

# If you do not want the script to even try to recover content from a bricked image, enable it. # I left it out since the firm partitions are not being touched. Aborting to avoid a brick."Īsk "Safe restore\n$\nto SysNAND?" Set ERRORMSG "Safe restore is not available on\nntrboot. Set ERRORMSG "No qualifying exploit was found.\nAborting to avoid bricking the unit."

Set ERRORMSG "This script requires ntrboot to run."Īsk "WARNING:\nSystem exploit will not be protected.\nNEVER use an EmuNAND image with this\nscript - it may brick your device.\n \nFully restore\n$\nto SysNAND?" Set SUCCESSMSG "Successfully Restored SysNAND." Set ERRORMSG "An error occurred during the transfer\nPlease try again." # Besides, EmuNANDs don't even use their firm partitions. # I left it out since EmuNAND isn't vital. # Uncomment the "verify" line below to enable verification. Set SUCCESSMSG "Successfully Restored EmuNAND."įilesel "Select NAND Backup." $/*nand_?.bin NANDBAK # This will restore a backup from 0:/gm9/out, expecting the name scheme from the backup scripts # This will create a backup named _sysnand_?.binĪsk "Create a SysNAND backup in $?"įindnot $/$_$_sysnand_?.bin OUTPATH # This will create a backup named _emunand_?.binĪsk "Create a EmuNAND backup in $?"įindnot $/$_$_emunand_?.bin OUTPATHĮcho "Backup created successfully:\n$" Set ERRORMSG "Cleanup completed successfully" Rm -o -s 0:/gm9/scripts/cleanup_sd_card.gm9 Rm -o -s 0:/gm9/scripts/setup_ctrnand_luma3ds.gm9

Rm -o -s 0:/luma/payloads/ntrboot_flasher.firm Set SUCCESSMSG "Cleanup completed successfully"Īsk "This will clean the final setup files from your SD.\n\nContinue?"
