Good time of day. Tell me what scripts you can open the file"tpkg" from Toyman, file ".zca" from Alawar and file ".pak" from Meridian' 93?
Toyman - https://yadi.sk/d/EBvpTEJgxEkRIw
Alawar - https://yadi.sk/d/ExRCr1xjPqQ6oA
Meridian' 93 - https://yadi.sk/d/ae_LVhHVCYbNzg
How to open ".tpkg", ".zca", ".pak"?
-
- Posts: 1383
- Joined: Sat Aug 09, 2014 2:34 pm
Re: How to open ".tpkg", ".zca", ".pak"?
1)
2) Script is https://aluigi.altervista.org/bms/dancing_craze.bms but your archive xor'ed with other key.
3) Seems data is obfuscated.
Code: Select all
# Toyman
idstring "tpkg"
get FILES long
get ZERO long
set OFFSET long 0
for i = 0 < FILES
get ZIP byte
get SIZE longlong
get ZSIZE longlong
get NAMESZ long
getdstring NAME NAMESZ
savepos OFFSET
if ZIP == 0
log NAME OFFSET SIZE
math OFFSET += SIZE
else
clog NAME OFFSET ZSIZE SIZE
math OFFSET += ZSIZE
endif
goto OFFSET
next i
2) Script is https://aluigi.altervista.org/bms/dancing_craze.bms but your archive xor'ed with other key.
3) Seems data is obfuscated.
-
- Posts: 53
- Joined: Mon May 27, 2019 10:04 pm
Re: How to open ".tpkg", ".zca", ".pak"?
Ekey wrote:1)Code: Select all
# Toyman
idstring "tpkg"
get FILES long
get ZERO long
set OFFSET long 0
for i = 0 < FILES
get ZIP byte
get SIZE longlong
get ZSIZE longlong
get NAMESZ long
getdstring NAME NAMESZ
savepos OFFSET
if ZIP == 0
log NAME OFFSET SIZE
math OFFSET += SIZE
else
clog NAME OFFSET ZSIZE SIZE
math OFFSET += ZSIZE
endif
goto OFFSET
next i
2) Script is https://aluigi.altervista.org/bms/dancing_craze.bms but your archive xor'ed with other key.
3) Seems data is obfuscated.
So there is no way to open archive 3 at all? And a bit not understood with 2 archive. The script seems to open it, but in fact there is nothing.
-
- Posts: 1383
- Joined: Sat Aug 09, 2014 2:34 pm
Re: How to open ".tpkg", ".zca", ".pak"?
Archive 2 > there is a script for unpacking this format, but need another xor key.
Archive 3 > data seems is obfuscated / encrypted.
In these two cases, reverse engineering is needed.
Archive 3 > data seems is obfuscated / encrypted.
In these two cases, reverse engineering is needed.