the decryption is real
I reimplemented the decrypt method and gave you a command prompt
Note
All data is stored in little-endian This means that the lowest value number comes first, instead of last.
Say x
(32-bit integer) = 10 00 00 00
(in hex),
In big-endian, this would be equal to 268435456
, however in little-endian this is equal to 16
.
I will probably work on cleaning up the method but for now it works so it's fine I guess? Anyway, the structure of the decrypted file is quite simple.
You can see this by opening the prompt and simply typing "raw
" (to look at the bytes like \xFF\x00\xFF\x00
...) or "raw-s
" (same as raw, but instead of byte view it converts bytes to characters like "a b c d
" [accounted for unicode])
There is no file header, the data just flows.