Skip to content

ability to extract/replace/etc type 0x62 'BIOS Binary' images. #50

@hanetzer

Description

@hanetzer

From what I can see, psptool completely ignores these type of images.
For the longest I had no idea there was more x86 code inside of a ryzen
UEFI image.

My use case is twofold:

  1. Extracting said image to determine init code from it
  2. Replacing said image with serialice or a similar program for reverse engineering.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions