|
楼主 |
发表于 2022-3-2 16:30:14
|
显示全部楼层
As some of you have already noticed, a couple of weeks ago @Dinolek and I published a utility, that allows bypassing authentication on MTK devices.
The tool is based on an exploit dubbed kamakiri, which was originally found by @xyz` and released for the Amazon FireTV Stick 4K (mantis)
What does this mean?
You can use this utility to bypass Serial Link Authentication and Download Agent Authentication on supported devices to use software such as SP Flash Tool to unbrick devices that would otherwise require authentication (AUTH-file).
The tool has since been expanded to support more SOCs by contributions from @viperbjk, @Rortiz2 and others.
It currently supports the following SOCs (and their variations):
mt6261
mt6572
mt6580
mt6582
mt6592
mt6595
mt6735
mt6737
mt6739
mt6750
mt6753
mt6755
mt6757
mt6761
mt6763
mt6765
mt6768
mt6771
mt6779
mt6785
mt6795
mt6797
mt6799
mt6833
mt6853
mt6873
mt6885
mt8127
mt8163
mt8167
mt8173
mt8590
mt8695
There are two parts to this project, the Utility itself and the Exploit Collection.
Please refer to the projects README how to set up your environment to use this utility successfully.
Please note, this project has already been incorporated in multiple commercial tools without even a mention.
This software is free to use, but the courtesy of at least mentioning the original authors is expected.
If you like this software and would like to support us, you can donate |
|