We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[2022-01-29 15:19:22.701729] Waiting for bootrom [2022-01-29 15:19:28.683498] Found port = COM4
[2022-01-29 15:19:28.683498] Device hw code: 0x813 [2022-01-29 15:19:28.683498] Device hw sub code: 0x8a00 [2022-01-29 15:19:28.683498] Device hw version: 0xca00 [2022-01-29 15:19:28.693104] Device sw version: 0x0 [2022-01-29 15:19:28.693104] Device secure boot: True [2022-01-29 15:19:28.693104] Device serial link authorization: True [2022-01-29 15:19:28.693104] Device download agent authorization: True
[2022-01-29 15:19:28.693104] Disabling watchdog timer [2022-01-29 15:19:28.693104] Disabling protection Traceback (most recent call last): File "C:\Users\I'm Ps Prosen\Desktop\UnbrickRN8ProNoAuth\4.Bypass\main.py", line 65, in main() File "C:\Users\I'm Ps Prosen\Desktop\UnbrickRN8ProNoAuth\4.Bypass\main.py", line 60, in main exploit(device, watchdog_address, var_0, var_1, arguments.payload) File "C:\Users\I'm Ps Prosen\Desktop\UnbrickRN8ProNoAuth\4.Bypass\src\exploit.py", line 33, in exploit udev = usb.core.find(idVendor=0x0e8d, idProduct=0x3) File "C:\Users\I'm Ps Prosen\AppData\Local\Programs\Python\Python310\lib\site-packages\usb\core.py", line 1309, in find raise NoBackendError('No backend available') usb.core.NoBackendError: No backend available Press any key to continue . . .
The text was updated successfully, but these errors were encountered:
No branches or pull requests
[2022-01-29 15:19:22.701729] Waiting for bootrom
[2022-01-29 15:19:28.683498] Found port = COM4
[2022-01-29 15:19:28.683498] Device hw code: 0x813
[2022-01-29 15:19:28.683498] Device hw sub code: 0x8a00
[2022-01-29 15:19:28.683498] Device hw version: 0xca00
[2022-01-29 15:19:28.693104] Device sw version: 0x0
[2022-01-29 15:19:28.693104] Device secure boot: True
[2022-01-29 15:19:28.693104] Device serial link authorization: True
[2022-01-29 15:19:28.693104] Device download agent authorization: True
[2022-01-29 15:19:28.693104] Disabling watchdog timer
[2022-01-29 15:19:28.693104] Disabling protection
Traceback (most recent call last):
File "C:\Users\I'm Ps Prosen\Desktop\UnbrickRN8ProNoAuth\4.Bypass\main.py", line 65, in
main()
File "C:\Users\I'm Ps Prosen\Desktop\UnbrickRN8ProNoAuth\4.Bypass\main.py", line 60, in main
exploit(device, watchdog_address, var_0, var_1, arguments.payload)
File "C:\Users\I'm Ps Prosen\Desktop\UnbrickRN8ProNoAuth\4.Bypass\src\exploit.py", line 33, in exploit
udev = usb.core.find(idVendor=0x0e8d, idProduct=0x3)
File "C:\Users\I'm Ps Prosen\AppData\Local\Programs\Python\Python310\lib\site-packages\usb\core.py", line 1309, in find
raise NoBackendError('No backend available')
usb.core.NoBackendError: No backend available
Press any key to continue . . .
The text was updated successfully, but these errors were encountered: