We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
This is the error I'm getting with my redmi pad tablet....
.......Port - Device detected :) Preloader - CPU: MT6789(MTK Helio G99) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - Var1: 0xa Preloader - Disabling Watchdog... Preloader - HW code: 0x1208 Preloader - Target config: 0xe7 Preloader - SBC enabled: True Preloader - SLA enabled: True Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: True Preloader - Mem write auth: True Preloader - Cmd 0xC8 blocked: True Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: F81C1E76F3D71F7428E624EA0FD5FAD2 PLTools - Loading payload from generic_patcher_payload.bin, 0x538 bytes Exploitation - Kamakiri Run Traceback (most recent call last): File "C:\Users\Itamar\mtkclient\mtk", line 855, in <module> mtk = Main(args).run(parser) ^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\Itamar\mtkclient\mtkclient\Library\mtk_main.py", line 635, in run mtk = da_handler.configure_da(mtk, preloader) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\Itamar\mtkclient\mtkclient\Library\DA\mtk_da_handler.py", line 88, in configure_da mtk = mtk.bypass_security() ^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\Itamar\mtkclient\mtkclient\Library\mtk_class.py", line 191, in bypass_security if plt.runpayload(filename=self.config.payloadfile): ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\Itamar\mtkclient\mtkclient\Library\pltools.py", line 79, in runpayload ack = self.exploit.runpayload(payload, ack, addr, dontack) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\Itamar\mtkclient\mtkclient\Library\Exploit\kamakiri2.py", line 204, in runpayload if self.da_payload(payload, addr, True): ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\Itamar\mtkclient\mtkclient\Library\exploit_handler.py", line 80, in da_payload if self.exploit(payload, addr): ^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\Itamar\mtkclient\mtkclient\Library\Exploit\kamakiri2.py", line 65, in exploit ptr_send = unpack("<I", self.da_read(self.mtk.config.chipconfig.send_ptr[0][1], 4))[0] + 8 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^^ TypeError: 'NoneType' object is not subscriptable
Any other models work really good tho,awesome explolit....but can you add support for that chipset too?
The text was updated successfully, but these errors were encountered:
Duplicate of #758
Sorry, something went wrong.
@bkerler it still not working sir....tried again..same error(after updating the local repository of course :))
it won't work as helio g99 is not supported yet check issue #758 for updates support is being worked on there
No branches or pull requests
This is the error I'm getting with my redmi pad tablet....
.......Port - Device detected :) Preloader - CPU: MT6789(MTK Helio G99) Preloader - HW version: 0x0 Preloader - WDT: 0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr: 0x201000 Preloader - Var1: 0xa Preloader - Disabling Watchdog... Preloader - HW code: 0x1208 Preloader - Target config: 0xe7 Preloader - SBC enabled: True Preloader - SLA enabled: True Preloader - DAA enabled: True Preloader - SWJTAG enabled: True Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: True Preloader - Mem write auth: True Preloader - Cmd 0xC8 blocked: True Preloader - Get Target info Preloader - BROM mode detected. Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xca00 Preloader - SW Ver: 0x0 Preloader - ME_ID: F81C1E76F3D71F7428E624EA0FD5FAD2 PLTools - Loading payload from generic_patcher_payload.bin, 0x538 bytes Exploitation - Kamakiri Run Traceback (most recent call last): File "C:\Users\Itamar\mtkclient\mtk", line 855, in <module> mtk = Main(args).run(parser) ^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\Itamar\mtkclient\mtkclient\Library\mtk_main.py", line 635, in run mtk = da_handler.configure_da(mtk, preloader) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\Itamar\mtkclient\mtkclient\Library\DA\mtk_da_handler.py", line 88, in configure_da mtk = mtk.bypass_security() ^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\Itamar\mtkclient\mtkclient\Library\mtk_class.py", line 191, in bypass_security if plt.runpayload(filename=self.config.payloadfile): ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\Itamar\mtkclient\mtkclient\Library\pltools.py", line 79, in runpayload ack = self.exploit.runpayload(payload, ack, addr, dontack) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\Itamar\mtkclient\mtkclient\Library\Exploit\kamakiri2.py", line 204, in runpayload if self.da_payload(payload, addr, True): ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\Itamar\mtkclient\mtkclient\Library\exploit_handler.py", line 80, in da_payload if self.exploit(payload, addr): ^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "C:\Users\Itamar\mtkclient\mtkclient\Library\Exploit\kamakiri2.py", line 65, in exploit ptr_send = unpack("<I", self.da_read(self.mtk.config.chipconfig.send_ptr[0][1], 4))[0] + 8 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^^ TypeError: 'NoneType' object is not subscriptable
Any other models work really good tho,awesome explolit....but can you add support for that chipset too?
The text was updated successfully, but these errors were encountered: