I wanted to contribute to the scene , so I coded a tool that might help the community our members and fellow dev’s.This Tool is intended for dev’s so please be careful if you don’t know what you do.I will not be held responsible for any harm
My tool is a emulator for PS3 modules (e.g metldr), it is in pre alpha stage but I thought, it would be great to get some community feedback.
alpha2 > pre alpha so it is not in pre alpha stage anymore. It detecs code modifications on the fly too. The new feature list is not complette that's my fault I guess.
Thanks for the news update. I need some infos from some reversers to create the next stunning feature:
Crypto dumping... dumps all crypto calls... Let's call it function parameter dumping cause it will work for everything and will implement a callback on known functiins which will make dumping at certain calls possible.
I try to implement this and GET/PUT DMA commands this weekend. I think I can't finish it this weekend, but this will be the beta stage. V0.9 should then just implement the rest of the commands that anergistic implements.
After that it is unknown what I do and so on. Since then my reversing starts to get more focus.
How to use:
Not all SPU Commands are implemented yet, but it is easily extendable and I will make it support DMA, all SPU Commands and SPU Mailbox soon.
First open a .kds file. Check out the metldr.kds to see an example. The rest is like a normal debugger.If you put dumps of your reversed functions in the KnownFunctions folder, it will detect it and mark that function for you.
Just for example Mark the whole cellSpuAesDecryptCbcCfb128 function in HexView in IDA -> Right Click -> Save to FileName the File "cellSpuAesDecryptCbcCfb128" without extension and copy it to the KnownFunctions Directory of the Emulator. Now all similar functions get automatic detected!
"Step" Executes next command, "Run" runs till breakpoint (Breakpoints are not implemented yet).Debug SPU Code in Windows.
Subscribe for Latest News