Repository: MTK-bypass/exploits_collection Branch: master Commit: 5efcfbbc9c0c Files: 2 Total size: 5.0 KB Directory structure: gitextract_f2ajrd55/ ├── README.md └── default_config.json5 ================================================ FILE CONTENTS ================================================ ================================================ FILE: README.md ================================================ ### Supported SoCs - mt6261 - mt6572 - mt6580 - mt6582 - mt6592 - mt6595 - mt6735 - mt6737 - mt6739 - mt6750 - mt6753 - mt6755 - mt6757 - mt6761 - mt6763 - mt6765 - mt6768 - mt6771 - mt6779 - mt6785 - mt6795 - mt6797 - mt6799 - mt6833 - mt6853 - mt6873 - mt6885 - mt8127 - mt8163 - mt8167 - mt8173 - mt8590 - mt8695 ================================================ FILE: default_config.json5 ================================================ { "0x6261": { // mt6261 "payload": "mt6261_payload.bin", "var_1": 0x28, "watchdog_address": 0xA0030000, }, "0x6572": { // mt6572 "payload": "mt6572_payload.bin", "payload_address": 0x10036A0, "ptr_usbdl": 0x40ba68, "ptr_da": 0x40befc, }, "0x6580": { // mt6580 "payload": "mt6580_payload.bin", "var_1": 0xAC, "ptr_usbdl": 0xb60c, "ptr_da": 0xba94, }, "0x6582": { // mt6582 "payload": "mt6582_payload.bin", "ptr_usbdl": 0xa5fc, "ptr_da": 0xaa84, }, "0x6592": { // mt6592 "payload": "mt6592_payload.bin", "ptr_usbdl": 0xa564, "ptr_da": 0xa9ec, }, "0x6595": { // mt6595 "payload": "mt6595_payload.bin", "ptr_usbdl": 0xb218, "ptr_da": 0xb6a0, }, "0x321": { // mt6735 "watchdog_address": 0x10212000, "var_0": 0x10, "var_1": 0x28, "payload": "mt6735_payload.bin", "ptr_usbdl": 0x95f8, "ptr_da": 0x9a94, }, "0x335": { // mt6737 "watchdog_address": 0x10212000, "var_0": 0x10, "var_1": 0x28, "payload": "mt6737_payload.bin", "ptr_usbdl": 0x9608, "ptr_da": 0x9aa4, }, "0x699": { // mt6739 "var_0": 0x20, "var_1": 0xB4, "payload": "mt6739_payload.bin", "ptr_usbdl": 0xdf1c, "ptr_da": 0xe3e8, }, "0x337": { // mt6753 "watchdog_address": 0x10212000, "var_1": 0x28, "payload": "mt6753_payload.bin", "ptr_usbdl": 0x9668, "ptr_da": 0x9b04, }, "0x326": { // mt6755 "payload": "mt6755_payload.bin", "ptr_usbdl": 0x9a6c, "ptr_da": 0x9f14, }, "0x551": { // mt6757 "payload": "mt6757_payload.bin", "ptr_usbdl": 0x9c2c, "ptr_da": 0xa0e8, }, "0x717": { // mt6761 "var_1": 0x25, "payload": "mt6761_payload.bin", "ptr_usbdl": 0xbc8c, "ptr_da": 0xc158, }, "0x690": { // mt6763 "var_1": 0x7F, "payload": "mt6763_payload.bin", "ptr_usbdl": 0xd66c, "ptr_da": 0xdb38, }, "0x766": { // mt6765 "var_0": 0x2C, "var_1": 0x25, "payload": "mt6765_payload.bin", "ptr_usbdl": 0xbdc0, "ptr_da": 0xc28c }, "0x707": { // mt6768 "var_0": 0x2C, "var_1": 0x25, "payload": "mt6768_payload.bin", "ptr_usbdl": 0xc190, "ptr_da": 0xc650, }, "0x788": { // mt6771 "var_0": 0x20, "payload": "mt6771_payload.bin", "ptr_usbdl": 0xdebc, "ptr_da": 0xe388, }, "0x725": { // mt6779 "payload": "mt6779_payload.bin", "ptr_usbdl": 0xe04c, "ptr_da": 0xe50c, }, "0x813": { // mt6785 "payload": "mt6785_payload.bin", "ptr_usbdl": 0xe2a4, "ptr_da": 0xe764, }, "0x6795": { // mt6795 "payload": "mt6795_payload.bin", "ptr_usbdl": 0x978c, "ptr_da": 0x9c28, }, "0x279": { // mt6797 "payload": "mt6797_payload.bin", "ptr_usbdl": 0x9eac, "ptr_da": 0xa354, }, "0x816": { // mt6885 "payload": "mt6885_payload.bin", "ptr_usbdl": 0xe6b8, "ptr_da": 0xebbc, }, "0x8127": { // mt8127 "payload": "mt8127_payload.bin", "ptr_usbdl": 0xb2b8, "ptr_da": 0xb740, }, "0x8163": { // mt8163 "var_1": 0xB1, "payload": "mt8163_payload.bin", "ptr_usbdl": 0xc12c, "ptr_da": 0xc5c8, }, "0x8167": { // mt8516 "var_1": 0xCC, "payload": "mt8167_payload.bin", "ptr_usbdl": 0xd2e4, "ptr_da": 0xd7ac, }, "0x8172": { // mt8173 "payload": "mt8173_payload.bin", "payload_address": 0x120A00, "ptr_usbdl": 0xa0e4, "ptr_da": 0xa580, }, "0x8695": { // mt8695 "payload": "mt8695_payload.bin", "ptr_usbdl": 0xbeec, "ptr_da": 0xc3f8, }, "0x886": { // mt6873 "payload": "mt6873_payload.bin", "ptr_usbdl": 0xea78, "ptr_da": 0xef38, }, "0x562": { // mt6799 "watchdog_address": 0x10211000, "payload": "mt6799_payload.bin", "ptr_usbdl": 0xf5ac, "ptr_da": 0xfa78, }, "0x989": { // mt6833 "payload": "mt6833_payload.bin", "ptr_usbdl": 0xdfe0, "ptr_da": 0xe4a0, }, "0x996": { // mt6853 "payload": "mt6853_payload.bin", "ptr_usbdl": 0xea64, "ptr_da": 0xef24, }, "0x8590": { // mt8590 "payload": "mt8590_payload.bin", "ptr_usbdl": 0xbbe4, "ptr_da": 0xc06c, }, }