........Port - Device detected :) Preloader - CPU: MT8168() Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - Var1: 0xa Preloader - Disabling Watchdog... Preloader - HW code: 0x8168 Preloader - Target config: 0xe5 Preloader - SBC enabled: True Preloader - SLA enabled: False Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: True Preloader - Mem write auth: True Preloader - Cmd 0xC8 blocked: True Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca01 Preloader - SW Ver: 0x100 Preloader - ME_ID: 543B27A1349C952F194036037B7F4B35 PLTools - Loading payload from generic_patcher_payload.bin, 0x56c bytes PLTools - Kamakiri / DA Run Kamakiri - Trying kamakiri2.. Traceback (most recent call last): File "mtk", line 740, in mtk = Main(args).run() File "D:\Users\13591\Downloads\000\mtkclient-main\mtkclient\Library\mtk_main.py", line 556, in run mtk = da_handler.configure_da(mtk, preloader) File "D:\Users\13591\Downloads\000\mtkclient-main\mtkclient\Library\mtk_da_cmd.py", line 87, in configure_da mtk = mtk.bypass_security() File "D:\Users\13591\Downloads\000\mtkclient-main\mtkclient\Library\mtk.py", line 148, in bypass_security if plt.runpayload(filename=self.config.payloadfile): File "D:\Users\13591\Downloads\000\mtkclient-main\mtkclient\Library\pltools.py", line 102, in runpayload if self.kama.payload(payload, addr, True, exploittype): File "D:\Users\13591\Downloads\000\mtkclient-main\mtkclient\Library\kamakiri.py", line 138, in payload if self.exploit2(payload, addr): File "D:\Users\13591\Downloads\000\mtkclient-main\mtkclient\Library\kamakiri.py", line 116, in exploit2 ptr_send = unpack("