- Create a folder on your Desktop called
SDCARD. - Download and extract the latest Atmosphere to the folder
SDCARD. - Download and extract the latest Hekate to the folder
SDCARD. - Download and extract the latest Sys-Patch to the folder
SDCARD. - Search Google for
THZoria firmware files. Download the one matching the supported firmare and extract to a folder calledFirmwareinsideSDCARD. - Block Ninteno Servers.
- Navigate to your
SDCARDfolder on the Desktop. - Inside the
atmospherefolder, create ahostsfolder if it does not exist. - Navigate inside this
hostsfolder and copy the two text files:emummc.txtandsysmmc.txtfrom below.
- Navigate to your
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <?php | |
| // tfl-decrypt.php requires PHP 8.5+ | |
| // Single-file upload + decrypt + return JSON | |
| $privateKeyPath = '/var/www/private.pem'; // Configure this to the PEM format Tinfoil private key location (outside webroot). | |
| // Simple HTML form when no POST | |
| if ($_SERVER['REQUEST_METHOD'] !== 'POST') { | |
| echo '<!doctype html><html><head><meta charset="utf-8"><title>TFL -> JSON</title><style>body {image-rendering: pixelated; background: url("data:image/svg+xml;charset=utf-8;base64,PHN2ZyBvcGFjaXR5PSIwLjIiIHdpZHRoPSI4MDBweCIgaGVpZ2h0PSI4MDBweCIgdmlld0JveD0iMCAwIDgwMCA4MDAiIHhtbG5zPSdodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2Zyc+PGZpbHRlciBpZD0nbm9pc2VGaWx0ZXInPjxmZVR1cmJ1bGVuY2UgdHlwZT0nZnJhY3RhbE5vaXNlJyBiYXNlRnJlcXVlbmN5PScwLjY1JyBudW1PY3RhdmVzPSczJyBzdGl0Y2hUaWxlcz0nc3RpdGNoJyAvPjwvZmlsdGVyPjxyZWN0IHdpZHRoPScxMDAlJyBoZWlnaHQ9JzEwMCUnIGZpbHRlcj0ndXJsKCNub2lzZUZpbHRlciknIC8+PC9zdmc+"),linear-gradient(112.1deg, rgb(16, 19, 28) 11.4%, rgb(32, 38, 60) 70.2%); color: white; font-family: "Noto Sans", sans-serif; display: flex; just |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <?php | |
| require_once 'vendor/autoload.php'; | |
| use phpseclib3\Crypt\RSA; | |
| use phpseclib3\Crypt\AES; | |
| use phpseclib3\Crypt\PublicKeyLoader; | |
| // Load Tinfoil public key | |
| $publicPem = <<<EOD |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| XSendFile On | |
| XSendFileAllowAbove On | |
| RewriteEngine On | |
| RewriteBase /test/ | |
| # If it's not a real file or folder, route to index.php | |
| RewriteCond %{REQUEST_FILENAME} !-f | |
| RewriteCond %{REQUEST_FILENAME} !-d | |
| RewriteRule ^(.*)$ index.php [L] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <?php | |
| // Configuration values | |
| $expectedHauth = '0123456789ABCDEF0123456789ABCDEF'; | |
| $altHauth = 'FEDCBA9876543210FEDCBA9876543210'; | |
| $defaultHtml = "../index.html"; | |
| // Get HAUTH header | |
| $hauth = $_SERVER['HTTP_HAUTH'] ?? null; | |
| // Check if HAUTH matches expectedHauth or altHauth |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Sign Key Data: | |
| Modulus: | |
|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| |
| Exponent: | |
| 010001 | |
| P: | |
| FB5AA488479A690AD82994AA2D4F5F78174C8537CC7984B57ADCC6256AC3CEA72B62CDFCEBA1973DEF96C376FE3F314D3C9B55E2DC0AF343BAB6210DDD78986A25B82A6D2109981A7510ECFCC1D799675D6F93EE91614AF1C996416869AF837A65B8469BEC74D720FBB912E64B63BFCAC5C31BF873AF77EFF6B064ECA8C9AA41 | |
| Q: | |
| DCF39F646DF38C9038E7A0361521ABAF6E2A1D0E4D569A411F9B0FE16792124DECC5653138C4A7AD45A742EAE5BC007D6643BBF83E47B6584DDC537E454D15E490495C3B650C5E2D596522AB2191CAD5BAC218D753D77D8308A31D426B72C68DBD8B05B171AAE08 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import os | |
| import sys | |
| def split_file(input_file, chunk_size, output_folder): | |
| # Create a folder for the split files | |
| base_name = os.path.splitext(os.path.basename(input_file))[0] | |
| ext_name = os.path.splitext(os.path.basename(input_file))[1] | |
| output_folder_name = os.path.join(output_folder, f'{base_name}_split{ext_name}') | |
| os.makedirs(output_folder_name, exist_ok=True) | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import os | |
| import re | |
| import requests | |
| import zstandard | |
| import subprocess | |
| import shutil | |
| import time | |
| # Directory path to search | |
| search_directory = "/path/to/stash" |
python3 fakeshop.py
NewerOlder