diff --git a/_pages/en_US/bannerbomb3-(legacy).txt b/_pages/en_US/bannerbomb3-(legacy).txt
index 41f3babb19..5d8f9ee958 100644
--- a/_pages/en_US/bannerbomb3-(legacy).txt
+++ b/_pages/en_US/bannerbomb3-(legacy).txt
@@ -23,7 +23,7 @@ These instructions work on USA, Europe, Japan, and Korea region consoles as indi
### What You Need
-* Your `movable.sed` file from completing Seedminer or nimhax
+* Your `movable.sed` file from completing Seedminer
#### Section I - Prep Work
diff --git a/_pages/en_US/bannerbomb3.txt b/_pages/en_US/bannerbomb3.txt
index e5db7ba2ee..6a75055a70 100644
--- a/_pages/en_US/bannerbomb3.txt
+++ b/_pages/en_US/bannerbomb3.txt
@@ -26,7 +26,7 @@ If you have a Taiwanese console (indicated by a T after the system version), fol
### What You Need
-* Your `movable.sed` file from completing Seedminer or nimhax
+* Your `movable.sed` file from completing Seedminer
#### Section I - Prep Work
diff --git a/_pages/en_US/dumping-movable-(nimhax).txt b/_pages/en_US/dumping-movable-(nimhax).txt
deleted file mode 100644
index 69f3d011d3..0000000000
--- a/_pages/en_US/dumping-movable-(nimhax).txt
+++ /dev/null
@@ -1,47 +0,0 @@
----
-title: "Dumping Movable (nimhax)"
----
-
-{% include toc title="Table of Contents" %}
-
-{% capture technical_info %}
-Technical Details (optional)
-
-To install boot9strap on your console, we derive your console's unique encryption key. To accomplish this, we use the Homebrew Launcher to launch nimhax and dump the data encryption key (movable.sed) from your console.
-
-For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit.
-
-{% endcapture %}
-{{ technical_info | markdownify }}
-{: .notice--info}
-
-### What You Need
-
-* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file)
-
-### Instructions
-
-#### Section I - Prep Work
-
-1. Power off your console
-1. Insert your SD card into your computer
-1. Copy the `nimhax` folder from the nimhax `.zip` to the `/3ds/` folder on your SD card
-1. Reinsert your SD card into your console
-1. Power on your console
-
-
-{: .notice--info}
-
-#### Section II - nimhax
-
-1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser)
-1. Launch nimhax from the list of homebrew
-1. If the exploit was successful, a `movable.sed` file will appear on the root of your SD card
-
-### Next step: Frogtool
-
-Once you have your console's encryption key (`movable.sed`), you can use it in conjunction with Frogtool, which uses your `movable.sed` file to inject and take advantage of JPN Flipnote Studio. \
-While this method is faster, it requires downloading a file with a torrent client. Do not follow this method if you're unable to use a torrent client.
-
-Continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
-{: .notice--primary}
diff --git a/_pages/en_US/homebrew-launcher-(pichaxx).txt b/_pages/en_US/homebrew-launcher-(pichaxx).txt
index dc2214673e..a58df498f5 100644
--- a/_pages/en_US/homebrew-launcher-(pichaxx).txt
+++ b/_pages/en_US/homebrew-launcher-(pichaxx).txt
@@ -76,4 +76,4 @@ In this section, you will see whether you can access Safe Mode on your console.
___
-{% include_relative include/hbl-common-exploits-movable.txt %}
+{% include_relative include/hbl-common-exploits.txt %}
diff --git a/_pages/en_US/homebrew-launcher-(steelhax).txt b/_pages/en_US/homebrew-launcher-(steelhax).txt
index d10810791f..9b8dace5a3 100644
--- a/_pages/en_US/homebrew-launcher-(steelhax).txt
+++ b/_pages/en_US/homebrew-launcher-(steelhax).txt
@@ -76,4 +76,4 @@ In this section, you will see whether you can access Safe Mode on your console.
___
-{% include_relative include/hbl-common-exploits-movable.txt %}
+{% include_relative include/hbl-common-exploits.txt %}
diff --git a/_pages/en_US/include/hbl-common-exploits-movable.txt b/_pages/en_US/include/hbl-common-exploits-movable.txt
deleted file mode 100644
index a17fbfd3b1..0000000000
--- a/_pages/en_US/include/hbl-common-exploits-movable.txt
+++ /dev/null
@@ -1,9 +0,0 @@
-### Next step: Choose an exploit
-
-If the camera appeared in the previous section, Safe Mode is likely to be working on your console.
