NikkeTools
Tools for Reverse-Engineering Nikke
Install / Use
/learn @Hiro420/NikkeToolsREADME
NikkeTools
Tools for Reverse-Engineering Nikke
Disclaimer
Shiftup/Level Infinite owns the original assets to the game, all credits go to its rightful owner. I am not liable for any damages caused if you get banned from using a mod created by this tool, or its derivatives. I DO NOT CLAIM ANY RESPONSIBILITY FOR ANY USAGE OF THIS SOFTWARE, THE SOFTWARE IS MADE 100% FOR EDUCATIONAL PURPOSES ONLY
List of tools:
- Catalog -> Decrypts all the dbs from AppData\LocalRow
- MetadataDumper -> Dumps decrypted metadata from process memory
- Protobuf -> A tool to recover protobuf definitions from the game assemblies, together with their HTTP paths
- StaticData -> Fetches AND decrypts the latest StaticData.zip (game data) from live servers
- UnLuac -> Decompiles Lua bytecode back to original code, modified for Nikke lua
How to use them?
- Catalog | StaticData -> Just compile and run, works straight out of the box
- MetadataDumper -> Compile the project via Visual Studio 2022. Take theput the
NikkeMetadataDumper.dllfromWin64generated folder, together with the files inGadgetfolder, and put them all in game directory next tonikke.exe. Run the game, a decryptedglobal-metadata.datwill be generated in the game directory. - Protobuf -> Compile the project via Visual Studio 2022. Use the generated
global-metadata.datto dump Il2Cpp via Il2CppDumper. Then either put theDummyDllfolder next to theNikkeProtoDumper.exe, or drag the DummyDll folder into theNikkeProtoDumper.exe.Nikke.protowill be generated, inproto3format. - UnLuac -> Run
compile.batto compile the project. Then put all the.lua.bytesfiles you got from YarikStudio or AssetStudio into theLuafolder. Run theDecompileAll.pypython script, and all the decompiled luas will be generated inDecompiledfolder.
Copyright© Hiro420
