Sly Cooper Technical Wiki
Register
Advertisement

The Sly Reverse Engineering Project, or Ghidra project, is an ongoing project to disassemble and understand the code for the Sly games. The project is collaborative and hosted on a Ghidra server.

History[]

The project began on June 23, 2020, when the Ghidra Server for the project was created. There were attempts to reverse-engineer the game code before this, but they were isolated and largely not collaborative.[1]

The DebugCode data structure and associated functions were among the first to be fully reverse-engineered, which revealed the function of the Chetkido password debug code. Since then, many functions structs, and data values have been discovered and labeled.

Getting started[]

Required Downloads[]

  1. Java JDK - https://www.oracle.com/java/technologies/javase-downloads.html
  2. Ghidra - https://ghidra-sre.org/
  3. EE Processor Extension (download as ZIP file) - https://github.com/beardypig/ghidra-emotionengine

Set up Ghidra[]

  1. Start Ghidra by opening the ghidraRun.bat file in the Ghidra folder.
  2. In Ghidra, go to File > Install Extensions, click the plus sign (+), and select the EE extension ZIP file. You may now close the Install Extensions window.

Connect to the server[]

To connect to the server, simply go to File > New Project > Shared Project.

  • Server name: slyre.ddns.net
  • Port number: 13100[2]

References[]

Advertisement