032] [BLES01033] [BLES01034] [BLES01035] [BLES01105] [BLJM60286] [BLJM60287] [BLJM60536] [BLJM60537] [BLJM61004] [BLJM61005] [BLKS20228] [BLES00356]
8C10AC1473DF38ADD7A4F2EE8C838DAB Call of Duty® Black Ops II (1.03) [BLUS31011] [BLUS31140] [BLES01717] [BLES01718] [BLES01720] [BLUS31141] [NPUB31054] [EP0002-BLES01717_00-CODBLOPS2PATCH03]
E7646A32C4F34762C1F58241DD8374F2 Call of Duty® ELITE [NPUB30607] [NPEB00801] [UP0002-NPUB30607_00-CODELITE00000000]
496E66696E697479576172644B657900 Call of Duty: Modern Warfare 2 [BLUS30377] [BLUS30429] [BLUS30450] [BLES00683] [BLES00684] [BLES00685] [BLES00686] [BLES00687] [BLES00690] [BLES00691] [BLJM60191] [BLJM60269] [BLJM61006] [BLKS20159]
496E66696E697479576172644B657900 Call of Duty: Modern Warfare 3 [BLUS30838] [BLUS30887] [BLES01428] [BLES01429] [BLES01430] [BLES01431] [BLES01432] [BLES01433] [BLES01434] [BLJM60404] [BLJM60422]
31323334353637383941424344454600 Call of Duty: Modern Warfare 3 (1.23) [BLUS30838] [BLUS30887] [BLES01428] [BLES01429] [BLES01430] [BLES01431] [BLES01432] [BLES01433] [BLES01434] [BLJM60404] [BLJM60422] [UP0002-BLUS30838_00-MW3P000000000123]
C8E0234D149E4549BC1B086FEFD7282A Call of Duty: World at War [BLUS30192] [BLES00354] [BLES00355] [BLES00404] [BLES00457] [BLKS20098] [BLES00357] [EP0002-BLES00354_00-CODWAWMAPPACK105]
36BAD25595801CDCA6E30319AF7826CE CAPCOM Arcade cabinet [NPUB30769] [NPUB90178] [UP0102-NPUB30769_00-CACC0255PACKALLX]
90394BD86C745DA84D0E4209F073E100 Call of Juarez: Bound in Blood [BLUS30347] [BLES00556] [BLAS50114] [BLJM60153] [NPUB30637] [UP0001-BLUS30347_00-COJBIB0000000020]
BD93AFFFE240424297A2D86414D3FA5C Castlevania: Harmony of Despair [NPUB30505] [NPEB00563] [EP0101-NPEB00563_00-CASTHARMONYOFDES]
218A6FBF2865464A79399B6EEF54632A Champion Jockey: G1 Jockey & Gallop Racer [BLUS30863] [BLES01235] [BLJM60367] [JP0106-BLJM60367_00-GXGJPNPATCH00102]
D84D248D58EEA66FAC705893E7C0865D Champion Jockey: G1 Jockey & Gallop Racer [BLJM60367] [BLES01235] [BLUS30863]
F0370E82EFD9E0249D63FFDEC323A6A8 Conflict: Denied Ops [NPEB90055] [NPUB90078] [BLUS30107] [BLES00182] [BLES00183] [UP0776-NPUB90078_00-CONFLICTDOUSDEMO]
90A06A5252A4B702F3242E584C27D542 Darksiders II [NPUB30979] [UP1005-NPUB30979_00-DARKSIDERS2DIGIT]
5A6170686F64426565626C6562726F78 DC Universe Online (1.43) [BLUS30583] [BCES01048] [UP0017-BLUS30583_00-DCUOLPS3LIVE0001]
00000000000000000000000000000000 Defiance [NPUB31094] [UP2025-NPUB31094_00-DEFIANCE00000001]
E17337F73830F67826927A6071C61DA1 Devil May Cry HD Collection [NPUB30998] [NPEB01188] [BLUS30764] [BLES01228] [BLJM60363] [BLJM60569] [EP0102-NPEB01188_00-DMCCHDDIGITAL000]
4034250AB9018EF901C098E1790A907F DmC: Devil May Cry [NPUB90929] [NPEB90473] [UP0102-NPUB90929_00-DMCDEMO000000001]
3E5A737B7D7D6F242D3F305873647153 Deus Ex Human Revolution (1.01) [BLUS30476] [BLUS30733] [BLES01150] [BLES01151] [BLES01152] [BLJM60353] [BLAS50367]
58A4BADB96035258C54DDE01F210CBDD Doom 3 BFG Edition [BLUS31024] [BLES01679] [UP1003-BLUS31024_00-D3BFGDAYONEPATCH]
0D381309CBF64D8DC3B411EFBFD4648B Dragon Age Origins [BLUS30415] [BLES00721] [BLES00699] [BLJS10103] [UP0006-BLUS30415_00-DAOPATCH106POST0]
CBB2EAB0E2925A89DF06A843B7F2221B Dragons Age II (1.05) [BLUS30645] [BLES01084] [NPUB30476] [BLJS10161] [BLAS50317] [BLAS50329]
00000000000000000000000000000000 Dungeons And Dragons Daggerdale [NPUB30318] [UP0182-NPUB30318_00-0000111122223332]
69A455FE5D23E0F7BA79C1AF8065BEFE ELEVATOR ACTION DELUXE [NPUB30428] [UP0082-NPUB30428_00-ELEVATORACTIONDX]
1E14C49F03FCE2E01A8BB8BF0BCA6F12 Everybody's Golf: World Tour [BCES00068] [EP9000-BCES00068_00-EGWTPATCH0000013]
7613AB8E948211DD8203AE9856D89593 Far Cry® 2 [BLUS30178] [BLES00324] [BLES00325] [NPUB30523] [NPEB00599] [BLAS50076] [BLJM60108] [BLKS20084] [UP0001-BLUS30178_00-FARCRY2PATCHV104]
6892cb500f10473d5758847650054357 Far Cry® 2 [NPUB30523] [UP0001-NPUB30523_00-FC2ORIGS3REMPKG1]
3D761CF97D8FFDEAA1DA883ECB0B0F75 Far Cry® 3 [BLUS30687] [BLES01137] [BLES01138] [EP0001-BLES01137_00-FC3SCEEDISCTU001] [EP0001-BLES01138_00-FC3SCEEUKDISC001] [UP0001-BLUS30687_00-FC3SCEADISCTU001]
119CE34694764D31B59A99275AD60751 Fairytale Fights® [NPEB90208] [NPUB90343] [BLUS30456] [BLES00696] [EP4005-NPEB90208_00-FFGAMETEASERDEMO]
E9C055A4A666ACB84BB19BD38D36E6A6 Fatal Fury [NPUB30260]
EA82CD9815FAE8325521AA9DD7E08134 Fat Princess [NPUA80139] [NPEA00111] [NPHA80066] [NPJA00048] [NPJA90120] [UP9000-NPUA80139_00-FATPRINCESS00001]
12345678901234567890123456789012 FIFA 10 (1.04) [BLUS30385] [BLES00615] [BLAS50145] [BLKS20153] [BLES00165] [BLJM60175] [UP0006-BLUS30385_00-PATCH0NA0ZF01040]
12345678901234567890123456789012 FIFA 11 (1.06) [BLUS30630] [BLJM60274] [BLES01059] [BLJM61011] [BLAS50339] [UP0006-BLUS30630_00-FIFA110000000000]
