usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m Port - Hint: Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb. usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m .usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m .usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m .usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m .usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m .usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m .usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m .usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m .usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m .usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m .usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m . usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m Port - Hint: Power off the phone before connecting. For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb. For preloader mode, don't press any hw button and connect usb. usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m usb_class usb_class - [LIB]: ←[95mCouldn't detect the device. Is it connected ?←[0m --- Logging error --- Traceback (most recent call last): File "C:\Users\\AppData\Local\Programs\Python\Python39-32\lib\logging\__init__.py", line 1086, in emit stream.write(msg + self.terminator) File "C:\Users\\AppData\Local\Programs\Python\Python39-32\lib\encodings\cp1254.py", line 19, in encode return codecs.charmap_encode(input,self.errors,encoding_table)[0] UnicodeEncodeError: 'charmap' codec can't encode character '\u0326' in position 801: character maps to Call stack: File "C:\Users\\Desktop\mtkclient\mtk", line 1014, in mtk = Main().run() File "C:\Users\\Desktop\mtkclient\mtk", line 648, in run if mtk.preloader.init(args=self.args, readsocid=readsocid): File "C:\Users\\Desktop\mtkclient\mtkclient\Library\mtk_preloader.py", line 119, in init res=self.mtk.port.handshake(maxtries=maxtries) File "C:\Users\\Desktop\mtkclient\mtkclient\Library\Port.py", line 75, in handshake self.cdc.connected = self.cdc.connect() File "C:\Users\\Desktop\mtkclient\mtkclient\Library\usblib.py", line 298, in connect self.debug(self.configuration) Message: Arguments: () usb_class usb_class - [LIB]: ←[95m CONFIGURATION 1: 0 mA ==================================== bLength : 0x9 (9 bytes) bDescriptorType : 0x2 Configuration wTotalLength : 0x43 (67 bytes) bNumInterfaces : 0x2 bConfigurationValue : 0x1 iConfiguration : 0x0 bmAttributes : 0x80 Bus Powered bMaxPower : 0x0 (0 mA) INTERFACE 0: CDC Communication ========================= bLength : 0x9 (9 bytes) bDescriptorType : 0x4 Interface bInterfaceNumber : 0x0 bAlternateSetting : 0x0 bNumEndpoints : 0x1 bInterfaceClass : 0x2 CDC Communication bInterfaceSubClass : 0x2 bInterfaceProtocol : 0x1 iInterface : 0x1 comm_if̦data_if̄Љ兴 ENDPOINT 0x84: Interrupt IN ========================== bLength : 0x7 (7 bytes) bDescriptorType : 0x5 Endpoint bEndpointAddress : 0x84 IN bmAttributes : 0x3 Interrupt wMaxPacketSize : 0x40 (64 bytes) bInterval : 0x1 INTERFACE 1: CDC Data ================================== bLength : 0x9 (9 bytes) bDescriptorType : 0x4 Interface bInterfaceNumber : 0x1 bAlternateSetting : 0x0 bNumEndpoints : 0x2 bInterfaceClass : 0xa CDC Data bInterfaceSubClass : 0x0 bInterfaceProtocol : 0x0 iInterface : 0x2 data_if̄Љ兴►呪풅ཊꤛ漢䕄礤 ENDPOINT 0x81: Bulk IN =============================== bLength : 0x7 (7 bytes) bDescriptorType : 0x5 Endpoint bEndpointAddress : 0x81 IN bmAttributes : 0x2 Bulk wMaxPacketSize : 0x40 (64 bytes) bInterval : 0x0 ENDPOINT 0x1: Bulk OUT =============================== bLength : 0x7 (7 bytes) bDescriptorType : 0x5 Endpoint bEndpointAddress : 0x1 OUT bmAttributes : 0x2 Bulk wMaxPacketSize : 0x40 (64 bytes) bInterval : 0x0←[0m usb_class usb_class - [LIB]: ←[95mNo kernel driver supported: Operation not supported or unimplemented on this platform←[0m Port - Device detected :) usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 128, in init\n if not self.echo(self.Cmd.GET_HW_CODE.value): # 0xFD\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:fd←[0m usb_class usb_class - [LIB]: ←[95musbread:0x1←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 128, in init\n if not self.echo(self.Cmd.GET_HW_CODE.value): # 0xFD\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:fd←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 133, in init\n self.config.hwcode = self.rword()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\usblib.py", line 479, in rword\n v = self.usbread(2)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:0335←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 134, in init\n self.config.hwver = self.rword()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\usblib.py", line 479, in rword\n v = self.usbread(2)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:0000←[0m CPU:MT6737M() HW version:0x0 WDT:0x10212000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - CQ_DMA addr: 0x10217c00 Preloader - Var1: 0x28 usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 174, in init\n res = self.get_hw_sw_ver()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 526, in get_hw_sw_ver\n res = self.sendcmd(self.Cmd.GET_HW_SW_VER.value, 8) # 0xFC\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:fc←[0m usb_class usb_class - [LIB]: ←[95musbread:0x1←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 174, in init\n res = self.get_hw_sw_ver()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 526, in get_hw_sw_ver\n res = self.sendcmd(self.Cmd.GET_HW_SW_VER.value, 8) # 0xFC\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:fc←[0m usb_class usb_class - [LIB]: ←[95musbread:0x8←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 174, in init\n res = self.get_hw_sw_ver()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 526, in get_hw_sw_ver\n res = self.sendcmd(self.Cmd.GET_HW_SW_VER.value, 8) # 0xFC\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:8a00←[0m usb_class usb_class - [LIB]: ←[95musbread:0x8←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 174, in init\n res = self.get_hw_sw_ver()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 526, in get_hw_sw_ver\n res = self.sendcmd(self.Cmd.GET_HW_SW_VER.value, 8) # 0xFC\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:cb00←[0m usb_class usb_class - [LIB]: ←[95musbread:0x8←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 174, in init\n res = self.get_hw_sw_ver()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 526, in get_hw_sw_ver\n res = self.sendcmd(self.Cmd.GET_HW_SW_VER.value, 8) # 0xFC\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:0000←[0m usb_class usb_class - [LIB]: ←[95musbread:0x8←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 174, in init\n res = self.get_hw_sw_ver()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 