./kindlekey1.k4i
after extracted for the first time.config.json
's calibre key to your calibre-debug.exe
path.config.json
's postprocessing
key. Remember to add quotes and escape special characters if needed! You can check the example config-example.json
to get an idea.pip install pycryptodome
)config.json
's calibre key to your calibre-debug.exe
path.config.json
's postprocessing
key. Remember to add quotes and escape special characters if needed! You can check the sample config.json to get an idea.pip install pycryptodome
)usage: extract_kindle.py [-h] [-k] [-p] [-o OUTPUT] dir
positional arguments:
dir choose the folder contains DRMed azw file(s)
optional arguments:
-h, --help show this help message and exit
-k, --keep keep temp and useless files
-p, --postprocessing do some postprocessing with the file.
-o OUTPUT, --output OUTPUT
output folder (default: same as dir)
Examples:
extract_kindle.py "G:\_temp\My Kindle Content\B00KYFFDV2_EBOK" -o "D:\output" -p
extract_kindle.py "G:\_temp\My Kindle Content\B00KYFFDV2_EBOK"
You can also use it as a module by something like
extract_kindle.main(R"G:\_temp\My Kindle Content\B00KYFFDV2_EBOK", "-o", "D:\\output", "-p")
Remember to add quotes around them if needed!