edl
safetynet-fix
edl | safetynet-fix | |
---|---|---|
26 | 222 | |
1,400 | 6,010 | |
- | - | |
8.7 | 1.0 | |
11 days ago | 11 months ago | |
Python | C++ | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
edl
-
Rooting the Boox Tab Mini C
Open up QFIL (which should have been installed as part of the QPST tool). Click "Configuration" -> "FireHose Configuration" and in the window which pops up change the "Device Type" to UFS as informed by the article here "https://www.ereaderpro.co.uk/en/blogs/news/e-ink-product-follow-up-boox-tab-mini-c-and-page-versus-previous-generation". The article indicates that the device uses UFS2.1 as it's storage protocol. It also indicates that the device uses a Qualcomm® Snapdragon™ 662. In order to properly program the chip we need an appropriate programmer which is `prog_firehose_life_ddr_patched.zip`. The driver to communicate with the Qualcomm chip was originally found in a git thread (https://github.com/bkerler/edl/issues/200) attached to a comment as `prog_firehose_life_ddr_patched.zip` here: https://github.com/bkerler/edl/files/7991604/prog_firehose_life_ddr_patched.zip. To use this change the "Select Build Type" to be "Flat Build" and then click "Browse" for the "Programmer Path" and point it to `prog_firehose_life_ddr_patched.zip`.
-
Windows 11 has made the “clean Windows install” an oxymoron
YMMV, but in my experience it works flawlessly.
If that fails there are chip specific tools you can use to read/write to the right partitions, such as the fantastic EDL tool for Qualcomm devices:
https://github.com/bkerler/edl
-
Oneplus 7t resetted itself after update
EDL is the offical protocol used by support to debug and reset your phone. Issuing the following command should reboot you into fastboot.
-
Owning the Netgear M6 Pro MR6400
Sierrakeygen HOW-TO on Windows 1. Original information from https://github.com/bkerler/edl
- Cheap android phone I can run void on?
-
Oneplus 3 display remains black
As for tracking down the issue on your side, it would be a matter of setting up this and then creating a memory dump while in EDL mode. The "how to get logs out of this" part we'll have to figure out afterwards.
-
Sony Xperia XZ2 bricked
After flashed wrong abl from LG G7 to abl_a partition and reboot, my phone was bricked. No Flash mode nor fastboot, I was use paper clip and short to testpoint in mainboard, its recogized as QUSB_BULK_CID:0402_SN:XXXXXXXX. I can send hello packet to sahara (edl mode) and got these information when using EDL tools (https://github.com/bkerler/edl). Seem like Sony sake authencation and Secure boot prevented me load different loader to sahara, Is there anyway or who can find the correct firehose loader programmer file for this XZ2? :
-
USB > virtual machine connexion issues (windows 10) VM inside Virt manager/Virtual machine manager
I had this problem too, I find it simpler to use something like hirensboot CD (a windows live image) or an edl tool to directly flash the image from Linux, like this, first you'll need to decompress the image with this.
-
stuck on mi logo after flashing patched boot.img
You might be able to use bkerlers edl to unbrick the phone. https://github.com/bkerler/edl
-
OnePlus 9 Pro Hard Bricked, just like my heart :(
I did. Kinda funny that all the links in those search results are marked as linked. I tried every possible solution that I could find. Even this https://github.com/bkerler/edl but still no luck. Thanks for your reply though.
safetynet-fix
-
[ROOT] Stuck in semi bootloop?
