A Python script that decrypts Neverness to Everness's encrypted .ini configuration files. The game uses AES-256-ECB encryption with Base64 encoding per line and |SPLIT| as a line separator. The AES key was located at sub_141592120 in HTGame_dump.exe via reverse engineering.
Useful for reading and researching the game's internal configuration data.
Details:
Encryption: AES-256-ECB + Base64, PKCS7 padding
Separator: |SPLIT|
AES Key: UVbP6pjjw5KZhvddie3tfhg1pVkkveY8
Key Source: sub_141592120 in HTGame_dump.exe
Requirements:
Python: 3.x
Library: pycryptodome or pycryptodomex
Install with:
Code:
pip install pycryptodome
Usage:
Decrypt a single file:
Code:
python NTE_decrypt_ini.py path/to/file.ini
Code:
python NTE_decrypt_ini.py path/to/ini_folder output_folder
Upload Permission:
- You are strictly forbidden from uploading this file to any other website.
Credits by anonymous