The Sly Reverse Engineering Project, or Ghidra project, is an ongoing project to disassemble and understand the code for the Sly games. The project is collaborative and hosted on a Ghidra server.
History[]
The project began on June 23, 2020, when the Ghidra Server for the project was created. There were attempts to reverse-engineer the game code before this, but they were isolated and largely not collaborative.[1]
The DebugCode
data structure and associated functions were among the first to be fully reverse-engineered, which revealed the function of the Chetkido password debug code. Since then, many functions structs, and data values have been discovered and labeled.
Getting started[]
Required Downloads[]
- Java JDK - https://www.oracle.com/java/technologies/javase-downloads.html
- Ghidra - https://ghidra-sre.org/
- EE Processor Extension (download as ZIP file) - https://github.com/beardypig/ghidra-emotionengine
Set up Ghidra[]
- Start Ghidra by opening the ghidraRun.bat file in the Ghidra folder.
- In Ghidra, go to File > Install Extensions, click the plus sign (+), and select the EE extension ZIP file. You may now close the Install Extensions window.
Connect to the server[]
To connect to the server, simply go to File > New Project > Shared Project.
- Server name: slyre.ddns.net
- Port number: 13100[2]