Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reverse engineering process #14

Open
Slion opened this issue Sep 4, 2023 · 1 comment
Open

Reverse engineering process #14

Slion opened this issue Sep 4, 2023 · 1 comment
Labels
documentation Improvements or additions to documentation

Comments

@Slion
Copy link
Owner

Slion commented Sep 4, 2023

We need to document the reverse engineering process to make it easier to support future versions of Windows.

My understanding is that you need to run a Python script from a fork of GetVirtualDesktopAPI_DIA that dumps the GUIDs and interfaces definitions from twinui.pcshell.dll using Debug Interface Access and Microsoft Symbol Server.

It would be nice to port that Python script to C# and integrate it to this repository. That would make it even easier to perform reverse engineering.

@Slion Slion added the documentation Improvements or additions to documentation label Sep 4, 2023
@Slion Slion changed the title Document reverse engineering process Reverse engineering process Sep 21, 2023
@Lej77
Copy link

Lej77 commented Oct 5, 2024

I made an attempt at porting the script to Rust if that is relevant. The program works well enough to print vftable info:
https://github.com/Lej77/VirtualDesktopAccessor/blob/260eae8d407867a2be8f7e3e55d0b464c7be9a4d/print-com-interfaces/src/main.rs

Edit: also the program doesn't depend on Visual Studio and Debug Interface Access so it should be more portable.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Improvements or additions to documentation
Projects
None yet
Development

No branches or pull requests

2 participants