Git Product home page Git Product logo

biosutilities's Introduction

BIOSUtilities

Various BIOS Utilities for Modding/Research

BIOS Utilities News Feed

AMI BIOS Guard Extractor

Description

Parses AMI BIOS Guard (a.k.a. PFAT, Platform Firmware Armoring Technology) images, extracts their SPI/BIOS/UEFI firmware components and decompiles the Intel BIOS Guard Scripts. It supports all AMI PFAT revisions and formats, including those with Index Information tables or nested AMI PFAT structures. The output comprises only final firmware components which are directly usable by end users.

Note that the AMI PFAT structure may not have an explicit component order. AMI's BIOS Guard Firmware Update Tool (AFUBGT) updates components based on the user/OEM provided Parameters and Options or Index Information table, when applicable. That means that merging all the components together does not usually yield a proper SPI/BIOS/UEFI image. The utility does generate such a merged file with the name "00 -- <filename>_ALL.bin" but it is up to the end user to determine its usefulness. Moreover, any custom OEM data after the AMI PFAT structure are additionally stored in the last file with the name "<n+1> -- _OOB.bin" and it is once again up to the end user to determine its usefulness. In cases where the trailing custom OEM data include a nested AMI PFAT structure, the utility will process and extract it automatically as well.

Usage

You can either Drag & Drop or manually enter AMI BIOS Guard (PFAT) image file(s). Optional arguments:

  • -h or --help : show help message and exit
  • -v or --version : show utility name and version
  • -i or --input-dir : extract from given input directory
  • -o or --output-dir : extract in given output directory
  • -e or --auto-exit : skip all user action prompts

Compatibility

Should work at all Windows, Linux or macOS operating systems which have Python 3.10 or newer support.

Prerequisites

Optionally, to decompile the AMI PFAT > Intel BIOS Guard Scripts, you must have the following 3rd party utility at the "external" project directory:

AMI UCP Update Extractor

Description

Parses AMI UCP (Utility Configuration Program) Update executables, extracts their firmware components (e.g. SPI/BIOS/UEFI, EC, ME etc) and shows all relevant info. It supports all AMI UCP revisions and formats, including those with nested AMI PFAT, AMI UCP or Insyde iFlash/iFdPacker structures. The output comprises only final firmware components and utilities which are directly usable by end users.

Usage

You can either Drag & Drop or manually enter AMI UCP Update executable file(s). Optional arguments:

  • -h or --help : show help message and exit
  • -v or --version : show utility name and version
  • -i or --input-dir : extract from given input directory
  • -o or --output-dir : extract in given output directory
  • -e or --auto-exit : skip all user action prompts
  • -c or --checksum : verify AMI UCP Checksums (slow)

Compatibility

Should work at all Windows, Linux or macOS operating systems which have Python 3.10 or newer support.

Prerequisites

To run the utility, you must have the following 3rd party tools at the "external" project directory:

Optionally, to decompile the AMI UCP > AMI PFAT > Intel BIOS Guard Scripts (when applicable), you must have the following 3rd party utility at the "external" project directory:

Apple EFI IM4P Splitter

Description

Parses Apple IM4P multi-EFI files and splits all detected EFI firmware into separate Intel SPI/BIOS images. The output comprises only final firmware components and utilities which are directly usable by end users.

Usage

You can either Drag & Drop or manually enter Apple EFI IM4P file(s). Optional arguments:

  • -h or --help : show help message and exit
  • -v or --version : show utility name and version
  • -i or --input-dir : extract from given input directory
  • -o or --output-dir : extract in given output directory
  • -e or --auto-exit : skip all user action prompts

Compatibility

Should work at all Windows, Linux or macOS operating systems which have Python 3.10 or newer support.

Prerequisites

To run the utility, you do not need any prerequisites.

Apple EFI Image Identifier

Description

Parses Apple EFI images and identifies them based on Intel's official $IBIOSI$ tag, which contains info such as Model, Version, Build, Date and Time. Optionally, the utility can rename the input Apple EFI image based on the retrieved $IBIOSI$ tag info, while also making sure to differentiate any EFI images with the same $IBIOSI$ tag (e.g. Production, Pre-Production) by appending a checksum of their data.

