From 35ad671acf71a8f5a5615bf0fb4cfbb83adaf014 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?L=C3=A9o=20Lam?= Date: Mon, 19 Oct 2020 20:32:24 +0200 Subject: [PATCH] readme: Mention the SHA256 hash of the 1.5.0 NSO --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 20bd192e..35a88f01 100644 --- a/README.md +++ b/README.md @@ -47,6 +47,7 @@ To contribute to the project, you will also need: * These Python modules: `capstone colorama cxxfilt pyelftools` (install them with `pip install ...`) * The original 1.5.0 `main` NSO executable, converted to ELF format with [nx2elf](https://github.com/shuffle2/nx2elf). * Copy it to data/main.elf -- it is used for the diff script and other tools. + * The uncompressed NSO has the following SHA256 hash: `d9fa308d0ee7c0ab081c66d987523385e1afe06f66731bbfa32628438521c106` Experience with reverse engineering optimized C++ code is very useful but not necessary if you already know how to decompile C code.