You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
2. Use AssetStudio to extract all the .3d asset in pbtyes and scripts folder
3. Clone the following reop from Github
https://github.com/maodijim/pbtk
4. Convert all binary files to proto file
python <pbtk repo path>/extractors/from_binary.py <path to folder pbbytes asset extracted by AssetSutdio> proto
5. Install protobuf compiler
https://github.com/protocolbuffers/protobuf/releases/tag/v3.4.0
# or
go install google.golang.org/protobuf/cmd/protoc-gen-go@v1.25.0
6. Generate proto file for go
cd <pbtk repo path>/extractors/proto
protoc -I . --go_out=proto_go .\*.proto
# Once Done copy all .pb.go file to ROMProject/Cmds
7. Clone this project
https://github.com/maodijim/ROMEncryption
8. Export Table_exchange, Table_Item, Table_Skill_ClsBranch_* from script2 folder using AssetSutdio
9. Use ROMEncryption to decrypt table_exchange.bytes into table_exchange.lua
#Visual studio is needed to compile the .cs file https://visualstudio.microsoft.com/
# Java https://www.java.com/en/download/
Build ROMEncryption\UtinyRipper first then
Build ROMEncryption
Create folder rawlua at the ROMEncryption.exe folder
Run ROMEncryption.exe
10. Run ./tools/main.lua against table_exchange.lua to get the json formatted exchangeItems.json
11. Change the variable in_files to table_item.bytes path and run ./tools/key_val_to_json.py to get json formatted items.json
12. Change the variable in_files to parent folder path of Table_Skill_ClsBranch_* with only Table_Skill_ClsBranch_* files inside the folder then run ./tools/key_val_to_json.py to get skills.json