MTK Sec Boot Disable v4.0.R443

MTK Sec Boot Disable v4.0.R443 là công cụ trên Windows giúp bypass Auth (Secure Boot protection) từ bất kỳ điện thoại nào sử dụng MediaTek MTK khá dễ dàng. Nếu bạn muốn flash firmware hoặc xóa mẫu hình, mật khẩu khỏi điện thoại của mình thì bạn cần bypass Auth để Secure Boot protection. Vì vậy, hãy tải xuống MTK Secure Boot Disable Tool với hướng dẫn cài đặt bên dưới đẻ sử dụng miễn phí.


Developer Description

  • MTK Secure Boot Disable Tool V4.
  • Added support for windows 11.
  • Added support Read Preloader file in Brom mode (2 methods)
  • To use for FRP & wipe data operations via flash tool
  • After dump preloader you can use any scatter file just replace the preloader file and rename the platform string inside scatter.
  • If you need any scatter file you can contact me via telegram, id = MR.X . (i am not using messenger so don't send me messages on messenger only can reply in telegram)

Tính năng MTK Sec Boot Disable

Tested chipsets (method 1)

  • MT6739
  • MT6761
  • MT6762
  • MT6765
  • MT6768
  • MT6779
  • MT6785

Method 2 will work on following chipsets 
Only if preloader size less than (0x40000 = 262,144 KB)

Credits (chaosmaster for usb ctrl values & bkerler for dump payload)

  • MT6572
  • MT6580
  • MT6582
  • MT6592
  • MT6595
  • MT6735
  • MT6737
  • MT6739
  • MT6753
  • MT6755
  • MT6757
  • MT6761
  • MT6763
  • MT6765
  • MT6768
  • MT6779
  • MT6785
  • MT6795
  • MT6797
  • MT6885
  • MT8127
  • MT8163
  • MT8516
  • MT8173
  • MT8695
  • MT6873
  • MT6799
  • MT6833
  • MT6853
  • MT8590

Supported Soc IDs for disable SLA & DAA security

  • MT6261
  • MT6572
  • MT6580
  • MT6582
  • MT6735
  • MT6737
  • MT6739
  • MT6755
  • MT6757
  • MT6761
  • MT6763
  • MT6765
  • MT6768
  • MT6771
  • MT6785
  • MT6799
  • MT6779
  • MT6873
  • MT8127
  • MT8163
  • MT8173
  • MT8695
  • MT6833 
  • MT6853 
  • MT6853V 

Hướng dẫn sử dụng MTK Sec Boot Disable

Note

After using any auth bypass tool,
You don't need to select da or auth file Generic da will work perfect,
You just need preloader and scatter for DARM[EXT_RAM] initialization.

Credits

Bjoern Kerler
kamakiri [xyzz]
linecode exploit [chimera]
Chaosmaster
https://github.com/bkerler/mtkclient
Please use the tool at your own risk

Download

Dung lượng: N/A

Đăng nhận xét

Mới hơn Cũ hơn