12345678901234567890123456789012 FIFA 12 [BLUS30809] [BLES01381] [BLES01382] [BLAS50370] [BLJM60996] [NPEB00688] [EP0006-BLES01381_00-FIFA120000000000]
12345678901234567890123456789012 FIFA 13 [BLUS30998] [BLES01676] [BLAS50514] [BLJM60514]
12345678901234567890123456789012 FIFA Street [BLES01493] [BLUS30882] [BLJM60457]
E7783598211CF63424B94EE94E4A5D2C Final Fantasy XIII-2 [BLES01269] [BLJM60382] [BLUS30776] [BLUS30925] [BCAS20196] [BCAS20223] [BCAS20224] [BCAS20225] [EP0082-BLES01269_00-PATCHVERSION0106]
00000000000000000000000000000000 Final Fantasy XIII-2 [BLES01269] [BLJM60382] [BLUS30776] [BLUS30925] [BCAS20196] [BCAS20223] [BCAS20224] [BCAS20225]
2E21302E362F202731596153304A5C4A Flower [NPUA80083] [UP9000-NPUA80083_00-FLOWERPS3PRIVATE]
32204F4157407953737C2D25406F2C54 Flower [NPEA00094] [UP9000-NPUA80083_00-FLOWERPS3PRIVATE]
483466396b2f5b703c743f463044565f Flowery [NPJA00039] [JP9000-NPJA00039_00-FLOWERPS3PRIVATE]
00070907030706030304080108010107 Formula One Championship Edition (1.10) [BCUS98142] [BCAS20009] [BCJS30005] [BCES00005] [UP9000-BCUS98142_00-F1CHAMPIONSHIPED]
17834BFF12174E4CE2F0B5CD8BB37FBD Free Realms [NPUA30048] [NPEA00299]
7D524E1C9EFE4A36B08BBD4DA340D300 From Dust [NPUB30418] [UP0001-NPUB30418_00-FROMDUSTTRIAL001]
96F4F8047346EB130E78933C3D1BDBBB Ghostbusters (1.03) [BCES00642] [BLUS30307] [BLAS50120] [EP9000-BCES00642_00-PROTON103PATCH01]
183EF1DCA2B44DA893D2ADBAE1CA36F2 God of War® Ascension [BCUS98232] [BCES01741] [BCES01742] [BCES01838] [BCJS37008] [BCAS25016] [NPUA70216] [EP9000-BCES01741_00-GOWABDPATCH00001]
9812F06A923E442DBD3B8CF7AFBC2E87 God of War® HD Collection (1.01) [BCUS98229] [BCUS98230] [BCUS98253] [BCES00791] [BCES00800] [BCJS30080] [BCAS20102] [BLJM60200] [UP9000-BCUS98229_00-GOWHDCLSHIP02222]
A93233BBBBBBBBBBBBBBCB2AB3BB3B44 Harry Potter and the Deathly Hallows€: Part 2 [BLES01307] [BLUS30768] [BLAS50361]
C0A3B3641C2AD1EF23153A48A3E12FE7 HEAVY RAIN€ [BCUS98164] [BCES00458] [BCES00802] [BCES00797] [NPJA90119] [BCAS20107] [BCJS30040] [NPEA90053] [NPUA70088] [NPHA80086] [BCUS98280] [BCJS70017] [BCAS25006] [BCKS15006
00000000000000000000000000000000 Homefront [NPUB30572] [UP1005-NPUB30572_00-HFDIGITAL0000001]
8450021620413F2EBC5234937B5A0701 Hulu Plus [NPUP00046] [UT0008-NPUP00046_00-2010101201639300]
D0FCBA9BA75621DFAA69A2280D1E51CF ICO€ & Shadow of the Colossus€ Classics HD (1.01) [BCUS98259] [BCES01097] [BCES01115] [BCAS20202] [BCJS30070] [BCJS30073] [BCAS20150]
24060411149EE10A9E2ADE1EAE2BDE00 Jikkyou Powerful Pro Yakyuu 2011 Ketteiban [BLJM60424] [JP0101-BLJM60424_00-PAWAPROPATCH0001]
19FF3B56117305CCA57992408EFEB001 Jikkyou Powerful Pro Yakyuu 2012 [BLJM60469] [JP0101-BLJM60469_00-PW2012P3PATCH005]
B0090227200902272009022720090227 Journey [NPEA00288] [EP9000-NPEA00288_00-DJOURNEYXX0000A1]
A0090227200902272009022720090227 Journey Collector's Edition [BCUS98377]
4176616C616E63686553747564696F73 Just Cause 2 [NPUB30606] [UP0082-NPUB30606_00-JUSTCAUSE2PSNVER]
011F13B1FC2EA3DD4C05BC00188A4BB8 Just Dance 4 [BLUS31033] [BLES01722] [EP0001-BLES01722_00-JUSTDANCE04PKG01]
DDFF5D43F9D44216C67B9ACAD636F313 Karateka [NPUB31078] [UP2072-NPUB31078_00-KARATEKAGAME0000]
12B8A6467A58DEBA316F0C0A4A386422 Kidou Senshi Gundam: Extreme VS [BLJS10131] [BLAS50423] [JP0700-BLJS10131_00-GAMEDISCPATCH002]
406EEA4E78D8F408167443BDD8803721 League Bowling [NPUB30257]
3FD24924948AE94A3FD9999999975FF7 Legasista [NPUB30860] [NPEB01082] [BLJS10157] [UP1063-NPUB30860_00-HDDBOOTLEGASI001]
C0A3B3641C2AD1EF23153A48A3E12345 Life with Playstation [NPIA00007] [IP9100-NPIA00007_00-0000111122223333]
AAC128FEB22AB31ACA2697EE91879DB1 LocoRoco Coccorecho [NPEA00036] [EP9000-NPEA00036_00-LOCOROCOEURO0001]
E73591C6F8A08C5BAFE8E0DEF4F552EA MAG (2.12) [BCUS98110] [BCES00818] [BCAS20081] [BCJS30036] [BCES00558] [UP9000-BCUS98110_00-MAGPATCH00000001]
C71D19C60B98BA5A1F024202145C75DD Magician Lord [NPUB30264]
D6D4506DB5B5455BA98A11EA9426BCD9 Marvel Ultimate Alliance 2 (1.02) [BLUS30294] [BLES00546] [UP0002-BLUS30294_00-MUA2PATCH0124176]
304BB4852BD12D02D499F2268D9A3270 Mesmerize [NPEA00030] [EP9000-NPEA00030_00-MESMERIZEPACK002]
E3A152EF3624CF89ABCDB1317D57CC6B Metal Gear Solid HD Collection (1.03) [BLUS30847] [BLUS30906] [BLES01419] [BLJM61001] [BLKS20316] [BLAS50383] [EP0101-BLES01419_00-MGSHDCOLLECTION0]
B608E78018A335E494B972A6B717A166 Metal Gear Solid HD Collection (1.01) [BLUS30847] [BLUS30906] [BLES01419] [BLJM61001] [BLKS20316] [BLAS50383]
730D29E299832687471B6AB80FB83BF5 Metal Gear Solid Collection [NPEB00684] [EP0101-NPEB00684_00-EUSMGS3HG0013340]
6D1BBD1669D900CC4A00CC6EE8061B4E Metal Gear Solid 4 Update (2.00) [BLUS30109] [BLUS30148] [BLES00246] [BLKS25001] [BLJM67004] [BLKS25002] [BLJM67001] [BLKS25003] [BLJM57001] [BLJM67003] [BLJM67002] [EP0101-BLES00246_00-PATCH00000000000]
