Widget Atas Posting

MTK Auth Bypass Tool v24


Free MTK Auth Bypass Tool V24 Build 24.0.0000:22:01:2022 added :
- Added backup protected/sensitive regions in META Mode, using the CCCI driver. 
- The meta backup is unconditional can work with old chipsets like MT6572 to MT6877T
- Highly recommended to use preloader mode to skip the security check and for boot up process.
- see meta_init.rc - except for Fused devices.
Backup list includes (if exists):
- nvram
- nvdata
- nvcfg
- protect1
- protect2
- protect_f
- protect_s
- proinfo
- nvram
- seccfg
- oppo_custom
- opporeserve2
- misc
- persist
- md1img
- Added extra factory reset method.


Free MTK Auth Bypass Tool V23 Build 23.0.0000:22:01:2022 added :
* Read eMMC Dump in META MODE .
- dump MTK eMMC userpart - mmcblk0 in META Mode.
- dump MTK UFS SDC in META Mode (sda - sdb - sdaxx)
- possible to backup but not implanted yet in my SW.
* voulmes/blocks will be copied directly from 
* dev/block/mmcblk0.
* dev/block/sdc.
Note : in meta mode all voulmes will mounted as defualt in normal boot as
- Android Linux kernel.
so you can copy what ever you want voulme/file/block.
for example you can copy :
/vendor/ueventd.rc.
/proc/bootdevice/ext_csd.
/system/build.prop.
/etc/init/mtk_camdumpserver.rc
/vendor/nvdata/md/NVRAM/NVD_IMEI/LD01_001.
/mnt/vendor.
/dev/block/platform/bootdevice/by-name/frp.
/dev/block/mmcblkxxx.
meansits similar to adb shell ls in root mode.
this maybe will be helpful for devices which not allow to enter BRom mode
and FAT/MODEM driver is much faster to copy blocks from device. 
+ i hope Mediatek pacth this ASAP.
Download MTK Auth Bypass Tool V23 : Mega / DHost / Upfile / MediaFire / AndroidFileHost


MTK Free Auth Bypass Tool V20 Build 20.0.0000:09:01:2022 added :
- Reboot MTK devices to Factory mode. 
- Reboot MTK devices to AT mode. 
- Fixed META API (MD) connection issues.
All boot mode set operations support SLA enabled devices and can work in both Preloader and Brom mode.
Download MTK Auth Bypass Tool V20 : Mega / DHost / Upfile / MediaFire / AndroidFileHost


MTK Auth Bypass Tool V18 Build 18.0.0000:06:01:2022 Added :
- Huawei FRL-L22 (Y9A) switch to brom mode with signle click without update.app file (switch from upgrade mode to brom for flash mode operation without test point).
* after switch you can use any tool (sigma , cm2) for huawei ID and other operations , after finish the desired operation flash preloader file to get the device working again.
currently it's working only under 123 ver , will update later for latest versions like 167 - 170.
- merged and fixed mtk ofp multi-super region extractor (auto rename preloader and scatter fixed and skipped remove the directory if extraction directory already exists).
 - Meta mode options updated to support LG and HMD MTK devices.
- added disable payjoy app via ADB.
supported MTK chipstes for meta mode oeprations :
MT6572, MT6580, MT6582, MT6592, MT6595, MT6735, MT6737, MT6739, MT6753, MT6755, MT6750, MT6750M, MT6750T, MT6750S, MT6757, MT6761, MT6762, MT3369, MT8766B, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6795, MT6797, MT8127, MT8163, MT8516, MT8173, MT8695, MT6873, MT6799, MT8590, MT6781, MT6768, MT6883, MT6885, MT6889, MT6833, MT6853, MT6853V, MT6873, MT6891Z, MT6893, MT8765WB, MT8385, 
MT8183, MT8666
MTK Auth Bypass Tool V18 : Mega / DHost / Upfile / MediaFire / AndroidFileHost


