I'm not sure.
Try to talk with developers here:
Issues · MTK-bypass/exploits_collection
Contribute to MTK-bypass/exploits_collection development by creating an account on GitHub.
I'm not sure.
Thanks to:
chaosmaster / k4y0z: GitHub / XDA
xyzz / xyz`: GitHub / XDA
Dinolek: GitHub / XDA
1. Download the attached file: VD171_MTK-bypass.zip.
- How to install:
2. Extract the file and open the folder.
3. Run and install python: python-3.9.1-amd64.exe.
Keep atention: You need to select "Add Python to PATH" before starting the installation.
![]()
4. Open cmd or powershell and execute this command:
pip install pyusb pyserial json5
5. Go to the Driver folder and right-click on the cdc-acm.inf file, then click Install and then, close window.
6. Run and install filter wizard: libusb-win32-devel-filter-1.2.6.0.exe.
7. Launch filter wizard.
8. Select Install a device filter and click Next.
9. Connect powered off phone with volume- button to boot in EDL mode.
10. Once you see new MediaTek USB Port in the list, select it and click Install.
![]()
Now, you are ready for bypassing EDL !
1. Go to the Bypass folder. Run the script: bypass.bat.
- How to bypass:
2. Connect powered off phone with volume- button to boot in EDL mode.
3. Once you get "Protection disabled" at the end, without disconnecting phone and usb, run SP Flash Tool.
![]()
4. Once the SP Flash Tool opens, click Options > Options > Connection.
5. Select UART mode and select Baud rate to 921600.
![]()
Now, you are ready for flashing !
1. Download latest release of the tool: https://github.com/MTK-bypass/bypass_utility/releases/latest
- How to update:
2. Download latest release of payloads: https://github.com/MTK-bypass/exploits_collection/releases/latest
3. Extract the content of both files to the Bypass folder.
Now, you are updated !
- How does the bypass work?
Dissecting a MediaTek BootROM exploit
A bricked Xiaomi phone led me to discover a project in Github that uses a MediaTek BootROM exploit that was undocumented. The exploit was found by Xyz, and implemented by Chaosmaster. The initial exploit was already available for quite a while. Since I have managed to revive my phone, I am documentitinyhack.com
All Credits To:
chaosmaster / k4y0z: GitHub / XDA
xyzz / xyz`: GitHub / XDA
Dinolek: GitHub / XDA
Do you need help with your MERLIN device ?
Read this FAQ: https://forum.xda-developers.com/t/...for-merlin-redmi-note-9-redmi-10x-4g.4225163/
#NoAuth #NoAuthentication #No-Auth #No-Authentication #MediaTek #Xiaomi
#MiAuth #MiAuthentication #Mi-Auth #Mi-Authentication #XiaoMiAuth #free
#XiaoMiAuthentication #XiaoMi-Auth #XiaoMi-Authentication #unbricking
#unbricked #unbrick
#MTK #MT6572 #MT6735 #MT6737 #MT6739 #MT6750 #MT6765 #MT6762
#MT6761 #MT6768 #MT6771 #MT6785 #MT8127 #MT8163 #MT8173 #MT8695
You are welcome, my friend.
OMG THANK YOU SO MUCHThanks to:
chaosmaster / k4y0z: GitHub / XDA
xyzz / xyz`: GitHub / XDA
Dinolek: GitHub / XDA
1. Download the attached file: VD171_MTK-bypass.zip.
- How to install:
2. Extract the file and open the folder.
3. Run and install python: python-3.9.1-amd64.exe.
Keep atention: You need to select "Add Python to PATH" before starting the installation.
![]()
4. Open cmd or powershell and execute this command:
pip install pyusb pyserial json5
5. Go to the Driver folder and right-click on the cdc-acm.inf file, then click Install and then, close window.
6. Run and install filter wizard: libusb-win32-devel-filter-1.2.6.0.exe.
7. Launch filter wizard.
8. Select Install a device filter and click Next.
9. Connect powered off phone with volume- button to boot in EDL mode.
10. Once you see new MediaTek USB Port in the list, select it and click Install.
![]()
Now, you are ready for bypassing EDL !
1. Go to the Bypass folder. Run the script: bypass.bat.
- How to bypass:
2. Connect powered off phone with volume- button to boot in EDL mode.
3. Once you get "Protection disabled" at the end, without disconnecting phone and usb, run SP Flash Tool.
![]()
4. Once the SP Flash Tool opens, click Options > Options > Connection.
5. Select UART mode and select Baud rate to 921600.
![]()
Now, you are ready for flashing !
1. Download latest release of the tool: https://github.com/MTK-bypass/bypass_utility/releases/latest
- How to update:
2. Download latest release of payloads: https://github.com/MTK-bypass/exploits_collection/releases/latest
3. Extract the content of both files to the Bypass folder.
Now, you are updated !
- How does the bypass work?
Dissecting a MediaTek BootROM exploit
A bricked Xiaomi phone led me to discover a project in Github that uses a MediaTek BootROM exploit that was undocumented. The exploit was found by Xyz, and implemented by Chaosmaster. The initial exploit was already available for quite a while. Since I have managed to revive my phone, I am documentitinyhack.com
All Credits To:
chaosmaster / k4y0z: GitHub / XDA
xyzz / xyz`: GitHub / XDA
Dinolek: GitHub / XDA
Do you need help with your MERLIN device ?