201397B3F71CDD69A2154DCCEBC23F4D Metal Slug [NPUB30258]
040C4A90168B503F0254504A04FD308E Medal of Honor [BLUS30436] [BLES01067] [BLES01106] [BLES01107] [BLES01108] [BLES00860] [BLJM60275] [NPUJ00974] [NPUB90366] [BLET70010] [BLJM60344] [BLAS50238] [BLAS50232] [UP0006-BLUS30436_00-MOHPATCHNAV00001]
00000000000000000000000000000000 Medal of Honor Warfighter [BLUS30990] [BLES01636] [UP0006-BLUS30990_00-MOHWPATCH0000001]
0F00200B013370000000500700020090 Mirror's Edge [BLUS30179] [BLES00322] [BLJM60104] [BLKS20094] [BLAS50073] [NPEL00074] [NPEB00052] [NPUB90119] [NPJB90140] [NPHB00057] [NPEB90114] [BLJM60181] [EP0006-NPEB90114_00-MIEDDEMOEU000001]
123456789012345678901234567890AB MONOPOLY STREETS [BLUS30533] [BLES00954] [BLAS50253][NPUB30592] [UP0006-NPUB30592_00-MONOPOLYPSNNA000]
6CB297786AEB68D761FABEC8E1CD1437 Mortal Kombat [NPUB30668] [UP1018-NPUB30668_00-MK9HDDCONVERSION]
90394BD86C745DA84D0E4209F073E100 nail'd (1.02) [BLUS30544] [BLES00914] [BLJM60331] [BLJM60461] [UP2047-BLUS30544_00-NAILDGAMEPNPATCH]
569F9349D9C594C0A04ED2FD5CBB158E Namco Museum [NPUB30086] [NPJB00012] [UP0700-NPUB30086_00-NAMCOMUSEUMFULLV]
6F46772AC2C84BA59484A73BB13B26BB NBA 2K12 (1.05) [BLUS30830] [BLES01418] [BLJS10136]
0C444C567EEF42D9FFE28991AEB867EE Need for Speed: The Run [NPEB00851] [EP0006-NPEB00851_00-NFSTHERUNPSN0000]
00000000000000000000000000000000 Need for Speed: The Run [BLUS30757] [BLES01298] [BLAS50337] [BLJM60386]
7AC7E325735C754B8C7F7984819B0A48 NETFLIX [NPUP00030] [UT0007-NPUP00030_00-NETFLIXRIGEL01NA]
A0FFF31F6A94046AF61550C7AC1F5DB3 NETFLIX [NPEB00874] [EP4350-NPEB00874_00-NETFLIXRIGEL01EU]
4D4D8F2D0C106FEA46A9123952B9F66A Ni No Kuni: Wrath Of The White Witch [BLUS30947] [NPUB30932] [NPUB90846] [BLES01555] [NPEB01158] [BCAS20218] [BLJS10150] [BLJS10185] [NPJB00238] [UP0700-NPUB30932_00-NNKDLFULLGAMEPTA]
38019393387F7F7F7F7F7F7F7F7F7F7F Ni No Kuni: Wrath Of The White Witch [BLUS30947] [NPUB30932] [NPUB90846] [BLES01555] [NPEB01158] [BCAS20218] [BLJS10150] [BLJS10185] [NPJB00238] [UP0700-NPUB30932_00-NNKDLFULLGAMEPTA]
CFCB51DC22CAE8C2659082F7EFB2C881 OKABU [NPEB00621] [EP4334-NPEB00621_00-HCOKABUGAME00000]
8D5B3D9ACE0BAC2794A1434D92E689F7 Okami HD [BLJM60467] [BLAS50523] [JP0102-BLJM60467_00-0000000000000000]
559A80C1274F4BDBE829ACF076BA2D96 Orange Box (1.01) [BLUS30055] [BLES00171] [BLES00153] [BLES00172] [BLKS20015] [BLAS50034] [UP0006-BLUS30055_00-OBOXPATCH0000001]
C0A3B3641C2AD1EF23153A48A3E12FE7 Pain [BCES00548] [BCUS98211] [EP9000-BCES00548_00-PAIN000100000000]
31410A8B3C8B4AA0BA0E9D23BB6598F4 PlayMemories Studio€ [EP4288-NPEB00873_00-HDDBOOTDEMO00001]
19089CBAF948487F9530832BF477B369 Portal 2 (1.01) [BLUS30732] [BLES01222] [BLJM60352] [BLAS50331] [BLJM60473]
D13BFAED3399C4D578C16B6718AA88DE Prince of Persia [BLUS30214] [BLES00389] [BLES00390] [BLAS50085] [BLJM60107] [NPUB30424] [NPEL00079] [BLKS20100] [UP0001-BLUS30214_00-POP0GAMEUPDATE01]
E014D827F94402348A97429477BDFFCB Prince of Persia The Forgotten Sands [BLUS30401] [BLES00839] [BLES00840] [BLAS50207] [BLKS20193] [BLJM60234] [NPUB90370] [NPUB30632] [UP0001-BLUS30401_00-POPTFSUPDATE0001]
50455332303038455550415443483032 Pro Evolution 2008 [BLUS30111] [BLES00110] [BLES00111] [BLES00100] [EP0101-BLES00110_00-PES2008EUPATCH02]
50455332303130455550415443480000 Pro Evolution 2010 [BLUS30404] [BLES00689] [BLES00688] [EP0101-BLES00688_00-PES2010EUPATCH02]
E39570A1398E61F5806CC3F07DEC630D Prototype [NPUB30389] [UP0002-NPUB30389_00-PROTOHDDBOOT0001]
3467652D383862652D38646161623232 Qriocity: Music Unlimited [IP9100-NPIA09002_00-0000111122223333]
9FFEA6C8DE7A437DA5AC578D2E444977 Quantum of Solace [BLUS30198] [BLES00411] [BLES00406] [BLJM60137] [BLKS20088] [BLUS30199]
C0A3B3641C2AD1EF23153A48A3E12FE7 Rag Doll Kung Fu€: Fists of Plastic [NPUA80217] [NPEO50015] [NPJA00038] [NPHA80055] [NPEK00161] [NPEA00103] [NPUA70058] [NPEA00142] [NPJA90107] [UP9000-NPUA80217_00-PRAGDOLLKU000004]
58A4BADB96035258C54DDE01F210CBDD Rage (01.01) [BLUS30485] [BLES01377] [BLES01378] [BLES01426] [BLAS50374] [BLJM60994]
9F2941A09733FEDC77183735A069347C Ratchet & Clank: QForce [NPUA80642] [BCES01594] [EP9000-BCES01594_00-RATCHETQFORCE001]
7FE7048BC7E4299916881A3A0E08CD73 Real Steel [NPUB30605] [NPEB00754] [NPJB00169] [EP0728-NPEB00754_00-RSGAMEEUR0000000]
C0A3B3641C2AD1EF23153A48A3E12FE7 Renegade Ops [NPEB00446] [NPUB30406]
729A4F5EE376794650782D0CCD7DCB72 Red Dead Redemption (1.07) [BLUS30418] [BLUS30711] [BLUS30758] [BLES00630] [BLES00680] [BLES01179] [BLES01294] [BLJM60265] [BLJM60314] [BLJM60403] [BLKS20202] [BLKS20315] [BLAS50203] [BLAS50296] [BLAS50382] [NPEL00137] [NPUB90270]
F62B9A1EC187E5BB061FCDD715E3F6BE RESIDENT EVIL€ THE DARKSIDE CHRONICLES [NPEB00816]