MTK Auth Bypass Tool V17 Build 17.0.0000:04:01:2022 :
- added dump eMMC EXT_CSD in MetaMode and parse! registers.
in case if eMMC Info found in /proc/bootdevice mnt 
- Reset/Wipe Nvram for some devices in MetaMode (reset both imei's to FFFF).
- this is actually some kind of re-implantation or fix for tool i made last year for ext_csd dump now fixed to work with secure devices.
highly recommend to use SP Api for non-reentrant version of META calls (AP/SP - with USB).
- fixed reboot from preloader mode to meta mode (useful for fused LG and Nokia and some devices which can't enter brom mode without test point (MT6771, MT6763, MT6762G)
- fixed remove temp/un-used dirs.
Phase out :
- Vivo Demo Remove (due to stability and boot mode set API's)
please use previous versions for this feature.
Note : currently you need to re-start!! the software after each meta operation in case if you didn't tick use SP Api - will be fixed later.
Metacore api modem funcs modifications by zishuo.
hoping this will be helpful for gsm technicians.
Download MTK Auth Bypass Tool V17 : Mega / DHost / UpfileMediaFire / AndroidFileHost


MTK Auth Bypass V16 Build 16.0.0000:04:01:2022 added backup and restore nvram in META_MODE, support FAT IMEI, OTP IMEI, SECRO IMEI, fixed meta mode reboot and read all (Extra Build Prop Info).& to restore nvram just select folder (.map and .dat folder). only one standalone exe - no extra files needed with METACore statically linked. note : meta mode nvram format is (.map and .dat) not like the ordinary nvarm and nvadta, but it conatins the imei and network data and all white list nvram s LID's (SML, IMEI, LOCK_DTATA). and take care for signed nvram can't use with different devices. due to some weird META_MODEM_API issues you can't perform 2 operations at the same session need to restart the tool after every meta operation.
Download MTK Auth Bypass Tool V16 : Mega / Upfiles / MediaFire / AndroidFileHost

New Features MTK Auth Bypass Tool V15 Build 15.0.0000:03:01:2022 :
* added Read MTK Device Info in meta mode (No dll ;)).
* merged ADB and Fastboot Info tool.
* added getvar all command to capture the fastboot info for all vendors.
Supported operations:
- Disable brom security.
- Crash preloader (support samsung + lg).
- Dump preloader.
- Reset VIVO Demo test Mode.
- Reboot META MODE.
- Read ADB Info.
- Read Fastboot Info.
- Read MTK MetaMode Info.
* for meta read info operation please connect device in brom mode using volume up + down buttons. Note : some vendor disabled meta mode entering. and changed with the currently known WatchDog address so meta mode entering won't work with all MTK devices.
Download MTK Auth Bypass Tool V15 : Mega / MediaFire / AndroidFileHost


MTK Auth Bypass Tool V13: Build 13.0.0000:16:12:2021 Added Reboot META mode from BRom (support SLA enabled devices). after reboot with auth bypass tool. if you used MODEM META Tool. you need to select the new comport number manually, steps: select Platform Type - More - DUT in meta mode - select USB/UART and new meta mode port number, optmized added auth bypass (SLA/DAA)  + dump preloader support for all knwon mtk chipsets :
fixed support for (MT8173 - MT8695).
supported operations:
- Disable brom security.
- Crash preloader (support samsung + lg).
- Dump preloader.
- Reset VIVO Demo test Mode.
- Reboot META MODE.
total supported chipsets: MT6781, MT6768, MT6883, MT6885, MT6889, MT6833, MT6853, MT6853V, MT6873, MT6891Z, MT6893, MT8765WB, MT8385, MT8183, MT8666, MT6572, MT6580, MT6582, MT6592, MT6595, MT6735, MT6737, MT6739, MT6753, MT6755, MT6750, MT6750M, MT6750T, MT6750S, MT6757, MT6761, MT6762, MT3369, MT8766B, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6795, MT6797, MT8127, MT8163, MT8516, MT8173, MT8695, MT6873, MT6799, MT8590
Download MTK Auth Bypass Tool V13 : Mega / Upfiles / MediaFire / AndroidFileHost