Usage

You can either Drag & Drop or manually enter Apple EFI image file(s). Optional arguments:

  • -h or --help : show help message and exit
  • -v or --version : show utility name and version
  • -i or --input-dir : extract from given input directory
  • -o or --output-dir : extract in given output directory
  • -e or --auto-exit : skip all user action prompts
  • -r or --rename : rename EFI image based on its tag

Compatibility

Should work at all Windows, Linux or macOS operating systems which have Python 3.10 or newer support.

Prerequisites

To run the utility, you must have the following 3rd party tools at the "external" project directory:

Apple EFI Package Extractor

Description

Parses Apple EFI PKG firmware packages (i.e. FirmwareUpdate.pkg, BridgeOSUpdateCustomer.pkg), extracts their EFI images, splits those in IM4P format and identifies/renames the final Intel SPI/BIOS images accordingly. The output comprises only final firmware components which are directly usable by end users.

Usage

You can either Drag & Drop or manually enter Apple EFI PKG package file(s). Optional arguments:

  • -h or --help : show help message and exit
  • -v or --version : show utility name and version
  • -i or --input-dir : extract from given input directory
  • -o or --output-dir : extract in given output directory
  • -e or --auto-exit : skip all user action prompts

Compatibility

Should work at all Windows, Linux or macOS operating systems which have Python 3.10 or newer support.

Prerequisites

To run the utility, you must have the following 3rd party tools at the "external" project directory:

Apple EFI PBZX Extractor

Description

Parses Apple EFI PBZX images, re-assembles their CPIO payload and extracts its firmware components (e.g. IM4P, EFI, Utilities, Scripts etc). It supports CPIO re-assembly from both Raw and XZ compressed PBZX Chunks. The output comprises only final firmware components and utilities which are directly usable by end users.

Usage

You can either Drag & Drop or manually enter Apple EFI PBZX image file(s). Optional arguments:

  • -h or --help : show help message and exit
  • -v or --version : show utility name and version
  • -i or --input-dir : extract from given input directory
  • -o or --output-dir : extract in given output directory
  • -e or --auto-exit : skip all user action prompts

Compatibility

Should work at all Windows, Linux or macOS operating systems which have Python 3.10 or newer support.

Prerequisites

To run the utility, you must have the following 3rd party tools at the "external" project directory:

Award BIOS Module Extractor

Description

Parses Award BIOS images and extracts their modules (e.g. RAID, MEMINIT, _EN_CODE, awardext etc). It supports all Award BIOS image revisions and formats, including those which contain LZH compressed files. The output comprises only final firmware components which are directly usable by end users.

Usage

You can either Drag & Drop or manually enter Award BIOS image file(s). Optional arguments:

  • -h or --help : show help message and exit
  • -v or --version : show utility name and version
  • -i or --input-dir : extract from given input directory
  • -o or --output-dir : extract in given output directory
  • -e or --auto-exit : skip all user action prompts

Compatibility

Should work at all Windows, Linux or macOS operating systems which have Python 3.10 or newer support.

Prerequisites

To run the utility, you must have the following 3rd party tool at the "external" project directory:

Dell PFS Update Extractor

Description

Parses Dell PFS Update images and extracts their Firmware (e.g. SPI, BIOS/UEFI, EC, ME etc) and Utilities (e.g. Flasher etc) component sections. It supports all Dell PFS revisions and formats, including those which are originally LZMA compressed in ThinOS packages (PKG), ZLIB compressed or Intel BIOS Guard (PFAT) protected. The output comprises only final firmware components which are directly usable by end users.

Usage

You can either Drag & Drop or manually enter Dell PFS Update images(s). Optional arguments:

  • -h or --help : show help message and exit
  • -v or --version : show utility name and version
  • -i or --input-dir : extract from given input directory
  • -o or --output-dir : extract in given output directory
  • -e or --auto-exit : skip all user action prompts
  • -a or --advanced : extract signatures and metadata
  • -s or --structure : show PFS structure information

Compatibility

Should work at all Windows, Linux or macOS operating systems which have Python 3.10 or newer support.

Prerequisites

Optionally, to decompile the Intel BIOS Guard (PFAT) Scripts, you must have the following 3rd party utility at the "external" project directory:

Fujitsu SFX BIOS Extractor

Description

Parses Fujitsu SFX BIOS images and extracts their obfuscated Microsoft CAB archived firmware (e.g. SPI, BIOS/UEFI, EC, ME etc) and utilities (e.g. WinPhlash, PHLASH.INI etc) components. The output comprises only final firmware components which are directly usable by end users.