00875F084DF2B8D68AA06D55335E1276 RESIDENT EVIL€ Operation Raccoon City (1.01-1.03) [BLUS30750] [BLUS30929] [BLES01288] [BLES01417] [BLAS50431] [NPUB30767] [NPEB00984] [BLJM60342] [EP0102-BLES01288_00-PATCH00000000003]
00000000000000000000000000000000 Ridge Racer 7 [BLUS30001] [BCES00009] [BLJS10001] [BCAS20001] [BCKS10001] [BLKS10039] [NPUB30457] [BLJS50010] [BCKS10039]
925B973965C5AD25A57F25D4398EFAFA R.U.S.E. (1.01) [BLUS30478] [BLES00785] [UP0001-BLUS30478_00-RUSEPS3XPATCH001]
3429F83C6487D365486FFC805379D686 Sacred 2 (1.02) [BLUS30312] [BLES00410] [BLJS10071] [BLJS50016] [UP2013-BLUS30312_00-GAMEUPDATEPATCH2]
49FEE8AB793A2DE84C2C9D22E2D3564D Samurai Shodown [NPUB30265] [NPEB00247]
2B5C6D1E6F90A53C7831F38A1B0B198B Samuraidou 4 [BLJS10107] [JP0604-BLJS10107_00-PATCH00000000003]
C9FA33C26F68FBA0E70BF147B9CACF6F Silent Hill HD Collection (1.02) [BLUS30810] [BLES01504] [BLAS50432] [BLJM60425] [EP0101-BLES01504_00-SHHDPATCH00000EU]
00000000000000000000000000000000 Silent Hill: Downpour [BLUS30565] [BLES01446] [BLAS50456] [UP0101-BLUS30565_00-SHGAMEPATCH00001]
90394BD86C745DA84D0E4209F073E100 Sniper Ghost Warrior (1.01) [BLUS30796] [BLES01286] [BLES01281] [BLJM60374]
08727DF80102030431C855B900000101 SOCOM Special Forces (1.05) [BCES00938] [BCES00939]
08727DF80102030431C855B900000101 SOCOM 4 US Navy SEALs (1.05) [BCUS98135] [BCUS98213] [BCUS98305] [BCUS98315] [BCJS30052] [BCKS10137] [BCAS20121]
C0A3B7641C2AD1EF20133A28A3E15FE3 Splinter Cell Trilogy HD (1.01) [BLUS30761] [BLES01146] [BLAS50360]
2160B28ABBB5348BAD25704E4CEFBD4E Super Sidekicks [NPUB30259] [UP0576-NPUB30259_00-NEOGEOSTATION008]
89CC36FC34B1D7DEB23D6744A9D05A51 Supersonic Acrobatic Rocket-Powered Battle-Cars [NPUB30035] [NPEB00062] [NPUB90169] [EP2002-NPEB00062_00-SARBATTLECARS001]
79D442BAAB63593C8EBC4536AE434D9B Starhawk€ [BCUS98181] [BCES00907] [BCES01234] [BCAS20171] [BCJS30076] [EP9000-BCES01234_00-STARHAWKBDPATCH1]
15454864315343513216315346265612 Test Drive unlimited 2 (1.02-1.06) [BLUS30527] [BLES00884] [BLJM60318] [BLJM60460]
0147457A89FDCDA8CFCDAB8967452804 The Adventures of Tin Tin [BLUS30747] [NPUB30805] [BLES01306] [UP0001-NPUB30805_00-TINTINPS3REMPKG1]
B61FCC0BC911462BF414EBE67733A9FF The King Of Fighters '94 [NPUB30266]
5CFBAB50B816133654F06B16199AC409 The Punisher: No Mercy [NPUB30070] [NPEB00112] [NPEP50032] [NPEB00098] [NPEB90179] [NPUB90198] [UP4042-NPUB30070_00-PUNISHERNOMERCY1]
0A351302CCF64D7DC3B312DEBFD7749B The Sims 3 (1.02) [BLUS30609] [BLES01016] [BLAS50257] [BLJM60285] [BLJM60399] [UP0006-BLUS30609_00-PATCH00000000002]
30F1BABB519FB240CA8C1A1451802644 The Walking Dead [NPUB30741] [NPEB00957] [UP2026-NPUB30741_00-WD104000001PATCH]
A87B6A987FB6A09D87FBA097D6AE8807 TIME CRISIS: RAZING STORM (1.01) [BLUS30528] [BCES01070] [BLJS10091] [UP0700-BLUS30528_00-TCRS0100PATCHPKG]
C3B3B674202DE1F326253D58A6F130F7 TMNT: Turtles in Time Re-Shelled [NPUB30107] [NPEB00149] [NPHB00134] [UP0001-NPUB30107_00-TMNTRESHELLED001]
7613AB8E948211DD8203AE9856D89593 Tom Clancy's Endwar (1.03) [BLUS30180] [BLES00376] [BLES00487] [BLKS20092] [BLJM60136] [UP0001-BLUS30180_00-TRHDRM0000000103]
0147457A89FDCDA8CFCDAB89674528FF Tom Clancy's Endwar [NPUB30913] [UP0001-NPUB30913_00-ENDWARPS3REMPKG1]
00000000000000000000000000000000 Tom Clancy's Endwar Demo [NPUB90171] [NPEB90118] [UP0001-NPUB90171_00-TCEWPS3DEMOPACK1]
6692C4500F10473D5758847650054351 Tom Clancy's Ghost Recon Advanced Warfighter 2 [NPUB30502] [BLUS30034] [BLES00067] [BCAS20022] [BLKS20080] [BCKS10019] [BLJM60040] [UP0001-NPUB30502_00-GRAW2PS3REMPKG01]
32A8003E48F711E1A53025E64724019B Tom Clancy's Ghost Recon Future Soldier€ [BLUS30521] [BLES00924] [BLES00922] [UP0001-BLUS30521_00-GRFSTITLEUPDAT02]
E5EB14BEB3074EB4180B51A9B22B9734 Tom Clancy's Ghost Recon Future Soldier€ [BLUS30521] [BLES00924] [BLES00922]
1FBADF00D726101632A11DA1CAFEACAC Tom Clancy's H.A.W.X [BLUS30186] [BLES00330] [BLAS50101] [BLJM60144]
0123456789ABCDEFEFCDAB8967452301 Tom Clancy's H.A.W.X 2 [BLUS30488] [BLES00928] [BLAS50225] [BLJM60242] [BLES00929] [BLJM60375]
6825CB560F13743D7758847650014357 Tom Clancy's Rainbow Six Vegas [UP0001-NPUB30633_00-VEGAS1BLURAYPKG1[
584244534F204E3D575882205FF54C5A Tom Clancy's Rainbow Six Vegas 2 [NPUB30503] [UP0001-NPUB30503_00-VEGAS2PS3REMPKG1]
442C5AF691E51010C1D05AC5E7984CAB Tom Clancy's Rainbow Six Vegas 2 [BLUS30125] [BLAS50045] [BLES00248] [BLES00237] [BLKS20067] [BLJM60074] [BLES00755] [UP0001-BLUS30125_00-UBIR6V2PATCH0003]
C0A3B7641C2AD1EF20133A28A3E15FE3 Tom Clancy's Splinter Cell Trilogy HD (1.01) [BLUS30761] [BLES01146] [BLES01146] [BLAS50360]
B825CB507FA3723D5758847350054351 Tom Clancy's Splinter Cell: Double Agent [NPUB30636] [UP0001-NPUB30636_00-SCDA1BLURAYPKG01]
998760D7EBBB8D43242BB466DF501C7E Torne [BCJB95006] [IP9100-BCJB95006_00-TORNE410X120628R]
