• Stars
    star
    203
  • Rank 192,890 (Top 4 %)
  • Language
    C
  • Created over 5 years ago
  • Updated over 4 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Document ETW providers

ETW Providers Docs

Windows 7 - /Manifests-Win7-7600

Windows 10 - /Manifests-Win10-17134

Windows provides the ETW framework for event tracing. The ETW framework comes with many built-in ETW providers, but most of them are not documented very well.

Using tdh.h API provider information can be dumped. For manifest based providers, a manifest can be recreated using the same method perfview uses: (https://github.com/Kae7in/perfview/blob/444fd391db9b8275846e2a5bbb8ec1d6e73a5dad/src/PerfView/Extensibility.cs#L2523) (this is not the original manifest, because manifests are compiled) For non-manifest based providers, currently only keywords are dumped. But theoretically you can register to the provider and just cache all the results from all the events (in this case the event must be raised for it to be documented)

Moreover, in a quest to find more interesting ETW providers, I started reversing specific ETW providers and document the manifests. Some manifests were found in open source Microsoft repositories:

Currently reverse engineered providers:

More Repositories

1

windbg-cheat-sheet

My personal cheat sheet for using WinDbg for kernel debugging
JavaScript
373
star
2

autochk-rootkit

Reverse engineered source code of the autochk rootkit
C
195
star
3

apc-research

APC Internals Research Code
C
156
star
4

ida-plugins

A collection of my IDA plugins
Python
131
star
5

ReversingMinesweeper

Reverse Engineering Minesweeper: Reconstruct Minesweeper Source Code
C
123
star
6

shellcode2exe

Batch script to compile a binary shellcode blob into an exe file
Batchfile
79
star
7

windows-inspector

A driver to intercept low level windows events
C
60
star
8

windows-imports-searcher

Support Windows OS Reversing by searching easily for references to functions across many DLLs
Python
34
star
9

snax86

A snake game written in x86 Assembly language for windows console
Assembly
31
star
10

rpcmon

RPC Monitor based on The ETW Microsoft-Windows-Rpc provider
Python
25
star
11

practical-reverse-engineering

Code for the solutions of practical reverse engineering
C
20
star
12

autoit-analysis

AutoIt Analysis Library: Parser & Emulator For Malware Researchers
Python
16
star
13

simple-os

Simple Protected Mode Kernel for i386
C++
15
star
14

auto-makefile

Generic Makefile Template with Automatic Dependency Generation
Makefile
12
star
15

PE

PE.Parser, PE.Dumper, PE.Loader
C++
11
star
16

checkpoint-ctf-2018

Solutions to the challenges of the checkpoint CSA CTF
Python
8
star
17

set-critical-thread

Use NtSetInformationThread(ThreadBreakOnTermination) for anti-debugging
C++
8
star
18

real-kernel

16 bit Real mode operating system kernel
C++
7
star
19

tracelogging-providers

A dump of all the trace logging providers from system32
PowerShell
7
star
20

simple-etw-provider

hello world ETW provider
C
6
star
21

repnz.github.io

The deployed version of my blog
HTML
5
star
22

gamekid

Gameboy Emulation Library
C
5
star
23

supple

Supple way to load dynamic XML configuration files
C#
4
star
24

bluehat-il-2019-slotd

BlueHat IL 2019 vulnerable debugging interface
C
3
star
25

nc8-reversing-ctf

Solution to the NC8 CTF & nc8 instruction set emulation API
Python
2
star
26

pytreecli

A command line library that allows to build a tree structures command line easily
Python
2
star
27

c-streams

Wrapper for custom streams in the C language
C
2
star
28

dotflow

DotNet Actor Model POC library
C#
1
star
29

calculator-driver

Simple calculator windows driver
C
1
star