/TADpole

Primary LanguagePythonMIT LicenseMIT

Notice

You can use DSIHaxInjector for seedminer instead of this program. This is a cloud based version of TADpole and it's easier to use because of its user-friendly web interface.

Requirements

  • Windows - adapting to Linux is possible
  • Python 2.x.x or 3.x.x - official download
  • Pycryptodomex - install with pip install pycryptodomex
  • A DSiWare export from your target console - must be DSihax injectable (see list of injectable games). EA Sudoku is recommended for US/EU -- if you don't have one already on the list.
  • A movable.sed from your target console - see README in latest seedminer release
  • A valid ctcert.bin with private key attached from a CFW console - see instructions below for guidance. You might also be able to find one online, but it may not be valid. I can confirm the one with SHA256 dc2a92d2c2f7cf444ff1343ecf1224c4e9e49daff79ae02d72585b850af0ad4e is valid, though.
  • Sudokuhax injection files for TADpole - download appropriate set from this link

Usage

Basic Command Line usage is:

Dump
python TADpole.py (8-digit hex).bin d
Rebuild
python TADpole.py (8-digit hex).bin r

Seedminer Instructions:

  1. Download and extract latest release of TADpole
  2. Copy the injectable DSiWare game from System Memory to your SD card via 3DS System Settings
  3. Copy the exported DSiWare game from your SD card (in your-sd-card/Nintendo 3DS/ID0/ID1/Nintendo DSiWare/) to the extracted TADpole folder on your PC. It might look like 4b4c4455.bin, for example. The hex number will be different of course.
  4. Place movable.sed in .../TADpole/resources/
  5. Place ctcert.bin in .../TADpole/resources/
  6. Dump the exported DSiWare .bin by drag n dropping it on dump.bat.
  7. Place both sudokuhax injection files (public.sav.inject and srl.nds.inject) inside the generated game folder
  8. Rebuild the modified game folder by drag n dropping the DSiWare .bin on rebuild.bat
  9. Copy the built .patched file to the .../Nintendo DSiWare/ folder in your SD card and replace the original DSiWare export with it by removing .patched from the filename
  10. Proceed to import the DSiWare to your system memory from your SD card
  11. Download b9sTool and place the boot.nds on your SD root
  12. Proceed with steps in Section VI of 3ds.guide

Note: more detailed instructions with screenshots can be found here (may be deprecated)

Obtaining ctcert.bin plus private key - (can also be found online - no hints!)

Warning: the following steps require access to a 3DS with Custom Firmware (an already hacked 3DS)

  1. Install the seedstarter.cia found in the seedminer release section
  2. Place ctcertifier.firm in /luma/payloads/ of your SD card if you have Luma3DS installed or else somewhere where you can execute it via a chainloader
  3. Turn on your 3DS and run seedstarter.cia
  4. Press Y to dump ctcert.bin (missing private key) to sdmc:/seedstarter/ctcert.bin
  5. Turn off your 3DS
  6. Run ctcertifier.firm by holding Start and turning the 3DS on when you have Luma3DS installed
  7. Copy ctcert.bin from sdmc:/seedstarter/ctcert.bin to your TADpole location, and put it in the resources/ folder
  8. Done

Additional Notes

  • If you perform a System Transfer from console A to console B, the movable.sed from console A (pre-transfer) will be identical to the movable.sed for console B (post-transfer).
  • The release archives include an .exe if you want to avoid installing python2, python3, or python in general.

Thanks