Skip to content

ihaveamac/TADpole

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Requirements

  • Windows - adapting to Linux is possible
  • Python 2.x.x - official download
  • Pycryptodomex - install with pip install pycryptodomex
  • A DSiWare export from your target console - must be DSihax injectable (see list of injectable games)
  • A movable.sed from your target console - see README in latest seedminer release
  • A valid ctcert.bin with private key attached from a CFW console - see instructions below for guidance
  • Sudokuhax injection files for TADpole - download appropriate set from this link

Usage

  1. Download and extract latest release of TADpole
  2. Copy the injectable DSiWare game from System Memory to your SD card via 3DS System Settings
  3. Copy the exported DSiWare game from your SD card (in your-sd-card/Nintendo 3DS/ID0/ID1/Nintendo DSiWare/) to the extracted TADpole folder on your PC. It might look like 4b4c4455.bin, for example. The hex number will be different of course.
  4. Place movable.sed in .../TADpole/resources/
  5. Place ctcert.bin in .../TADpole/resources/
  6. Inside Command Prompt, navigate to the extracted TADpole folder:
cd wherever-it-was-extracted/TADpole
  1. Inside Command Prompt, dump the exported DSiWare game with:
python TADpole.py (8-digit hex).bin dump
  1. Place both sudokuhax injection files (public.sav.inject and srl.nds.inject) inside the generated game folder
  2. Inside Command Prompt, rebuild the modified game folder with:
python TADpole.py (8-digit hex).bin rebuild
  1. Copy the built .patched file to the .../Nintendo DSiWare/ folder in your SD card and replace the original DSiWare export with it by removing .patched from the filename
  2. Proceed with steps in Section V of 3ds.guide

Note: more detailed instructions with screenshots can be found here

Obtaining ctcert.bin plus private key

Warning: the following steps require access to a 3DS with Custom Firmware (an already hacked 3DS)

  1. Install the seedstarter.cia found in the seedminer release section
  2. Place ctcertifier.firm in /luma/payloads/ of your SD card if you have Luma3DS installed or else somewhere where you can execute it via a chainloader
  3. Turn on your 3DS and run seedstarter.cia
  4. Press Y to dump ctcert.bin (missing private key) to sdmc:/seedstarter/ctcert.bin
  5. Turn off your 3DS
  6. Run ctcertifier.firm by holding Start and turning the 3DS on when you have Luma3DS installed
  7. Copy ctcert.bin from sdmc:/seedstarter/ctcert.bin to your TADpole location, and put it in the resources/ folder
  8. Done

Additional Notes

  • If you perform a System Transfer from console A to console B, the movable.sed from console A (pre-transfer) will be identical to the movable.sed for console B (post-transfer).
  • Examples of how to run the python commands are provided in .bat scripts.
  • The release archives include an .exe if you want to avoid installing python2 or python in general.

Thanks

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 99.0%
  • Batchfile 1.0%