Difference between revisions of "Talk:Tips"

Jump to navigation Jump to search
2,035 bytes added ,  16:57, 12 April 2018
no edit summary
(Created page with "=LF> New Methods= I guess here's where I'll write down my thoughts on asset extraction. From release / creation of the wiki up until Valentines 2017 I think, our (Raku and I'...")
 
 
(3 intermediate revisions by the same user not shown)
Line 1: Line 1:
=New Methods=
Unfortunately this will only work for textures, but it's the main use case we have anyways. The "new" future-proof method is using Nox with Ninja Ripper. Ninja Ripper hooks into Nox and reads its DirectX context, able to grab models, shaders, and textures, and spits them out as DirectX-compliant(?) assets. From there, you can use GIMP to read the DDS files, and flip them vertically.
We can still look towards decryption through snooping Assembly-CSharp.dll, but that's just to provide a smaller amount of convenience. With this new way, we don't have to bother compressing, transferring, unbundling, and sifting through Unity cached asset bundles, but instead, directly get to the goodies. In theory, this can also work with Utage, as they're already rendered too :upside_down:
Note: I necessarily won't write a guide, as my experience is very straightforward without any real modifications. However, this doesn't seem to work for others. Because of how little I did to get it working, I can't offer much advice on getting it working.
=LF> New Methods=
=LF> New Methods=
I guess here's where I'll write down my thoughts on asset extraction.
I guess here's where I'll write down my thoughts on asset extraction.
Line 11: Line 18:


--[[User:Mrquiggles|Mrquiggles]] ([[User talk:Mrquiggles|talk]]) 10:50, 9 April 2018 (CDT)
--[[User:Mrquiggles|Mrquiggles]] ([[User talk:Mrquiggles|talk]]) 10:50, 9 April 2018 (CDT)
To also put my thoughts into one place:
* https://github.com/DerPopo/UABE/issues/169 -> references needing Assembly-CSharp.dll
* http://devxdevelopment.com/ -> is able to at least get a peak at Assembly-CSharp.dll
* https://github.com/0xd4d/dnSpy -> allegedly can hook into C# calls
* https://www.alanzucconi.com/2015/09/02/a-practical-tutorial-to-hack-and-protect-unity-games/ -> mentions both diving into Assembly-CSharp.dll and a (probably simpler) way to just grab the geometry (hopefully it also grabs textures) itself.
The method seems to be:
* fork over money, cross fingers that Assembly-CSharp.dll is able to contain the decrypt function call, doing dubious and morally gray actions
or
* somehow magically intercept a bunch of calls on Android as referenced in the GitHub issue, going through the hell of finding a way to do it and where to hook and crossing fingers it works
--[[User:Mrquiggles|Mrquiggles]] ([[User talk:Mrquiggles|talk]]) 11:19, 9 April 2018 (CDT)

Navigation menu