We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
We need to document the reverse engineering process to make it easier to support future versions of Windows.
My understanding is that you need to run a Python script from a fork of GetVirtualDesktopAPI_DIA that dumps the GUIDs and interfaces definitions from twinui.pcshell.dll using Debug Interface Access and Microsoft Symbol Server.
twinui.pcshell.dll
It would be nice to port that Python script to C# and integrate it to this repository. That would make it even easier to perform reverse engineering.
The text was updated successfully, but these errors were encountered:
I made an attempt at porting the script to Rust if that is relevant. The program works well enough to print vftable info: https://github.com/Lej77/VirtualDesktopAccessor/blob/260eae8d407867a2be8f7e3e55d0b464c7be9a4d/print-com-interfaces/src/main.rs
Edit: also the program doesn't depend on Visual Studio and Debug Interface Access so it should be more portable.
Sorry, something went wrong.
No branches or pull requests
We need to document the reverse engineering process to make it easier to support future versions of Windows.
My understanding is that you need to run a Python script from a fork of GetVirtualDesktopAPI_DIA that dumps the GUIDs and interfaces definitions from
twinui.pcshell.dll
using Debug Interface Access and Microsoft Symbol Server.It would be nice to port that Python script to C# and integrate it to this repository. That would make it even easier to perform reverse engineering.
The text was updated successfully, but these errors were encountered: