I’ve finally gotten around to finishing my SelfTool for manipulating Self and Sprx files. Self files are like exe files for the PS3 and Sprx files are like dll files for the PS3.
Among other things, SelfTool can be used to print out information stored in the file in a readable format to make studying them easier.
NOTE: This DOES NOT enable booting of copied games in any way. It also does not support decrypting or encrypting of self/sprx files. It is really only useful for those who are interested in looking a bit deeper at self/sprx files.
It’s good to see that people are still dedicated, excellent work xorloser.
keep up the good work, hopefully we will have a hello world on the PS3 somtime…
Looks interesting!
Can you compile you program for unix-like systems (elf binary instead of MS exe)?
tnx
Hello,
Your work is really amazing. I was wondering, could you provide more info on the mgs4 self files? I am not that knowledgeable on the current status of ps3 reverse engineering, but i have wanted to get a look at the unencrypted self and usrdir files. I am currently working on the mgs2 and mgs3 model, texture, and animation formats. I have read that some of the technique used in this game were similar and wanted to see if the methods that work on the previous games in the series work against this game if possible. The file extensions and directory structure are similar from what i can tell but i don’t know how to get past the disc encryption. Would really like to analyze these files further.
Any information you could provide would be greatly appreciated.
Thanks in advance.
Xorloser, what else will you do? I remember ArkTool. Excellent tool.
Does this only work on unencrypted SELFs?
This does not decrypt encrypted SELF files, however it is still able to get a fair bit of information from them which can be printed out to get clues about how a SELF works, where it loads to, what flags it uses etc.
Hi, nice posts there thank’s for the interesting information
Hi xorloser,
Your tool is very good, thanks.
Could you publish the source code behind your tool (to avoid losing time in reversing it 😉 ?
I have also triggered some crash when extracting some self files from the public PS3 dump archive.
Crash happen with files extracted at following offset:
0x006C25B4 with size 256KB -> Crash.
0x006D5470 with size 256KB -> return Error loading …
0x001624BC with size 256KB -> Crash.
Best Regards
TitanMKD
it crashes on those “files” because they are not full files, just the headers followed by garbage
also i do not plan to release the source code at this time, sorry
ha, somehow I spent the better part of last night looking for details on the self format, and I missed this page/tool!
Thanks a bunch…although I agree it’s a shame that we must reverse your tool in order to really see what’s going on
Did you ever find a way to convert Self files to eboot.bin files?
@Glen , if ur still having trouble try renaming the ‘.self’ to ‘EBOOT.bin’, this can be done by rightclicking>Rename… or if you have no access to a mouse, open run (Windowskey +r) type notepad.exe , press ENTER now type
@echo off
ren *.self *.self
SAVE AS “RenAll2Bin.bat”, in the same folder as all self files you want converted to .bin , for later renaming to EBOOT, Srry bout late answer it took me 4 years to work out myself
– TrecherousZ
@echo off
ren *.self *.BIN