MTK Manual Commands

drox-PH-Ceb

Moderator
Staff member
Certified Technician
MTK client credit to sir bkerler original developer nito.
requirements:
Please, Log in or Register to view URLs content!
--- ito ang original na naka butas ng mtk halos lahat ng box or dongle gumagamit nito.

#to dump preloader partition
python mtk dumppreloader

#erase frp partition
python mtk e frp

#backup firmware
python mtk r recovery,oppo_custom,opporeserve2,nvdata,nvram,protect1,protect2,md1img,spmfw,scp_1,sspm_1,lk,boot,logo,odmdtbo,odm,tee,vendor,system,super,vbmeta,my_custom,cdt_engineering,vbmeta_system,vbmeta_vendor,cache.img Backup-Firmware/recovery.img,Backup-Firmware/oppo_custom.img,Backup-Firmware/opporeserve2.img,Backup-Firmware/nvdata.img,Backup-Firmware/nvram.img,Backup-Firmware/protect1.img,Backup-Firmware/protect2.img,Backup-Firmware/md1img.img,Backup-Firmware/spmfw.img,Backup-Firmware/scp_1.img,Backup-Firmware/sspm_1.img,Backup-Firmware/lk.img,Backup-Firmware/boot.img,Backup-Firmware/logo.bin,Backup-Firmware/odmdtbo.img,Backup-Firmware/odm.img,Backup-Firmware/tee.img,Backup-Firmware/vendor.img,Backup-Firmware/system.img,Backup-Firmware/super.img,Backup-Firmware/vbmeta.img,Backup-Firmware/my_custom.img,Backup-Firmware/cdt_engineering.img,Backup-Firmware/vbmeta_system.img,Backup-Firmware/vbmeta_vendor.img,Backup-Firmware/cache.img

#erase userdata
python mtk e userdata

#erase backup or remove demo tulad ng vivo
python mtk e backup

#relock bootloader
python mtk xflash seccfg lock

#unlock bootloader
python mtk xflash seccfg unlock

#bypass auth
python mtk payload

#safeformat tested sa a5s etc. Walang mabubura na mga files.
#flashing para.img
python mtk w para para.img
for para.img link here:
Please, Log in or Register to view URLs content!


for more command list punta lang kayo dito
Please, Log in or Register to view URLs content!
 

Gsm_Yam

* GSMYamTools PH *
Staff member
Certified Technician
UP ko to bro... nagsimula ng lumapag ang DROX-PH-CEB..

==> pASIKAT-Pinoy ka na bro; sa mga idea mo
 

drox-PH-Ceb

Moderator
Staff member
Certified Technician
adb read info cmd list

adb shell getprop ro.build.product
adb shell getprop gsm.sim.state
adb shell "service call iphonesubinfo 1 | toybox cut -d \"'\" -f2 | toybox grep -Eo '[0-9]' | toybox xargs | toybox sed 's/\ //g'"
adb shell wm size
adb shell getprop ro.serialno
adb shell getprop ro.hardware
adb shell getprop ro.build.display.id
adb shell getprop ro.build.version.release
adb shell getprop ro.build.version.security_patch
adb shell getprop gsm.version.baseband
adb shell getprop sys.usb.config
adb shell getprop gsm.sim.operator.alpha
adb shell cat /proc/version
adb shell getprop ro.boot.hardware.ddr
adb shell getprop ro.boot.hardware.emmc
 

drox-PH-Ceb

Moderator
Staff member
Certified Technician
Remove pattern/lock via adb cmd

adb shell rm /data/data/com.android.providers.settings/databases/settings.db
adb shell rm /data/data/com.android.providers.settings/databases/settings.db-shm
adb shell rm /data/data/com.android.providers.settings/databases/settings.db-wal
adb shell am broadcast -a android.intent.action.MASTER_CLEAR
adb shell am broadcast -a android.intent.action.MASTER_CLEAR_COMPLETED
adb shell recovery --wipe_data
 

drox-PH-Ceb

Moderator
Staff member
Certified Technician
dissable xiaomi relock adb cmd
warning: do at your own risk

adb shell pm uninstall --user 0 com.xiaomi.finddevice

adb shell am set-debug-app -w --persistent com.xiaomi.account
adb shell am set-debug-app -w --persistent com.xiaomi.finddevice
 

drox-PH-Ceb

Moderator
Staff member
Certified Technician
remove frp via adb cmd

adb shell content insert --uri content://settings/secure --bind name:s:user_setup_complete --bind value:s:1
adb shell am start -n com.android.settings/com.android.settings.Settings
adb shell am start -c android.intent.category.HOME -a android.intent.action.MAIN
 

drox-PH-Ceb

Moderator
Staff member
Certified Technician
### fastboot mode cmd ##

--Use to remove Qualcomm Frp--
fastboot erase config

--Use to remove Spreadtrum frp (older version)--
fastboot erase persist

--Use to remove Huawei Frp via fastboot mode--
fastboot oem frp-erase

--Read device info via fastboot cmd--
fastboot oem get-product-model
fastboot oem get-psid

