Windows Vista introduced the long awaited feature of Monitor mode for normal everyday wireless adapters. While you still can't do packet injection without resorting to expensive solutions like AirPCap TX, it's still a very useful feature to have when testing wireless security.
However tools like airodump-ng doesn't support this method as of yet, and most of the good tools for working with this are in Linux anyway, so I was looking for a way to convert NetMonitor packet captures to tcpdump/pcap format when I came across the nm2lp utility by Josh Wright which does exactly that.
Unfortunately it seems to be incompatible with x64 Windows (At least not without recompiling as 64 bit binary) and crashed on my laptop. So in good opensource tradition I decided to reinvent the wheel, this time in C# and called it nm2pcap. Afterwards I also built a airserve-ng compatible server NMServe which uses NetMonitor API to capture packets and serve them to any airodump-ng client.
NMServe enables you to use a non USB wireless adapter with a airodump-ng instance running on a VMWare BackTrack 4 installation which you otherwise can't do since VMWare doesnt support non usb devices to be attached to the guest os. You could even use it with the windows airodump-ng binaries though that seems a bit flaky. The only snag is that it cannot put the adapter into Monitor mode automatically. You will need to do it manually using the nmwifi.exe which comes with NetMonitor before running NMServe. I'd probably fix this later.
The NMUtils binaries and the source code are available under LGPL v2 license.