Blog
-> Reverse Engineering
Install and Setup EDL Client
Install and Setup EDL Client
- Download and Install https://github.com/leokhoa/laragon/releases/download/6.0.0/laragon-wamp.exe
- Download and Select Custom Install with path C:\laragon\bin\python\Python312\ https://www.python.org/ftp/python/3.12.4/python-3.12.4-amd64.exe
- Download and Install https://winfsp.dev/rel/
- Download and Install https://github.com/daynix/UsbDk/releases/
- Clone Repo https://github.com/bkerler/edl.git
- git submodule update --init --recursive
- pip3 install -r requirements.txt
- pip3 install .





$ edl --serial
$ edl --portname \\.\COM1
Buscar el puerto COM en Device Manager
Presionar la tecla Windows + R
devmgmt.msc Ejecturar

Ultima actualizaciĆ³n: 2024-07-04 17:51:14
Install and Setup MTKCLIENT 2
How Install MTK CLIENT
- Download and Install https://github.com/leokhoa/laragon/releases/download/6.0.0/laragon-wamp.exe
- Download and Select Custom Install with path C:\laragon\bin\python\Python312\ https://www.python.org/ftp/python/3.12.4/python-3.12.4-amd64.exe
- Download and Install https://winfsp.dev/rel/
- Download and Install https://github.com/daynix/UsbDk/releases/
- Clone Repo









- Exit Brom Mode Phone is Blank Mode or Lcd Black $ python mtk reset
- Read Full Flash $ python mtk rf flash.bin
- Erase partition FRP $ python mtk e frp
- Show gpt $ python mtk printgpt
- Generate and display rpmb1-3 key $ python mtk da generatekeys
- MTK Unlock Bootloader $ python mtk da seccfg unlock
- Bypass SLA, DAA and SBC (using generic_patcher_payload) $ python mtk payload
If you can switch any version mtkclient or install seversal version with git checkout
Example clone mtkclient 1.63

- eba887b9bb3764abf2a56775f6708be1c7589854 refs/tags/1.4
- a70d552fb605c0b8a422ad5899f4a95541079c3d refs/tags/1.41
- 3d4c3f0115ab4c89b823d1d123ec13c24c861dfc refs/tags/1.42
- 1e7f37e5ccdcecc553a8a2363898a6954b6fbdb4 refs/tags/1.52
- 81694c4aae9af5190e9ea1d037e727bf1f7dbe5a refs/tags/1.63
- 537c8c76bccfc5fe7615ecf578081257e45b2591 refs/tags/1.9
you can read official documentation for more use
Best Regard
Ultima actualizaciĆ³n: 2024-06-21 18:04:24