UEFITool is a viewer and editor of firmware images conforming to UEFI Platform Interface (PI) Specifications.
Unified Extensible Firmware Interface or UEFI is a post-BIOS firmware specification originally written by Intel for Itanium architecture and than adapted for X86 systems. The first EFI-compatible x86 firmwares were used on Apple Macintosh systems in 2006 and PC motherboard vendors started putting UEFI-compatible firmwares on their boards in 2011. In 2015 there are numerous systems using UEFI-compatible firmware including PCs, Macs, Tablets and Smartphones on x86, x86-64 and ARM architectures. More information on UEFI is available on UEFI Forum official site and in Wikipedia.
UEFITool is a cross-platform open source application written in C++/Qt, that parses UEFI-compatible firmware image into a tree structure, verifies image's integrity and provides a GUI to manipulate image's elements. Project development started in the middle of 2013 because of the lack of cross-platform open source utilities for tinkering with UEFI images.
In the beginning of 2015 the major refactoring round was started to make the program compatible with newer UEFI features including FFSv3 volumes and fixed image elements. It's in development right now with the following features still missing:
- Editor part, i.e image reconstruction routines
- Console UI
The missing parts are in development and the version with a new engine will be made as soon as image reconstruction works again.
There are some other projects that use UEFITool's engine:
- UEFIExtract, which uses ffsParser to parse supplied firmware image into a tree structure and dumps the parsed structure recursively on the FS. Jethro Beekman's tree utility can be used to work with the extracted tree.
- UEFIFind, which uses ffsParser to find image elements containing a specified pattern. It was developed for UBU project.
Right now there are some alternatives to UEFITool that you could find useful too:
- FMMT by TianoCore. Python-based open source toolset for modifying EDK2-based UEFI firmware images. Does not support any IBV customizations, but is official, and lives in EDK2 repository.
- Fiano by Google and Facebook. Go-based cross-platform open source toolset for modifying UEFI firmware images.
- PhoenixTool by AndyP. Windows-only freeware GUI application written in C#. Used mostly for SLIC-related modifications, but it not limited to this task. Requires Microsoft .NET 3.5 to work properly. Supports unpacking firmware images from various vendor-specific formats like encrypted HP update files and Dell installers.
- uefi-firmware-parser by Teddy Reed. Cross-platform open source console application written in Python. Very tinker-friendly due to use of Python. Can be used in scripts to automate firmware patching.
- Chipsec by Intel. Cross-platform partially open source console application written in Python and C. Can be used to test Intel-based platforms for various security-related misconfigurations, but also has NVRAM parser and other components aimed to firmware modification.
You can either use pre-built binaries or build a binary yourself.
- To build a binary that uses Qt library (UEFITool) you need a C++ compiler and an instance of Qt5 or Qt6 library. Install both of them, get the sources, generate makefiles using qmake (
qmake ./UEFITool/uefitool.pro
) and use your system's make command on that generated files (i.e.nmake release
,make release
and so on). Qt6-based builds can also use CMAKE as an altearnative build system. - To build a binary that doesn't use Qt (UEFIExtract, UEFIFind), you need a C++ compiler and CMAKE utility to generate a makefile for your OS and build environment. Install both of them, get the sources, generate makefiles using cmake (
cmake UEFIExtract
) and use your system's make command on that generated files (i.e.nmake release
,make release
and so on). Non-Qt builds can also use Meson as an alternative build system.
- Image editing is currently only possible using an outdated and unsupported UEFITool 0.28 (
old_engine
branch) and the tools based on it (UEFIReplace
,UEFIPatch
). This is the top priority issue #67, which is being worked on, albeit slowly (due to the amount of coding and testing required to implement it correctly). - Some vendor-specific firmware update files can be opened incorrectly or can't be opened at all. This includes encrypted HP update files, Dell HDR and EXE files, some InsydeFlash FD files and so on. Enabling support for such files will require massive amount of reverse-engineering which is almost pointless because the updated image can be obtained from BIOS chip where it's already decrypted and unpacked.
- Intel Firmware Interface Table (FIT) editing is not supported right now. FIT contains pointers to various image components that must be loaded before executing the first CPU instruction from the BIOS chip. Those components include CPU microcode updates, binaries and settings used by BIOS Guard and Boot Guard technologies and some other stuff. More information on FIT can be obtained here.
- Windows builds of
UEFIExtract
andUEFIFind
might encouter an issue with folder paths being longer than 260 bytes (MAX_PATH
) on some input files (see issue #363). This is a known Windows limitation, that can be fixed by enabling long paths support via Windows Registry and adding a manifest to the executable file that requires such support.UEFIExtract
has the required manifest additions since versionA67
, and the required registry file is provided by Microsoft on the page linked above, but this workaround is only awailable starting with Windows 10 build 1067.
- Coverity Scan - static analyzer for C, C++, C#, JavaScript, Ruby, or Python code.
- SonarCloud - cloud-based source code analysis service.
Every new release includes an update to the database of known UEFI-related GUIDs build with help of Linux Vendor Firmware Service.
You can download the up-to-date version of that database using this link.
A Python utility for analyzing UEFI firmware images, extracting FFS (Firmware File System) files and embedded PE (Portable Executable) files, and generating comprehensive SBOM (Software Bill of Materials) metadata.
- FFS File Analysis: Extracts UEFI FFS files and their metadata
- PE File Extraction: Identifies and extracts embedded PE files from FFS files
- SBOM Metadata: Generates comprehensive metadata including:
- Version information
- Publisher/Company details
- File descriptions
- PE version strings
- Architecture information
- Build dates
- Digital signatures
- SHA-256 hashes
- File dependencies
- Multiple Output Formats: Supports text, CSV, and JSON output formats
-
Clone or download the utility files:
git clone <repository-url> cd uefi-ffs-pe-analyzer
-
Install dependencies:
pip install -r requirements.txt
Or install manually:
pip install pefile uefi-firmware
python uefi_ffs_pe_analyzer.py firmware.bin
This will analyze the firmware file and generate a text report with default naming.
# Generate text report
python uefi_ffs_pe_analyzer.py firmware.bin --output report.txt --format text
# Generate CSV report
python uefi_ffs_pe_analyzer.py firmware.bin --output report.csv --format csv
# Generate JSON report
python uefi_ffs_pe_analyzer.py firmware.bin --output report.json --format json
# Verbose output
python uefi_ffs_pe_analyzer.py firmware.bin --verbose
firmware_file
: Path to the UEFI firmware file to analyze--output, -o
: Output file path (default:{firmware_name}_sbom.{format}
)--format, -f
: Output format (text
,csv
, orjson
, default:text
)--verbose, -v
: Enable verbose logging--help, -h
: Show help message
Human-readable text report with detailed information about each FFS file and embedded PE file:
FFS File 1: 12345678-9ABC-DEF0-1234-56789ABCDEF0
Component Name: FFS_12345678
GUID: 12345678-9ABC-DEF0-1234-56789ABCDEF0
Version: 1.2.3.4
Type: FFS File
Subtype: DXE driver
Offset: 0x00001234
Size: 65536 bytes
Architecture: x64
Vendor: Unknown
Contained PE Files:
PE File 1: MyDriver
Version: 1.2.3.4
Publisher: Acme Corp
Description: ACME UEFI DXE Driver
PE Version: 1.2.3.4
Architecture: x64
SHA-256 Hash: 9a8b7c6d...
Comma-separated values suitable for spreadsheet analysis or database import.
Structured JSON data with metadata and detailed information about all discovered files.
- GUID: Unique identifier for the FFS file
- Name: Component name
- Type/Subtype: UEFI file type classification
- Offset/Size: Location and size in firmware
- Version: Version information
- Vendor: Publisher information
- Architecture: Target architecture
- Build Date: Compilation timestamp
- Security Attributes: Security-related flags
- Compatibility: UEFI version compatibility
- Version: File version from PE resources
- Publisher: Company name from PE resources
- Description: File description from PE resources
- PE Version: PE-specific version string
- Company: Company name
- Copyright: Copyright information
- Digital Signer: Digital signature details
- Architecture: Target architecture (x86, x64, ARM, etc.)
- Build Date: Compilation timestamp
- SHA-256 Hash: Cryptographic hash of the PE file
- File Size: Size of the PE file
- Subsystem: PE subsystem type
- Machine Type: Target machine architecture
- pefile: Python library for parsing PE (Portable Executable) files
- uefi-firmware: Python library for parsing UEFI firmware images
- structlog: Enhanced logging (uncomment in requirements.txt)
- click: Better CLI interface (uncomment in requirements.txt)
- PE Resource Parsing: Version resource extraction depends on the
pefile
library - UEFI Parsing: Firmware parsing depends on the
uefi-firmware
library - Compressed Files: May not handle all compression formats
- Encrypted Files: Cannot analyze encrypted firmware components
-
"pefile library not available"
pip install pefile
-
"uefi_firmware library not available"
pip install uefi-firmware
-
No FFS files found
- Verify the input file is a valid UEFI firmware image
- Try with
--verbose
flag for more detailed output
-
Permission errors
- Ensure you have read access to the firmware file
- Ensure you have write access to the output directory
Use the --verbose
flag for detailed logging:
python uefi_ffs_pe_analyzer.py firmware.bin --verbose
UEFI FFS PE Analyzer - SBOM Report
==================================================
Generated: 2024-01-15 14:30:25
Total FFS Files: 15
Total PE Files: 23
FFS File 1: 12345678-9ABC-DEF0-1234-56789ABCDEF0
Component Name: FFS_12345678
GUID: 12345678-9ABC-DEF0-1234-56789ABCDEF0
Version: 1.2.3.4
Type: FFS File
Subtype: DXE driver
Offset: 0x00001234
Size: 65536 bytes
Architecture: x64
Vendor: Unknown
Security Attributes: Standard
Compatibility: UEFI 2.x
Contained PE Files:
PE File 1: MyDriver
Version: 1.2.3.4
Publisher: Acme Corp
Description: ACME UEFI DXE Driver
PE Version: 1.2.3.4
Company: Acme Corporation
Copyright: Copyright (c) 2024 Acme Corp
Digital Signer: CN=Acme Signing Authority
Architecture: x64
Build Date: Timestamp: 0x5F3759DF
SHA-256 Hash: 9a8b7c6d5e4f3a2b1c0d9e8f7a6b5c4d3e2f1a0b9c8d7e6f5a4b3c2d1e0f9a8b
File Size: 32768 bytes
Subsystem: EFI Boot Service Driver
Machine Type: x64
- Fork the repository
- Create a feature branch
- Make your changes
- Add tests if applicable
- Submit a pull request
This project is licensed under the BSD License - see the LICENSE file for details.
- UEFI Forum for the UEFI specification
- Microsoft for the PE file format specification
- The
pefile
anduefi-firmware
library maintainers