-
-If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
-{: .notice--primary}
-
-If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
-{: .notice--info}
diff --git a/_pages/en_US/include/hbl-common-exploits.txt b/_pages/en_US/include/hbl-common-exploits.txt
index 654dd826ef..a17fbfd3b1 100644
--- a/_pages/en_US/include/hbl-common-exploits.txt
+++ b/_pages/en_US/include/hbl-common-exploits.txt
@@ -5,5 +5,5 @@ If the camera appeared in the previous section, Safe Mode is likely to be workin
If the camera appeared, continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
{: .notice--primary}
-If the camera did NOT appear, continue to [Dumping Movable (nimhax)](dumping-movable-(nimhax))
+If the camera did NOT appear, continue to [Installing boot9strap (Frogtool)](installing-boot9strap-(frogtool))
{: .notice--info}
diff --git a/_pages/en_US/installing-boot9strap-(frogtool).txt b/_pages/en_US/installing-boot9strap-(frogtool).txt
index c9817065ec..2d26ce5c71 100644
--- a/_pages/en_US/installing-boot9strap-(frogtool).txt
+++ b/_pages/en_US/installing-boot9strap-(frogtool).txt
@@ -18,9 +18,8 @@ To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frog
### What You Need
-* Your `movable.sed` file from completing Seedminer or nimhax on the root of your SD card
* [frogcert.bin](magnet:?xt=urn:btih:d12278ea50bb3574f1fbd327f3d0e2292c70941f&dn=frogcert.bin&tr=https%3a%2f%2ftracker.fastdownload.xyz%3a443%2fannounce&tr=https%3a%2f%2fopentracker.xyz%3a443%2fannounce&tr=http%3a%2f%2fopen.trackerlist.xyz%3a80%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=udp%3a%2f%2fopen.demonii.si%3a1337%2fannounce&tr=udp%3a%2f%2ftracker.port443.xyz%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.vanitycore.co%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fretracker.lanta-net.ru%3a2710%2fannounce&tr=udp%3a%2f%2fthetracker.org%3a80%2fannounce&tr=http%3a%2f%2ftorrent.nwps.ws%3a80%2fannounce&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.iamhansen.xyz%3a2000%2fannounce&tr=udp%3a%2f%2fbt.xxx-tracker.com%3a2710%2fannounce&tr=http%3a%2f%2f0d.kebhana.mx%3a443%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.opentrackr.org%3a1337%2fannounce&tr=udp%3a%2f%2ftracker4.itzmx.com%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.justseed.it%3a1337%2fannounce&tr=http%3a%2f%2ftherightsize.net%3a1337%2fannounce&tr=udp%3a%2f%2fretracker.hotplug.ru%3a2710%2fannounce&tr=udp%3a%2f%2ftracker.internetwarriors.net%3a1337%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2800%2fannounce&tr=https%3a%2f%2f2.track.ga%3a443%2fannounce&tr=udp%3a%2f%2fbigfoot1942.sektori.org%3a6969%2fannounce) (magnet link)
-* The latest release of [Frogtool](https://github.com/zoogie/Frogtool/releases/latest)
+* The latest release of [Frogtool-nimhax](https://github.com/lifehackerhansol/Frogtool/releases/download/v2.3-nimhaxb6/Frogtool-nimhax.zip) (direct download)
* The latest release of [b9sTool](https://github.com/zoogie/b9sTool/releases/latest)
#### Section I - CFW Check
@@ -33,7 +32,9 @@ To use the [magnet](https://wikipedia.org/wiki/Magnet_URI_scheme) link for `frog
1. Insert your SD card into your computer
1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
1. Copy `boot.nds` (b9sTool) from the b9sTool release `.zip` to the root of your SD card
-1. Copy `Frogtool.3dsx` to the `/3ds/` folder on your SD card
+1. Create a folder named `3ds` on the root of your SD card if it does not already exist
+ + This folder stores homebrew applications and data; it is different from the `Nintendo 3DS` folder that the console automatically generates
+1. Copy the `Frogtool` folder from the Frogtool-nimhax `.zip` to the `/3ds/` folder on your SD card
1. Copy `frogcert.bin` to the root of your SD card
1. Reinsert your SD card into your console
1. Power on your console
diff --git a/_pages/en_US/site-navigation.txt b/_pages/en_US/site-navigation.txt
index 79bb00b90f..0a8a55c4f2 100644
--- a/_pages/en_US/site-navigation.txt
+++ b/_pages/en_US/site-navigation.txt
@@ -26,7 +26,6 @@ sitemap: false
+ [Contribute](contribute)
+ [CTRTransfer](ctrtransfer)
+ [Dumping eShop DSiWare](dumping-eshop-dsiware)
-+ [Dumping Movable (nimhax)](dumping-movable-(nimhax))
+ [Dumping Titles and Game Cartridges](dumping-titles-and-game-cartridges)
+ [F3 (Linux)](f3-(linux))
+ [F3X (Mac)](f3x-(mac))