MTK Auth Bypass Tool V13 QT C++ GUI source code. the source code support line coding exploit with libusb0 no need UsbDk,with auto filtering. just don't forget about release interface or reset the r/w endpoint after each transmission. support all mtk 32bit/Helio/Dimensity chipsets. Both old and new exploits supported. You can build the source code with any qt version Recommend Qt version to build the source code:
QT 5.14.2 MinGW highly recommend (static build).
QT 6.1.0 - QT 6.2.2.
with build-in qt advanced threading system.
If you faced any problem with build/compile process feel free to request my help.
supported operations:
- Disable brom security.
- Crash preloader (support samsung + lg).
- Dump preloader.
- Remove VIVO Demo test Mode via ATE.
- Reboot META MODE (from Brom).
all details and list of supported chipsets provided on my previous posts.
Auth Bypass exploit and payloads credits to Chaosmaster & Bjoern Kerler.
in case if you want copy the auth bypass payloads make sure to give credits to owner, 
otherwise if you build your own payloads you can use the source code - modify - +++.

MTK Bypass Auth Tool V12 Build 12.0.0000:17:11:2021. Added auth bypass SLA/DAA  + dump preloader support for : MT6781 MediaTek Helio G96, MT6768 2021 MediaTek Helio G88. 
exploit by Chaosmaster, bypass payload by Bjoern Kerle
Thanks to Hary Sulteng for providing the test devices
MTK Auth Bypass Tool V12 : AFHMega / Upfiles / DroidHostMediaFire

