32w ago - Following up on the PS3 KLicense Brute-force Tool release, this weekend PlayStation 3 scene developer Flat_z has made available a PS3 Disc Key Dumper, Klicensee Dumper and corresponding Data Dumper with details outlined below.
The klicensee_dumper should speed up the gathering of klicensees. One of dumpers is an alternative to klicensee bruteforcer which released before because some klicensee keys cannot be bruteforced. Klicensee is used to resign/decrypt/encrypt self/sprx/edat.
As for the other dumper (for a disc key), I'm writing a tool to decrypt/encrypt saves and resign them for your console...
73w ago - Shortly following the True Blue v2.4 PS3 dongle update below, today EussNL has made available an UnPKG'd / UnSELF'd version, the JB2 TB v2.4 payload and an IDA update which contains fixed EBOOT data for other PlayStation 3 developers.
From the ReadMe File: For those that have multiple external HDDs connected to your PS3 and are using the gameData.pkg (released a few weeks ago) this tool (tweak) may be helpful to you, so you don't have to be swapping USBs in order for the gameDATA app to see your current external HDD as the (1) main ext HDD.
So for those that have been enjoying the latest PSN DUPLEX backup games, but running out of internal HDD space, plus those that have more than one external HDD (and don't wish to be swapping the external HDDs so they can be identified as the (1) USB drive, this will help you.
100w ago - Today XDev shared a guide and video on how to transfer PS3 data from 3.65 to 3.55 Custom Firmware allowing PlayStation 3 CFW users to get their accounts that are on OFW to CFW.
To quote: This is useful for those that need to get PS3 DLC map packs accounts ect on their 3.55. Better doing this then having to readd accounts ect all over again after every data transfer like I was.
First off the regular PS3 needs to be on 3.65 Firmware. Your second PS3 needs to Be on a 3.55 CFW "Not Rebug"
122w ago - Update: PS3 hacker Graf_Chokolo has now shared news of a PlayStation 3 GameOS Hypervisor exploit (quoted below) and released a NPDRM Decryption Payload (GIT) for developers while JU57FL1P has decrypted an NCIS Eboot.
PlayStation 3 developers were previously unable to decrypt NPDRM EBOOT.BIN's (like those in PKG files) as the PS3's NPDRM encryption differed, but today Graf_Chokolo has figured out how to use appldr to decrypt NPDRM encrypted data from Sonic 4.
For those who haven't been following, prior to this PS3 hacking update Graf_Chokolo was working on porting the LV1 Exploit to GameOS mode.
Graf_Chokolo said the following, to quote: "Dumped appldr arguments for NPDRM decryption on 3.41. I'm able now to decrypt NPDRMs with appldr on 3.41. Thanks to Jack for his support.