Top > Japanese << Back

(Cover art supplied by ISFDB)
Disassembler Decompiler for C trial Version Product Version AGNSS DCC 2.60
AGNYAN DCCYAN reverse engineering
Kernighan Ritchie The C programming language Top
[Top orSearch] Hit 10 !
Inquiry bilyzkid.com/agnss_dcc/us/inquire.htm
FSFJUL1964.jpg
Top Product Version (Cover art supplied by ISFDB) Inquiry Thanks for your inquiry. Please fill in the following entries! (Fill in all items! Click Submit button to submit!) Your name: Your mail address: Inquiry:
Disassembler & DeCompiler for C bilyzkid.com/agnss_dcc/us/index.htm
FSFDEC69.jpg wel003.gif
Top Japanese (Cover art supplied by ISFDB) or and Disassembler Decompiler for C trial Version Product Version AGNSS DCC 2.60 AGNYAN DCCYAN reverse engineering Kernighan Ritchie The C programming language Top Disassembler Decompiler for C You can here download the trial version of Disassembler Decompiler for C, AGNSS DCC 2.60, Copyright (c) Bilyzkid Co.,Ltd. 1991-2019 (Generates Assembly Source and C Source Files for Any Executable Files). Disassembler Decompiler for C
Specification in Disassembler AGNSS bilyzkid.com/agnss_dcc/us/spec_agn.htm
FSFAug1963.jpg
Top Product Version (Cover art supplied by ISFDB) Specification in Disassembler AGNSS New Features of Disassembler AGNSS 2.60 * All CPU instructions in Pentium IV (Multi-Data instructions, SIMD 2, etc.) are supported. * All CPU instructions in Pentium III (Multi-Data instructions, SIMD, etc.) are supported. * All CPU instructions in Pentium Pro (conditional move instructions, cmov, etc.) are supported. * All CPU instructions in MMX Pentium (MMX instructions, etc.) are supported. * Making source files is extended to all executable files in Windows 95, 98, and Windows 2000/NT/XP. * Supported the new mechanism that enables to automatically judge offset operators or immediate values correctly for EXEs with no relocations. * All of three moveable versions (MSDOS/Con32/Win32) are included in the product version. Also, * In output source for Windows 95/98/2000/NT/XP, offset operators and data labels are completely resolved. That is, in output assembly source generated by the fully automatical mode, there is no lack of offset operators/data labels and there is no redundant ones, and so, by reassembling/relinking, you can make the executable file that can move almostly as it is. * TD32's TDS (Borland's de
Specification in DeCompiler for C, DCC bilyzkid.com/agnss_dcc/us/spec_dcc.htm
FSFSep1963.jpg
Top Product Version (Cover art supplied by ISFDB) Specification in DeCompiler for C, DCC New Features of DCC 2.60, DeCompiler for C * All CPU instructions in Pentium IV (Multi-Data instructions, SIMD 2, etc.) are supported. * All CPU instructions in Pentium III (Multi-Data instructions, SIMD, etc.) are supported. * All CPU instructions in Pentium Pro (conditional move instructions, cmov, etc.) are supported. * All CPU instructions in MMX Pentium (MMX instructions, etc.) are supported. * Making source files is extended to all executable files in Windows 95, 98, and Windows 2000/NT/XP. * Supported the new mechanism that enables to automatically judge offset operators or immediate values correctly for EXEs with no relocations. * Both of two moveable versions (Con32/Win32) are included in the product version. Also, * TD32's TDS (Borland's debug information) in Windows 95/98/2000/NT/XP is completely supported. By this, for example, you can make TDS by CGN2 directly from MAP file generated by AGNSS, and so, you can execute source-debugging immediately by the output assembly sources. * In order to correspond to the optimization for registers in compilers, range() option is additionally supported fo
Method to decompile in DCC bilyzkid.com/agnss_dcc/us/dcc_step.htm
FSFJul1963.jpg
Top Product Version (Cover art supplied by ISFDB) Method to decompile in DCC Contents 1. Is correct the description of functions and data? 1.1. Functions 1.2. Data 2. Is correct the description of simple statements? 3. Is correct the description of multi-goto (switch) statements? 4. Is correct the description of loop (for-while) statements? 5. Is correct the description of branch (if-else) statements? We will describe some check points to output the complete decompiled C source files in DCC. The main check points to know whether or not a decompiling operation is achieved successfully are the following five; [1] Is correct the description of functions and data? [2] Is correct the description of simple statements? [3] Is correct the description of multi-goto (switch) statements? [4] Is correct the description of loop (for-while) statements? [5] Is correct the description of branch (if-else) statements? As for the decompiling work, CSM (C simulator) executes it all automatically. The above works are correspoding to CSM PASS 1 to CSM PASS 5, respectively, that are displayed if started CSM with -v start option. The concrete work i
List of all CPU instructions bilyzkid.com/agnss_dcc/us/cpu.htm
FSFJUN72.jpg
