From 6bd589f354885f4703a225d39d4cf38104785986 Mon Sep 17 00:00:00 2001 From: Dinolek <18579460+Dinolek@users.noreply.github.com> Date: Thu, 21 Jan 2021 19:27:12 +0100 Subject: [PATCH] Update README --- README.md | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index d5fdab9..4ce7b1d 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,9 @@ # Bypass utility Small utility to disable bootrom protection(sla and daa) +## Payloads +https://github.com/MTK-bypass/exploits_collection + ## Usage on Windows Skip steps 1-5 after first usage @@ -14,7 +17,7 @@ pip install pyusb pyserial json5 ``` 6. Run this command and connect your powered off phone with volume+ button, you should get "Protection disabled" at the end ``` -python main.py -c -p +python main.py ``` 7. After that, without disconnecting phone, run SP Flash Tool @@ -30,7 +33,7 @@ pip install pyusb pyserial json5 ``` 3. Run this command as root and connect your powered off phone with volume+ button, you should get "Protection disabled" at the end ``` -./main.py -c -p +./main.py ``` 4. After that, without disconnecting phone, run SP Flash Tool in UART Connection mode