526, in get_hw_sw_ver\n res = self.sendcmd(self.Cmd.GET_HW_SW_VER.value, 8) # 0xFC\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:0000←[0m Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xcb00 Preloader - SW Ver: 0x0 Preloader - Disabling Watchdog... usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 190, in init\n self.setreg_disablewatchdogtimer(self.config.hwcode) # D4\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 321, in setreg_disablewatchdogtimer\n res = self.write32(addr, [value])\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 233, in write32\n if self.echo(self.Cmd.WRITE32.value):\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:d4←[0m usb_class usb_class - [LIB]: ←[95musbread:0x1←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 190, in init\n self.setreg_disablewatchdogtimer(self.config.hwcode) # D4\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 321, in setreg_disablewatchdogtimer\n res = self.write32(addr, [value])\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 233, in write32\n if self.echo(self.Cmd.WRITE32.value):\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:d4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 190, in init\n self.setreg_disablewatchdogtimer(self.config.hwcode) # D4\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 321, in setreg_disablewatchdogtimer\n res = self.write32(addr, [value])\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 234, in write32\n if self.echo(pack(">I", addr)):\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:10212000←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 190, in init\n self.setreg_disablewatchdogtimer(self.config.hwcode) # D4\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 321, in setreg_disablewatchdogtimer\n res = self.write32(addr, [value])\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 234, in write32\n if self.echo(pack(">I", addr)):\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:10212000←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 190, in init\n self.setreg_disablewatchdogtimer(self.config.hwcode) # D4\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 321, in setreg_disablewatchdogtimer\n res = self.write32(addr, [value])\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 235, in write32\n ack = self.echo(pack(">I", len(dwords)))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000001←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 190, in init\n self.setreg_disablewatchdogtimer(self.config.hwcode) # D4\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 321, in setreg_disablewatchdogtimer\n res = self.write32(addr, [value])\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 235, in write32\n ack = self.echo(pack(">I", len(dwords)))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000001←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 190, in init\n self.setreg_disablewatchdogtimer(self.config.hwcode) # D4\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 321, in setreg_disablewatchdogtimer\n res = self.write32(addr, [value])\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 236, in write32\n status = self.rword()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\usblib.py", line 479, in rword\n v = self.usbread(2)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:0001←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 190, in init\n self.setreg_disablewatchdogtimer(self.config.hwcode) # D4\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 321, in setreg_disablewatchdogtimer\n res = self.write32(addr, [value])\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 242, in write32\n if not self.echo(pack(">I", dword)):\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:22000000←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 190, in init\n self.setreg_disablewatchdogtimer(self.config.hwcode) # D4\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 321, in setreg_disablewatchdogtimer\n res = self.write32(addr, [value])\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 242, in write32\n if not self.echo(pack(">I", dword)):\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:22000000←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 190, in init\n self.setreg_disablewatchdogtimer(self.config.hwcode) # D4\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 321, in setreg_disablewatchdogtimer\n res = self.write32(addr, [value])\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 244, in write32\n status2 = self.rword()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\usblib.py", line 479, in rword\n v = self.usbread(2)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:0001←[0m Preloader - HW code: 0x335 usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 195, in init\n self.config.target_config = self.get_target_config(self.display)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 351, in get_target_config\n if self.echo(self.Cmd.GET_TARGET_CONFIG.value):\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:d8←[0m usb_class usb_class - [LIB]: ←[95musbread:0x1←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 195, in init\n self.config.target_config = self.get_target_config(self.display)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 351, in get_target_config\n if self.echo(self.Cmd.GET_TARGET_CONFIG.value):\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:d8←[0m usb_class usb_class - [LIB]: ←[95musbread:0x6←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 195, in init\n self.config.target_config = self.get_target_config(self.display)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 352, in get_target_config\n target_config, status = unpack(">IH", self.rbyte(6))\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\usblib.py", line 488, in rbyte\n return self.usbread(count)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000005←[0m usb_class usb_class - [LIB]: ←[95musbread:0x6←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 195, in init\n self.config.target_config = self.get_target_config(self.display)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 352, in get_target_config\n target_config, status = unpack(">IH", self.rbyte(6))\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\usblib.py", line 488, in rbyte\n return self.usbread(count)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:0000←[0m Preloader - Target config: 0x5 Preloader - SBC enabled: True Preloader - SLA enabled: False Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 196, in init\n blver=self.get_blver()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 338, in get_blver\n if self.usbwrite(self.Cmd.GET_BL_VER.value):\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:fe←[0m usb_class usb_class - [LIB]: ←[95musbread:0x1←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 196, in init\n blver=self.get_blver()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 339, in get_blver\n res = self.usbread(1)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:fe←[0m Preloader - BROM mode detected. usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 197, in init\n meid = self.get_meid()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 530, in get_meid\n if self.usbwrite(self.Cmd.GET_BL_VER.value):\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:fe←[0m usb_class usb_class - [LIB]: ←[95musbread:0x1←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 197, in init\n meid = self.get_meid()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 531, in get_meid\n res = self.usbread(1)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:fe←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 197, in init\n meid = self.get_meid()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 533, in get_meid\n self.usbwrite(self.Cmd.GET_ME_ID.value) # 0xE1\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:e1←[0m usb_class usb_class - [LIB]: ←[95musbread:0x1←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 197, in init\n meid = self.get_meid()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 534, in get_meid\n if self.usbread(1) == self.Cmd.GET_ME_ID.value:\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:e1←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 197, in init\n meid = self.get_meid()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 535, in get_meid\n length = unpack(">I", self.usbread(4))[0]\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000010←[0m usb_class usb_class - [LIB]: ←[95musbread:0x10←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 197, in init\n meid = self.get_meid()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 536, in get_meid\n self.mtk.config.meid = self.usbread(length)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:05c1cafe6b664df9cfa1b47fcfc6fd2f←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 648, in run\n if mtk.preloader.init(args=self.args, readsocid=readsocid):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 197, in init\n meid = self.get_meid()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 537, in get_meid\n status = unpack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("I", mode))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000000←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("I", mode))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000000←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("I", address))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000000←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("I", address))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000000←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("I", length))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000001←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("I", length))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000001←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("I", addr)):\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:10212050←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("I", addr)):\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:10212050←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("I", dwords))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000001←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("I", dwords))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000001←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("H", self.usbread(2))[0]\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:0000←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("I", mode))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000000←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("I", mode))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000000←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("I", address))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:000095c8←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("I", address))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:000095c8←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("I", length))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000004←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("I", length))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000004←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 111, in exploit2\n ptr_send = unpack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 80, in da_read_write\n self.mtk.preloader.brom_register_access(0, 1)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 492, in brom_register_access\n self.mtk.port.echo(self.Cmd.brom_register_access.value)\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:da←[0m usb_class usb_class - [LIB]: ←[95musbread:0x1←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 80, in da_read_write\n self.mtk.preloader.brom_register_access(0, 1)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 492, in brom_register_access\n self.mtk.port.echo(self.Cmd.brom_register_access.value)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:da←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 80, in da_read_write\n self.mtk.preloader.brom_register_access(0, 1)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 493, in brom_register_access\n self.mtk.port.echo(pack(">I", mode))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000000←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 80, in da_read_write\n self.mtk.preloader.brom_register_access(0, 1)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 493, in brom_register_access\n self.mtk.port.echo(pack(">I", mode))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000000←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 80, in da_read_write\n self.mtk.preloader.brom_register_access(0, 1)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 494, in brom_register_access\n self.mtk.port.echo(pack(">I", address))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000000←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 80, in da_read_write\n self.mtk.preloader.brom_register_access(0, 1)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 494, in brom_register_access\n self.mtk.port.echo(pack(">I", address))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000000←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 80, in da_read_write\n self.mtk.preloader.brom_register_access(0, 1)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 495, in brom_register_access\n self.mtk.port.echo(pack(">I", length))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000001←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 