There are two tools you can use to decrypt and extract updates.
* [unsega_v0.1727.exe](./Unsega/unsega_v0.1727.exe): Fast but closed source.
* [fsdecrypt.exe](./Fsdecrypt/fsdecrypt.exe): Slow but open source.
Unsega is sourced directly from 1cc and should be totally safe but if you don't feel like running shady .exe's, you can build fsdecrypt from source instead.
Both tools do exactly the same thing and work in a very similar way so use whatever you like.
### .app decryption and extraction
1) Drag and drop the .app file on [unsega_v0.1727.exe](./Unsega/unsega_v0.1727.exe) or [fsdecrypt.exe](./Fsdecrypt/fsdecrypt.exe)
2) Mount the resulting .vhd(unsega) or .ntfs(fsdecrypt) file with [osfmount.exe](./Extra/osfmount.exe) (using default settings)
3) Copy the internal_x.vhd partition from the vhd you just mounted.
* If the extracted vhd is named **internal_0.vhd**, you can just double click it to open it.
* If the extracted vhd is named **internal_X.vhd** where X is anything else than 0, you'll need to merge the file with a base update first! See [Merging incremental updates](#merging-incremental-updates)
You'll need to install the [ExFat7z](./Extra/ExFat7z/) 7zip plugin before proceeding. Install instructions are in the plugin's folder. You can find the original download page for the plugin [here](https://www.tc4shell.com/en/7zip/exfat7z/)