efiXplorer v4.1 releases: IDA plugin for UEFI firmware analysis and reverse engineering automation
efiXplorer – IDA plugin for UEFI firmware analysis and reverse engineering automation
Supported versions of Hex-Rays products: every time we focus on the last versions of IDA and Decompiler because trying to use the most recent features from new SDK releases. That means we tested only on recent versions of Hex-Rays products and do not guarantee stable work on previous generations.
Why not IDApython: all code developed in C++ because it’s a more stable and performant way to support a complex plugin and get the full power of the most recent SDK’s features.
Supported Platforms: Win, Linux, and OSX (x86/x64).
Key features
Identify available Boot Services automatically
Annotate assembly code automatically with available Boot Services
Identify available Runtime Services automatically
Annotate assembly code automatically with available Runtime Services
Identify available EFI Protocols automatically
Identify known EFI GUID’s
efiXplorer Architecture
From the beginning of the project, we focus on building extensible architecture to make our life easier to support the current version and adding new features 🚀
Changelog v4.1
- [new feature] Improved SMI handlers recognition to support: SxSmiHandler, IoTrapSmiHandler, UsbSmiHandler and etc.
- [new feature] Improved child SW SMI handlers recognition and now annotated as ChildSwSmiHandler.
- [new feature] Added visual representation for NVRAM variables and additional context in JSON report: address, service name, var name and var GUID.
- [bug fix] Numerous improvements and bug fixes in code analyzer and firmware image loader
- Moving to support of IDA SDK v7.7
Download
Copyright (C) 2020 Binarly