diff --git a/README.md b/README.md index 226bbb6..94d0897 100644 --- a/README.md +++ b/README.md @@ -14,3 +14,16 @@ Open Powershell (as Admin) and run: ![Execution](./Execution.PNG) +There also another script module from [Github](https://github.com/mattifestation/TCGLogTools) (and recommended by Mycrosoft on their blogpost about this vulnerability) that can be used to inspect Bios boot logs and changes. + +To use them, import module from their repo in Powershell: + + Import-Module .\TCGLogTools.psm1 + +And then follow instructions on their git and Microsoft blogpost: + + .\ListBootApps.ps1 + + + +