To quote: Finally I was able to find the time to port my dumpers on 4.21 CFW. There were some problems while porting from 3.55 to 4.xx and hopefully all of them were fixed.
These dumpers are not required to work with previous tool called Data Ddumper because they just write all data directly to the corresponding file on /dev_hdd0/tmp. All dumpers were tested on 4.21 REX and should works fine if you do the process correctly.
Example from KDSBest in REX 4.21:
; "Kindoms of Amalur"
61w ago - Following up on the PS3 KLicense Brute-force Tool release, this weekend PlayStation 3 scene developer Flat_z has made available a PS3 Disc Key Dumper, Klicensee Dumper and corresponding Data Dumper with details outlined below.
The klicensee_dumper should speed up the gathering of klicensees. One of dumpers is an alternative to klicensee bruteforcer which released before because some klicensee keys cannot be bruteforced. Klicensee is used to resign/decrypt/encrypt self/sprx/edat.
As for the other dumper (for a disc key), I'm writing a tool to decrypt/encrypt saves and resign them for your console...
67w ago - Following up on the previous update, today I am releasing my True Blue USB dongle PS3 ELF dumper which works with any PlayStation 3 Firmware greater than 3.56 to dump the encrypted TB EBOOT / ELF files once they are loaded.
72w ago - This weekend Spanish PlayStation 3 developers at DemonHades have made available a PS3 eEID0 Dumper for JBM 3.55, MA 3.56 and PlayStation 3 CFW 3.55 alongside a ConfEditor for TheGrid.
To quote, roughly translated: eEID0 Dumper by BlackDeath to JBM 3.55, MA 3.56 and CFW 3.55
Hello friends, after the method of filtration CEX2DEX the team decided to investigate this new field (for some) and not so much for others, that is why we are working to bring you the easiest method to move to Linux without requiring DEX.
Today I present created by the dumper EID0 blackdeath with which we can dump all EID0 or directly CEX first section with only launch a pkg and have connected a USB port on dev_usb000, the instructions are on screen and are easy:
START: To dump all EID0.
SQUARE: To dump the first section of EID0 directly (eid0_1st_Section_CEX.bin).
X (EQUIS): To dump metldr (Encryption) to USB and be prepared to exploit and get the dump of the decrypted metldr in subsequent steps.