20907958910945634589173450891352 The Tomb Raider Trilogy [BLUS30718] [BLES01195] [EP0082-BLES01195_00-TRTRILOGYPTCH100]
040030081C232D0B408080091C1C2D0A Tour de France 2011 [BLES01296]
007BAD666BED00BABE00B0B05AD0B173 Tour de France 2011 (1.01) [BLES01296]
007BAD666BED00BABE00B0B05AD0B173 Tour de France 2012 (1.01) [BLES01562]
F492C65EFD8DC810692D8E18E82A5507 Viaplay [EP4345-NPEB00863_00-VIAPLAYFULLAPP00]
ED46FA7B9BF91880AE79BB75C5A35F8E WipEout® HD Fury [NPUA80105] [NPEA00057] [EP9000-NPEA00057_00-WHDPATCH22000000]
1A4B5C0D5E8F942B6720E2790AFA0869 Way of the Samurai 3 [BLUS30398] [BLES00712] [BCAS20101] [EP4109-BLES00712_00-PATCH00000000000]
B23466764DC34BB5AEDD210391F591AF Wolfenstein [BLUS30298] [BLES00661] [BLES00564] [BLES00566] [BLKS20133] [UP0002-BLUS30298_00-PATCHWOLF0000002]
7FE7048BC7E4299916881A3A0E08CD73 WWE 12 (1.02) [BLUS30841] [BLES01439] [BLJM60436]
E8904B0B875AFC47CCA39EA260CD0771 YAKUZA 3 (Ryu Ga Gotoku 3: Kenzan!) [NPJB90169] [JP0177-NPJB90169_00-0000000000000000]
3045F03D49BB2144848AABCCCD469DF8 YAKUZA 3: Battle Engine [NPJB90072] [JP0177-NPJB90072_00-0000000000000000]
9F1DDD43C5D239B14471B98A20CD45A1 YAKUZA 4 (1.08) [BLUS30643] [BLES01081] [NPUB90512] [BLJM60208] [BLJM55032] [BLJM55021] [BLJM60316] [BLAS50310] [NPJB90071] [JP0177-BLJM60316_00-GAMEVER0108WEEK8]
B91AC830D023F9320BA7771935C9C9A0 YAKUZA 5 (Ryu ga Gotoku 5) [BLJM60489] [JP0177-BLJM60489_00-GAMEVER0101WEEK1]
BCCA80BADFA4CCFCF69CF0C7ACE90E7B Zone of the Enders HD Edition [BLUS30937] [BLJM60511] [UP0101-BLUS30937_00-ZOEHDDVDPATCH001]
8AA0C4C2F0D13E64E3589787D3D83188 Zone of the Enders HD Edition [BLJM60451] [JP0101-BLJM60451_00-ZOEHDDVDPATCH001]
66113E697A8A65EC5D58B1F62CC62606 Zone of the Enders HD Edition [NPEB01186] [EP0101-NPEB01186_00-ZOEHDMAINGAME001]
Note: This is just a proof-of-concept, I wanted to know how the whole SELF/SPRX stuff worked. It doesn't contain keys or any proprietary tools from Sony, and as far as I know, it's not doing anything illegal.
From JLM: In case anyone is not sure how to use the script:
1. Use scetool to decrypt the eboot.bin, copy eboot.bin to the scetool folder, use command scetool -v -d eboot.bin eboot.elf, screen output should be (brackets removed from around *'s because it screws up the post formatting):
scetool 0.2.8 <public build> (C) 2011-2012 by naehrwert
NP local license handling (C) 2012 by flatz
* Loaded keysets
* Loaded loader curves
* Loaded vsh curves
* Using keyset [appldr 0x0010 03.60]
* Header decrypted
* Data decrypted
* Elf Written to eboot.elf
2. Use scetool to decrypt the sprx with Asure's script, unpack his bruteforce.zip in the scetool directory, copy the sprx to the scetool directory, use his script or the following which is slightly different: rename the sprx to exactly this: game.sprx, using notepad create a text file and paste the script contents:
for %%S in (eboot.elf) do SET /a LAST_OFFSET=%%~zS-16
for %%S in (eboot.elf) do SET /a MAX_OFFSET=%%~zS-16
if %LAST_OFFSET% gtr 1000000 (
set /a CUT+=2
rem echo Cut val: %CUT%
FOR /F "tokens=*" %%i in ('"od -j%LAST_OFFSET% -N16 -w16 -t x1 eboot.elf | cut -c %CUT%- |sed 's/ //g'"') do SET KEY=%%i
if %KEY% == 00000000000000000000000000000000 (
echo Skipped 10 bytes of blank/useless key at %LAST_OFFSET%
set /a LAST_OFFSET-=10
) else (
ECHO Trying Key: %KEY% from decimal offset: %LAST_OFFSET% / %MAX_OFFSET%
scetool.exe -l %KEY% -d game.sprx game.prx >nul
set /a LAST_OFFSET-=1
IF EXIST game.prx GOTO END
echo Done! Key used was: %KEY%
Save the file as sprxdecrypt.bat, open a command prompt window, type: sprxdecrypt.bat wait a long time.. ONLY FOR THE VERY PATIENT.
Tiny changes to Asure's script: changed filename to game.sprx and game.prx, change it to whatever you like (remember to use the same name in the test line after "IF EXIST") also removed extra -l %key% in the scetool command line.
It has a slider for a more convenient selection of the offset. The cut.exe / dd.exe / od.exe / sed.exe / batch files are not needed. Just put it in the same folder of the scetool.exe, with the EBOOT.BIN and the .self or .sprx to be decrypted, start the BruteForce.exe and press the Start button. Tested working with Red Dead Redemption. Added support for command line parameters.
Example: BruteForce.exe 332300 /start
Anyway I improved the BruteForce.exe a bit more:
Added additional checks when the program starts
Now the tool auto-resigns the EBOOT.BIN and the self/sprx with the 3.55 keys when it finds the klic
Small GUI changes
Included all the tools in a 7z archive
In Portal 2, the klic key is not aligned to 4. Thus the faster method (4X) will not find it. So, I made BruteForce 1.4: It first try to find the key in a range aligned to 4. If it doesn't find the key, then it retries using the original method (1 byte at a time).