--Use to enter into recovery mode---
fastboot reboot-recovery

--Fastboot reboot into edl mode cmd--
fastboot oem edl
fastboot reboot-bootloader

--fastboot to reboot to normal mode--
fastboot reboot
 
Last edited:

drox-PH-Ceb

Moderator
Staff member
Certified Technician
--Use to remove MDM lock (samsung)--
adb shell pm uninstall --user 0 com.sec.enterprise.knox.cloudmdm.smdms
 

drox-PH-Ceb

Moderator
Staff member
Certified Technician
-- Qualcomm safe format via misc.img--
emmcdl -p "your_comport_number_here" -f "your_mbn_loader_here" -b misc.img
 

drox-PH-Ceb

Moderator
Staff member
Certified Technician
-- adb enable diagnostic of xiaomi devices (w/o root) adb shell am start -n com.longcheertel.midtest/com.longcheertel.midtest.Diag
 

drox-PH-Ceb

Moderator
Staff member
Certified Technician
## Apple / iOS ### iMobileDevice Commands (libimobiledevice)
Please, Log in or Register to view URLs content!
#### Device Identification - **Check IMEI (Using ideviceinfo)** "-k InternationalMobileEquipmentIdentity" - **Check Serial Number (Using ideviceinfo)** "-k SerialNumber" - **Check Model Number (Using ideviceinfo)** "-k ModelNumber" - **Check Firmware (Using ideviceinfo)** "-k ProductVersion" - **Check Factory Reset Protection (Using ideviceactivation)** "activate" - **Check Mobile Device Management Lock (Using ideviceinfo)** "-q com.apple.mobile.chaperone -k DeviceIsChaperoned"
 

drox-PH-Ceb

Moderator
Staff member
Certified Technician
Device Identification Check Basic Information "AT+DEVCONINFO" Check Factory Reset Protection "AT+REACTIVE=1,0,0" Check Storage Size "AT+SIZECHECK=?" Check Network Lock "AT+SVCIFPGM=1,4" Check Android Version "AT+VERSNAME=3,2,3" Check Battery Information "AT+BATGETLEVEL?" Check IMEI Information "AT+IMEINUM" Check Software Information "AT+SWVER" Device Functions Download Mode "AT+SUDDLMOD=0,0" Factory Reset "AT+FACTORST=0,0" Single Tap Screen "AT+CTSA=2,500,500" Double Tap Screen "AT+CTSA=3,500,500" Swipe Screen "AT+CTSA=1,500,500;+CTSA=0,1000,1000" Enable Dialer Codes "AT+SYSSCOPE=1,0" "AT+SWATD=0" "AT+ACTIVATE=0,0,0" "AT+SWATD=1" "AT+KSTRINGB=0,3" Enable ADB !Must type *#0*# on dialer and enter test mode! !"AT+DUMPCTRL=1,0" must be used before "AT+SWATD=0" on older models! "AT+SYSSCOPE=1,0" "AT+SWATD=0" "AT+ACTIVATE=0,0,0" "AT+SWATD=1" "AT+DEBUGLVC=0,5" Touch Scripts SM-G781 | SM-G981 Android 10/11/12 Open Dialer & Accept ADB "AT+CTSA=2,100,2300" (Open Dialer) or "AT+CTSA=2,600,2100" For Android 11/12 Dialer "AT+CTSA=2,100,1825" (*) "AT+CTSA=2,750,1825" (#) "AT+CTSA=2,600,1825" (0) "AT+CTSA=2,100,1825" (*) "AT+CTSA=2,750,1825" (#) "AT+CTSA=2,600,2100" (Accept ADB Prompt) SM-G950 Android 8/9 Open Dialer & Accept ADB "AT+CTSA=2,600,2100" (Open Dialer) or "AT+CTSA=2,300,2100" For Android 9 Dialer "AT+CTSA=2,300,1700" (*) "AT+CTSA=2,750,1700" (#) "AT+CTSA=2,500,1700" (0) "AT+CTSA=2,300,1700" (*) "AT+CTSA=2,750,1700" (#) "AT+CTSA=2,900,1450" (Accept ADB Prompt) or "AT+CTSA=2,750,1300" For Android 9 Accept ADB SM-G970 | SM-G973 | SM-G975 Android 9/10/11 Open Dialer & Accept ADB "AT+CTSA=2,100,2100" (Open Dialer) or "AT+CTSA=2,600,1900" For Android 11 Dialer "AT+CTSA=2,300,1800" (*) "AT+CTSA=2,900,1800" (#) "AT+CTSA=2,600,1800" (0) "AT+CTSA=2,300,1800" (*) "AT+CTSA=2,900,1800" (#) "AT+CTSA=2,900,2000" (Accept ADB Prompt)
 

Members online

No members online now.

Forum statistics

Threads
1,414
Messages
1,782
Members
905
Latest member
bitbse_exchange
Top