Back to all tools
OtherPackaging

Driver Automation Tool

Driver Automation Tool is a PowerShell WPF desktop app that automates the full lifecycle of OEM driver and BIOS package management for ConfigMgr and Intune. It automatically discovers vendor catalogs, downloads with resume-enabled curl, extracts, builds WIMs, and wraps packages as .intunewin for Intune Win32 deployment. The tool supports multiple OEMs, BIOS update handling, hash verification, and configurable packaging (DISM/wimlib/7-Zip) to streamline ConfigMgr and Intune workflows.

Created by

Security Analysis

4of 6
2 Issues FoundOverride

24 files scanned on May 10, 2026

Issues Detected
No Obfuscated Code
No base64 encoded commands or hidden scripts
Base64 decode and execute in Driver Automation Tool/Modules/DriverAutomationToolCore/DriverAutomationToolCore.psm1 ([lines: 74](https://github.com/maurice-daly/DriverAutomationTool/blob/master/Driver Automation Tool/Modules/DriverAutomationToolCore/DriverAutomationToolCore.psm1#L74))
No Hardcoded Secrets
No API keys or credentials in code
Hardcoded credential in Driver Automation Tool/Modules/DriverAutomationToolCore/Templates/Deploy-BIOSPassword-Remediation.ps1 ([lines: 34](https://github.com/maurice-daly/DriverAutomationTool/blob/master/Driver Automation Tool/Modules/DriverAutomationToolCore/Templates/Deploy-BIOSPassword-Remediation.ps1#L34))
Passed Checks
No Remote Execution
No Credential Theft
No Data Exfiltration
No Malicious Patterns
AI Analysis

The Driver Automation Tool codebase aligns with legitimate enterprise management tooling, including Intune/Graph usage and BIOS password handling. The notable security concerns are a hardcoded BIOS password placeholder that must be replaced before deployment and telemetry/privacy considerations. No evidence of obfuscated code or overt remote code execution was found in the provided snippets. Recommended actions: remove/rotate hardcoded secrets, harden registry/DPAPI handling with strict ACLs, audit telemetry data flows, and verify any potential startup/persistence mechanisms against organizational security policies.

Screenshots1 / 5

Swipe to see more

You might also like

Other

PSAppDeployToolkit

PSAppDeployToolkit is a PowerShell-based, open-source framework for Windows software deployment that integrates with major deployment solutions (including Microsoft Intune). It provides a prescriptive deployment workflow, a rich library of functions, a customizable UI (Fluent or Classic), and full-fidelity logging to drive high deployment success rates. It enables complex, secure, user-friendly deployments across enterprise environments.

PSAppDeployToolkitPSAppDeployToolkit
Other

Wintuner GUI

WinTuner GUI is a modern PowerShell-based graphical interface for managing Microsoft Intune Win32 apps via WinGet packages. Search WinGet packages, create .wtpackage files, and deploy them to Intune, with update checks for existing apps. Features include fuzzy app discovery, persistent settings, interactive M365 login, and a JSON settings store for end-to-end Intune app lifecycle management.

Manuel HöflerManuel Höfler
Other

PSADT Script Generator

Automatically generate PSADT deployment scripts for new applications or update existing packages while preserving custom code.

R
Robert L
PowerShell Module

Intune-App-Sandbox

Intune-App-Sandbox is a testing utility for PowerShell-based installers packaged with the Win32 Content Prep Tool for Intune deployments. It creates a sandbox workspace (C:\SandboxEnvironment), and adds context-menu options to pack with IntunewinUtil or run tests in a Safe sandbox. It also supports a detection-based test flow and a reusable template script to accelerate building and validating packaging for Win32 apps in Intune.

Maciej HorbaczMaciej Horbacz