FuzzleSnuz
New Member
- Joined
- Mar 9, 2023
- Messages
- 4 (0.17/day)
I've been using NVCleanstall since I discovered it about a year ago and it works great. One of its features intrigues me: adding new device identifiers to the various INFs and rebuilding the associated security catalogs. I have a use-case for that ability on something different: Intel's RST driver, which neglects to include their latest Optane devices, one of which I recently purchased and was disappointed to find is not "supported" by that specific driver.
So my question is, how does NVCleanstall rebuild the security catalogs without using a test-signing certificate? Being that it is a CLR application, I would gladly take a look into the msil and learn for myself, but Mr. W1zzard has of course obfuscated it
I recall seeing a thread here on this site within the last year where someone else lamented the fact that the program is not easily disassembled and they could not learn how it achieved some task, and in that thread W1zzard made a post saying he would be happy to explain how NVCleanstall does certain tasks without divulging the exact source code. I don't know if that offer is still on the table, but I would love to know how NVCleanstall is rebuilding these security catalogs, so that I can replicate that ability for myself to fix this stupid Intel driver.
And I really hope the answer isn't simply paying two grand for NVCleanstall's own big boy certificate™ from Sectigo or something.
So my question is, how does NVCleanstall rebuild the security catalogs without using a test-signing certificate? Being that it is a CLR application, I would gladly take a look into the msil and learn for myself, but Mr. W1zzard has of course obfuscated it

And I really hope the answer isn't simply paying two grand for NVCleanstall's own big boy certificate™ from Sectigo or something.
Last edited: