EfiPy: Python Library for accessing UEFI BIOS internal function by protocol

I just noticed this project, and it’s been around for years, and I’ve been using UEFI and Python for years, sigh. 😦 It appears the developer is Max Wu of Phoenix. There is a blog, in addition to the tool. The blog has also been around for a long time, last post was last month, on UEFI topic not scoped to EfiPy.

EfiPy is a Python Module on UEFI shell which can access UEFI BIOS kernel interface:
– System Table
– Runtime Services
– Boot Services

pAnalyzer package –
Tracing UEFI protocol calling flow
Output protocol flow to screen or file with XML format

CorePy (assembly package) –
Simple Assembly code in Python environment.

EfiPy Shell package-
Simple uefi shell program coded with EfiPy library to prove EfiPy workable

EfiPy leverage these open source packages – ctypes, CorePy.

http://efipy.blogspot.com/2019/02/get-ipv4-information-via.html

https://sourceforge.net/projects/efipy/

https://sourceforge.net/projects/efipy/files/

UEFI Utility DisplayBMP Updated to Support More Formats and Scrolling

This post details recent updates to a simple UEFI shell utility for displaying BMP images that I first released in 2015 and subsequently updated in 2017, and again this year. Source code for the previous versions is available on Github at UEFI-Utilities-2016 and UEFI-Utilities-2018 respectfully.[…]

https://blog.fpmurphy.com/2019/02/uefi-utility-displaybmp-updated-to-support-more-formats-and-scrolling.html

UEFI PI spec updated

The UEFI Forum has released a new version of the PI spec. William’s blog entry has a copy of the relevent section of the release notes:

https://uefi.org/specifications

Click to access PI_Spec_1_7_final_Jan_2019.pdf

https://www.basicinputoutput.com/2019/02/uefi-forum-releases-pi-spec-17.html

Some input from Nikolaj:

Patching Yourself into Windows Code Integrity, Part 1: On-Disk Patching

I started this whole thing because I wanted to run my own kernel-mode code while still having access games protected by anti-cheat that don’t allow test signing, and I didn’t want to shell out the time and money required to get an EV certificate. […]I’m going to start out by patching binaries on disk, but the end result will be a UEFI application that patches all binaries in memory. […]

https://github.com/Avery3R/re-writeups/blob/master/windows-ci/part1_on_disk_patching.md