Repository: MTK-bypass/exploits_collection
Branch: master
Commit: 5efcfbbc9c0c
Files: 2
Total size: 5.0 KB
Directory structure:
gitextract_f2ajrd55/
├── README.md
└── default_config.json5
================================================
FILE CONTENTS
================================================
================================================
FILE: README.md
================================================
### Supported SoCs
- mt6261
- mt6572
- mt6580
- mt6582
- mt6592
- mt6595
- mt6735
- mt6737
- mt6739
- mt6750
- mt6753
- mt6755
- mt6757
- mt6761
- mt6763
- mt6765
- mt6768
- mt6771
- mt6779
- mt6785
- mt6795
- mt6797
- mt6799
- mt6833
- mt6853
- mt6873
- mt6885
- mt8127
- mt8163
- mt8167
- mt8173
- mt8590
- mt8695
================================================
FILE: default_config.json5
================================================
{
"0x6261": { // mt6261
"payload": "mt6261_payload.bin",
"var_1": 0x28,
"watchdog_address": 0xA0030000,
},
"0x6572": { // mt6572
"payload": "mt6572_payload.bin",
"payload_address": 0x10036A0,
"ptr_usbdl": 0x40ba68,
"ptr_da": 0x40befc,
},
"0x6580": { // mt6580
"payload": "mt6580_payload.bin",
"var_1": 0xAC,
"ptr_usbdl": 0xb60c,
"ptr_da": 0xba94,
},
"0x6582": { // mt6582
"payload": "mt6582_payload.bin",
"ptr_usbdl": 0xa5fc,
"ptr_da": 0xaa84,
},
"0x6592": { // mt6592
"payload": "mt6592_payload.bin",
"ptr_usbdl": 0xa564,
"ptr_da": 0xa9ec,
},
"0x6595": { // mt6595
"payload": "mt6595_payload.bin",
"ptr_usbdl": 0xb218,
"ptr_da": 0xb6a0,
},
"0x321": { // mt6735
"watchdog_address": 0x10212000,
"var_0": 0x10,
"var_1": 0x28,
"payload": "mt6735_payload.bin",
"ptr_usbdl": 0x95f8,
"ptr_da": 0x9a94,
},
"0x335": { // mt6737
"watchdog_address": 0x10212000,
"var_0": 0x10,
"var_1": 0x28,
"payload": "mt6737_payload.bin",
"ptr_usbdl": 0x9608,
"ptr_da": 0x9aa4,
},
"0x699": { // mt6739
"var_0": 0x20,
"var_1": 0xB4,
"payload": "mt6739_payload.bin",
"ptr_usbdl": 0xdf1c,
"ptr_da": 0xe3e8,
},
"0x337": { // mt6753
"watchdog_address": 0x10212000,
"var_1": 0x28,
"payload": "mt6753_payload.bin",
"ptr_usbdl": 0x9668,
"ptr_da": 0x9b04,
},
"0x326": { // mt6755
"payload": "mt6755_payload.bin",
"ptr_usbdl": 0x9a6c,
"ptr_da": 0x9f14,
},
"0x551": { // mt6757
"payload": "mt6757_payload.bin",
"ptr_usbdl": 0x9c2c,
"ptr_da": 0xa0e8,
},
"0x717": { // mt6761
"var_1": 0x25,
"payload": "mt6761_payload.bin",
"ptr_usbdl": 0xbc8c,
"ptr_da": 0xc158,
},
"0x690": { // mt6763
"var_1": 0x7F,
"payload": "mt6763_payload.bin",
"ptr_usbdl": 0xd66c,
"ptr_da": 0xdb38,
},
"0x766": { // mt6765
"var_0": 0x2C,
"var_1": 0x25,
"payload": "mt6765_payload.bin",
"ptr_usbdl": 0xbdc0,
"ptr_da": 0xc28c
},
"0x707": { // mt6768
"var_0": 0x2C,
"var_1": 0x25,
"payload": "mt6768_payload.bin",
"ptr_usbdl": 0xc190,
"ptr_da": 0xc650,
},
"0x788": { // mt6771
"var_0": 0x20,
"payload": "mt6771_payload.bin",
"ptr_usbdl": 0xdebc,
"ptr_da": 0xe388,
},
"0x725": { // mt6779
"payload": "mt6779_payload.bin",
"ptr_usbdl": 0xe04c,
"ptr_da": 0xe50c,
},
"0x813": { // mt6785
"payload": "mt6785_payload.bin",
"ptr_usbdl": 0xe2a4,
"ptr_da": 0xe764,
},
"0x6795": { // mt6795
"payload": "mt6795_payload.bin",
"ptr_usbdl": 0x978c,
"ptr_da": 0x9c28,
},
"0x279": { // mt6797
"payload": "mt6797_payload.bin",
"ptr_usbdl": 0x9eac,
"ptr_da": 0xa354,
},
"0x816": { // mt6885
"payload": "mt6885_payload.bin",
"ptr_usbdl": 0xe6b8,
"ptr_da": 0xebbc,
},
"0x8127": { // mt8127
"payload": "mt8127_payload.bin",
"ptr_usbdl": 0xb2b8,
"ptr_da": 0xb740,
},
"0x8163": { // mt8163
"var_1": 0xB1,
"payload": "mt8163_payload.bin",
"ptr_usbdl": 0xc12c,
"ptr_da": 0xc5c8,
},
"0x8167": { // mt8516
"var_1": 0xCC,
"payload": "mt8167_payload.bin",
"ptr_usbdl": 0xd2e4,
"ptr_da": 0xd7ac,
},
"0x8172": { // mt8173
"payload": "mt8173_payload.bin",
"payload_address": 0x120A00,
"ptr_usbdl": 0xa0e4,
"ptr_da": 0xa580,
},
"0x8695": { // mt8695
"payload": "mt8695_payload.bin",
"ptr_usbdl": 0xbeec,
"ptr_da": 0xc3f8,
},
"0x886": { // mt6873
"payload": "mt6873_payload.bin",
"ptr_usbdl": 0xea78,
"ptr_da": 0xef38,
},
"0x562": { // mt6799
"watchdog_address": 0x10211000,
"payload": "mt6799_payload.bin",
"ptr_usbdl": 0xf5ac,
"ptr_da": 0xfa78,
},
"0x989": { // mt6833
"payload": "mt6833_payload.bin",
"ptr_usbdl": 0xdfe0,
"ptr_da": 0xe4a0,
},
"0x996": { // mt6853
"payload": "mt6853_payload.bin",
"ptr_usbdl": 0xea64,
"ptr_da": 0xef24,
},
"0x8590": { // mt8590
"payload": "mt8590_payload.bin",
"ptr_usbdl": 0xbbe4,
"ptr_da": 0xc06c,
},
}
gitextract_f2ajrd55/ ├── README.md └── default_config.json5
Condensed preview — 2 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (6K chars).
[
{
"path": "README.md",
"chars": 316,
"preview": "### Supported SoCs\n- mt6261\n- mt6572\n- mt6580\n- mt6582\n- mt6592\n- mt6595\n- mt6735\n- mt6737\n- mt6739\n- mt6750\n- mt6753\n- "
},
{
"path": "default_config.json5",
"chars": 4785,
"preview": "{\n \"0x6261\": { // mt6261\n \"payload\": \"mt6261_payload.bin\",\n \"var_1\": 0x28,\n \"watchdog_address\": "
}
]
About this extraction
This page contains the full source code of the MTK-bypass/exploits_collection GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 2 files (5.0 KB), approximately 2.1k tokens. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.
Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.