Usage

You can either Drag & Drop or manually enter Fujitsu SFX BIOS image file(s). Optional arguments:

  • -h or --help : show help message and exit
  • -v or --version : show utility name and version
  • -i or --input-dir : extract from given input directory
  • -o or --output-dir : extract in given output directory
  • -e or --auto-exit : skip all user action prompts

Compatibility

Should work at all Windows, Linux or macOS operating systems which have Python 3.10 or newer support.

Prerequisites

To run the utility, you must have the following 3rd party tool at the "external" project directory:

Fujitsu UPC BIOS Extractor

Description

Parses Fujitsu UPC BIOS images and extracts their EFI compressed SPI/BIOS/UEFI firmware component. The output comprises only a final firmware component which is directly usable by end users.

Usage

You can either Drag & Drop or manually enter Fujitsu UPC BIOS image file(s). Optional arguments:

  • -h or --help : show help message and exit
  • -v or --version : show utility name and version
  • -i or --input-dir : extract from given input directory
  • -o or --output-dir : extract in given output directory
  • -e or --auto-exit : skip all user action prompts

Compatibility

Should work at all Windows, Linux or macOS operating systems which have Python 3.10 or newer support.

Prerequisites

To run the utility, you must have the following 3rd party tool at the "external" project directory:

Insyde iFlash/iFdPacker Extractor

Description

Parses Insyde iFlash/iFdPacker Update images and extracts their firmware (e.g. SPI, BIOS/UEFI, EC, ME etc) and utilities (e.g. InsydeFlash, H2OFFT, FlsHook, iscflash, platform.ini etc) components. It supports all Insyde iFlash/iFdPacker revisions and formats, including those which are 7-Zip SFX 7z compressed in raw, obfuscated or password-protected form. The output comprises only final firmware components which are directly usable by end users.

Usage

You can either Drag & Drop or manually enter Insyde iFlash/iFdPacker Update image file(s). Optional arguments:

  • -h or --help : show help message and exit
  • -v or --version : show utility name and version
  • -i or --input-dir : extract from given input directory
  • -o or --output-dir : extract in given output directory
  • -e or --auto-exit : skip all user action prompts

Compatibility

Should work at all Windows, Linux or macOS operating systems which have Python 3.10 or newer support.

Prerequisites

To run the utility, you do not need any prerequisites.

Panasonic BIOS Package Extractor

Description

Parses Panasonic BIOS Package executables and extracts their firmware (e.g. SPI, BIOS/UEFI, EC etc) and utilities (e.g. winprom, configuration etc) components. It supports all Panasonic BIOS Package revisions and formats, including those which contain LZNT1 compressed files. The output comprises only final firmware components which are directly usable by end users.

Usage

You can either Drag & Drop or manually enter Panasonic BIOS Package executable file(s). Optional arguments:

  • -h or --help : show help message and exit
  • -v or --version : show utility name and version
  • -i or --input-dir : extract from given input directory
  • -o or --output-dir : extract in given output directory
  • -e or --auto-exit : skip all user action prompts

Compatibility

Should work at all Windows, Linux or macOS operating systems which have Python 3.10 or newer support.

Prerequisites

To run the utility, you must have the following 3rd party Python modules installed:

Moreover, you must have the following 3rd party tool at the "external" project directory:

Phoenix TDK Packer Extractor

Description

Parses Phoenix Tools Development Kit (TDK) Packer executables and extracts their firmware (e.g. SPI, BIOS/UEFI, EC etc) and utilities (e.g. WinFlash etc) components. It supports all Phoenix TDK Packer revisions and formats, including those which contain LZMA compressed files. The output comprises only final firmware components which are directly usable by end users.

Usage

You can either Drag & Drop or manually enter Phoenix Tools Development Kit (TDK) Packer executable file(s). Optional arguments:

  • -h or --help : show help message and exit
  • -v or --version : show utility name and version
  • -i or --input-dir : extract from given input directory
  • -o or --output-dir : extract in given output directory
  • -e or --auto-exit : skip all user action prompts

Compatibility

Should work at all Windows, Linux or macOS operating systems which have Python 3.10 or newer support.

