MTK-bypass / bypass_utility

MIT License
459 stars 114 forks source link

is:open is:issue label:question #71

Open Jpg73529 opened 2 years ago

Jpg73529 commented 2 years ago

[2022-01-29 15:19:22.701729] Waiting for bootrom [2022-01-29 15:19:28.683498] Found port = COM4

[2022-01-29 15:19:28.683498] Device hw code: 0x813 [2022-01-29 15:19:28.683498] Device hw sub code: 0x8a00 [2022-01-29 15:19:28.683498] Device hw version: 0xca00 [2022-01-29 15:19:28.693104] Device sw version: 0x0 [2022-01-29 15:19:28.693104] Device secure boot: True [2022-01-29 15:19:28.693104] Device serial link authorization: True [2022-01-29 15:19:28.693104] Device download agent authorization: True

[2022-01-29 15:19:28.693104] Disabling watchdog timer [2022-01-29 15:19:28.693104] Disabling protection Traceback (most recent call last): File "C:\Users\I'm Ps Prosen\Desktop\UnbrickRN8ProNoAuth\4.Bypass\main.py", line 65, in main() File "C:\Users\I'm Ps Prosen\Desktop\UnbrickRN8ProNoAuth\4.Bypass\main.py", line 60, in main exploit(device, watchdog_address, var_0, var_1, arguments.payload) File "C:\Users\I'm Ps Prosen\Desktop\UnbrickRN8ProNoAuth\4.Bypass\src\exploit.py", line 33, in exploit udev = usb.core.find(idVendor=0x0e8d, idProduct=0x3) File "C:\Users\I'm Ps Prosen\AppData\Local\Programs\Python\Python310\lib\site-packages\usb\core.py", line 1309, in find raise NoBackendError('No backend available') usb.core.NoBackendError: No backend available Press any key to continue . . .