We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
D:\mtkclient\bypass>python main.py [2022-03-13 02:34:42.685510] Waiting for device [2022-03-13 02:34:48.955530] Found device = 0e8d:0003
[2022-03-13 02:34:49.375418] Device hw code: 0x717 [2022-03-13 02:34:49.375418] Device hw sub code: 0x8a00 [2022-03-13 02:34:49.375418] Device hw version: 0xca01 [2022-03-13 02:34:49.375418] Device sw version: 0x200 [2022-03-13 02:34:49.375418] Device secure boot: False [2022-03-13 02:34:49.375418] Device serial link authorization: False [2022-03-13 02:34:49.375418] Device download agent authorization: False
[2022-03-13 02:34:49.375418] Disabling watchdog timer [2022-03-13 02:34:49.385457] Insecure device, sending payload using send_da [2022-03-13 02:34:49.435554] Found send_dword, dumping bootrom to bootrom_717.bin
The text was updated successfully, but these errors were encountered:
No branches or pull requests
D:\mtkclient\bypass>python main.py
[2022-03-13 02:34:42.685510] Waiting for device
[2022-03-13 02:34:48.955530] Found device = 0e8d:0003
[2022-03-13 02:34:49.375418] Device hw code: 0x717
[2022-03-13 02:34:49.375418] Device hw sub code: 0x8a00
[2022-03-13 02:34:49.375418] Device hw version: 0xca01
[2022-03-13 02:34:49.375418] Device sw version: 0x200
[2022-03-13 02:34:49.375418] Device secure boot: False
[2022-03-13 02:34:49.375418] Device serial link authorization: False
[2022-03-13 02:34:49.375418] Device download agent authorization: False
[2022-03-13 02:34:49.375418] Disabling watchdog timer
[2022-03-13 02:34:49.385457] Insecure device, sending payload using send_da
[2022-03-13 02:34:49.435554] Found send_dword, dumping bootrom to bootrom_717.bin
Maybe there is some way to replace "bootrom.bin" with another one, already unlocked?
Or is there a way to bypass the protection?
The text was updated successfully, but these errors were encountered: