Originally Posted by snowydew
From what i've seen, at the top of extracted iso.bin.edat's is 16 bytes, i'm guessing that's what is either used to decrypt the eboot.pbp. Somewhat stumped on that since i can't really do much from where I am (not a reverse engineer heh). The psp ones should also be the same, locations on where the files are or how to unencrypt / decompress files if need be. Once the eboot.pbp's are extracted there should be several things in there, including a small file which will have flags for the emulators of choice, probably to make sure the memory cards are there and such, or to even start the emulator after loading it initially. Chances are crashserious will be finished before i am so :P
Very nice, well done you both!
If I can be proven helpful please, feel free to "irritate" me!