Skip to content

Extract data from DOS executables compressed with PKlite

License

Notifications You must be signed in to change notification settings

hackerb9/depklite

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

depklite

Command line tool to extract data from PKLITE compressed DOS executables. Data is written to another file. This is useful for searching for strings or to disassemble and examine the code.

The decompression routines are based on @NY00123's refkleen which in turn were ported from @afrtiz1's OpenTESArena. @Afritz1 gives credit to @dozayon's excellent documentation of the PKLITE V1.12 compression format.

This program is released under the same MIT license used by refkleen's depklite implementation.

Usage

depklite - extract data from DOS executables compressed with PKlite.

Usage: depklite [-dv] [-o <outfile>] foo.exe [offset]

    foo.exe: name of the executable file to decompress.

Options:

    offset:  start of compressed data. (Default is 0).
    -d, --decrypt           Enable decryption of data.
    -o, --output <outfile>  Write to outfile instead of foo.exe.dep.
    -v, --verbose [=<0|1>]  Be more verbose.

Notes

  • Ideally, this program would create a valid DOS executable which is uncompressed. However, writing the DOS header and putting the code in the right place to execute isn't trivial and serves no useful purpose that I can think of.

  • This does not detect the start of the compressed data. It defaults to zero, which is definitely wrong, but is more likely to have all the data extracted. 800 is where the Commander Keen 1.00 data was. 752 was what Elder Scrolls Arena used.

  • Decryption routines were not tested.

  • The decoding routines use a fixed size buffer (current 4MiB) for storing output, so anything beyond that is truncated. I doubt this will be a limitation, but if it is, let me know.