
Example all .dds: Coming soon
Code: Select all
for %%G in ("*.dds") do okami-encdec.exe -id "%%G"
Code: Select all
# script for QuickBMS http://aluigi.altervista.org/quickbms.htm
encryption blowfish "YaKiNiKuM2rrVrPJpGMkfe3EK4RbpbHw"
get SIZE asize
get NAME basename
get EXT extension
string NAME + _decrypted.
string NAME + EXT
log NAME 0 SIZE
Acewell wrote:your samples look encrypted to me, i know it isn't xor, maybe rotate?, or some other 64 bit
block encryption, i don't know a whole lot about encryption so maybe aluigi can see more.
edit
apparently they are blowfish encrypted with 256 bit key
http://forum.xentax.com/viewtopic.php?p=136295#p136295
for batch decrypting your samples with ffgriever's tool you can use this bat file![]()
Code: Select all
for %%G in ("*.dds") do okami-encdec.exe -id "%%G"
you can open the decrypted dx10 dds with Noesis
also i guess you could use any of the parameters and not just "-id" because he said
pay no mind to the decompression/compression stuff for it was copied from another source.
i just used "-id" here because it was the first i tried and it worked.![]()
edit2
thanks to ffgriever for kindly sharing the key, i just made a bms script for fun to decrypt the files with it![]()
Code: Select all
# script for QuickBMS http://aluigi.altervista.org/quickbms.htm
encryption blowfish "YaKiNiKuM2rrVrPJpGMkfe3EK4RbpbHw"
get SIZE asize
get NAME basename
get EXT extension
string NAME + _decrypted.
string NAME + EXT
log NAME 0 SIZE