60
edits
m (Cleanup text) |
(Finish/tweak requirements) |
||
Line 1: | Line 1: | ||
== What You Need == | == What You Need == | ||
* The latest release of {{GitHub|phacoxcll/cdecrypt/releases|phacoxcll's CDecrypt fork}} (the <code>CDecrypt.zip</code> file) | * The latest release of {{GitHub|phacoxcll/cdecrypt/releases|phacoxcll's CDecrypt fork}} (the <code>CDecrypt.zip</code> file) | ||
* The latest release of | ** Only a Windows build is provided, Mac and Linux users may need to manually compile the source code. | ||
** | * The latest release of [https://github.com/ihaveamac/nuspacker/blob/master/NUSPacker.jar?raw=true NUSPacker] (direct download) | ||
** NUSPacker requires that you have [https://www.java.com/en/download/ Java] installed on your system to work. | |||
* An image editor that supports the <code>.tga</code> image format | * An image editor that supports the <code>.tga</code> image format | ||
** These instructions will use [https://getpaint.net/download.html paint.net]. | ** These instructions will use [https://getpaint.net/download.html paint.net]. | ||
* The [https://gist.github.com/cm-360/696d84f674149a6caacb0cf78c894635 MetaVerify.py] script (click "Download ZIP" on the GitHub page to download) | |||
** This script requires that you have [https://www.python.org/downloads/ Python 3.7.4+] installed on your system to work. | |||
* The {{GitHub|dimok789/homebrew_launcher/releases/download/v2.1/homebrew_launcher_channel.v2.1.zip|Homebrew Launcher Channel v2.1}} (direct download) | * The {{GitHub|dimok789/homebrew_launcher/releases/download/v2.1/homebrew_launcher_channel.v2.1.zip|Homebrew Launcher Channel v2.1}} (direct download) | ||
* The <code>.rpx</code> file of whichever homebrew program you are making a channel for | * The <code>.rpx</code> file of whichever homebrew program you are making a channel for | ||
* The Wii U Common Key | * The Wii U Common Key | ||
** This is in the <code>otp.bin</code> file from your console's NAND dump. | ** This is in the <code>otp.bin</code> file from your console's NAND dump. Extract it using this [https://www.dropbox.com/sh/gxkf72jia1adpyg/AADjKnHiumn5XSiroEFfPkkWa/CommonKeyExtractor.zip?dl=1 Common Key Extractor]. Copy the key and save it in a text file somewhere; it will be needed later. | ||
** If you cannot get the extractor to work, the key can also be obtained by opening <code>otp.bin</code> in a hex editor, and is located at offsets <code>0x000000E0</code> to <code>0x000000EF</code>. If extracted correctly, it should be a 32-character long hexadecimal number starting with <code>D7B0</code>. | |||
== Section I - | == Section I - CDecrypt == | ||
== Section II - Editing code files == | == Section II - Editing code files == | ||
Line 17: | Line 20: | ||
== Section III - Editing meta files == | == Section III - Editing meta files == | ||
== Section IV - | == Section IV - NUSPacker == |
edits