Microsoft Windows [Version 10.0.17763.1]

(c) 2018 Microsoft Corporation. All rights reserved.


C:\Users\GSMTEAM360>cd "C:\Users\GSMTEAM360\Desktop\New folder\mtkclient"


C:\Users\GSMTEAM360\Desktop\New folder\mtkclient>py -3.10 mtk.py --help

MTK Flash/Exploit Client Public V2.0.1 (c) B.Kerler 2018-2024


usage: mtk.py [-h]

              {script,multi,printgpt,gpt,r,rl,rf,rs,ro,fs,w,wf,wl,wo,e,es,ess,footer,reset,dumpbrom,dumpsram,dumppreloader,payload,crash,brute,gettargetconfig,peek,stage,plstage,logs,meta,da}

              ...


MTK Flash/Exploit Client Public V2.0.1 (c) B.Kerler 2018-2024


positional arguments:

  {script,multi,printgpt,gpt,r,rl,rf,rs,ro,fs,w,wf,wl,wo,e,es,ess,footer,reset,dumpbrom,dumpsram,dumppreloader,payload,crash,brute,gettargetconfig,peek,stage,plstage,logs,meta,da}

                        Valid commands are: printgpt, gpt, r, rl, rf, fs, rs,

                        w, wf, wl, e, es, footer, reset, dumpbrom, dumpsram,

                        dumppreloader, payload, crash, brute, gettargetconfig,

                        peek, stage, plstage, da, script

    script              Run text script

    multi               Run multiple commands using a semicolon-separatedlist

                        (enclose list in quotes)

    printgpt            Print GPT Table information

    gpt                 Save gpt table to given directory

    r                   Read flash to filename

    rl                  Read all partitions from flash to a directory

    rf                  Read whole flash to file

    rs                  Read sectors starting at start_sector to filename

    ro                  Read flash starting at offset to filename

    fs                  Mount the device as a FUSE filesystem

    w                   Write partition from filename

    wf                  Write flash from filename

    wl                  Write partitions from directory path to flash

    wo                  Write flash starting at offset from filename

    e                   Erase partition

    es                  Erase partition with sector count

    ess                 Erase sector with sector count

    footer              Read crypto footer from flash

    reset               Send mtk reset command

    dumpbrom            Try to dump the bootrom

    dumpsram            Try to dump the sram

    dumppreloader       Try to dump the preloader

    payload             Run a specific kamakiri / da payload, if no filename

                        is given, generic patcher is used

    crash               Try to crash the preloader

    brute               Bruteforce the kamakiri var1

    gettargetconfig     Get target config (sbc, daa, etc.)

    peek                Read memory in patched preloader mode

    stage               Run stage2 payload via boot rom mode (kamakiri)

    plstage             Run stage2 payload via preloader mode (send_da)

    logs                Read logs

    meta                Enter meta mode

    da                  Run da special commands


options:

  -h, --help            show this help message and exit


C:\Users\GSMTEAM360\Desktop\New folder\mtkclient>




Post a Comment

0 Comments