Hi friend!
Passing by to thank you for the
.ssh textures plugin for Noesis. I've also been very interested in ripping the files from Goldeneye Rogue Agent because I'm enthusiastic of game development and I wanted to try out a "pc port" of sorts.
My experience in reverse engineering is very short, but I was able to rip some
.elf files and a
.o that looks like a file structure declaration at the root of the PS2 ISO. I could also unpack the
.viv files and check the textures using your plugin. Due to my lack of understanding of hex decryption I uploaded those files here for you to check out:
https://drive.google.com/drive/folders/ ... sp=sharing
I've also ran
from a Linux terminal, here's the following results:
Code: Select all
ELF Header:
Magic: 7f 45 4c 46 01 01 01 00 00 00 00 00 00 00 00 00
Class: ELF32
Data: 2's complement, little endian
Version: 1 (current)
OS/ABI: UNIX - System V
ABI Version: 0
Type: EXEC (Executable file)
Machine: MIPS R3000
Version: 0x1
Entry point address: 0x106608
Start of program headers: 52 (bytes into file)
Start of section headers: 5847180 (bytes into file)
Flags: 0x20924001, noreorder, 5900, eabi64, mips3
Size of this header: 52 (bytes)
Size of program headers: 32 (bytes)
Number of program headers: 1
Size of section headers: 40 (bytes)
Number of section headers: 22
Section header string table index: 21
Section Headers:
[Nr] Name Type Addr Off Size ES Flg Lk Inf Al
[ 0] NULL 00000000 000000 000000 00 0 0 0
[ 1] .text PROGBITS 00106600 000080 493c08 00 AX 0 0 64
[ 2] .reginfo MIPS_REGINFO 00000000 5900e8 000018 01 0 0 4
[ 3] .DVP.ovlytab LOPROC+0xffff42 00000000 590100 000060 0c W 4 0 4
[ 4] .DVP.ovlystrtab STRTAB 00000000 590160 000127 00 0 0 1
[ 5] .DVP.overlay..0x0 LOPROC+0xffff42 00000000 590287 000800 00 WX 0 0 1
[ 6] .DVP.overlay..0x8 LOPROC+0xffff42 00000000 590a87 000800 00 WX 0 0 1
[ 7] .DVP.overlay..0x1 LOPROC+0xffff42 00000000 591287 000800 00 WX 0 0 1
[ 8] .DVP.overlay..0x1 LOPROC+0xffff42 00000000 591a87 000800 00 WX 0 0 1
[ 9] .DVP.overlay..0x2 LOPROC+0xffff42 00000000 592287 000800 00 WX 0 0 1
[10] .DVP.overlay..0x2 LOPROC+0xffff42 00000000 592a87 000208 00 WX 0 0 1
[11] .DVP.overlay..0x0 LOPROC+0xffff42 00000000 592c8f 000800 00 WX 0 0 1
[12] .DVP.overlay..unk LOPROC+0xffff42 00000000 59348f 000250 00 WX 0 0 1
[13] .data PROGBITS 0059a280 493d00 03e5d0 00 WA 0 0 128
[14] .vutext PROGBITS 005d8880 4d2300 003560 00 AX 0 0 16
[15] .rodata PROGBITS 005dbe00 4d5880 0af4fc 00 A 0 0 16
[16] .gcc_except_table PROGBITS 0068b300 584d80 00005c 00 WA 0 0 4
[17] .sdata PROGBITS 0068b380 584e00 00b25c 00 WAp 0 0 8
[18] .sbss NOBITS 00696600 590080 000a18 00 WAp 0 0 64
[19] .bss NOBITS 00697080 5900e8 108d9c 00 WA 0 0 128
[20] .vubss NOBITS 0079fe1c 5900e8 000000 00 WA 0 0 1
[21] .shstrtab STRTAB 00000000 5936df 0001ad 00 0 0 1
Key to Flags:
W (write), A (alloc), X (execute), M (merge), S (strings), I (info),
L (link order), O (extra OS processing required), G (group), T (TLS),
C (compressed), x (unknown), o (OS specific), E (exclude),
p (processor specific)
There are no section groups in this file.
Program Headers:
Type Offset VirtAddr PhysAddr FileSiz MemSiz Flg Align
LOAD 0x000080 0x00106600 0x00106600 0x58ffdc 0x69981c RWE 0x80
Section to Segment mapping:
Segment Sections...
00 .text .data .vutext .rodata .gcc_except_table .sdata .sbss .bss
There is no dynamic section in this file.
There are no relocations in this file.
The decoding of unwind sections for machine type MIPS R3000 is not currently supported.
No version information found in this file.