The method is similar to the original batch, but bytes aligned to 4 are tested first. Keys already tested, are ignored. In this version also it is possible to define the range to parse (start and stop addresses). Additionally, I added other data aligments: 1, 2, 4, 8 and 16. So in some cases, it could be up to 16X faster than the original method
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
## portal2 launcher eboot.bin with appldr 3.60 key :
scetool 0.2.7 (C) 2011-2012 by naehrwert
NP local license handling (C) 2012 by flatz
Magic 0x53434500 [OK]
Key Revision [3.60 - 3.61]
Header Type [SELF]
Metadata Offset 0x00000410
Header Length 0x0000000000000980
Data Length 0x00000000000AC650
Header Type 0x0000000000000003
App Info Offset 0x0000000000000070
ELF Offset 0x0000000000000090
PH Offset 0x00000000000000D0
SH Offset 0x000000000004DE90
Section Info Offset 0x0000000000000290
SCE Version Offset 0x0000000000000390
Control Info Offset 0x00000000000003C0
Control Info Size 0x0000000000000070
Added real-time switching from hex to dec and vice-versa
Patterns 01xxxxxx01xxxxxx01xxxxxx01xxxxxx are ignored (in addition to 00xxxxxx00xxxxxx00xxxxxx00xxxxxx, *0000* and *FFFFFFFFFFFF*)
Added credits please let me know if I'm missing someone
Added display info for SELF/SPRX
Added F2 shortcut to open program's folder
Added find to DOS box (use F3)
Double click on an offset value in the DOS box sets the offset field
Stop address field can be set from the DOS box selecting an initial address then double click on the final address
Updated to version 1.5.2:
Solved the issue finding the key for SOCOM 4 (the real key contains *0000* which was in the ignored patterns)
Now the patterns to ignore can me defined in the file "ignore_patterns.txt". It includes 4 by default, but you can add all/remove the patterns that you want.
TIP: If you use data alignment 16, if the klic key is not found in the selected range, the tool will retry automatically using data alignment 4, then data alignment 1. The BruteForce 1.6 has the "pre-database of known keys" already implemented. It now first tries the known keys first (read from klics.txt). I went further: the program now first extracts the ContentID, and puts the klic for the TitleID as the first in the list.
I uploaded version 1.6.1 and 1.6.2 is up:
Added Asure to the credits.
This version now has an experimental dynamic section alignment (it first tries using the alignment of the section).
The section index is now displayed.
I changed the &H to 0x in build 1.6.5 (available online) Added the KLIC for Tom Clancy Splinter Cell Trilogy HD (1.01) [BLES01146] (thanks to andreus and PatrickBatman for all the klic keys in the database). Added the patterns for the above scenario.
BruteForce/SCETool Decrypter Build 1.6.7
Added 2 new klic keys to the database: G1 Jockey and Sniper Ghost Warrior
The used keys are now saved to a file. The file name includes the ContentID and ELF size to prevent conflicts with other files decrypted. (these keys are not tested the next time you run the program.)
BruteForce/SCETool Decrypter Build 1.6.8
I added a timeout of 1 minute. If in that time scetool.exe does not finish, the program will terminate the task and retry again. If it crashes again, it continues with the next keys!
BruteForce/SCETool Decrypter Build 1.7.0
The default view was changed from decimal to hex
Press SPACE key in the EBOOT info to jump to the section offset addresses
When you change the offset address, it now hilights the address in the EBOOT info window
Press ENTER near an address in the EBOOT info window to use it as offset address
The timeout is now set to 30 secs (in 1.6.9 it was set to 10 mins by mistake)
Added support to choose encryption keys: 3.40 or 3.55 (default)
Added option to compress encrypted Data (active by default)
If the PARAM.SFO is found in the folder, it sets the PS3_SYSTEM_VER to 3.55 (or 3.40)
Program's version and ContentID are now displayed
Count of ignored keys is now shown while processing
Added FixELF (36 --> 34 / 35 --> 34) before SPRX/SELF encryption
If EBOOT.BIN or SELF/SPRX is not found, it tries to use the *_ORIGINAL files if present in the folder
Added Test drive unlimited 2 (1.06) to the database of klics (thanks to PatrickBatman)
Fixed some incorrect addresses caused by automatic coersion (VB uses int16 instead of int32 when the value fits in 2 bytes. Example: 0xFFFF was converted to -1 instead of 65,535)
BruteForce/SCETool Decrypter Build 1.7.1:
Display the key revision
Warning for EBOOT.BIN with key revision 24 13 BC C5 F6 00 33 00 00 00 34
24 13 BC C5 F6 00 33 00 00 00 37 -> 24 13 BC C5 F6 00 33 00 00 00 34
24 13 BC C5 F6 00 33 00 00 00 36 -> 24 13 BC C5 F6 00 33 00 00 00 34
24 13 BC C5 F6 00 33 00 00 00 35 -> 24 13 BC C5 F6 00 33 00 00 00 34
(41 --> 34 and 42 --> 42 --> 34 are not applied, because 4.1x and 4.2x are higher than 4.00)[/code]
BruteForce/SCETool Decrypter Build 1.7.2:
I tested MW3 with this version and it works fine now.
Settings are now remembered when the program is closed
Added setting for skip sections
BruteForce/SCETool Decrypter Build 1.7.3:
it fixes a bug introduced fixing the coersion bug in version 1.6.10?
BruteForce/SCETool Decrypter Build 1.7.5:
I tested the new version and i saw you encrypt with the klincensee. yes, now it is encrypting with the klicensee and SPRX (and compress=true and skip sections=fase are now the defaults)
I removed almost all the windows updates while it is minimized and made small code optimizations to create/move less strings while it's processing. I don't think they will make much difference, but at least I tried
BTW: Notice that same klic is used in different regions.
BruteForce/SCETool Decrypter Build 1.7.6:
If they match (i.e. no differences) then there is a very good chance that you only need to re-self the eboot.bin to the desired .self without the need of a license key.
It can suggest to the user that it is possible to create the .self for testing.
BruteForce/SCETool Decrypter Build 1.7.7:
In my tests it worked 10-20% faster
BruteForce/SCETool Decrypter Build 1.7.11:
I updated the FixELF.exe so in a single call like this: FixELF.exe EBOOT.elf "24 13 BC C5 F6 00 33 00 00 00 36" "24 13 BC C5 F6 00 33 00 00 00 34" it will search: "24 13 BC C5 F6 00 33 00 00 00 xx ??" -> "24 13 BC C5 F6 00 33 00 00 00 34 00" where xx is any char between 0x35 and 0x99 (inclusive). if the value is found, it stop the search/replace.
This build 1.7.11 now supports another tool (aldostools.org/temp/testklic.rar) developed by andreus to test the klicensee. Extract the content of the rar in the same folder of the BruteForce.exe. In our tests it worked faster than scetool. The user can select which tool want to use to find the klicensee (scetool or testklic).
BruteForce/SCETool Decrypter Build 1.7.12: A klicensee finder using scetool (based on Asure's brute force script) with heuristic algorythms for brute force attack. Once it finds the klicensee, the tool resign the EBOOT/SPRX/SELF with 3.55/3.40 keys. It also includes my FixELF tool.
