https://github.com/llamaware/llamatoolkit
Decompilation toolkit for The Coffin of Andy and Leyley
https://github.com/llamaware/llamatoolkit
reverse-engineering rpg-maker-mv
Last synced: 12 months ago
JSON representation
Decompilation toolkit for The Coffin of Andy and Leyley
- Host: GitHub
- URL: https://github.com/llamaware/llamatoolkit
- Owner: Llamaware
- License: other
- Created: 2024-02-26T07:35:04.000Z (about 2 years ago)
- Default Branch: master
- Last Pushed: 2024-08-14T01:32:53.000Z (over 1 year ago)
- Last Synced: 2025-03-24T06:45:16.692Z (about 1 year ago)
- Topics: reverse-engineering, rpg-maker-mv
- Language: JavaScript
- Homepage:
- Size: 356 KB
- Stars: 6
- Watchers: 1
- Forks: 1
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE.txt
Awesome Lists containing this project
README
# LlamaToolkit 2.0
[](https://github.com/me-shaon/GLWTPL)

A decompilation toolkit for The Coffin of Andy and Leyley.
### Prerequisites
To run the compiled binaries, you need the .NET 8.0 Runtime to be installed.
You need a Node.js installation to use the deobfuscator.
### Usage
Place the program and the `llama` folder in the main directory that contains `Game.exe` and run LlamaToolkit from the command line.
```
LlamaToolkit
```
### Decrypt
Only `.k9a` files can be decrypted. The filenames of all encrypted files must be unchanged.
Arguments:
`inputFileOrDir`: Specify the input directory or file. If directory, it will traverse all folders in the directory recursively.
`outputDir`: Specify the output directory.
You must pass both arguments at once. Both relative and absolute paths are supported.
If no arguments are provided, LlamaToolkit will only check the `audio`, `data`, and `img` folders in the game directory.
```
LlamaToolkit decrypt
```
### DeDRM
Allows the game to be launched without Steam.
Arguments:
`gameDir`: Specify the game directory.
If no arguments are provided, LlamaToolkit will assume that it is currently inside of the game directory.
```
LlamaToolkit dedrm
```
### Extract and Deobfuscate (Automatically)
Go to the `llama/decode-js` folder and use `npm i` to install dependencies.
Then run the command:
```
LlamaToolkit autopwn
```
If no arguments are provided, LlamaToolkit will assume that it is currently inside of the game directory.
This command will carry out the following operations:
1. Inject the code extractor into the game.
2. Launch the game and dump obfuscated code to `input.js`.
3. Kill the game.
4. Remove the code extractor from the game.
5. Deobfuscate the code in `input.js` and save it to `output.js`.
### ReDRM
Restore the DRM.
```
LlamaToolkit redrm
```
### Extract and Deobfuscate (Manually)

Acquire the obfuscated game code by injecting a script into the game:
```
LlamaToolkit extract
```
The game will dump obfuscated code to a new file named `input.js` on the next startup.
Run the deobfuscator on this file:
```
LlamaToolkit deob input.js
```
The new file will be saved to `output.js`.
Remove the code extractor from the game:
```
LlamaToolkit restore
```
### Credits
LlamaToolkit uses the `Jering.Javascript.NodeJS` package, which has its own [license](https://github.com/JeringTech/Javascript.NodeJS/blob/master/License.md).
The deobfuscator uses [decode-js](https://github.com/echo094/decode-js), which is licensed under the MIT License.

*Last updated 8/13/2024 for game version 2.0.14*