For some reason i can't access the site anymore? Could you try and see if you can still access it?
The requirements are an unlocked bootloader and a boot image to patch(or recovery if your boot image lacks a ramdisk).
I was worried about that myself, but the gray-out is only temporary - as soon as you toggle the button it merely asks you for your lock code again - DM me back if you find different.
hi bro can you assist with a tutorial to flash and root this fone. I have an AT&T version.
Great - I am still scared to try and have let myself get distracted from this important task but want to pursue it next week. Can you actually accompany my step-by-step or does that tutorial you speak of, do so?
This is a modified version of your script which links to the latest build. I tested it successfully but as always, use at your own risk.FWIW, I wrote a simple linux bash script for flashing the guamna retus 11 stock rom to a Moto G Play 2021 XT2093-4:
echo "Moto G Play 2021 XT2093-4 (guamna) firmware flash script fpr Linux"
echo "For flashing STOCK GUAMNA RETUS 11 firmware to a MOTO G PLAY 2021 XT2093-4"
echo "THIS SCRIPT IS INHERENTLY DANGEROUS! USE IT AT YOUR OWN RISK!"
echo "Mandatory Preparation:"
echo "1. Back up all desired phone user data. It will be lost."
echo "2. Make sure the phone battery is well-charged"
echo "3. Put phone in fastboot mode: Turn it off, then hold power/volume-down."
echo "4. Connect phone to PC via usb cable."
echo "5. Open a terminal on the PC somewhere writable."
echo "6. Copy this script there and make it executable."
echo "7. Make sure the PC has a working internet connection."
echo "8. Install necessary packages: 'sudo apt install adb fastboot wget unzip'"
echo "9. Make sure you have 7 GB of free disk space for the ROM download/unzip."
echo "10. Make sure the phone and PC can communicate: 'fastboot devices'"
echo "Once all these things have been done, you can continue. Else STOP NOW."
read -p "Continue (y/n)?" CONT
if [ "$CONT" = "y" ]; then
unzip XT2093-4_GUAMNA_RETUS_11_RZAS31.Q2-146-14-7_subsidy-DEFAULT_regulatory-DEFAULT_CFC.xml.zip -d retus11
fastboot getvar max-sparse-size
fastboot oem fb_mode_set
fastboot flash partition gpt.bin
fastboot flash bootloader bootloader.img
fastboot flash radio radio.img
fastboot flash bluetooth BTFM.bin
fastboot flash dsp dspso.bin
fastboot flash logo logo.bin
fastboot flash vbmeta vbmeta.img
fastboot flash boot boot.img
fastboot flash dtbo dtbo.img
fastboot flash recovery recovery.img
fastboot flash super super.img_sparsechunk.0
fastboot flash super super.img_sparsechunk.1
fastboot flash super super.img_sparsechunk.2
fastboot flash super super.img_sparsechunk.3
fastboot flash super super.img_sparsechunk.4
fastboot flash super super.img_sparsechunk.5
fastboot flash super super.img_sparsechunk.6
fastboot flash super super.img_sparsechunk.7
fastboot flash super super.img_sparsechunk.8
fastboot flash super super.img_sparsechunk.9
fastboot flash super super.img_sparsechunk.10
fastboot flash super super.img_sparsechunk.11
fastboot flash super super.img_sparsechunk.12
fastboot flash super super.img_sparsechunk.13
fastboot flash super super.img_sparsechunk.14
fastboot flash super super.img_sparsechunk.15
fastboot flash super super.img_sparsechunk.16
fastboot flash super super.img_sparsechunk.17
fastboot flash super super.img_sparsechunk.18
fastboot erase carrier
fastboot erase ddr
fastboot erase userdata
fastboot erase metadata
fastboot oem fb_mode_clear
echo "Flash completed. You can now reboot your phone with 'fastboot reboot'"
echo "Script ended with no action taken."
Yes, this was with a T-Mobile phone. You unlock the bootloader, take boot.img from the lolinet link, patch it in Magisk, and flash through fastboot.
Motorola phones are perfect for you then, I use them exclusively when tethering to a routers. Always easy to root. No dun restrictions in apn settings. All carrier spyware is in the product partition, easy to suss out and disable. Can't beat it.