80, in da_read_write\n self.mtk.preloader.brom_register_access(0, 1)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 495, in brom_register_access\n self.mtk.port.echo(pack(">I", length))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000001←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 80, in da_read_write\n self.mtk.preloader.brom_register_access(0, 1)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 496, in brom_register_access\n status = self.mtk.port.usbread(2)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:0000←[0m usb_class usb_class - [LIB]: ←[95musbread:0x1←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 80, in da_read_write\n self.mtk.preloader.brom_register_access(0, 1)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 506, in brom_register_access\n data=self.mtk.port.usbread(length)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 80, in da_read_write\n self.mtk.preloader.brom_register_access(0, 1)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 511, in brom_register_access\n status = self.mtk.port.usbread(2)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:0000←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 81, in da_read_write\n self.mtk.preloader.read32(self.mtk.config.chipconfig.watchdog + 0x50)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 217, in read32\n if self.echo(self.Cmd.READ32.value):\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:d1←[0m usb_class usb_class - [LIB]: ←[95musbread:0x1←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 81, in da_read_write\n self.mtk.preloader.read32(self.mtk.config.chipconfig.watchdog + 0x50)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 217, in read32\n if self.echo(self.Cmd.READ32.value):\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:d1←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 81, in da_read_write\n self.mtk.preloader.read32(self.mtk.config.chipconfig.watchdog + 0x50)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 218, in read32\n if self.echo(pack(">I", addr)):\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:10212050←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 81, in da_read_write\n self.mtk.preloader.read32(self.mtk.config.chipconfig.watchdog + 0x50)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 218, in read32\n if self.echo(pack(">I", addr)):\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:10212050←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 81, in da_read_write\n self.mtk.preloader.read32(self.mtk.config.chipconfig.watchdog + 0x50)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 219, in read32\n ack = self.echo(pack(">I", dwords))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000001←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 81, in da_read_write\n self.mtk.preloader.read32(self.mtk.config.chipconfig.watchdog + 0x50)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 219, in read32\n ack = self.echo(pack(">I", dwords))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000001←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 81, in da_read_write\n self.mtk.preloader.read32(self.mtk.config.chipconfig.watchdog + 0x50)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 220, in read32\n status = self.rword()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\usblib.py", line 479, in rword\n v = self.usbread(2)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:0000←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 81, in da_read_write\n self.mtk.preloader.read32(self.mtk.config.chipconfig.watchdog + 0x50)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 222, in read32\n result = self.rdword(dwords)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\usblib.py", line 469, in rdword\n value = self.usbread(4 * count)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000000←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 81, in da_read_write\n self.mtk.preloader.read32(self.mtk.config.chipconfig.watchdog + 0x50)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 223, in read32\n status2 = unpack(">H", self.usbread(2))[0]\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:0000←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 103, in da_read_write\n return self.mtk.preloader.brom_register_access(address - 0x40, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 492, in brom_register_access\n self.mtk.port.echo(self.Cmd.brom_register_access.value)\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:da←[0m usb_class usb_class - [LIB]: ←[95musbread:0x1←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 103, in da_read_write\n return self.mtk.preloader.brom_register_access(address - 0x40, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 492, in brom_register_access\n self.mtk.port.echo(self.Cmd.brom_register_access.value)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:da←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 103, in da_read_write\n return self.mtk.preloader.brom_register_access(address - 0x40, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 493, in brom_register_access\n self.mtk.port.echo(pack(">I", mode))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000001←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 103, in da_read_write\n return self.mtk.preloader.brom_register_access(address - 0x40, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 493, in brom_register_access\n self.mtk.port.echo(pack(">I", mode))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000001←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 103, in da_read_write\n return self.mtk.preloader.brom_register_access(address - 0x40, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 494, in brom_register_access\n self.mtk.port.echo(pack(">I", address))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:001009c0←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 103, in da_read_write\n return self.mtk.preloader.brom_register_access(address - 0x40, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 494, in brom_register_access\n self.mtk.port.echo(pack(">I", address))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:001009c0←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 103, in da_read_write\n return self.mtk.preloader.brom_register_access(address - 0x40, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 495, in brom_register_access\n self.mtk.port.echo(pack(">I", length))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000258←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 103, in da_read_write\n return self.mtk.preloader.brom_register_access(address - 0x40, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 495, in