Get the latest tech news

Using Ghidra and Python to reverse engineer Ecco the Dolphin


Re-routing the encryption

Ecco the Dolphin: Defender of the Future has some previously unrecognized cheat features that activate based on what you name your save file. By analyzing a memory snapshot from the flycast emulator, I found that the buffer at 8cfffb34 holds the visible portion of the initials you type in. I’ve got lots of other articles on finding previously unknown cheat codes — see my archive here.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of Dreamcast

Dreamcast

Photo of dolphin

dolphin

Photo of Ghidra

Ghidra

Related news:

News photo

Fixing an Elgato HD60 S HDMI capture device with the help of Ghidra

News photo

Show HN: A Ghidra extension for exporting parts of a program as object files

News photo

With the help of AI new updates to PlayStation 2 and Dreamcast emulation are giving a new lease of life to some of the best games ever made