I have updated the BruteForce to version 1.7.12 and my PS3 Tools to use the lowest key revision (01) and 3.40 by default.
For BruteForce, the default option now will be 3.40 (it can be switch to 3.55)
If the PARAM.SFO is copied to the BruteForce-scetool's folder the BruteForce.exe will auto-patch the sfo's PS3_SYSTEM_VER to 3.40.
If you use my PS3 Tools to make the PKG (just right-clicking of the folder), now it will auto-patch the PARAM.SFO to 3.40 if PS3_SYSTEM_VER is higher than 3.40.
If you need to patch a PARAM.SFO from a batch file, use my latest PARAM.SFO Editor 2.5.3 like this:
The BruteForce is a tool designed mainly to *FIND* the klicensee used to encrypt the NPDRM self/sprx files found in game patches/updates. Currently it supports files signed with up to 3.6 keys (mainly 3.56 and 3.60). If 3.7+ keys are available, the tool should also work (updating the keys in the data folder).
To find the klicensee you will need to copy the EBOOT.BIN, the self/sprx files and the PARAM.SFO to the BruteForce/scetool's folder.
If the klicensee is already known, it will take few seconds to resign the EBOOT.BIN and the self/sprx files. Otherwise it will use optimized methods to try to *guess* the klicensee in few hours.
Once the klicensee is found, the files are resigned with the keys from key revision 01 [0.92 - 3.30], which should be supported by ALL firmware versions available.
To resign files and repack PKG, I suggest that use the PS3 Tools Collection (which also includes the BruteForce).
To resign a disc EBOOT.BIN/self/sprx, just press Ctrl+Enter on the file and it will be resigned. If you double click (or press Enter) on the EBOOT.BIN or *.self or *.sprx you will see the file's information (including key version used).
To resign NPDRM files, extract the PKG (use the right click menu), browse to the USRDIR and press Ctrl+Enter on the EBOOT.BIN/self/sprx files. Then return to the folder where the PKG is located and right click on the extracted folder and select Make PKG.
It will modify automatically the PARAM.SFO to work with 3.40/3.55+. It will also detect the type of PKG being created (disc patch, game data or hard disk game). So there is not need at all for batch files or edit package.conf. Everything is automated.
The PS3 Tools Collection integrates strongly with Windows Explorer, so you can view/edit files (PKG, PUP, SFO, SFX, HIP, HIS, RAP, edat, SFB, BIN, SELF, SPRX, MD5, SFV, SHA1, MTH, 66600) and perform many other tasks just double clicking on the files or using the context menu.
Another nice feature is the repack of retail PKGs for use with DEX converted consoles. Just press Ctrl+Shift+Enter on a PKG and the tool will automatically extract the PKG and repack it as a debug PKG. To extract a PKG, just press Shift+Enter on the PKG. And to view it's Content ID, press Ctrl+Enter on the PKG.
If you select Make PKG on a PS3_GAME folder, it will call the PS3RIP tool.
If you select Make PKG on a PS3_UPDATE folder, it will call the Create_PS3_EXTRA tool.
All tools are accessed from the PS3 Tools Menu. You can use it from other PS3 related tasks, like add links to your favorite scene news sites or open folders where you put your PS3 files. You can return to the menu clicking on the blue jewel icon.
For the PS3 Game Updates, it is suggested to set the target version to 3.60
If you need to remove ALL the file associations created by the tool, there is a .reg file in the tools folder.
For BruteForce, try extracting this AddOn (developed by andreus) in the scetool's folder (it should help to make the brute force work faster).
Big thanks to Asure, naehrwert, flatz, deank, andreus, PatrickBatman, BLKDTH, JLM, opoisso893, Matsumot0, catalinnc, and many others that I could be forgetting.
PS. The BruteForce/scetool does NOT crack NPDRM files (DLC or games) that require RIF/RAP/edats.
BruteForce/SCETool Decrypter Build 1.7.13:
I just updated the BruteForce to version 1.7.13 with the new option "Dont use tried_keys list"
BruteForce/SCETool Decrypter Build 1.7.14:
The testklic was using the default key version (I was not passing the key version as parameter).
BruteForce/SCETool Decrypter Build 1.7.15:
This new version has the "shutdown" option and prompt to auto-update the database when a new klic is found.
If shutdown option is active, it will not prompt and will auto-update the online database automatically.
A new button "Update KLICS.TXT" will download the latest klic.txt
if FixELF is called with any of the following options:
FixELF "24 13 BC C5 F6 00 33 00 00 00 36" "24 13 BC C5 F6 00 33 00 00 00 34"
FixELF "13 BC C5 F6 00 33 00 00 00 36" "13 BC C5 F6 00 33 00 00 00 34"
it will actually do the following search/replace:
"13 BC C5 F6 00 33 00 00 00 xx xx" --> "13 BC C5 F6 00 33 00 00 00 34 00"
"13 BC C5 F6 00 00 00 01 00 xx xx" --> "13 BC C5 F6 00 00 00 01 00 34 00"
"13 BC C5 F6 00 00 84 00 00 xx xx" --> "13 BC C5 F6 00 00 84 00 00 34 00"
"13 BC C5 F6 00 00 90 00 00 xx xx" --> "13 BC C5 F6 00 00 90 00 00 34 00"
(only if xx xx > 34 00 and the found address is aligned to 4)
BruteForce/SCETool Decrypter Build 1.8.1:
I updated the PKG Content ID (it also resigns SELF/SPRX/EBOOT)
The tool now first checks the current app type of each SELF/SPRX/EBOOT, then use it for resign the file.
I also rearranged a bit the options.
BruteForce/SCETool Decrypter Build 1.8.5:
Includes the new KLICS.TXT and can decrypt DEBUG EBOOT.BIN) - Everyone should say THANKS to Deank for the tip.
BruteForce/SCETool Decrypter Build 1.8.6:
Updated command line parameters for new klics.txt
BruteForce/SCETool Decrypter Build 1.9.0:
Added 2 new heuristic algorythms
Find the "drmKey" string in the decrypted EBOOT.ELF and test the text klicensee next to it
Test klicensees stored as text strings (ansi or unicode)
BruteForce/SCETool Decrypter Build 126.96.36.199:
There was a bug in the algorythm for "drmKey" (it was considering the klics in lower case as invalid)... but the 2nd algorythm should have worked.
Now it accepts the game folder as parameter, and scans all the sprx/self/eboot.bin. If the klic is found, the resigned files are moved to the original location.
If there is not an EBOOT.BIN in the BruteForce folder, it will ask for the game folder.
Also changed the priority of the tried keys validations... I hope that it helps a bit to improve the speed.
BruteForce/SCETool Decrypter Build 188.8.131.52a:
Updated the .ps3 with the proper keys provided by andreus in the testklic app (I'm still going to double check them)
Updated klics.txt with at least the following new klicensees (thanks to Omnomnom, catalinc and av)
Tested the Ridge Racer 7 with the updated .ps3 keys and it seems to be working fine again using testklic app by andreus.
BruteForce/SCETool Decrypter Build 184.108.40.206:
Updated the .ps3 keys folder based on ps3devwiki.com/wiki/Keys#Appldr
There was still errors in the proper keys included yesterday from testklic app by andreus. The drm-key-55 and drm-iv-355 were the 3.50 (rev 0x07 np). I also found other errors in the keys. Also included the keys in "key revision" format.