MTK Bypass Auth Tool V11 Build 11.0.0000:08:10:21.
* Optimized auth bypass for dimensity chipsets (LC).
* Added auth bypass for chinese tablests/routers.
* Phased out non mobile phones/tablets/routers chipsets.
* Improved preloader crash operation for Samsung/LG devices.
* MT8590, MT7683, MT8521, MT7623, MT8172, MT8167, MT8516, MT8362
currently expected chipsets to be supported for Smartphones, Tablets.
MT6580, MT6579S, MT6580M, MT8311, MT8321, MT8321M, MT6735, MT6735M, MT6735P, MT6753, MT6753T, MT6737T, MT6737M, MT6737, MT6737H", MT8735, MT8735M, MT8735P, MT8783, MT8783T, MT8161A, MT8161B, MT8161P, MT8735T, MT8735A, MT8735B, MT8735D, MT8161AA, MT8161AB, MT6739CW-ENG2, MT6739-ENG, MT6739WW-ENG1, MT6739WA-ENG3, MT6739WM-ENG5, MT6739WA, MT6739WW, MT6739CH, MT6739CW, MT6739WM, MT8765-ENG, MT8765-ENG1, MT8765WB,MT8765WA, MT8765CA, MT6731, MT6731-ENG1,MT6755, MT6755V/CM, MT6755V/C, MT6755V/BM, MT6755V/B, MT6755V/WM, MT6755V/W, MT6755V/VM, MT6755V/V, MT6755V/CT, MT6755V/BT, MT6755V/WT, MT6755V/VT, MT6750V/CT, MT6750V/C, MT6738V/C, MT6750V/WT, MT6750V/W, MT6738V/CT, MT6738V/W, MT6738V/WT, MT6755V/CS, MT6755V/WS, MT6750V/CS, MT6750V/WS, MT6750V/CN, MT6750V/WN, MT6757, MT6757C, MT6757W, MT6757V, MT6757CH, MT6757WH, MT6757VH, MT6757CD, MT6757WD, MT6757VD, MT6757CL, MT6757WL, MT6757VL, MT6757T, MT6757M", MT6761V/WAB, MT6761V/CAB, MT6761V/WBB, MT6761V/CBB, MT8766A, MT8766B, MT8166B, MT8766D, MT6761V/WD, MT6761V/CD, MT6761V/WE, MT6761V/CE, MT6763T /* i-p */m, MT6763V/B, MT6763V/V, MT6763V/CT, MT6763V/WT, MT6762V/CN, MT6762V/CM, MT8768CB, MT6762M, MT6762V/WN, MT6762V/WM, MT8768WB, MT6762V/CB, MT8768CE, MT6762V/CA, MT8768CA, MT6762, MT6762V/WB, MT8768WE, MT6762V/WA, MT8768WA, MT6762V/CR, MT8768CD, MT6762V/CS, MT6762R, MT6762V/WR, MT8768WD, MT6762V/WS, MT6762V/CD, MT6762V/WD, MT6762D, MT6765V/CB, MT6765V/CA, MT8768CT, MT6765V/WB, MT6765V/WA, MT8768WT, MT6765, MT6765T, MT6762G, MT6765G, MT6768V/WA, MT6768V/CA, MT6768V/WB, MT6768V/CB, MT6767V/WA, MT6767V/CA, MT6767V/WB, MT6767V/CB, MT6769V/WA, MT6769V/CA, MT6769V/WB, MT6769V/CB, MT6769V/WT, MT6769V/CT, MT6769V/WU, MT6769V/CU, MT6769V/WZ, MT6769V/CZ, MT6769V/WY, MT6769V/CY, MT6771V/C(ENG), MT6771V/C, MT6771V/W, MT8183, MT6771V/CM, MT6771V/WM, MT6771V/CT, MT6771V/WT, MT8788, MT6771V/CL, MT6771V/WL, MT6779V/WU, MT6779V/CU, MT6779V/WY, MT6779V/CY, MT6779V/WB, MT6779V/CB, MT6779V/WE, MT6779V/CE, MT6779V/WV, MT6779V/CV, MT6779V/WZ, MT6779V/CZ, MT6779V/WC, MT6779V/CC, MT6779V/WF, MT6779V/CF, MT6779V/CD, MT6779V/WD, MT6783V/CU, MT6783V/WU, MT6783V/CB, MT6783V/WB, MT6785V/CU, MT6785V/WU, MT6785V/CB, MT6785V/WB, MT6785V/CV, MT6785V/WV, MT6785V/CC, MT6785V/WC
MTK Auth Bypass Tool V11 : Mega / Gdrive / MediaFire / AndroidFileHost
Some chipset's maybe not actually exists, Manufactured by Mediatek but for limited/internal/private use, others => default : MT6877, MT6883, MT6885, MT6889, MT6833, MT6853, MT6853V, MT6873, MT6891Z, MT6893, MT8765WB, MT8385, MT8183, MT8666, MT6572, MT6580, MT6582, MT6592, MT6595, MT6735, MT6737, MT6739, MT6753, MT6755, MT6750, MT6750M, MT6750T, MT6750S, MT6757, MT6761, MT6762, MT3369, MT8766B, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6795, MT6797, MT8127, MT8163, MT8516, MT8173, MT8695, MT6873, MT6799, MT8590

MTK Bypass Auth Tool V10 Update Build 10.0.0000:29:9:21.finally the list of all mtk chipsets now supported added auth bypass support for:
* MT6877 MediaTek (Dimensity 900 5G).
* MT6877V/ZA MediaTek (Dimensity 900 5G).
* MT6877V/NZA MediaTek (Dimensity 900 5G).
* MT6877V/TZA MediaTek (Dimensity 900 5G).
* MT6877V/TNZA MediaTek (Dimensity 900 5G).
* MT6883 (Dimensity 800) 
* MT6883V/ZA (Dimensity 800) 
* MT6883Z (Dimensity 1000C) 
* MT6885 (Dimensity 1000L)  
* MT6885Z (Dimensity 1000L)  
* MT6889 (Dimensity 1000)  
* MT6889Z (Dimensity 1000+) 
* MT6890 (T750 5G-integrated SoC)
* MT6880 (Milestone Silver)
MTK Auth Bypass Tool V10 : Mega / MediaFire / AndroidFileHost

