Closed Ferxkw closed 3 months ago
hello, good day, thanks for this great tool, I just wanted to comment that in version 1.52 it worked very well to use the payload command and without disconnecting printgpt and in the new versions it give an error.
`C:\Users\Repara-Cel\AppData\Local\Programs\Python\Python38-32>python mtk payload && python mtk printgpt MTK Flash/Exploit Client V1.6.1 (c) B.Kerler 2018-2023
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile Port - Device detected :) Preloader - CPU: MT6765/MT8768t(Helio P35/G35) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0x25 Preloader - Disabling Watchdog... Preloader - HW code: 0x766 Preloader - Target config: 0x0 Preloader - SBC enabled: False Preloader - SLA enabled: False Preloader - DAA enabled: False Preloader - SWJTAG enabled: False Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: CA2F21101494F6A0006F7EEB4D9B21C9 Preloader - SOC_ID: 7A0D42B60DD930DDAF9FFAB441B18134C0506E24E8CD6124EF0B2D9E5EEE9B15 PLTools - Loading payload from mt6765_payload.bin, 0x264 bytes PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Kamakiri - Done sending payload... PLTools - Successfully sent payload: C:\Users\Repara-Cel\AppData\Local\Programs\Python\Python38-32\mtkclient\payloads\mt6765_payload.bin MTK Flash/Exploit Client V1.6.1 (c) B.Kerler 2018-2023
DA_handler - Please disconnect, start mtkclient and reconnect.
C:\Users\Repara-Cel\AppData\Local\Programs\Python\Python38-32>`
Stale issue message
hello, good day, thanks for this great tool, I just wanted to comment that in version 1.52 it worked very well to use the payload command and without disconnecting printgpt and in the new versions it give an error.
`C:\Users\Repara-Cel\AppData\Local\Programs\Python\Python38-32>python mtk payload && python mtk printgpt MTK Flash/Exploit Client V1.6.1 (c) B.Kerler 2018-2023
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile Port - Device detected :) Preloader - CPU: MT6765/MT8768t(Helio P35/G35) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10212000 Preloader - Var1: 0x25 Preloader - Disabling Watchdog... Preloader - HW code: 0x766 Preloader - Target config: 0x0 Preloader - SBC enabled: False Preloader - SLA enabled: False Preloader - DAA enabled: False Preloader - SWJTAG enabled: False Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: CA2F21101494F6A0006F7EEB4D9B21C9 Preloader - SOC_ID: 7A0D42B60DD930DDAF9FFAB441B18134C0506E24E8CD6124EF0B2D9E5EEE9B15 PLTools - Loading payload from mt6765_payload.bin, 0x264 bytes PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Kamakiri - Done sending payload... PLTools - Successfully sent payload: C:\Users\Repara-Cel\AppData\Local\Programs\Python\Python38-32\mtkclient\payloads\mt6765_payload.bin MTK Flash/Exploit Client V1.6.1 (c) B.Kerler 2018-2023
DA_handler - Please disconnect, start mtkclient and reconnect.
C:\Users\Repara-Cel\AppData\Local\Programs\Python\Python38-32>`