RaiRaiTheRaichu added a new file:
QuoteDisplay MoreUnity Bundle CAB-ID Changer
Find out more about what EFT mods I'm working on here!
https://trello.com/b/CONaHPTn/…i-mods-by-rairaitheraichu
This is a modding tool for Unity bundles. The CAB-ID is an MD5 hash of the bundle, stored in the header.
If you use a program like UABE, you can replace textures, swap models, and so on within Unity bundles. If you are modding a Unity game that can load these new bundles, the CAB-ID needs to be unique as well or else Unity will crash. The CAB-ID will not automatically change when you replace the contents of a Unity bundle, therefore changing the ID manually is required. This tool automates that process.
This script supports drag-and-drop file support as well as batch file support.
Currently, changing bundle dependencies is not supported. This may change in the future.
Why use this over the TarkovBundleHelper? This allows multiple bundle files to be changed all in one action, very quickly, with drag and drop support. If you need the extended capabilities of the Bundle Helper, definitely use that instead. The source code is currently unavailable for the Bundle Helper so I made this from scratch.
Requirements
* Python 3.12.0
You only need Python if you are not downloading the compiled binary. The binary is created using pyinstaller.
How To Use
- Extract 'CAB_ID_Changer.exe' to an unprotected folder (NOT within Program Files, etc)
- Copy your Unity bundle(s) to the folder containing the 'CAB_ID_Changer.exe'.
- Drag and drop your bundle(s) onto the executable file and it will process all of them.
Alternatively, you can run the script through the command line interface with the following format:
- `CAB_ID_Changer.exe 'someunitybundle.bundle' 'someotherunitybundle' ...
Contact
RaiRaiTheRaichu on Discord.
License
Do not reupload or redistribute anywhere without explicit permission. Share the link to either this page or the GitHub repository.
Additional Information
Re: VirusTotal
The program is a short Python script compiled into an .exe via pyinstaller which bypasses the need for users to have the dependencies installed (Python 3.12). Many virus programs use Python scripts compiled into .exes to hide malware, thus, the executable matches some signatures of existing malware.
Included in the repo is the source code. You do not need to run the .exe file at all - you can open up the .py file in notepad if you'd like and see exactly what the code is doing. If you install Python 3.12.0, you can drag and drop your bundles directly onto the .py script and it will function exactly the same. You are free to compile the code into an .exe yourself using pyinstaller and compare.
If you aren't aware of how Github releases work and don't trust the .exe hosted there, please check out the Actions tab in the repo and familiarize yourself with the build script - it's fairly simple to understand. You can see the exact commands being run by Github to create the executable from the source code. The executable comes from those actions performed by Github - not uploaded from anyone else's machine.