MTK Auth Bypass Tool V7.8.0.5 added auth bypass support : MT6873 MediaTek (Dimensity 800 5G), MT6873V/ZA MediaTek (Dimensity 800 5G), MT8765WB tablets (ARMv8 (64-bit). added vivo demo remove for latest vivo devices. added lg preloader crash support. added preloader cash only option without disable auth -> to be able to use other tools which require usb hotplug callbacks. phased out usblib and payloads and external depends, only 1 standalone exe, supported chipsets: MT6572, MT6580, MT6582, MT6592, MT6595, MT6735, MT6737, MT6739, MT6753, MT6755, MT6750, MT6750M, MT6750T, MT6750S, MT6757, MT6761, MT6762, MT3369, MT8766B, MT6763, MT6765, MT6768, MT6771, MT6779, MT6785, MT6795, MT6797, MT8127, MT8163, MT8516, MT8173, MT8695, MT6873, MT6799, MT8590, MT6833, MT6833V, MT6853, MT6853V, MT6853V/TNZA, MT6873, MT6873V, MT6891Z, MT6893, MT8765WB, MT8385, MT8183, MT8666. MTK Auth Bypass Tool V7 : Mega / MediaFire / AndroidFileHost

MTK Bypass Auth Tool V6.0.0.1 Exclusive Version,Update Mores Auth Bypass MTK Dimensity. Have Test MTK Soc MT6891Z, MT6893 Dimensity 1100/1200, MT6833 Dimensity 700, MT6853 Dimensity 720/800U 5G, MT6765 Helio P35
MTK Auth Bypass Tool V6 : Mega / MediaFire / AndroidFileHost


Free MCT Ofp extractor and MCT Mediatek Bypass Auth REV4 V1.00.210208 add MT6261, MT6572, MT6580, MT6582, MT6763, MT6799, MT6873. MCT REV3 Add MT6755, MT6757, MT6761, MT6873. Alat Bypass Auth MCT Mediatek REV1 dan REV2 dari MCT (Myanmar Creative Team). MODEL YANG DIDUKUNG : MT6572, MT6735, MT6737, MT6739, MT6750, MT6765, MT6768, MT6771, MT6785, MT8127, MT8163, MT8173, MT8695 


Eksploitasi ini bergantung pada Jenis SOC yang digunakan pada perangkat kalian
sebelum menggunakan alat ini kalian perlu menginstal driver libusb-win32-devel-filter-1.2.6.0 alat ini bisa digabungkan dengan spflashtool atau UFI Box dan tool lainnya, silahkan dicoba sendiri. Pada kolom download dibawah juga kami sertakan file DA, Preloader dan Scatter pasti akan dibutuhkan untuk hapus kunci pola dan proses lainnya.berikut tutorial cara menggunakan mct mtk bypass dengan SP FlahTool 
Download MCT MTK BYPASS Free Rev 4 : MegaMediaFire / AndroidFileHost



MTK_Addr_Files_V1.2.1_Setup
Feature -> Factory Files Reset Pass/Frp/Acc ID
Collection All-In-One Place Added :
MEIZU M8,V8_M1813
MEIZU V8_M1816
MEIZU Pro 7 Plus_M1793
XIAOMI MI Play_China+Global
XIAOMI Redmi 6_China+Global
XIAOMI Redmi 6a_China+Global
XIAOMI Redmi 9a_China+Global
XIAOMI Redmi Note 9_China+Global
XIAOMI Redmi Note 8 Pro_China+Global
Download :
NOTE : disable antivir if needed (add exclusions on windows security threat protection)