A Python script that decrypts Neverness to Everness's encrypted .ini configuration files. The game uses AES-256-ECB encryption with Base64 encoding per line and |SPLIT| as a line separator. The AES key was located at sub_141592120 in HTGame_dump.exe via reverse engineering.
Useful for reading and researching the game's internal configuration data.
Details:
Encryption: AES-256-ECB + Base64, PKCS7 padding
Separator: |SPLIT|
AES Key: UVbP6pjjw5KZhvddie3tfhg1pVkkveY8
Key Source: sub_141592120 in HTGame_dump.exe
Requirements:
Python: 3.x
Library: pycryptodome or pycryptodomex
Install with:
Usage:
Decrypt a single file:
Decrypt an entire directory of .ini files:
Decrypted files will be saved to ./decrypted by default if no output directory is specified.
Useful for reading and researching the game's internal configuration data.
Details:
Encryption: AES-256-ECB + Base64, PKCS7 padding
Separator: |SPLIT|
AES Key: UVbP6pjjw5KZhvddie3tfhg1pVkkveY8
Key Source: sub_141592120 in HTGame_dump.exe
Requirements:
Python: 3.x
Library: pycryptodome or pycryptodomex
Install with:
Code:
pip install pycryptodome
Usage:
Decrypt a single file:
Code:
python NTE_decrypt_ini.py path/to/file.ini
Code:
python NTE_decrypt_ini.py path/to/ini_folder output_folder