This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Unpacking PRODINFO.bin [Certs and Keys] | |
# SocraticBliss (R) | |
import os, sys | |
Sections = [['device_cert_ecc_b233', 0x0480, 0x180, 'der'], | |
['ssl_cert', 0x0AE0, 0x800, 'der'], | |
['gamecard_cert', 0x2440, 0x400, 'der'], | |
['eticket_cert_rsa', 0x2A90, 0x240, 'der'], | |
['amiibo_key', 0x3520, 0x050, 'pem'], | |
['amiibo_cert_ecqv', 0x3580, 0x014, 'der'], |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@ECHO OFF | |
TITLE CertNXtractionPack by SocraticBliss and SimonMKWii (R) | |
ECHO: && ECHO PRE-REQUISITES: | |
ECHO -- Get your BIS Keys (via biskeydump) | |
ECHO -- Dump your SYSNAND (via hekate) | |
ECHO -- Decrypt your PRODINFO (BIS 0 Key) and Save to file - PRODINFO.bin to your working directory (via HacDiskMount) | |
ECHO -- keys.txt (ie. key = 32 digit hex value) file with the following keys... | |
ECHO --- master_key_00 | |
ECHO --- rsa_private_kek_generation_source |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from shutil import copyfile | |
from os import path | |
from subprocess import call | |
import hashlib | |
import sys | |
PATCHES = { | |
'FS-1.0.0-normal.vcdiff':'F01DAD47CC0561440246820AF7A60A0E49F91A64FB3528CEF5C3D0B8A9579C87', | |
'FS-1.0.0-exfat.vcdiff':'D723935EF9D4DFE4E145E8AA2CF0238A497B2978FDBF0BD01CABF695A285CE84', | |
'FS-2.0.0-normal.vcdiff':'002EB1C935A4E928054B1FB555C3DA2D40461A106061F506D1EB61F86B774244', |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# doc2dyn | |
# SocraticBliss (R) | |
import json | |
import os | |
import sys | |
def main(): | |
with open('dynlib.xml', 'w') as xml: | |
# Create the XML Header |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# A script for updating your ps4libdoc json files with additional names... | |
# SocraticBliss (R) | |
import json | |
import os | |
import re | |
import subprocess | |
import sys | |
def get_null_NIDs(): |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# cnmt de-struct-or | |
# SocraticBliss (R) | |
from struct import unpack as up | |
from binascii import hexlify as hx | |
''' | |
CNMT HEADER | |
title_id = up('<Q', cnmt[:0x8]) | |
title_version = up('<I', cnmt[0x8:0xC]) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# PS4 Signed ELF Parser | |
# SocraticBliss (R) | |
# Thanks to Znullptr and flatz <3 | |
from binascii import hexlify as hx | |
import struct | |
import sys | |
def self_header(file): | |
# MAGIC = 4F 15 3D 1D |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
''' | |
PS4 MONO binaries to IL MONO binaries by SocraticBliss (R) | |
The script recursively searches the directories for PS4 MONO DLL and EXE files, | |
finds the scekrit magic for them and then spits them out in the same directory... | |
1) Place this script in the top-most directory | |
2) python ps4_mono_to_il.py |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
:: SocraticBliss (R) | |
@ECHO OFF | |
TITLE Remote PS4 Package Installer | |
:: 0) Edit these | |
SET PS4=13.37.13.136:12800 | |
SET SERVER=13.37.13.137:8008 | |
:: 1) Check if the CUSA is already installed or not | |
SET CUSA=%~nx1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
//------------------------------------------------ | |
//--- 010 Editor v9.0 Binary Template | |
// | |
// File: PS4_SELF.bt | |
// Authors: SocraticBliss | |
// Version: 1.0.0 | |
// Purpose: 1) Decode the Signed ELF format for the PS4 (64 bit) | |
// 2) Decode the ELF program and section headers | |
// | |
// Category: Game |
OlderNewer