Download tools
download exploits
https://github.com/MTK-bypass/exploits_collection/releases
latest: https://github.com/MTK-bypass/exploits_collection/archive/refs/tags/v1.6.zip
got:: exploits_collection-1.6.zip
download bypass utility
https://github.com/MTK-bypass/bypass_utility/releases
latest: https://github.com/MTK-bypass/bypass_utility/archive/refs/tags/v.1.4.2.zip
got:: bypass_utility-v.1.4.2.zip
download python
https://www.python.org/downloads/
https://www.python.org/ftp/python/3.11.1/python-3.11.1-amd64.exe
extract :
7z x bypass_utility-v.1.4.2.zip
7z x exploits_collection-1.6.zip
copy playloads and default_config.json5 file from exploits*.zip to bypass folder
install python with pip and select add to path
pip install pyusb json5
Install libusb filter
download libusb-win32
https://sourceforge.net/projects/libusb-win32/files/libusb-win32-releases/1.2.6.0/libusb-win32-devel-filter-1.2.6.0.exe/download
Launch filter wizard, click next
Connect powered off phone with volume+ power button, you should see new serial device in the list.
Select it and click install
run python main.py
connect your powered off phone with volume+ power button, you should get "Protection disabled" at the end
now you can run any flash tool
https://spflashtool.com/download/
Exploit Supports SOC
- mt6261
- mt6572
- mt6580
- mt6582
- mt6592
- mt6595
- mt6735
- mt6737
- mt6739
- mt6750
- mt6753
- mt6755
- mt6757
- mt6761
- mt6763
- mt6765
- mt6768
- mt6771
- mt6779
- mt6785
- mt6795
- mt6797
- mt6799
- mt6833
- mt6853
- mt6873
- mt6885
- mt8127
- mt8163
- mt8167
- mt8173
- mt8590
- mt8695
Comments
Post a Comment