Prerequisites

To run the utility, you must have the following 3rd party Python module installed:

Portwell EFI Update Extractor

Description

Parses Portwell UEFI Unpacker EFI executables (usually named "Update.efi") and extracts their firmware (e.g. SPI, BIOS/UEFI, EC etc) and utilities (e.g. Flasher etc) components. It supports all known Portwell UEFI Unpacker revisions (v1.1, v1.2, v2.0) and formats (used, empty, null), including those which contain EFI compressed files. The output comprises only final firmware components and utilities which are directly usable by end users.

Usage

You can either Drag & Drop or manually enter Portwell UEFI Unpacker EFI executable file(s). Optional arguments:

  • -h or --help : show help message and exit
  • -v or --version : show utility name and version
  • -i or --input-dir : extract from given input directory
  • -o or --output-dir : extract in given output directory
  • -e or --auto-exit : skip all user action prompts

Compatibility

Should work at all Windows, Linux or macOS operating systems which have Python 3.10 or newer support.

Prerequisites

To run the utility, you must have the following 3rd party Python module installed:

Moreover, you must have the following 3rd party tool at the "external" project directory:

Toshiba BIOS COM Extractor

Description

Parses Toshiba BIOS COM images and extracts their raw or compressed SPI/BIOS/UEFI firmware component. This utility is basically an easy to use python wrapper around ToshibaComExtractor by LongSoft. The output comprises only a final firmware component which is directly usable by end users.

Usage

You can either Drag & Drop or manually enter Toshiba BIOS COM image file(s). Optional arguments:

  • -h or --help : show help message and exit
  • -v or --version : show utility name and version
  • -i or --input-dir : extract from given input directory
  • -o or --output-dir : extract in given output directory
  • -e or --auto-exit : skip all user action prompts

Compatibility

Should work at all Windows, Linux or macOS operating systems which have Python 3.10 or newer support.

Prerequisites

To run the utility, you must have the following 3rd party tool at the "external" project directory:

VAIO Packaging Manager Extractor

Description

Parses VAIO Packaging Manager executables and extracts their firmware (e.g. SPI, BIOS/UEFI, EC, ME etc), utilities (e.g. WBFLASH etc) and driver (audio, video etc) components. If direct extraction fails, it attempts to unlock the executable in order to run at all non-VAIO systems and allow the user to choose the extraction location. It supports all VAIO Packaging Manager revisions and formats, including those which contain obfuscated Microsoft CAB archives or obfuscated unlock values. The output comprises only final firmware components which are directly usable by end users.

Usage

You can either Drag & Drop or manually enter VAIO Packaging Manager executable file(s). Optional arguments:

  • -h or --help : show help message and exit
  • -v or --version : show utility name and version
  • -i or --input-dir : extract from given input directory
  • -o or --output-dir : extract in given output directory
  • -e or --auto-exit : skip all user action prompts

Compatibility

Should work at all Windows, Linux or macOS operating systems which have Python 3.10 or newer support.

Prerequisites

To run the utility, you must have the following 3rd party tool at the "external" project directory:

biosutilities's People

Contributors

platomav avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

biosutilities's Issues

Windows Error: ModuleNotFoundError: No module named 'common.checksums'

The script runs on Linux, but on Windows 7 with Python 3.8 installed, I get this error:

Traceback (most recent call last):
File "Dell_PFS_Extract.py", line 23, in
from common.checksums import get_chk_8_xor
ModuleNotFoundError: No module named 'common.checksums'

I tried installing the common module with pip, it seems to have installed something, but it did not solve the issue.

Error: This is not a supported input!

Hello!
I am trying to extract the .bin file with the Dell_PFS_Extract script and it is resulting in this message "Error: This is not a supported input!".
Does it really fail to extract the file of this type of .exe or am I doing something wrong? I'll put a screenshot to see if it can help me. The .exe is a dell notebook bios that I downloaded from the dell website.
https://www.dell.com/support/home/pt-br/drivers/driversdetails?driverid=5rnv1&oscode=wt64a&productcode=inspiron-14-5442-laptop
Thanks for help me.

Dell PFS

Need help determining what is needed to update my bios

I am very confused by my Samsung Expert NP350xbe-XD1BR's BIOS. It is apparently an AMI BIOS, yet when I extract the files inside the executable provided by Samsung (which I was unable to use for the update), it has a .cap file. Which is apparently used by Intel or Asus, from what I could gleam?

I have no idea how to use this file to update my BIOS, or even to convert it into something usable. All the guides I found talk about how to do it for Asus, but I have no idea why this Asus bios file is in a bios for a Samsung device? With an AMI motherboard?? Can someone please help clear this up?

Dell_PFS_Assembler is not working

PFS_ The assembler project is no longer available. Can you continue to update it?

Your work is great. Thank you very much for your hard work

Removing the dependency on the TianoCompress tool

Hi. In efi_decompress function decompressing is done with the TianoCompress tool:

subprocess.run([get_tiano_path(), '-d', in_path, '-o', out_path, '-q', comp_type], check=True, stdout=subprocess.DEVNULL)

It can easily be avoided by using efi_compressor.EfiDecompress from uefi-firmware-parser: https://github.com/theopolis/uefi-firmware-parser/blob/963ce5c8ab5a83719b2f6666d717ef405f818c2b/uefi_firmware/compression/EfiCompressor.c.

What if someone extract PE Overlay of Update file before using your script?

before finding your code i was trying to do it myself and i find out main part of PE executable bios update is the overlay, it is easy to extract overlay from a PE COFF file, i did it and then by searching the file's header i found your work: AMI_UCP_Extract.py
although it was successful to extract the bios from the executable update file but it couldn't extract it from extracted overlay
because in extracted overlay @uaf header began in location 0 so line 515 (if not main_uaf_off:) will fail although 0 is the location of @uaf

anyway i found an opportunity to say thanks for your work
good job

[AMI PFAT Extractor] Issues while unpacking TigerLake PFAT image for ASUS ZenBook Flip S UX371

The file: https://dlcdnets.asus.com/pub/ASUS/nb/UX363EA/UX363EAAS301.zip
The issue:
Traceback (most recent call last):
File "/Users/nschlej/Desktop/AMI_PFAT_Extract.py", line 160, in
if blocks[i][0] != block_name : print('\n%s (Parameter: %s, Update: %s)' % (blocks[i][0], blocks[i][1], ['No','Yes'][blocks[i][2]]))
IndexError: list index out of range

If commented out, the resulting image is still incorrect, I bet they updated the structures slightly.

not work

tested for new generation not work .am tested with extracted dell vostro 5459 not working.please update .thanks for all

Dell_PFS_Extract.py script is not working

Hi, guys!

I've tried use the Dell_PFS_Extract.py script to extract a dell bios, but that seems is not working, despite it doesn't print out any error message.

The script just end as if it was successful, however nothing is extracted.

I tested it under Windows 10 and Ubuntu 22.04...

Thank you for any help! 🚀

Fujitsu UPC tianocore error

Hi, I'm trying to decompress a Fujitsu UPC bios update but your python Fujitsu_UPC_Extract.py gives a Tianocore error parsing the UPC files inside that bios file.

May you download and extract that bios and try to parse with your tool , pls?

D3235.zip

Many thanks.

--input-dir argument

Hi !

Here is a "little" feedback for this great project.

It seems a checking for --input-dir argument is not implemented yet, despite that is listed in the scripts help.

  • By using the --input-dir argument along the wrong file, it doesn't throw "Error: This is not a supported input!" message in ANY script.
  • Although the script receives the correct file for extraction, just for passing a --input-dir argument to it, the script doesn't perform extraction anymore. At least that was what happen with AMI_UCP_Extract.py when using it along this bios.

NOTE 1 (Ergonomics): That's an ergonomic point, specially for newbies on "Bios Mod" (or Python language).

NOTE 2 (BUG): Passing the correct argument (and correct BIOS file) to the correct script and getting incorrect result is a bug. Even if this argument is OPTIONAL.

Thanks 🚀

Dell PFS Update Extractor v5.1 doesn't work on Dell Optiplex 7090 BIOS

  1. I tried on Dell Optiplex 7080 BIOS v1.0.7 and it worked.

  2. I also tried on the latest Optiplex 7080 BIOS v1.5.1, (file name: OptiPlex_7090_1.5.1.exe), which gives the following info:
    *** Dell_PFS_Extract.exe

    Error: This is not a Dell PFS update image!

*** OptiPlex_7090_1.5.1.exe

Extracted Dell PFS 1 > OptiPlex_7090_1.5.1 > Utilities section!

    Extracted Dell PFS 2 > BuffaloRkl_15.0.35.2028_EVT_BUFFALO_64 v1.5.1 > Utilities section!

