bypass_payloads
bypass_payloads copied to clipboard
MT6572, MT6768, MT6785 Issues
Seems wrong address or different BROM versions: MT6572 int (cmd_handler)() = (void)0x4002f7; >> 0x40C5AF MT6768 int (cmd_handler)() = (void)0xcec5; >> 0xCF15 MT6785 int (cmd_handler)() = (void)0xefd9; >> 0xF029 After these patch all works fine, Tested on Xiaomi phones.
Here is dump of my BROM's: https://drive.google.com/file/d/1dIGr2Ndbzhj_7YpPdHUtzYBzCuwr7FlD/view?usp=sharing
Thanks for the info, I'll take a look
Thanks for the report, It is working fine with Kamakiri exploit but not with Kamakiri 2. After patching with suggested values which I think is retrieved from mtkclient config file, everything worked just fine with Kamakiri 2 also.