This project targets reverse engineering the Call of Duty 2 (CoD2) macOS executable, which is a Mach-O universal (fat) binary containing slices for both the i386 and PowerPC architectures. The binary is compiled with GCC 2 and includes debug symbols in the STABS debugging format.
xtnded/cod2
Folders and files
| Name | Name | Last commit date | ||
|---|---|---|---|---|