#Python313
Explore tagged Tumblr posts
Text
1 note
·
View note
Text
Capturing the ambience of Pikmin (2001)
Disclaimer: I only explored the Gamecube v1.0.1 release. The Wii and Switch ports may require different tooling.
Extracting audio sequences
We'll be using piki-tools for its dedicated Pikmin 1 support. It offers a BARC tool for extracting pikiseq.arc - but first, we'll need a HED file to pair with it. Download one or extract it yourself from the sys/main.dol file. It starts with "BARC----" and ends shortly after "result.jam".
Contrary to the README we won't install piki-tools executables through pip - instead, we'll just run them from source. First, move the executables (e.g piki_barc) to the repo root (i.e. from piki-root/piki-root -> piki-root). Now, place your HED and ARC pair in the same directory and run:
"C:\Program Files\Python\Python313\python.exe" piki_barc.py EXTRACT "F:\Pikmin GC dump\files\dataDir\SndData\Seqs\pikiseq.hed"
This gives us a collection of JAM files, also known as BMS files.
Playing audio sequences
We'll use the unreleased JaiSeqX for its Pikmin 1 support.
Before running JaiSeqX.exe, copy Pikmin's Banks folder from SndData to the same directory as JAISeqX.exe, and run something like:
jaiseqx.exe "A:\Pikmin 1\GC sources\SndData\Banks\pikibank.bx" visu "A:\Pikmin 1\GC sources\extracted pikiseq.arc\d_end2.jam" 0 -libjaudio.force_init_version bx -jdsp.forcemap_ibnk_bx 13 -transpose 12
Extracting audio samples
Use XAYRGA's toolkit for Pikmin 1. Extract the archive into Pikmin's "SndData" and run _jamt_initialize.bat. The AW soundbanks will be unpacked into the Audio_Modding\SoundEffects\wav folder.
Appendix 0: Capturing footage
This should be possible using Dolphin's free look mode, with either the GC or Wii versions, albeit with some drawbacks on screen-space effects. There is also Heebo's free camera hack for the Switch version running on emulator. For a weirder solution we can run Pikmin 1^2 and PikHacker's freecam Gecko code. To skip levels on the Wii release, we can re-enable debug mode using a patch.
Appendix 1: Other extraction tools
BrawlCrate can supposedly explore ARC and BARC but I couldn't get it working for Pikmin 1. I had no luck with LunaBoy's RARC tool, either.
Appendix 2: STX files
These are AFCs and can be played with vgmstream.
Appendix 3: H4M files
You can extract these with h4m_audio_decode.
3 notes
·
View notes
Text
CVE-2025-27607:Python-json-loggerにRCE攻撃リスクの脆弱性、依存関係パッケージ「msgspec-python313-pre」がPyPl上から削除された事が原因
Pythonログライブラリに発見された深刻な脆弱性 2025年3月に公開された脆弱性情報によると、Pythonの人気ログライブラリ「python-json-logger」に、リモートコード実行(RCE)を可能にする深刻な脆弱性が発見されました。 CVE-2025-27607として登録されたこの脆弱性は、月間4300万回以上ダウンロードされる広く利用されているライブラリに影響を与えています。 脆弱性の深刻度はCVSSスコア8.8の「高」と評価されており、多くの開発者やシステム管理者にとって重要な問題となっています。 影響を受けるバージョンとシステム この脆弱性は、2024年12月30日から2025年3月4日の期間にリリースされたpython-json-loggerのバージョンに影響しています。 特にPython…
0 notes