The VG Resource

Full Version: Is it possible to rip audio from Ninja Storm 4 yet?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
So I'm already able to extract the Ninja Storm 3 xfbins by converting them to a .nub file but that method doesn't work for the files from Storm 4 because (apparently) they contain a NUS3BANK within them. Is there anyone out there who's been able to crack them by chance? Here's the file if you'd like to take a look
Yes, those files have been cracked for the longest while.

I just have to find my steps but its pretty easy its about as easy as ripping dragon ball z xenoverse files.

Ok here goes.

1. You will need QuickBMS from aluigi.
2. A blank notepad to copy this code into

idstring "NUCC\x00\x00"
endian big

findloc CHECK string "NUS3"
if CHECK == ""
cleanexit
else
set SNUM = 0
for
findloc OFFSET string "BNSF"
if OFFSET == ""
cleanexit
else
goto OFFSET
get DUMMY long
get SIZE long
get BNAME basename
math SIZE + 8
string NAME p "%s_%02d.bnsf" BNAME SNUM
log NAME OFFSET SIZE
math OFFSET += SIZE
math SNUM + 1
endif
next
endif

---

Once you have that you go to quickBMS select the note that you pasted the script into then select the xbin. That should allow you to get all of the bnsf files that you can open with Foobar2000. This method works for all of the Languages as well.

Credit to Aluigi and Ssh from zenhax for the decyption code.
(12-06-2017, 01:40 AM)TheWinter Wrote: [ -> ]Yes, those files have been cracked for the longest while.

I just have to find my steps but its pretty easy its about as easy as ripping dragon ball z xenoverse files.

Ok here goes.

1. You will need QuickBMS from aluigi.
2. A blank notepad to copy this code into

idstring "NUCC\x00\x00"
endian big

findloc CHECK string "NUS3"
if CHECK == ""
 cleanexit
else
 set SNUM = 0
  for
   findloc OFFSET string "BNSF"
    if OFFSET == ""
     cleanexit
    else
     goto OFFSET
     get DUMMY long
     get SIZE long
     get BNAME basename
     math SIZE + 8
     string NAME p "%s_%02d.bnsf" BNAME SNUM
     log NAME OFFSET SIZE
     math OFFSET += SIZE
     math SNUM + 1
   endif
  next
endif

---

Once you have that you go to quickBMS select the note that you pasted the script into then select the xbin. That should allow you to get all of the bnsf files that you can open with Foobar2000. This method works for all of the Languages as well.

Credit to Aluigi and Ssh from zenhax for the decyption code.
OMG! I assumed this thread was dead so sry for the late reply. You are seriously my new hero, it worked like charm! I've been wanting to extract these sounds soooooooo badly so I am extremely grateful for u helping me out. Thanks so much!!!
(12-10-2017, 03:32 AM)BradLeeTee Wrote: [ -> ]
(12-06-2017, 01:40 AM)TheWinter Wrote: [ -> ]Yes, those files have been cracked for the longest while.

I just have to find my steps but its pretty easy its about as easy as ripping dragon ball z xenoverse files.

Ok here goes.

1. You will need QuickBMS from aluigi.
2. A blank notepad to copy this code into

idstring "NUCC\x00\x00"
endian big

findloc CHECK string "NUS3"
if CHECK == ""
 cleanexit
else
 set SNUM = 0
  for
   findloc OFFSET string "BNSF"
    if OFFSET == ""
     cleanexit
    else
     goto OFFSET
     get DUMMY long
     get SIZE long
     get BNAME basename
     math SIZE + 8
     string NAME p "%s_%02d.bnsf" BNAME SNUM
     log NAME OFFSET SIZE
     math OFFSET += SIZE
     math SNUM + 1
   endif
  next
endif

---

Once you have that you go to quickBMS select the note that you pasted the script into then select the xbin. That should allow you to get all of the bnsf files that you can open with Foobar2000. This method works for all of the Languages as well.

Credit to Aluigi and Ssh from zenhax for the decyption code.
OMG! I assumed this thread was dead so sry for the late reply. You are seriously my new hero, it worked like charm! I've been wanting to extract these sounds soooooooo badly so I am extremely grateful for u helping me out. Thanks so much!!!
No problem, the codes were just released months ago.