Top Product Version (Cover art supplied by ISFDB) List of all CPU instructions All CPU instructions supported in AGNSS DCC are displayed as a list. Notation in the list is that, the first entry shows the input byte value into CPU (the one in Table 1 shows the first byte and the one in Table 2 shows the second byte when the first byte is 0x0f), and the second entry shows the instruction, as a CPU instruction group, that the first byte can be recognized as a CPU instruction. The CPU instruction group is named such as add_proc, etc., according to the output file dasm0.h in TSTDSM, a sample program included in AGNSS. All instructions included in a CPU instruction group are displayed in the next line only when the group is firstly described. The third entry shows the CPU name that the instruction is firstly appeared, such as 8086, etc. The fourth enry shows the version of AGNSS DCC that the instruction is firstly supported. (For specification in each CPU instruction, see the document opened to the public by Intel Inc.!) The ones newly supported in the latest version 2.50 are displayed in bold face. Table 1:CPU input value/first byte value CPU instruction group CPU AGNSS
Profiles of Our Products bilyzkid.com/agnss_dcc/us/profile.htm
FSFJAN77.jpg
Top Product Version (Cover art supplied by ISFDB) Profiles of Our Products Our products are all related to reverse engineering and are developed assuming that each user has some elementary knowledges about the specification of CPU, of assembler and of C compiler, and so on. But even if you are a beginner without such a knowledge, by touching our products and by growing familiar with them, you can get some elmentary knowledges in youself about reverse engineering. For your information, we will explain about our products, especially about references. 1. Disassembler is the elementary step. Disassembler is an indispensable and an almighty tool as much as it is said that reverse engineering begins with disassembler and ends at disassembler. An executable file or ROM being a target of reverse engineering corresponds, one to one, to codes disassembled, and so, if it was completely disassembled, the technical problem had been almostly resolved. At the elementary step, it is helpful to see Pentium Processor:Architecture and Programming (Intel Inc.), or to see a list of CPU assembler instructions included in TASM or MASM. (About all CPU instructions supported in our products, see list of all CPU instruction
DeCompiler for C bilyzkid.com/agnss_dcc/us/dcc.htm
FSFMar1963.jpg
Top Product Version (Cover art supplied by ISFDB) Download Trial Version Decompiler for C, DCC 2.60 File Size:357,555 bytes (Jan 6, 2004) DCCYANW.EXE is the trial version of Disassembler DeCompiler for C (AGNSS DCC 2.60, Copyright (c) Bilyzkid Co.,Ltd. 1991-2019). (The version of this trial one is 2.60, 32-bits Windows version.) After extracting the file from .zip... This is a self-decompressing file. After changed into the directory decompressed, type as follows; DCCYANW or lha x DCCYANW.EXE (if you have lha.exe). The executable environment is in 32-bits Windows on Intel 80X86-CPU. (It does not move in other CPUs or Windows 3.1.) The executable file, TSTCRYPT.EXE, decompiled to C is the DES-coding widely used to crypt passwords in UNIX. This crypt routine actually behaves in the same way with cryption of passwords in UNIX or BBS. (It is the same as BASIC Authentication used in internet. You can get the crypted strings in .htpasswd file. ) Other references: See List of all CPU instructions for those supported in DCC, Method to decompile in DCC to restore the complete C source files, Specification in DeCompiler for C for
Disassembler bilyzkid.com/agnss_dcc/us/agn.htm
FSFNOV78.jpg
Top Product Version (Cover art supplied by ISFDB) Download Trial Version Disassembler AGNSS 2.60 File Size:456,927 bytes (Jan 6, 2004) AGNYAN.EXE is the trial version of Disassembler DeCompiler for C (AGNSS DCC 2.60, Copyright (c) Bilyzkid Co.,Ltd. 1991-2019). (The version of this trial one is 2.60, 32-bits Console version.) After extracting the file from .zip... This is a self-decompressing file. After changed into the directory decompressed, type as follows; AGNYAN or lha x AGNYAN.EXE (if you have lha.exe). The executable environment is in 32-bits Windows on Intel 80X86-CPU. (It does not move in other CPUs or Windows 3.1.) The executable files that can be disassembled are all executable files in MSDOS/Windows 95/98/2000/NT/XP/3.0-3.1, and ROM/Dos-Extender, and the ones up to 16MB in size. Other references: See List of all CPU instructions for those supported in Disassembler AGNSS, Method to disassemble in AGNSS to restore the complete assembly source files, Specification in Disassembler for the product version in details, and Summary for some profiles of our products. New Features of Disassembler AGNSS 2.60
Method to disassemble in AGNSS bilyzkid.com/agnss_dcc/us/agn_step.htm
FSFNOV70.jpg
Top Product Version (Cover art supplied by ISFDB) Method to disassemble in AGNSS Contents 1. Is correct the distinction between code area and data area? 1.1. The area, should be data area, is described as code area. 1.2. The area, should be code area, is described as data area. 2. Is correct the distinction between offset operators and immediate values? 2.1. OBJ files and PE files 2.2. EXE/COM/SYS files in MSDOS, NE files, and MEM/EXP files 3. Screen output in BROW 4. Disassembling in higher levels 4.1. Make a rename file (.ren) for ren command! 4.2. Make a module file (.mod) for mod command! 4.3. Make a comment file (.cmt) for cmt command! 5. Toward decompiling for C We will describe some check points to output the complete disassembled source files in AGNSS. The main check points to know whether or not a disassembling operation is achieved successfully are the following two; [1] whether or not the distinction between code area and data area is correct. [2] whether or not the distinction between offset operators and immediate values is correct. 1. Is correct the distinction

