mattifestation / TCGLogTools
A set of tools to retrieve and parse TCG measured boot logs. Microsoft refers to these as Windows Boot Confirguration Logs (WBCL). In order to retrieve these logs, you must be running at least Windows 8 with the TPM enabled.
☆55Updated 6 years ago
Alternatives and similar repositories for TCGLogTools:
Users that are interested in TCGLogTools are comparing it to the libraries listed below
- Analysis and manipulation of extended attribute ($EA) on NTFS☆38Updated 9 years ago
- A PowerShell module to assist in parsing and managing catalog files.☆21Updated 8 years ago
- BCD is a module to interact with boot configuration data (BCD) either locally or remotely using the ROOT/WMI:Bcd* WMI classes. The functi…☆60Updated 4 years ago
- The content of this repository aims to assist efforts on analysing inner working principles, functionalities, and properties of the Micro…☆151Updated 4 years ago
- Blocks drivers from loading by using a name collision technique. #nsacyber☆47Updated 7 years ago
- The TpmTool utility is a simple cross-platform tool for accessing TPM2.0 Non-Volatile (NV) Spaces (Index Values) on compliant systems, wi…☆142Updated 3 years ago
- Parse Microsoft shim databases☆30Updated 2 months ago
- Named pipe I/O ETW provider for Windows☆70Updated 4 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- Event metadata collected across all manifest-based ETW providers on Window 10 1903☆31Updated 5 years ago
- AppContainer and LPAC (Less Privileged AppContainer) Launcher with Capabilities☆59Updated 6 months ago
- PowerKrabsEtw is a PowerShell interface for doing real-time ETW tracing.☆103Updated 4 years ago
- Expand compressed files from WinSxS folder☆155Updated 9 months ago
- A collection of free miscellaneous Windows tools☆131Updated 7 months ago
- PowerShell Module for the Antimalware Scan Interface (AMSI)☆25Updated 8 years ago
- ☆21Updated 8 years ago
- NTFS samples☆25Updated 4 years ago
- (unofficial) Hyper-V® Development Kit☆217Updated last year
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆31Updated 4 years ago
- Windows Detour Hooking in PowerShell☆78Updated 9 months ago
- A WPF-based application to explore Cryptographic Service Providers (CSP) and Key Storage Providers (KSP), their algorithms and persistent…☆13Updated 2 years ago
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆62Updated last year
- Library and tools to access the Windows Prefetch File (SCCA) format.☆73Updated 3 months ago
- A PowerShell module to abstract the complexities of Permanent WMI Event Subscriptions☆55Updated 9 years ago
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆138Updated 4 years ago
- PowerShell ETW consumer module☆28Updated last year
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses☆115Updated 7 years ago
- ☆19Updated 2 months ago
- ☆17Updated 2 months ago
- WNF Utilities 4 Newbies (WNFUN)☆94Updated 6 years ago