Jump to content

Reisyukaku

Innovator
  • Posts

    140
  • Joined

  • Last visited

Everything posted by Reisyukaku

  1. Sorry, I ment it generated the exefs, exheader, and the romfs. and it's the ~2GB file i'm using. keyX is probably wrong.. thats the only other thing i can think of.. otherwise you could try using ctrtool to decrypt it
  2. 3? Should only be 1 (ignore anything that says CTAP on it) the romfs xorpad should be ~2GB for ORAS That's a very very broad question. Check the tuts for reference I guess, or just experiment with the files.. when you dump the contents of romfs, you'll get a bunch of compressed files, so decompress those and check out the files inside.
  3. Well save edit and PC edit are literally the same thing.. one just has more options.. Also it only edits ram, in real time, when the exploit is ran, so you can delete it all off your SD with no problems.
  4. Well Pkhex is written in C# and android is developed in Java, so there's that.. wouldn't be incredibly hard to port but i don't think its a very feasible platform to gen mons on.
  5. Sorry you feel that way, but try compiling from source or something instead of continually being rude in my thread. I dont own windows 8, therefore it's hard to troubleshoot the issue. As I've said before, other windows 8 users have had problems said that running it off a flash drive worked. The people i've got to beta test on win8 said it ran fine without a flashdrive even, so check your installation as well. It's a mystery problem
  6. Updated the program to have fancy new change color of render background options. And tutorials are soon to come (due to popular demand). A placeholder is there for now but be sure to check up on that.
  7. heh, if you have 9.2 or under, use gateway launcher
  8. both i guess Also just skip the update stuff or edit exheader (byte 0xE is 3, make if FF)
  9. Sure, just remember to give credit if used in vid or something =) http://reisyukaku.org/prog/#May
  10. It's not that hard and definitely not magic, lol. The exploit allows you to run ARM11 code on the GPU, and since the GPU can access all kinds of neat things, we used the GPU calls to dump ram, edit ram in a buffer and flush ram back. Voila. (I wish i looked into this earlier instead of cfw, lol)
  11. dat messy source =) (anyways, worked fine when i tested it)
  12. Ok try this guys. (for those that want tid/sid) Just make sure that the first mon in your PC is actually yours, and then when you get that debug file, drag it onto the batch file in here. boxdata.bin_reader.zip
  13. with a hex editor.. I guess i could write a quick program in C to parse this info for people, lol.
  14. that file has pokemon data in it..you should just be able to copy a pokemon out into a .ek6 file and load into pkhex.. PC mons are 0xE8 bytes long. yep, you can.. theres a ramdump script on the github in the OP
  15. Please stop spamming the thread. Check names of files, that both are there, cache/cookies cleared, and that you're launching the exploit while in game..
  16. (^: Sounds like a bad egg.. check to make sure the mon on your SD is good. and that the file is named properly etc..
  17. hmm.. and y'all have both code.bin and pokemon.ekx on SD? Assuming so, im not sure what else could go wrong.. maybe try what i do and clear browser crap, and quickly go back to home menu and just make qr codes for the links, lol
  18. Sounds like the payload isnt executing.. try clearing browser history etc.
  19. hmm.. so ekx worked but not ek6? .. guess the kernel doesnt like numbers
  20. Just swapping the names is how i did it.. also check around 315 and 171. there should be 2 models of may.. both with diving stuff on.. those are your normal OW models (the mask is just there because its part of the model that only renders when under water..)
  21. I heard loading it on a flash drive works. idk
  22. Theres only an overworld model for her.. try about 180 - 190 in a/0/2/1
×
×
  • Create New...