mattifestation / TCGLogTools
A set of tools to retrieve and parse TCG measured boot logs. Microsoft refers to these as Windows Boot Confirguration Logs (WBCL). In order to retrieve these logs, you must be running at least Windows 8 with the TPM enabled.
☆55Updated 6 years ago
Alternatives and similar repositories for TCGLogTools:
Users that are interested in TCGLogTools are comparing it to the libraries listed below
- A PowerShell module to assist in parsing and managing catalog files.☆21Updated 8 years ago
- Analysis and manipulation of extended attribute ($EA) on NTFS☆38Updated 9 years ago
- The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, wi…☆142Updated 3 years ago
- The content of this repository aims to assist efforts on analysing inner working principles, functionalities, and properties of the Micro…☆151Updated 4 years ago
- BCD is a module to interact with boot configuration data (BCD) either locally or remotely using the ROOT/WMI:Bcd* WMI classes. The functi…☆60Updated 4 years ago
- Parse Microsoft shim databases☆30Updated 2 months ago
- AppContainer and LPAC (Less Privileged AppContainer) Launcher with Capabilities☆59Updated 6 months ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆47Updated 7 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆62Updated last year
- Event metadata collected across all manifest-based ETW providers on Window 10 1903☆31Updated 5 years ago
- Named pipe I/O ETW provider for Windows☆70Updated 4 years ago
- Scripts to prepare Windows system for debugging.☆30Updated 4 years ago
- Library and tools to access the Windows Prefetch File (SCCA) format.☆73Updated 3 months ago
- My collection of scripts for Ghidra (https://github.com/NationalSecurityAgency/ghidra)☆10Updated 4 years ago
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆31Updated 4 years ago
- (unofficial) Hyper-V® Development Kit☆217Updated last year
- Authenticode for PNG files☆9Updated 4 years ago
- extract and parse WEVT_TEMPLATEs from PE files☆18Updated last year
- WNF Utilities 4 Newbies (WNFUN)☆94Updated 6 years ago
- Extension blocks as found in ShellBags and other places in the Registry☆24Updated 2 months ago
- Enhanced version of the GFlags tool☆82Updated 5 years ago
- ☆17Updated 2 months ago
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses☆115Updated 7 years ago
- Expand compressed files from WinSxS folder☆155Updated 9 months ago
- PowerShell Module for the Antimalware Scan Interface (AMSI)☆25Updated 8 years ago
- Windows registry samples☆23Updated 6 years ago
- A collection of free miscellaneous Windows tools☆131Updated 7 months ago
- NTFS samples☆25Updated 4 years ago
- ☆62Updated 5 years ago