@@ -3,16 +3,16 @@ UEFI-Shell
3
3
4
4
[ ![ Build status] ( https://img.shields.io/github/actions/workflow/status/pbatard/UEFI-Shell/linux_gcc_edk2.yml?label=Build%20Status&style=flat-square )] ( https://github.com/pbatard/UEFI-Shell/actions/workflows/linux_gcc_edk2.yml )
5
5
[ ![ Github stats] ( https://img.shields.io/github/downloads/pbatard/UEFI-Shell/total.svg?label=Downloads&style=flat-square )] ( https://github.com/pbatard/UEFI-Shell/releases )
6
- [ ![ Release] ( https://img.shields.io/badge/Latest%20Release-24H1 %20(edk2--stable202405 )-blue.svg?style=flat-square )] ( https://github.com/pbatard/UEFI-Shell/releases )
6
+ [ ![ Release] ( https://img.shields.io/badge/Latest%20Release-24H2 %20(edk2--stable202411 )-blue.svg?style=flat-square )] ( https://github.com/pbatard/UEFI-Shell/releases )
7
7
[ ![ License] ( https://img.shields.io/badge/License-BSD%202--Clause-orange.svg )] ( https://opensource.org/licenses/BSD-2-Clause )
8
8
9
9
This repository contains pre-built UEFI Shell binary images, generated from
10
10
official [ EDK2] ( https://github.com/tianocore/edk2 ) stable releases.
11
11
12
12
## Usage
13
13
14
- These images are provided in the form of a bootable ISO, in order to make them
15
- easy to use with boot media creators such as [ Rufus] ( https://rufus.ie ) .
14
+ These images are mostly provided in the form of a bootable ISO, in order to
15
+ make them easy to use with boot media creators such as [ Rufus] ( https://rufus.ie ) .
16
16
17
17
However, these can also readily used by:
18
18
- Partitioning and formatting a media, such as a USB Flash drive, using a FAT
@@ -23,9 +23,28 @@ Once you have done that, and provided that your machine is set to boot from
23
23
removable media (and runs a UEFI firmware that uses one of the architectures
24
24
supported by the release), it should automatically boot into the UEFI Shell.
25
25
26
+ Alternatively, you can download the individual UEFI Shell binary for your
27
+ platform.
28
+
26
29
Note that Secure Boot must be disabled for a UEFI Shell media to boot, as
27
30
Microsoft does not allow an external UEFI Shell to be signed for Secure Boot.
28
31
32
+ ## Inclusion of Mosby
33
+
34
+ Starting with release 24H2, these ISO images also include [ Mosby] ( https://github.com/pbatard/Mosby )
35
+ ** as an optional binary** that you can run by typing ` Mosby ` from the Shell
36
+ command prompt.
37
+
38
+ This is done because we believe that, with the planned expiration of current
39
+ Secure Boot DB signing certificates for Microsoft Windows and UEFI Third Party
40
+ ** that will occur in 2026** , as well as the whole * BlackLotus* revocation mess,
41
+ more and more people are going to be looking for a convenient way to update
42
+ their UEFI Secure Boot databases, and Mosby is designed to accomplish just that.
43
+
44
+ But again, it needs to be reiterated that the inclusion of Mosby does not
45
+ change anything to the base UEFI Shell. It's just an extra command you can
46
+ invoke, * should you decide to do so* .
47
+
29
48
## Binary validation
30
49
31
50
These binaries are built in a fully transparent manner, in order to provide
0 commit comments