Error: Dell PFS Update Extractor v5.1 crashed, please report the following:

Traceback (most recent call last):
File "Dell_PFS_Extract.py", line 1245, in
File "Dell_PFS_Extract.py", line 407, in main
File "Dell_PFS_Extract.py", line 513, in pfs_section_parse
File "Dell_PFS_Extract.py", line 732, in pfs_extract
File "Dell_PFS_Extract.py", line 513, in pfs_section_parse
File "Dell_PFS_Extract.py", line 790, in pfs_extract
File "Dell_PFS_Extract.py", line 1055, in pfs_file_write
FileNotFoundError: [Errno 2] No such file or directory: 'C:\Users\Administrator\Desktop\Dell BIOS\Dell Optiplex 7090 BIOS\V1.5.1\OptiPlex_7090_1.5.1.exe_extracted\Firmware\2 BuffaloRkl_15.0.35.2028_EVT_BUFFALO_64 v1.5.1\Firmware\2 BuffaloRkl_15.0.35.2028_EVT_BUFFALO_64 v1.5.1 -- 1 System BIOS with BiosGuard v1.5.1.bin'

Press enter to exit

python 3.12 no error but nothing hapens

Just nothing

W:\Downloads\BIOSUtilities-main>python --version
Python 3.12.1

W:\Downloads\BIOSUtilities-main>python .\Dell_PFS_Extract.py W:\temp\7050\OptiPlex_7050_1.27.0.exe

W:\Downloads\BIOSUtilities-main>python .\Dell_PFS_Extract.py -s W:\temp\7050\OptiPlex_7050_1.27.0.exe

W:\Downloads\BIOSUtilities-main>python .\Dell_PFS_Extract.py --input-dir W:\temp\7050 -o W:\temp

W:\Downloads\BIOSUtilities-main>.\Dell_PFS_Extract.py

W:\Downloads\BIOSUtilities-main>.\Dell_PFS_Extract.py -h

W:\Downloads\BIOSUtilities-main>

Input error?

I am trying to extract the bios from a Alienware Aurora R7 using this tool.
I drag & drop Alienware_Aurora_R7_1.0.20.exe onto Dell_PFS_Extract.py, but then I get this Error: 'This is not a supported input!'
I am not experienced with Python so it probably is an issue on my side.

Recording.2023-04-26.121038.mp4

Alienware_ x15_ X17 cannot use Dell_ PFS_ Extract extract.

Alienware_ x15_ X17 cannot use Dell_ PFS_ Extract extract,I can use the writeromfile command to decompress normally, but the decompressed file is opened with WinHex. It seems that the content is encrypted and cannot be synthesized with the backup program normally, After my repeated tests, I found that many new Alienware series programs cannot be extracted normally. Can you help solve this problem? Or develop a corresponding program.

[Suggestion] Intel BIO -> FD converter

Looks like Intel is transitioning support for NUC product lineup to Asus, which means they will stop "innovate" at their dreaded BIO file format soon. I doubt Asus will switch to the usual AMI PFAT Capsules, and I also doubt Asus will change anything substantial about the format, so now is a prime moment to add support for them, i.e. be able to reconstruct an SPI-writer-friendly FD image from an input BIO image without using a hex editor and error-prone manual process.

Dell_PFS_Extract.py", line 23

Dell_PFS_Extract.py", line 23, in
from common.checksums import get_chk_8_xor
ModuleNotFoundError: No module named 'common'

Dell PFS Update Extractor - not work in windows 7

Hi!
Why "Dell PFS Update Extractor" only support Python 3.10? 3.10 not work in W7, but W7 is good OS for work.
I compile "Dell_PFS_Extract.py" to EXE in 3.8.1 (last work in W7), but this utility bad work in W7 on file: Precision_3570_Latitude_5530_1.2.1.exe

Dell PFS Update Extractor v6.0_a16

*** Precision_3570_Latitude_5530_1.2.1.exe

    Extracting Dell PFS 1 > Precision_3570_Latitude_5530_1.2.1 > Utilities

    Extracting Dell PFS 1 > Precision_3570_Latitude_5530_1.2.1 > Firmware

        Extracting Dell PFS 2 > D_BIOS_Package_Tool_Ver1.2.0_Precision_3570_Latitude_5530_ADL_1.2.1
v1.2.1 > Firmware

Error: Utility crashed, please report the following:

