While you can still use this corruptor, we suggest using the Real Time Corruptor whenever you can. The RTC is under active development and has far more features than other corruptors.
VineCorrupt is a multi-system corrupter designed to work with game systems ranging from NES to Wii with further inclusive development for other systems. VineCorrupt features opcode and file protection for its supported systems to minimize crashes. Each system has a different protection protocol according to their instruction set or file type to prevent crash inducing modifications. VinecCorrupt also features the ability to corrupt specific files within a disc through a directory structure.
- Byte Corruption
- Byte Operations
This section goes over the functions of VineCorrupt.
Choose a ROM file by selecting "Browse." The ROM's directory path will be displayed once the ROM has been selected.
Choose a directory by selecting "Browse" to extract the contents of the selected ROM. This directory's files will be the target for corruption.
Choose an emulator by selecting "Browse" to point to the emulator that runs the ROM files from the current tab. The selected emulator will remain selected for the specified system until the user chooses another one or VineCorrupt is updated.
Shows a display box with a code that can be loaded to restore the current settings. These values correspond to the current corruption options.
Once a ROM is corrupted, you can save it to a custom directory with this option. It will be deleted from the corrupter directory afterwards.
Shows a display box that allows the user to enter a code generated by a "save" operation. Submitting a code will restore previous corruption settings. This code corresponds to the current corruption options.
Starts the corruption process with the current settings. If an "Extract To" directory is listed, the files within this directory will be corrupted.
If an emulator is selected, it will attempt t o run the emulator with the given ROM as an argument. If an emulator has already been run this way, it will be closed. The option does not work with all emulators and the run/auto-close feature may not operate properly.
VineCorrupt supports non-specific file corruption for unsupported systems. It is not recommended to use this function if the supplied file is already supported by a VineCorrupt system due to the built-in file protection. Miscellaneous file corruption is performed in the same manner as supported system file corruption.
This section goes over the "Corruption Options" section of VineCorrupt.
The amount of space to skip between each corruption.
The offset into the ROM where the program will start corruption.
The offset into the ROM where the program will stop corruption. Setting this value to 0 will corrupt from the Start Byte to the end of the file (similar to "Auto-end").
This displays the total bytes of the ROM in hexadecimal once the file has been selected.
This displays the total bytes corrupted with the current settings after the ROM has been corrupted.
The drop down box lists all the current corruption types. The currently selected one will be applied after hitting Corrupt.
The Corruption Value is currently unlabeled and is located under the corruption selection drop down box. This value modifies byte operations.
This section goes over the byte operations of VineCorrupt. For examples of these operations see Maiddog's Help Section
Shift grabs a byte a [Corruption Value] distance away and puts it in the current position.
Swap grabs the current byte and a byte of [Corruption Value] distance away and swaps their values.
Adds the [Corruption Value] to the current byte.
Sets the value of the current byte to the value of [Corruption Value].
Random generates a random value and places it at the current byte. Random does not use the corruption value.
Rotate performs a bitwise rotation of the current value by a distance of [Corruption Value].
Performs a logical AND operation at the current byte with the [Corruption Value].
Performs a logical OR operation at the current byte with the [Corruption Value].
Performs a logical XOR operation at the current byte with the [Corruption Value].
Changes the current byte to its logical complement. Complement does not use the corruption value.
Write up by TechSupportSparky