- I updated the universal safety net fix module for Magisk from v2.2 to 2.4.0 (https://github.com/kdrag0n/safetynet-fix/releases)
-
Android spoofing
Hi! I'm not new to spoofing, but with the "Android 7 no longer supported" update, my four Huawei G8 spoofing phones got obsolete and I have to set up some new phones. I'm trying to follow this tutorial: https://www.reddit.com/r/PokemonGoSpoofing/comments/11azleu/the\_definitive\_guide\_to\_rootingspoofing\_with\_an/ What I already did: -Installed TWRP -Installed Magisk -Installed PoGo -Opened smalli patcher with admin rights, and select only the first box "Mock Locations". -Copyed the created zip to the phone and installed it in Modules. (Step 7) Not sure about the right order of what comes next... Step 6: Download lsposed (zygisk) and safety-net fix zips, install with magisk. Add LSPosed shortcut to your homepage if prompted Lsposed link: https://github.com/LSPosed/LSPosed/releases Safety-net fix https://github.com/kdrag0n/safetynet-fix/releases DO I NEED TO DO STEP 6??? Step 7: DONE! Step 8: Update magisk settings: a. Click systemless hosts b. Enable Zygisk and enforce Denylist c. Configure Denylist and select com.google.android.gms (1st) and com.google.android.gms.unstable (3rd from the last) d.Hide magisk app in magisk settings so far so good, but I have no "com.google.android.gms (1st) and com.google.android.gms.unstable" to select. So, what to select??? Step 9: Download pokemon go and YASNAC safety net checker apps from play store - DONE! Step 10: Download HideMockLocations apk, install, and enable for pogo in lsposed - tryed the last 4 versions, always getting error "An error occurred while parsing the package" when trying to install. So, Step 10+11+12 not done yet Maybe I don't need all of the steps for my Galaxy S7?? This tutorial is MUCH less complicated: https://www.reddit.com/r/PokemonGoSpoofing/comments/a1d07r/a\_better\_way\_to\_spoof\_mini\_guide\_android\_root/ no word about Lsposed, no Safety-net fix, no Zygisk, no enforce Denylist, no Hide magisk app, no YASNAC safety net checker, no HideMockLocations apk This tutorial also doesn't say to do much after adding the smali module to Magisk: https://www.reddit.com/r/PokemonGoSpoofing/comments/glxdfv/rooted\_method\_1\_smali\_patcher\_guide\_for\_android/ I'm confused :D
-
[ROOTED METHOD #2] Smali Patcher Guide for Android 7, 8, 9, 10, and 11 with a Magisk Rooted device
Safetynet-fix-v2.4.0.zip from https://github.com/kdrag0n/safetynet-fix/releases.
-
DivestOS on hotdog (OnePlus 7T Pro) bootloader relocking & Banking app
Using a rooted CrDroid, I had the same app "error" but was able to make it work, using root and modules (Safetynet Fix) to hide Magisk, OS debug tools and Lineage fingerprint I guess.
- [Help] LineageOS + Magisk + Netflix/Disney+
-
Разкажете ми за проблемите, които имате с Huawei устройства БЕЗ Гугъл
https://github.com/kdrag0n/safetynet-fix (requires Magisk + MagiskHide Props Config
-
how tf do i fix this
Install shamiko by lsposed team and install universal safetynet bypass by krag0n as modules in magisk.
- I hate this
-
Some Android problems
UniversalSafetyNetFix
-
Sony Xperia - I decided to stay with iPhone
Hey there! Yes, there's one major pitfall, which is Google's SafetyNet. If an app asks "is SafetyNet working" and Google answers "no", the app can decide to not offer you services. In my case the one and only issue I had is a banking app refusing to let me use my fingerprint for login, but if you want to avoid it there's ways to fix that (like [safetynet-fix](https://github.com/kdrag0n/safetynet-fix))
What are some alternatives?
mtkclient - MTK reverse engineering and flash tool
ih8sn
sahara - A multi-platform tool for working with Qualcomm Sahara protocol using QT5 and libopenpst
LSPosed - LSPosed Framework
kernel_msm-redbull - Kernel sources for the Pixel 4a (5G), Pixel 5 and Pixel 5a.
GPay-SQLite-Fix - A simple Magisk module to provide a Google Pay SQLite Fix (from XDA)
streamlink - Streamlink is a CLI utility which pipes video streams from various services into a video player
MagiskHidePropsConf - This tool is now dead...
river - 🌊 Online machine learning in Python
Magisk - The Magic Mask for Android
git - A fork of Git containing Windows-specific patches.
magisk-drm-disabler - Read-only mirror from GitLab. A Magisk module designed to disable DRM completely on Android