Legal Notice: This tool is for legitimate password recovery on systems you own only. Unauthorized access to computer systems is illegal.
BIOS/UEFI Password Bypass Tool
Security research utility for firmware password recovery and analysis
Firmware Security
Python 3.8+
GPLv3 Licensed
⚠️ Important Disclaimer
This tool is provided exclusively for:
- Legitimate password recovery on systems you own
- Ethical security research
- Educational purposes
The developers assume no liability for misuse of this software.
✨ Features
Password Generation
Backdoor password generation for major BIOS vendors including Phoenix, Insyde, and AMI
UEFI Inspection
Comprehensive UEFI variable inspection and analysis (Linux systems)
System Analysis
Detailed firmware information gathering and reporting
Safety Checks
Built-in protections to prevent accidental system damage
🏭 Supported Vendors
Vendor | Status | Notes |
---|---|---|
Phoenix | ✅ Working | Basic algorithm support |
Insyde | ✅ Working | Similar to Phoenix |
AMI | ✅ Working | Partial support |
Award | ⚠️ Limited | Basic support |
Lenovo | 🚧 Experimental | Work in progress |
Dell | 🚧 Experimental | Work in progress |
📦 Installation
Prerequisites
- Python 3.8 or higher
- Administrative privileges (for some features)
- Linux or Windows system
Installation Steps
# Clone the repository
git clone https://github.com/yourusername/bios-password-bypass.git
cd bios-password-bypass
# Install dependencies
pip install -r requirements.txt
💻 Usage
Basic Information Scan
# Display system BIOS/UEFI information
python src/main.py
Password Generation
# Generate backdoor passwords
python src/main.py --generate
# Specific vendor (Phoenix example)
python src/main.py --generate --vendor Phoenix
UEFI Variable Inspection (Linux)
# List all UEFI variables
sudo python src/main.py --list-uefi
# List first 10 variables
sudo python src/main.py --list-uefi | head -n 10
📜 License & Attribution
GPLv3 © 2023 Nur-m2r5r
This project is licensed under the GNU General Public License v3.0. See LICENSE for full terms.
Credits
- Developed by Nur-m2r5r
- Based on security research from multiple sources
- Inspired by historical BIOS backdoor algorithms