MTK-bypass / bypass_utility

MIT License
459 stars 114 forks source link

RuntimeError: #83

Open hkvsak opened 2 years ago

hkvsak commented 2 years ago

Traceback (most recent call last): File "E:\bypass_utility-v.1.4.2\src\exploit.py", line 36, in exploit udev._ctx.managed_claim_interface = lambda *args, **kwargs: None AttributeError: 'NoneType' object has no attribute '_ctx'

The above exception was the direct cause of the following exception:

Traceback (most recent call last): File "E:\bypass_utility-v.1.4.2\main.py", line 213, in main() File "E:\bypass_utility-v.1.4.2\main.py", line 58, in main result = exploit(device, config.watchdog_address, config.payload_address, config.var_0, config.var_1, payload) File "E:\bypass_utility-v.1.4.2\src\exploit.py", line 38, in exploit raise RuntimeError("libusb is not installed for port {}".format(device.dev.port)) from e RuntimeError: libusb is not installed for port COM3

Ra2-IFV commented 2 years ago

"libusb is not installed for port COM3"

JuaIMS commented 2 months ago

I got the same issue. Did anyone found a solution? If its written somewhere then I am an idiot. (I really hope that's the case)

JuaIMS commented 2 months ago

Update: It seems I somehow forgot to install UsbDK and this error happened because of that. BUT the UsbDK driver seems to have its own issue, whenever I try to use the bypass tool, I get a BSOD on Windows 11 saying "WDF_VIOLATION". This is not related to this project, the issue is covered here.