Disassembler & Decompiler for C

You can here download the trial version of

Disassembler & Decompiler for C, AGNSS & DCC 2.60, Copyright (c) Bilyzkid Co.,Ltd. 1991-2019

(Generates Assembly Source and C Source Files for Any Executable Files).



Bilyzkid Co.,Ltd.
Higashi-Izumi 1-34-19-102
Komae-Shi, Tokyo 201-0014, JAPAN
Phone:81-3-5497-1962


Outline
Name Bilyzkid Co.,Ltd.
Website Disassembler & DeCompiler for C
URL https://www.bilyzkid.com/agnss_dcc/us/
Staff Miura
Location Higashi-Izumi 1-34-19-102
Komae-Shi, Tokyo 201-0014, JAPAN
Phone 81-3-5497-1962
Mail Please inform us your questions via Inquiry!
Notation for the Specified Commercial Transaction Law
Business Items Software Development/Sales/ Maintenance/Support
Order Form
(Payment)
Please order our products via paypal!
(Orders via Credit Cards or from overseas are available. All fees are free!)
Cancellation Due to the property in Software Products, after paid, you could not calcel your payment. (On the screen of paypal, you can stop your order en route.)
Price For prices, see Product List!
Tax All taxes are included in its price.
The above notation is displayed for the Specified Commercial Transaction Law.
Privacy Policy
Use of Privacy 1. All informations of customers (Name/Address/Phone number/mail address) are used only for the transaction.
2. They are not used for any other commercial purposes.
Management of Privacy Information 1. SSL Encryption is used for Transmission Security of Privacy Information.
2. All mails from customers are deleted from servers just after received.
3. We promise to treat all privacy informations based on the Personal Information Protection Law.
Supply to the others 1. All informations of customers (Name/Address/Phone number/mail address) are never supplied to the others.
2. The download URL for a customer is maintained in the private URL and SSL Encryption and so, it cannot be searched by any robots nor leaked to the others.