The BruteForce now calls the testklic app using "key revision" instead of "firmware version" (as requested by andreus).
Added BruteForce association to folders. Now you can decrypt/resign a PS3 game folder using Right-click -> BruteForce...
Internal changes: changed some static values to parametric values read from the registry.
Reverted the resign files (when encrypt: 3.55 option is selected) to use the keyset 0x0A (retail type 0). It was changed it in 220.127.116.11 to 0x0B (retail), but I forgot to revert it to 0x0A.
Updated the klics.txt with the klics of MAG update 2.12 (found Omnomnom) and Final Fantasy XIII-2 update 1.06 (posted to the online database)
BruteForce/SCETool Decrypter Build 18.104.22.168:
A minor validation to ensure that testklic is used only for NPDRM files
BruteForce/SCETool Decrypter Build 2.0:
I updated BruteForce to version 2.0... Sorry, but no fancy features. This new build now includes make_fself.exe and the GUI let you set the target system (CEX or DEX) for re-encryption.
The klic.txt also includes a new klicense collected through online database update 218A6FBF2865464A79399B6EEF54632A Champion Jockey: G1 Jockey & Gallop Racer [BLUS30863] [BLES01235] [BLJM60367] [JP0106-BLJM60367_00-GXGJPNPATCH00102]
BruteForce/SCETool Decrypter Build 2.0.1:
It now uses make_fself_npdrm.exe for NPDRM content and make_fself.exe for retail content.
The program uses make_fself_npdrm.exe or make_fself.exe when DEX is selected (depending if the files are NPDRM or retail). For CEX it still uses scetool.exe.
BruteForce/SCETool Decrypter Build 2.0.2:
Today I updated the BruteForce 2.0.2 package again... but this time the update is not related to any of the tools, but related to the ps3 keys (both .ps3 and SCETool's keys file).
Here is the background: Yesterday I decided to recheck the .ps3 keys and realized that it was a bit difficult to edit/fix the keys using just an hex editor. So I created this tool to review the keys and edit them with a little more ease.
BruteForce/SCETool Decrypter Build 2.0.3:
I can't believe that I missed the most simple KLIC test... (test decryption of SPRX/SELF without KLIC)... fixed in BruteForce 2.0.3
BruteForce/SCETool Decrypter Build 2.1.0:
Added conversion to fself (DEX), fixed issue with files with space in the file name
BruteForce/SCETool Decrypter Build 2.2.0:
It now integrates the "blazing fast" test tool by MAGIC333X
If the tool does not find it using this new tool, it continues using the old methods
If the key is found, the BruteForce resigns the EBOOT and self/sprx as usual.
Indeed I already integrated it in the scetool-BruteForce version 2.2.0.
BruteForce/SCETool Decrypter Build 2.2.3:
So I tweaked the tool in version 2.2.3, to set it to the improper parameter --self-app-version=0000100050000000, which returns the proper "App Version" 01.05. Other changes in version 2.2.3 are:
FixELF is now applied always to the EBOOT.ELF (before it was applied only if the key version was higher than 3.40)
testklic now uses the key revision from the SELF/SPRX (before it was using the key revision from the EBOOT.BIN)
Now using the KLicence Brute-force Tool v1.2 (2012/10/07) and showing a progress bar
Small speed improvement: if TITLEID is found in KLICS.TXT, it's the first klic to try (before it always tested first noklic)
BruteForce/SCETool Decrypter Build 2.2.5:
Setting the Self App version from PARAM.SFO is now an option
(if the SelfAppVersion is unchecked, the tool will use the App Version from the SPRX/SELF)
Testklic now uses the key revision from the SELF/SPRX (before it was using the key revision from the EBOOT.BIN) was not working properly... fixed in 2.2.5
Updated for klicensee detection tool by MAGIC333X (v1.2), always applies FixELF, now uses key rev from sprx/self
BruteForce/SCETool Decrypter Build 2.3.0:
Includes the klicencebruteforce 1.3 and an option to use (or not) the address range.
BruteForce/SCETool Decrypter Build 2.3.1:
Fixed some minor issues and tweaks
Added keys to KLICS.TXT
BruteForce/SCETool Decrypter Build 2.3.2:
Updated for klicensee detection tool by MAGIC333X (v1.3.1), updated KLICS.TXT
BruteForce/SCETool Decrypter Build 2.3.3:
It also includes my FixELF tool.
BruteForce/SCETool Decrypter Build 3.1.0:
It now has support for download the patch files on demand from the online database at github maintained by gingerbread.
The database currently has the patches for approximately 170 game ids. And considering that some patches can be used also on other versions/regions of the same game, it could grow easily to near 500 game ids.
I also added support for listing of grouped cheats.
BruteForce/SCETool Decrypter Build 3.8.14: New in this version: added to the patch engine a new function for ADD calculation in a range of bytes (ADD, WADD, DWADD, QWADD).
Tip: After you resign and replace your trophies, it is required to Rebuild Database through Recovery Menu, and launch a game that will do "Sync Trophies" on it's startup in order to get the trophies working properly.
Update: I have updated the PS3 keys tool to version 1.1. Now it can convert SCETool's keys file to .ps3 (click on the big blue icon) I used the .ps3, data/keys and ps3devwiki Keys article for a three-way comparison. And found some mistakes in SCETool's data/keys file and some missing keys in ".ps3" and others keys were wrong. Not to talk about all the mistakes in the PS3 dev wiki already discussed here some days ago. So I did the best that I could do and fixed the files included in the updated archive of BruteForce 2.0.2.
BruteForce 2.0.2 now uses unfself.exe to unself DEX files and unself.exe + scetool.exe for CEX files.
PS3 Keys 1.2
The tool now shows a visual alert (a red cross icon) when the key if found in the scetool's Keys file, but the revision in the file name doesn't match the revision found in the section of the Keys file. A green check mark icon means that it was found in the Keys file and matched the version/revision.
Since version 1.1, the tool allows to convert the scetool's Keys into .ps3 keys binary format. Click on the big blue icon for the menu... I know that menu it is not intuitive but I love to hide features.
PS3 Keys 1.3
Version 1.3 adds a report of keys in HTML and 'next' button to find the bad keys.
PS3 Keys 1.5
Bruteforce + Testklic not working key set problem fixed
PS3 Keys 1.5.1 / 1.5.2
Updated keys again
I just discovered that unself2 also can decrypt with klic. A little nasty, but it can.
1. Go to github.com/granberro/ps3tools, download and compile the tools with Cygwin.
2. Add the keys (ps3devwiki.com/files/devtools/ps3keys/) to your /home/xxxx/.ps3 folder
3. Add the missing npdrm keys (app-iv-102f, app-key-102f, app-pub-102f, app-priv-356, free_klicensee-key, klic-key, npdrm-const and rif-key) to .ps3 folder
4. Hex edit /.ps3/free_klicensee-key and put the klic there
5. Then "unself2 xxxx.self xxxx.elf" (it will give a warning, but compare the elfs with this and scetool, you will see they are the same)
So it does the same scetool does. Don't know if this is faster, but it works.
Finally of note, HoNo posted (via ps3club.ru/forum/showpost.php?&p=721795&postcount=1) what he claims were 3.70 keys (below) but they were quickly deemed fake as pictured HERE.