RegProbe is a Windows desktop configuration shell plus a research workspace for evidence-backed tweak work. The app stays reversible and preview-first, while the repo keeps the proof trail: records, runtime captures, static analysis, audits, source-enrichment passes, and VM orchestration.
The shipped app is a focused three-surface shell: Configuration for the main workspace, Repairs for recovery and cleanup actions, and About for repo, build, and log context. The current UI is deliberately tighter than the older builds. It is a dark, flat-row workspace with a custom chrome, a left category rail, and a denser list-first layout instead of boxed cards. Contributor-only evidence metadata still exists, but it stays behind repo and developer gating.
Older surfaces such as the hardware dashboard, services browser, bloatware browser, startup manager, disk-health area, and the old policy-heavy shell are no longer part of the shipped experience.
RegProbe stays preview-first and reversible. SAFE tweaks follow Detect -> Apply -> Verify -> Rollback, the app does not mutate the system on startup, and elevated work runs through RegProbe.ElevatedHost instead of the main process. Runtime validation happens in the VM, not on the host, and research classification is evidence-first, not folklore-first.
Static credibility was hardened in the v3.2 pass:
- committed Ghidra artifacts are PDB-backed and bounded
- broken-link and ghidra-bloat queues are closed
- Nohuto priority records were re-audited first
IDAis optional today;Ghidra + PDBis the canonical static lane
Wave 1 quality hardening changed what counts as evidence.
full-evidence.json.artifact_refsare structured objects, not loose strings- every physical artifact now carries
path,sha256,size, andcollected_utc stagedmanifests are allowed as planning state, but they are not treated as captured evidence- runtime lanes that claim live capture must point to physical ETL/PML/JSON artifacts or they are downgraded to
missing-capture - kernel, boot, and driver-facing records must finish with a real mapped runtime lane before they can count as executed evidence
If you see a manifest without capture artifacts, treat it as orchestration metadata, not proof.
The active research surface now also carries:
- evidence freshness metadata keyed to tested Windows build
- regression history for revalidation after major build changes
- interaction graph and tweak dependency datasets
- anti-cheat / DRM advisory risk tags where known
- a reproducibility manifest for the current validation baseline
- public negative-evidence packages for archived and no-hit records
Useful entry points:
Research runners now expose an explicit collection mode:
evidencedefault mode for research and auditsoperationalonly for flows where automatic rollback is intentionally allowed
evidence mode is the safe default. In this mode:
- automatic rollback is suppressed
- pre-change and post-change exports are expected
- manifests carry
rollback_pending = trueuntil a later explicit cleanup run
operational mode keeps the older convenience behavior, but it is not the default for evidence collection.
Repo-tracked VM scripts no longer keep plaintext guest passwords.
Credential resolution order is now:
- explicit credential input
- environment variables such as
REGPROBE_VM_GUEST_USERandREGPROBE_VM_GUEST_PASSWORD - a DPAPI-protected CLIXML credential file referenced outside the repo
vmrun still consumes credentials at invocation time because that is a VMware CLI limitation. The repo now avoids storing or logging those secrets directly, and the shared VM helper masks them in runner output.
app/ WPF shell, views, view models, resources
core/ Contracts and shared models
engine/ Tweak implementations and execution pipeline
infrastructure/ Registry, file, process, and elevation adapters
elevated-host/ Separate admin helper process
cli/ Command-line entry point
tests/ Unit and behavior tests
research/ Human-facing records, notes, audit outputs
evidence/ Bundles and imported runtime/static artifacts
registry-research-framework/ v3.2 routing, phases, tools, manifests
Docs/ Workflow and contributor-facing docs
scripts/ Build, package, VM, and validation helpers
The supported validation VM is Win25H2Clean.
Current canonical snapshot:
RegProbe-Baseline-ToolsHardened-20260330
Current baseline policy:
- tooling-first
- Defender stays enabled
- bounded exclusions only for trusted tooling
- app payloads do not persist in the saved baseline
- app launch smoke is allowed only as an ephemeral deploy/validate/cleanup lane
Start here for the full flow:
Hard runtime cases no longer stop at reboot and idle.
Current escalation order:
- targeted
ETW/ runtime trace - safe mega-trigger runtime v2
WinDbgboot registry trace for remaining no-hit keys- source-enrichment cross-reference (
ReactOS,WRK,System Informer,Sandboxie,Wine,ADMX,WDK)
Current runtime note:
- the safe mega-trigger v2 runner now restores cleanly and completes the full 8-trigger pilot
- the remaining follow-up is ETL parsing after trace stop
- until that parser issue is closed, treat the lane as a safe pilot rather than a final classifier
The repo has a lot of PowerShell, but not all of it serves the same purpose.
- everyday scripts build, package, clean, baseline maintenance, shell health, app smoke
- active research scripts current v3.2 runners, escalation lanes, and follow-up lanes
- historical reproducibility scripts older one-off runners kept because notes, audits, and evidence bundles still depend on them
- regenerable clutter
bin/,obj/,publish/,dist/, andTestResults/
The full script map lives here:
If you are trying to learn the repo, read that file before deleting any .ps1. Many narrow runners are intentionally preserved so an old evidence claim can still be replayed.
Start with README and Contributing, then move to the VM workflow and the script catalog. After that, open the research atlas, pick one record under research/records, and read it next to its matching bundle under evidence/records. That path gives you the "what", the "how", and the proof trail in the same order most contributors discover it.
- Windows 10 or Windows 11
- .NET 8 SDK
- PowerShell 7+ recommended for script work
dotnet build RegProbe.sln -c Releasedotnet run --project app/app.csprojdotnet test tests/tests.csproj -c Release --no-build -v minimalpwsh -File scripts/package_windows.ps1 -Configuration Release -Runtime win-x64pwsh -File scripts/publish_release.ps1- Contributing
- VM workflow
- Runtime escalation
- Script catalog
- Tweak sources
- Research readme
- Evidence atlas
- Evidence audit
This project is licensed under the MIT License.
Built with Codex for the heavy lifting and occasional Claude passes on design and review. Everything here is hand-directed and repo-specific.
