This only works if you are able to boot into an OS
A GUI-based BIOS password brute-force tool for HP machines, written in Rust with real-time parallel attacks and a hacker-styled dark UI.
Use this tool to recover locked BIOS setups legally and ethically (e.g., forgotten supervisor password on your own hardware).
- π Real BIOS unlock attempts using
HPQPswd64.exe+BiosConfigUtility64.exe - π§© Multiple attack modes: Guess-based, Rule-based, Dictionary, Hybrid
- ποΈ GUI with dark theme (
egui+eframe) - π Fast, parallel candidate testing with
rayon - π§ Variant + mask-based modeling for intelligent guessing
- π Thread-safe, asynchronous attempt logging
- π§ Custom icon support (
bios_lock.png) - π₯ Launch GUI or CLI from setup script, Git clone, or binary
| Requirements | Minimum Version | Recommended | Purpose |
|---|---|---|---|
| π¦ Rust | 1.74+ | Latest | Language / compiler |
| π¦ Git | 2.30+ | Latest | Clone + version control |
| β¬οΈ HP Tools | N/A | Auto-fetched | Interact with BIOS config |
πΌοΈ bios_lock.png |
Any PNG | 128Γ128 | GUI icon (taskbar + window) |
| πͺ OS | Windows 10/11 | 64-bit | Required for BIOS execution |
Here's a clean and professional installation guide you can paste into your GitHub README.md:
This tool requires a few dependencies to build and run. The installation process is mostly automated and checks for existing tools before installing anything new.
- Windows 10/11 with PowerShell
- Administrator privileges (for some installations)
- Install Visual Studio Build Tools (if not already installed)
- Install Rust via
rustup(if not already installed) - Install Git (if not already installed)
- Clone this repository
- Build the project using Cargo
- Run the executable
Copy and paste this into PowerShell (Run as Administrator):
Get-Command cl.exe -ErrorAction SilentlyContinue >$null || (
Start-Process "https://aka.ms/vs/17/release/vs_buildtools.exe" -Wait;
Start-Process "vs_buildtools.exe" -ArgumentList "--add Microsoft.VisualStudio.Workload.NativeDesktop --includeRecommended --passive --norestart" -Wait
);
(Get-Command rustc.exe -ErrorAction SilentlyContinue) -or (irm https://sh.rustup.rs -UseBasicParsing | iex);
$env:Path += ";$env:USERPROFILE\.cargo\bin";
git --version 2>$null || (
Invoke-WebRequest https://github.com/git-for-windows/git/releases/download/v2.43.0.windows.1/Git-2.43.0-64-bit.exe -OutFile git-installer.exe;
Start-Process .\git-installer.exe -Wait;
Remove-Item .\git-installer.exe
);
if (!(Test-Path .\HP-ADMIN-UEFI-PASSWORD-BRUTEFORCE)) {
git clone https://github.com/yourusername/HP-ADMIN-UEFI-PASSWORD-BRUTEFORCE.git
}
cd HP-ADMIN-UEFI-PASSWORD-BRUTEFORCE
cargo build --release
.\bios-password-cracker\target\release\bios-password-cracker.exe- The script auto-skips any tools already installed.
- Make sure to restart PowerShell if Rust or VS Build Tools were newly installed.
- Tested on Windows 10/11 x64 with WSL and bare metal setups.
cargo run --release- Creates
HPUtilities/folder on first run - Downloads required HP EXEs automatically
- Opens GUI to configure and launch attacks
- Writes logs to
attempts.logand success result tosuccessful_password.txt
| Mode | Input Required | Use Case |
|---|---|---|
| Guess | A 7-char base guess (e.g. admin12) |
Attempts close variants first |
| Rule-based | Mask (LLSLLDD) + char sets |
Targeted brute-force pattern |
| Dictionary | Text file with password list | Common passwords, known leaks |
| Hybrid | All of the above combined | Smart full-spectrum attack |
| File Path | Description |
|---|---|
attempts.log |
Timestamped brute-force attempts |
successful_password.txt |
Saved result if successful |
bios-password-cracker/wordlists/ |
Your wordlists go here |
HPUtilities/*.exe |
HP BIOS utilities (downloaded) |
π¦ HP-ADMIN-UEFI-PASSWORD-BRUTEFORCE/
β£ π Cargo.toml # Workspace
β£ π bios-password-cracker/
β β£ π Cargo.toml # GUI App
β β£ π src/main.rs # GUI + logic
β β£ π bios_lock.png # Icon
β β£ π README.md # You're reading it
β β£ π attempts.log # Log file
β β£ π successful_password.txt # Cracked result (if found)
β β£ π wordlists/
β β β£ π default.txt
β β β π Award_BIOS.txt, AMI_BIOS.txt ...
β π bios_cracker_setup.bat # Automated build + run
# Start GUI normally
cargo run --release
# Use batch setup on clean Windows install
.\bios_cracker_setup.batYou can drop wordlists into:
bios-password-cracker/wordlists/
Some included lists:
AMI_BIOS.txtAward_BIOS.txtOther_BIOS.txtLenovo_BIOS.txt
You may also create custom.txt or import rockyou.txt.
If you see this during cargo build:
error: linker `link.exe` not found
note: please ensure that Visual Studio 2017 or later, or Build Tools for Visual Studio were installed with the Visual C++ option.
π You are missing the MSVC C++ toolchain needed to compile Rust projects on Windows.
- Download Visual Studio Build Tools
- Run the installer and select:
- β Desktop development with C++
- β also check MSVC v14.x, Windows SDK, and C++ build tools are selected
- Finish the install and restart your terminal
- Run:
cargo build --release
If you want to verify it's installed, run:
where linkπ§ VS Code alone is not enough β only Visual Studio Build Tools include link.exe and the required C++ compiler.
## π Legal Notice
This tool is for **educational and lawful recovery use only.**
Do **not** use this to bypass security illegally.
> π we do **not condone** or support unauthorized access of systems.
> Use it to **recover your own devices** β **you are responsible for your actions.**
## π§ Author
**Evan Saurage**
@sunofva
os reinstall number 5854336
## π License
MIT License. Free to use, modify, and distribute with credit.
Intended for restoration, recovery, and research.