diff --git a/README.md b/README.md
index 226bbb6..94d0897 100644
--- a/README.md
+++ b/README.md
@@ -14,3 +14,16 @@ Open Powershell (as Admin) and run:
![Execution](./Execution.PNG)
+There also another script module from [Github](https://github.com/mattifestation/TCGLogTools) (and recommended by Mycrosoft on their blogpost about this vulnerability) that can be used to inspect Bios boot logs and changes.
+
+To use them, import module from their repo in Powershell:
+
+ Import-Module .\TCGLogTools.psm1
+
+And then follow instructions on their git and Microsoft blogpost:
+
+ .\ListBootApps.ps1
+
+
+
+