MTK Auth Bypass Tool V55 (MTK Meta Mode Utility) is a free windows program that assists with bypassing DAA and SLA Auth (Secure Boot insurance) from any MediaTek MTK-controlled telephone without any problem.
These days, each Android cell phone accompanies USB assurance to stay away from outsiders glimmering and abuse of the gadget. You will not have the option to streak or open your telephone with practically no approved instrument or authorization. Thus, in this situation, the MediaTek MTK Secure Boot Disable Tool can assist you with bypassing the auth security from your telephone.
MTK Brom Mode:
- Disable Auth
- Dump Preloader
- Crash Preloader
- Crash Preloader To Brom
- Samsung MTK Force Brom (DM)
- Samsung MTK Exit Brom
- Samsung MTK Rebuild PMT (DM)
- FRL-L22 Y9A Force Brom
- Reboot Meta
- Reboot AT Mode
- Reboot Factory Mode
- Reboot Fastboot Mode
- VIVO New SEC Read info (FM)
- Analyze MTKA DA
- Analyze Preloader
META Mode:
- Read Meta Info
- Read Part (META)
- Format Part (Meta)
- Write Part (Meta)
- Dump MDDB/APDB (META)
- DUMP NV Regions (META)
- Dump User area (Meta)
- Dump PGPT (Meta)
- Dump EXT_CSD (META)
- EMMC Health Check (META)
- Factory Reset - META
- Factory Reset - META 2
- Gen FRP Reset PKG (META)
- Read NVRAM
- Wipe NVRAM
- Write NVRAM
- Unlock Network
Android Mode:
- Read ADB Info
- Read Fastboot Info
- Exit Fastboot Mode
- Xiaomi Enable Diag (ADB)
- Install APK (ADB)
- Disable the Payjoy APP (ADB)
- Generic ADB FRP Bypass
- Generic Fastboot Factory Reset
- Generic Fastboot FRP Wipe
- Wipe NVRAM_NVDATA (Fastboot)
- Extract Super IMG
- Extract OFP (MTK + QCOM)
- Extract Samsung ROM (MTK)
- Extract Huawei UPDATE (MTK)
- Extract OnePlus ROM (.ops)
- Extract LG ROM (.kdz)
- Extract RedMagic (payload.bin)
Extra Features:
- Samsung Reboot to Download Mode
- Samsung Read Info Download Mode
- Samsung Factory Reset (MTP)
- Samsung Activate ADB (MTP)
- Huawei Fastboot To Upgrade
- Huawei Normal To Upgrade
- VIVO Demo Remove (AT)
- VIVO Demo Remove (MT6877T)
- PGPT to Scatter
- Scatter to PGPT
Supported CPUs:
- MT6572
- MT6580
- MT6582
- MT6592
- MT6595
- MT6735
- MT6737
- MT6739
- MT6753
- MT6755
- MT6750
- MT6750M
- MT6750T
- MT6750S
- MT6757
- MT6761
- MT6762
- MT3369
- MT8766B
- MT6763
- MT6765
- MT6768
- MT6771
- MT6779
- MT6785
- MT6795
- MT6797
- MT8127
- MT8163
- MT8516
- MT8173
- MT8695
- MT6873
- MT6799
- MT8590
- MT6781
- MT6768
- MT6883
- MT6885
- MT6889
- MT6833
- MT6853
- MT6853V
- MT6873
- MT6891Z
- MT6893
- MT8765WB
- MT8385
- MT8183
- MT8666
Changelog!!!
MTK META Utility V55 :
- I have seen many individuals battling to bounce into BootROM mode for VIVO gadgets with another security (mt6765, mt6771), so I made a straightforward answer for entering/Exit BootROM mode for these gadgets.
- This component is as of now carried out in certain apparatuses, however not in the right way, they just added the DA document.
- With my technique you don't have to look for a preloader from old firmware to empower the Brom port or a preloader from another firmware bundle to exit Brom, all activities are computerized, to the surprise of no one, to assist individuals with working this sort of undertaking as quick as could really be expected to exit Brom you really want to choose the Main preloader document with a major size (4MB)
- Added Write PGPT choice in Brom mode to fix segment table debasement (Samsung particularly dead UFS gadgets like A326U, and A136U).
- Fixed (===== hang tight for DA high velocity port =====) gadget back to BRom port after change to DA port.
- For MT6768 and MT6833P we simply figured out how to find an internet based server-based arrangement, and it requires a BBK-Asia server for distant verification, and the solicitation cost 💲 we were all the while attempting to find a disconnected arrangement ideally we will succeed soon.
- The first preloader document will be saved into the program catalog (VIVO_EMI) with gadget RNID/ME_ID(unique MTK distinguishing proof) so you can utilize it with glimmering apparatuses (EMI/Preloader) to start DRAM and boot the gadget for R/W activities.
- Next task as referenced (disconnected answer for VIVO MT6768 - MT6833P) and Xiaomi Redmi 9A/9C Poco M31 Boot gadget/measure init bomb arrangement.
- To explain the power/exit BootROM process, designers can apply this sort of plan to the glimmering apparatuses to make it more straightforward for clients :
- we boot the gadget into DA mode with the scorched Download Agent from VIVO, first we dump the first preloader to be utilized for DRAM arrangement later in ongoing undertakings and save it into the neighborhood document with an extraordinary gadget number, for example, (MEID - RNID - SoC HRID) then, at that point, we design the essential boot district otherwise known as (BOOT1-A) to lead into USB special case because of absent or undermined MAGIC header, presently we will get bootrom port each time gadget associated with PC, and we have the first preloader record which saved before with the one of a kind gadget ID, so we can involve it for measure init, in the wake of completing the ideal activity, we simply have to send the first BOOT locale, the gadget will back to unique status without minimization or redesign pre-loader document, and that is.
Supported VIVO devices with MT6771 and MT6765 chipsets :
- Vivo V11i
- Vivo X21i
- Vivo Z3i
- Vivo Y97
- Vivo Y01
- Vivo Y02s
- Vivo Y1s
- Vivo Y3s
- Vivo Y10
- Vivo Y15a
- Vivo Y15s
- Vivo Y12s
- Vivo Y16
- Vivo Y20 2021
- Vivo Y21
- