Difference between revisions of "Abystus"

From Wiki - GameHacking.org
Jump to: navigation, search
(Added a div to separate the KI and Chip-Eight sections.)
m (Fixed a grammatical error.)
Line 69: Line 69:
 
=== The Peeper ===
 
=== The Peeper ===
  
[[The Peeper]] was introduced on February 22nd, 2014. It was targeted to hackers who were interested in finding unused or hidden content in games by searching for specific terms. The program analyzes the contents of a rom and reports its findings in a neat, organized tree-view with the total amount of occurrences a specific term has been found, the address at which the term was found at, and a snippet of relevant text that is 600 characters long. The Terms.txt file can be modified to add new words and can be accessed via the program's menu bar or manually.
+
[[The Peeper]] was introduced on February 22nd, 2014. It was targeted to hackers who were interested in finding unused or hidden content in games by searching for specific terms. The program analyzes the contents of a rom and reports its findings in a neat, organized tree-view with the total amount of occurrences a specific term has been found, the address at which the term was found, and a snippet of relevant text that is 600 characters long. The Terms.txt file can be modified to add new words and can be accessed via the program's menu bar or manually.
  
  
 
[[Category:People]]
 
[[Category:People]]

Revision as of 15:01, 15 October 2014

Abystus' current avatar on the GSHI forums.

Abystus is a current Administrator of GSHI and former Administrator of GSCentral. He is also a professional programmer and a well-known hacker in the game hacking scene.


Contributions

GG Mass Crypt

On January 19th, 2012, Abystus released GG Mass Crypt, a small, .NET based application that converts raw ROM codes into Game Genie codes and vice versa. This program was possibly the first of its kind to convert multiple lines of code at a time. Its predecessors were only able to tediously convert a single line of code.

Initially, the program only had support for the Super Nintendo. Version 1.1 brought support for the Sega Genesis. There were plans for supporting additional systems such as the Nintendo Entertainment System, Nintendo Game Boy, and Sega Game Gear. A code porting feature was also planned, but never implemented. The program is now discontinued since it eventually got incorporated into GHTool early in its development.

Killer Instinct Image View

Killer Instinct Image View in action.

Killer Instinct Image View, released December 12th, 2012, is an application that was designed to view the stored bitmaps within the Killer Instinct and Killer Instinct 2 arcade image files. It also has the ability to export the images locally to a bitmap file. It requires the .NET Framework (version 4.5 or higher), either a Killer Instinct or Killer Instinct 2 .IMG file, and the included DLL files.

This tool serves as a convenience for those who wish to not use any real "hacking" knowledge, but would also like to uncover new, unused content. Most of the content discovered using this program has been published in two pages of The Cutting Room Floor. The contributions to the Killer Instinct title can be found on this page. Similarly, the unused content for Killer Instinct 2 is located on this page.

Chip-Eight Hacking Emulator

Abystus' Chip-Eight emulator running Blinky.

To improve his knowledge on emulation, Abystus created Chip-Eight, a CHIP-8 hacking emulator. Released May 30th, 2013, Chip-Eight came with numerous features and also the ability to emulate most CHIP-8 and SuperChip games and demos. The emulator is currently released under the GNU General Public License version 2 (GPLv2) and the source code is hosted on CodePlex.

Features

Below is a list of features currently present in the Chip-Eight Hacking Emulator.

Feature Description
Non-hybrid type CHIP-8 roms Supports all non-hybrid type CHIP-8 roms.
SuperChip Supports SuperChip games.
Speed control and pause options Ability to control the speed and halt the emulation.
Debugger Provides a fully functional debugger that includes a read, write and execute breakpoint system, register set/lock options, and full assembly display.
Stepping Options Step into, step over, and step out.
Memory Viewer Allows read/write access to the system memory.
Trace Logger Provides a trace logger with optional register dump.
Cheat Support Allows cheats to be used. The current format is AAAA?CC:VV.
Cheat File Support Allows cheats to be added, updated and deleted to and from a cheat file.
Cheat Search Functionality Allows the ability to perform RAM searches.

The Peeper

The Peeper was introduced on February 22nd, 2014. It was targeted to hackers who were interested in finding unused or hidden content in games by searching for specific terms. The program analyzes the contents of a rom and reports its findings in a neat, organized tree-view with the total amount of occurrences a specific term has been found, the address at which the term was found, and a snippet of relevant text that is 600 characters long. The Terms.txt file can be modified to add new words and can be accessed via the program's menu bar or manually.