Read this FAQ: https://forum.xda-developers.com/t/...for-merlin-redmi-note-9-redmi-10x-4g.4225163/
#NoAuth #NoAuthentication #No-Auth #No-Authentication #MediaTek #Xiaomi
#MiAuth #MiAuthentication #Mi-Auth #Mi-Authentication #XiaoMiAuth #free
#XiaoMiAuthentication #XiaoMi-Auth #XiaoMi-Authentication #unbricking
#unbricked #unbrick
#MTK #MT6572 #MT6735 #MT6737 #MT6739 #MT6750 #MT6765 #MT6762
#MT6761 #MT6768 #MT6771 #MT6785 #MT8127 #MT8163 #MT8173 #MT8695
You are welcome, my friend.OMG THANK YOU SO MUCH
I dont know what i would have done without this guide![]()
Exactly.after this guide, Should I follow this one? https://forum.xda-developers.com/t/...for-merlin-redmi-note-9-redmi-10x-4g.4229937/
Can I flash a custom rom with sp flash tool even though my device is in bootloop right now and I need to bypass auth? Or i need to flash the official firmware . If I need to flash the firmware , it has to be the fastboot or recovery?Exactly.
First, you bypass auth and then use sp flash tool as you want.
Remember, if you remove usb cable, you need to bypass auth again.
I have no idea about how to flash a custom rom, my friend, I'm sorry.Can I flash a custom rom with sp flash tool even though my device is in bootloop right now and I need to bypass auth? Or i need to flash the official firmware . If I need to flash the firmware , it has to be the fastboot or recovery?
Can I use this method for qualcomm devices?Thanks to:
chaosmaster / k4y0z: GitHub / XDA
xyzz / xyz`: GitHub / XDA
Dinolek: GitHub / XDA
1. Download the attached file: VD171_MTK-bypass.zip.
- How to install:
2. Extract the file and open the folder.
3. Run and install python: python-3.9.1-amd64.exe.
Keep atention: You need to select "Add Python to PATH" before starting the installation.
![]()
4. Open cmd or powershell and execute this command:
pip install pyusb pyserial json5
5. Go to the Driver folder and right-click on the cdc-acm.inf file, then click Install and then, close window.
6. Run and install filter wizard: libusb-win32-devel-filter-1.2.6.0.exe.
7. Launch filter wizard.
8. Select Install a device filter and click Next.
9. Connect powered off phone with volume- button to boot in EDL mode.
10. Once you see new MediaTek USB Port in the list, select it and click Install.
![]()
Now, you are ready for bypassing EDL !
1. Go to the Bypass folder. Run the script: bypass.bat.
- How to bypass:
2. Connect powered off phone with volume- button to boot in EDL mode.
3. Once you get "Protection disabled" at the end, without disconnecting phone and usb, run SP Flash Tool.
![]()
4. Once the SP Flash Tool opens, click Options > Options > Connection.
5. Select UART mode and select Baud rate to 921600.
![]()
Now, you are ready for flashing !
1. Download latest release of the tool: https://github.com/MTK-bypass/bypass_utility/releases/latest
- How to update:
2. Download latest release of payloads: https://github.com/MTK-bypass/exploits_collection/releases/latest
3. Extract the content of both files to the Bypass folder.
Now, you are updated !
- How does the bypass work?
Dissecting a MediaTek BootROM exploit
A bricked Xiaomi phone led me to discover a project in Github that uses a MediaTek BootROM exploit that was undocumented. The exploit was found by Xyz, and implemented by Chaosmaster. The initial exploit was already available for quite a while. Since I have managed to revive my phone, I am documentitinyhack.com
All Credits To:
chaosmaster / k4y0z: GitHub / XDA
xyzz / xyz`: GitHub / XDA
Dinolek: GitHub / XDA
Do you need help with your MERLIN device ?
Read this FAQ: https://forum.xda-developers.com/t/...for-merlin-redmi-note-9-redmi-10x-4g.4225163/
#NoAuth #NoAuthentication #No-Auth #No-Authentication #MediaTek #Xiaomi
#MiAuth #MiAuthentication #Mi-Auth #Mi-Authentication #XiaoMiAuth #free
#XiaoMiAuthentication #XiaoMi-Auth #XiaoMi-Authentication #unbricking
#unbricked #unbrick
#MTK #MT6572 #MT6735 #MT6737 #MT6739 #MT6750 #MT6765 #MT6762
#MT6761 #MT6768 #MT6771 #MT6785 #MT8127 #MT8163 #MT8173 #MT8695
No.
when i run the bypass.bat script while pressing volumedown button in poweroff state then i get thi error
I'm not sure about that error.when i run the bypass.bat script while pressing volumedown button in poweroff state then i get thi errorView attachment 5643125
it says
usb.core.NoBackendError : No backend available
So will it be ok if i just skip auth by flashing preloader.bin in fastboot mode and then turn off my device and flash with spflashI'm not sure about that error.
Please, contact developers here:
![]()
Issues · MTK-bypass/exploits_collection
Contribute to MTK-bypass/exploits_collection development by creating an account on GitHub.github.com
hi
I'm sorry, I don't have experience with Redmi 10.hello i need help because my xiaomi redmi 10 (selene) is hardbrick by bad flash i have the mediatek drivers but the bypass tool doesn't work and i don't know what to do.
pip install pyusb pyserial json5
Nice job, my friend !LOVE YOU >....you saved my life ....i succesfully bypassed the protection.. and unbricked my hard-bricked begonia phone
i dont know how happy i am... huge thanks sir ....this was my first time doing such a work ..and you saved me from a huge loss
...thank you sir
God bless you sir ....
i have been trying to find a way for the past 16 hours continously .. i almost lost hope ...
thanks sir ..
Hello bro, today I was able to recover my Redmi 9 with the update of the tool that you shared, it was a bit complicated but in the end if it recovered, now, I have a problem, this Redmi is dual SIM and the two IMEIs appear unknown to me and a Wi-Fi network called NVram warning: Err = 0x10 appears, is there any solution to this error?I've attached a new zip file with the soon released files.
Please, try again and good luck