MTK-bypass / exploits_collection

279 stars 98 forks source link

Support for MT6885 - MT6889Z #15

Closed adleguimaraes closed 3 years ago

R0rt1z2 commented 3 years ago

Waiting for bootrom...[2021-04-05 10:35:12.303609] Waiting for bootrom Traceback (most recent call last): [2021-04-05 10:35:33.746503] Found port = COM3 File "C:\ProgramData\obexs\Data\main.py", line 169, in main() File "C:\ProgramData\obexs\Data\main.py", line 63, in main raise e File "C:\ProgramData\obexs\Data\main.py", line 56, in main config = Config().default(hw_code) File "C:\ProgramData\obexs\Data\src\config.py", line 14, in default self.from_file(config, hw_code) File "C:\ProgramData\obexs\Data\src\config.py", line 27, in from_file raise NotImplementedError("Can't find {} hw_code in config".format(hw_code)) NotImplementedError: Can't find 0x816 hw_code in config

Hello dear and god programmer, is there a any chance / possibility that there will be possible a bypass for the MT6889Z { Mediatek Dimensity 1000+ } chipset in the future? so that we can lift realme phones and other branded devices with this chipset from the world of the dead, I mean, with our devices in a state of hard bricked?

The exploit does not support that CPU. You can try dumping brom with test mode (-t).

Dinolek commented 3 years ago

Added support in https://github.com/MTK-bypass/exploits_collection/commit/61bd3f363219a45b3d58446565c3997cae12e2fd