https://github.com/itzandroidtab/catc_usb_chief_driver
Reverse engineering of the CATC USB Chief driver
https://github.com/itzandroidtab/catc_usb_chief_driver
catc protocol-analyzer sniffer usb
Last synced: 9 days ago
JSON representation
Reverse engineering of the CATC USB Chief driver
- Host: GitHub
- URL: https://github.com/itzandroidtab/catc_usb_chief_driver
- Owner: itzandroidtab
- License: unlicense
- Created: 2025-12-23T14:01:21.000Z (about 1 month ago)
- Default Branch: master
- Last Pushed: 2025-12-26T02:28:06.000Z (28 days ago)
- Last Synced: 2026-01-13T19:50:22.204Z (9 days ago)
- Topics: catc, protocol-analyzer, sniffer, usb
- Language: C++
- Homepage:
- Size: 101 KB
- Stars: 13
- Watchers: 0
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: readme.md
- License: LICENSE
Awesome Lists containing this project
README
# CATC USB Chief driver
This is a reverse engineering effort to make the driver work on a 64-bit machine (it should also work on 32-bit). The driver was reverse engineerd using IDA Pro and Ghidra.
## Pictures
Some pictures of it working on a 64-bit Windows 11 machine


### Open issues
* Driver has code that looks very janky (most of it is gone now)
* On some hardware the USB Chief doesnt return anything after the first device descriptor, configuration descriptor requests Windows does (happened Windows server 2019)
### USB chief limitations
* The software doesnt show anything when a High-Speed USB device is connected (banged my head against that)
## How to build
1. Install cmake, Visual studio and windows DDK (I installed `7600.16385.1`)
2. Open VScode (with cmake tools installed)
3. Change the `SDK_ROOT` SDK path in `CMakeLists.txt` to your installed location
4. Change `Kit` to "Visual studio xxxxxx amd64"
5. Press build (or keyboard shortcut `F7`)
6. Change `$WinDDKRoot` in `sign_driver.ps1` to the same path as `SDK_ROOT`
7. Run powershell as admin
8. Run `sign_driver.ps1`
9. Install driver using `pnputil`, right clicking `usbchief.inf` or using the device manager
## Original software
The original software can be found at [Teledynelecroy](https://www.teledynelecroy.com/support/softwaredownload/psg_swarchive.aspx?standardid=4). Search for in the archived downloads `chief`
### Extra note
This also fixes the bug that was patched using a lower driver. If someone from Teledynelecroy wants to sign and release the driver that would be great :+1: