rverse2
ninfs
rverse2 | ninfs | |
---|---|---|
1 | 9 | |
85 | 414 | |
- | - | |
6.5 | 7.6 | |
3 months ago | about 1 month ago | |
CSS | Python | |
Apache License 2.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
rverse2
-
Rverse Jailbreaked for 3ds. needs universal updater.
I already knew about Rverse, but upon further inspection, this looks like an old version of Rverse. The newest verion can be found here. (source code) (releases)
ninfs
-
How to transfer game data to new jailbroken 3ds
If it was ever jailbroken, check your backups and SD card for files named movable.sed or essential.exefs (which contains a copy of movable.sed). If you can get the console to boot just far enough to load Godmode9, you can obtain this. (Even with broken screens -- you just need another console to play along on or someone writing down the button sequence because you're flying blind.) Either of these files can be used to decrypt the saves stored on the SD card using ninfs.
-
I ran over my 3ds
If you have the movable.sed file from your old 3DS (or essential.exefs, which contains this), then you can use ninfs
-
my question gave my intentions clearly that i dont plan to downgrade my OS to 64bit
Python programs are not real programs
-
Is there a way to fix this?
Thank you so much for the info. As you said, I got the same answer on discord but at least I can try to figure out my nand backup with ihaveamac/ninfs
-
Problem with NAND (/How do I extract shit from a bin file)
You can try ninfs but since the NAND is encrypted, it requires that you have dumped your boot9.bin as well.
-
Is it possible to bypass the 3ds system check so I can get a nand backup?
You can find movable.sed at bytes 0x600-0x73F in essential.exefs. It’s also contained at 0x800-0x93F in a GodMode9 NAND backup if you have one. With this, you can use ninfs to browse the decrypted SD contents and back up your games and saves (you will need the file boot9.bin, which you might have backed up as _boot9_##.bin, but it’s the same for all systems so you can back it up from another 3DS if needed). I think ninfs can also open essential.exefs and get movable.sed for you. You can also use ninfs to browse a NAND backup.
-
A: Drive Deletion
Alright, so I've clearly got an extremely thick skull and when I was trying to decrypt a .3ds file, the decryption tool (https://github.com/ihaveamac/ninfs/releases) somehow made a new drive on my computer, which I am now stuck with... Does anyone know how to get rid of it?
-
How can I decrypt/rencrypt a DSi NAND for experimenting
ninfs works pretty well, on Windows you'll also need OSFMount to mount the disk images.
-
Can’t find Romfs file
You can use ninfs to mount .3DS and dump romfs.bin on your PC. https://github.com/ihaveamac/ninfs
What are some alternatives?
fastboot3DS - A homebrew bootloader for the Nintendo 3DS that is similar to android's fastboot.
GodMode9 - GodMode9 Explorer - A full access file browser for the Nintendo 3DS console :godmode:
rverse-Releases - A repo for posting rverse releases
fann - Official github repository for Fast Artificial Neural Network Library (FANN)
TWiLightMenu - DSi Menu replacement for DS/DSi/3DS/2DS
tgcloud - Opensource Telegram based cloud storage
Reverse - Deprecated Miiverse clone framework, for 3DS and Wii U
gitfs - Version controlled file system
botw - Parameter files in a human readable format. Models, sound files, etc. and any other copyrighted content ARE NOT INCLUDED. This CANNOT be used to play the game.
3dsconv - Python script to convert Nintendo 3DS CCI (".cci", ".3ds") files to the CIA format
irccloud-desktop - IRCCloud Desktop App
cia-unix - Decrypt CIA/3DS roms in UNIX environments (Linux and macOS)