brom_register_access\n self.mtk.port.echo(pack(">I", length))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000258←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 103, in da_read_write\n return self.mtk.preloader.brom_register_access(address - 0x40, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 496, in brom_register_access\n status = self.mtk.port.usbread(2)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:0000←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 103, in da_read_write\n return self.mtk.preloader.brom_register_access(address - 0x40, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 508, in brom_register_access\n self.mtk.port.usbwrite(data[:length])\n']←[0m usb_class usb_class - [LIB]: ←[95mTX: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←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 112, in exploit2\n self.da_write(self.mtk.config.chipconfig.brom_payload_addr, len(payload), payload)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 70, in da_write\n return self.da_read_write(address, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 103, in da_read_write\n return self.mtk.preloader.brom_register_access(address - 0x40, length, data, check_result)\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 511, in brom_register_access\n status = self.mtk.port.usbread(2)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:0000←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("I", mode))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000000←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("I", mode))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000000←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("I", address))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000000←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("I", address))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000000←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("I", length))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000001←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("I", length))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000001←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("I", addr)):\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:10212050←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("I", addr)):\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:10212050←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("I", dwords))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000001←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("I", dwords))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000001←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("H", self.usbread(2))[0]\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:0000←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("I", mode))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000001←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("I", mode))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000001←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("I", address))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00102760←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("I", address))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00102760←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("I", length))\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:00000004←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("I", length))\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000004←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 98, in runpayload\n if self.kama.payload(payload, addr, True, exploittype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 132, in payload\n if self.exploit2(payload, addr):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\kamakiri.py", line 113, in exploit2\n self.da_write(ptr_send, 4, pack("\n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 650, in run\n mtk = mtk.bypass_security(args=self.args, vid=vid, pid=pid, interface=interface,\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 205, in bypass_security\n if plt.runpayload(filename=payloadfile, ptype=ptype):\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\pltools.py", line 101, in runpayload\n result = self.usbread(4)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:a1a2a3a4←[0m PLTools - Successfully sent payload: C:\Users\\Desktop\mtkclient\mtkclient\config\..\payloads\mt6737_payload.bin Port - Device detected :) Main - Device is protected. usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 654, in run\n meid = mtk.preloader.get_meid()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 530, in get_meid\n if self.usbwrite(self.Cmd.GET_BL_VER.value):\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:fe←[0m usb_class usb_class - [LIB]: ←[95musbread:0x1←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 654, in run\n meid = mtk.preloader.get_meid()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 531, in get_meid\n res = self.usbread(1)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:fe←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 654, in run\n meid = mtk.preloader.get_meid()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 533, in get_meid\n self.usbwrite(self.Cmd.GET_ME_ID.value) # 0xE1\n']←[0m usb_class usb_class - [LIB]: ←[95mTX:e1←[0m usb_class usb_class - [LIB]: ←[95musbread:0x1←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 654, in run\n meid = mtk.preloader.get_meid()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 534, in get_meid\n if self.usbread(1) == self.Cmd.GET_ME_ID.value:\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:e1←[0m usb_class usb_class - [LIB]: ←[95musbread:0x4←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 654, in run\n meid = mtk.preloader.get_meid()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 535, in get_meid\n length = unpack(">I", self.usbread(4))[0]\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:00000010←[0m usb_class usb_class - [LIB]: ←[95musbread:0x10←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 654, in run\n meid = mtk.preloader.get_meid()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 536, in get_meid\n self.mtk.config.meid = self.usbread(length)\n']←[0m usb_class usb_class - [LIB]: ←[95mRX:05c1cafe6b664df9cfa1b47fcfc6fd2f←[0m usb_class usb_class - [LIB]: ←[95musbread:0x2←[0m usb_class usb_class - [LIB]: ←[95m[' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 1014, in \n mtk = Main().run()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtk", line 654, in run\n meid = mtk.preloader.get_meid()\n', ' File "C:\\Users\\\\Desktop\\mtkclient\\mtkclient\\Library\\mtk_preloader.py", line 537, in get_meid\n status = unpack("