Hello there, it's me again. Thought some of you might be interested to know what I've been up to in relation to my previous post. I've managed quite a lot, and my progress can be seen here: https://github.com/MicroTransactionsMatterToo/Kain-Disassembly
So far, I've managed to deobfuscate a majority of the program, and last night, I created a patch for the program that re-enables command line arguments, which until recently could only be modified using a hex editor, and only gave you so many characters to work with. I'm now working away on recreating some useful headers/C files so it's more readable.
Many Thanks
So, I decompiled Fez, cause it's written in .NET, which is reallllly easy to reverse-engineer. It's not illegal, as reverse-engineering for any purpose other than directly to circumvent DRM is not actually clearly defined in law ^^; I don't think I can distribute the source, but I should be able to find interesting bugs/cool things by debugging the game as it's run
Yo. Pretty new here, but thought I'd just make a post for this.
I'm fairly decent at reverse engineering games and finding either just interesting things or possible exploits. If you're interested, hit me up :) I don't have a lot of time, due to school, but I'll do the best I can.
Hello, just thought I'd leave a note here. New to speedrunning, and planning on running CrossCode when it's finished. As well as that, I'm a fairly experienced developer, and have an above average knowledge of the NES/SNES internals and workings. I can probably help with pulling apart games to find glitches, if that's done. Hope I can help out, and that I become a valuable member of the community :)