None
Bypass utility
Small utility to disable bootrom protection(sla and daa)
Payloads
https://github.com/MTK-bypass/exploits_collection
Usage on Windows
Skip steps 1-5 after first usage
- Install python(select "Add Python X.X to PATH")
- Install libusb-win32
- Lunch filter wizard, click next
- Connect powered off phone with volume+ button, you should see new serial device in the list. Select it and click install
- Install pyusb, pyserial, json5 with command:
pip install pyusb pyserial json5
- Run this command and connect your powered off phone with volume+ button, you should get "Protection disabled" at the end
python main.py
- After that, without disconnecting phone, run SP Flash Tool
Usage on Linux
Skip steps 1-2 after first usageTo use this you need FireISO or this patch for your kernel
- Install python
- Install pyusb, pyserial, json5 as root with command:
pip install pyusb pyserial json5
- Run this command as root and connect your powered off phone with volume+ button, you should get "Protection disabled" at the end
./main.py
- After that, without disconnecting phone, run SP Flash Tool in UART Connection mode
Credits
To restore the repository download the bundle
wget https://archive.org/download/github.com-MTK-bypass-bypass_utility_-_2021-01-27_15-02-48/MTK-bypass-bypass_utility_-_2021-01-27_15-02-48.bundle
and run:
git clone MTK-bypass-bypass_utility_-_2021-01-27_15-02-48.bundle
Source:
https://github.com/MTK-bypass/bypass_utilityUploader:
MTK-bypassUpload date: 2021-01-27