Dumping Bootrom, Preloader, Read/Write Flash content of devices with MTK Chipset and reverse engineering Bootrom/Preloader. Exploitings MTK with your own payloads. Code available here: github.com/bkerler/mtkclient
Пікірлер: 15
@turtius2 жыл бұрын
holy crap! that's impressive, this is probably the only in depth video on these mediatek SoC's and the respective tools
@markpickering95082 жыл бұрын
Very late, but thank you very much. Many pennies have fallen into place. Your generosity of sharing is inspiring.
@user-me7or7gl5q10 ай бұрын
You can write a book about those things. Thank you for sharing!
@mohamedyahi99658 ай бұрын
more videos like that
@Kaqtis2 жыл бұрын
Not exactly for the underexperienced but I will definitely try this
@aasasssddmdnmd20902 жыл бұрын
thank you sir that was amazing please make very basics videos i mean beginners like me need some basic Knowledge to understand this video completely could you give us this knowledge or guide us how to learn basic knowledge about mtk or qualcomm platforms
@silvanadesantis22812 жыл бұрын
Thank you
@MRX8BP3 жыл бұрын
awesome.
@rolexAltron2 ай бұрын
how to decrypt user data . by using mtkclient we can get key also so how i decrypt that bin image
@RachataRath9 ай бұрын
I try Samsung j2prime (mt6737T) can not payload how can i do ,mt6737T support?
@sudoproduction30724 ай бұрын
Meta mode still no update bro? python mtk --metamode FASTBOOT not work
@kakashisensei99703 жыл бұрын
i have the gsmhello bypass cs
@kakashisensei99703 жыл бұрын
if u need to make a tool
@mstox83682 жыл бұрын
Can you help me with stylo 6 I need this file preloader_muse6765_64_dh50_q.bin Great work Thanks