Traceback (most recent call last):
  File "Dell_PFS_Extract.py", line 1067, in <module>
  File "common\templates.py", line 93, in run_utility
  File "Dell_PFS_Extract.py", line 250, in pfs_pkg_parse
  File "Dell_PFS_Extract.py", line 396, in pfs_section_parse
  File "Dell_PFS_Extract.py", line 626, in pfs_extract
  File "Dell_PFS_Extract.py", line 396, in pfs_section_parse
  File "Dell_PFS_Extract.py", line 695, in pfs_extract
  File "Dell_PFS_Extract.py", line 1009, in pfs_file_write
FileNotFoundError: [Errno 2] No such file or directory: 'E:\\tmp\\Precision_3570_Latitude_5530_1.2.1.exe_extracted\\Firmware\\2D_BIOS_Package_Tool_Ver1.2.0_Precision_3570_Latitude_5530_ADL_1.2.1v1.2.1\\Firmware\\2D_BIOS_Package_Tool_Ver1.2.0_Precision_3570_Latitude_5530_ADL_1.2.1 v1.2.1 -- 1 System BIOS with BiosGuard v1.2.1.bin

Press enter to exit

Error: This is not an AMI BIOS Guard (PFAT) image! HELP

Hello I have Asus Rog Zephyrus M16 2021 GU603HE.
I usually left open my laptop. Last week when I entered the room I noticed computer was in bios and will be upgrading it bios version in 30 second.
I rushed it and hold the power button because I don't want it to be updated. After 5 seconds bios update started and in the 6. second computer shotted down.
After this moment nothing comes the screen. Keyboard lights are on and fans are spinning.

I bought CH341A and manage to read the bios chip. Made few changes, tried different things and reprogrammed it but nothings changed.

Also I couldn't analyze official bios because it says "AMI BIOS Guard (PFAT) protected image". And I couldn't remove the protection. It says " Error: This is not an AMI BIOS Guard (PFAT) image!"

What should I do any suggestions? Can someone help me?

ASUS GU603HE 315 BIOS OFFICIAL SITE

virustotal 9 engines detected this file Dell_PFS_Extract.exe in Dell_PFS_Extract_v4.2.rar

1.Unzip Dell_PFS_Extract_v4.2.rar to get Dell_PFS_Extract.exe
2.upload Dell_PFS_Extract.exe to virustotal
3.9 engines detected this file

Supply chain attack or just false positive?

AMI_PFAT_Extract not working with new METEORLAKE core ultra AMI BIOS Guard protected images

ASUS released new Intel 14th gen Core Ultra ASUS Zenbook 14.
https://www.asus.com/laptops/for-home/zenbook/asus-zenbook-14-oled-ux3405/techspec/

And AMI BIOS Guard Extractor v4.0_a12 not working with it's AMI BIOS Guard protected BIOS images. Showing many errors.
Error log: https://mega.nz/file/sTR3nLDD#K0fqlV8GorWfuubM3heOii0RHSIhvMca-LW9_UAPDvk
bios image: https://mega.nz/file/FapnAYKQ#HBuHEUFEHgq6f-XsYF7Tr7VKLCunhnk0CkePpOm1QS0

Dell PFS Extractor finishes execution without errors, even though no output is generated

Hi! I tried running the Dell PFS Extractor on both XPS 15 BIOS v1.6.0 and v1.15.0, using the following command:

.\Dell_PFS_Extract.exe -i .\XPS_7590_1.6.0.exe -o test.txt -v

The only terminal output I got was

Dell PFS Update Extractor v5.1

Done!

However, no output was generated. Could you check if you are facing this issue as well? The weird thing is that the OP of this guide has said that he or she was able to use your tool to extract the relevant information. Am I missing something here?

'AMI BIOS Guard Extractor' or 'AMI UCP BIOS Extractor' not working for Lenovo BIOS

Hi,

Thanks for making these tools. I've tried the Dell BIOS Extractor and got it working for my Dell Optiplex 3080. I'm trying to do the same thing but for my Lenovo M92p Tiny and I've tried using both the AMI BIOS Guard Extractor and AMI UCP BIOS Extractor and neither are able to extract any useful files from my Lenovo BIOS.......My Lenovo BIOS definitely use AMI.

You can find the BIOS from here:
https://support.lenovo.com/au/en/downloads/ds029265-flash-bios-update-thinkcentre-edge-92-thinkcentre-m82-m92-and-m92p-thinkstation-e31

I'm using the already compiled .exes from your Releases page. Please let me know what I'm doing wrong, or whether your tool actually supports that BIOS version, thanks!

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.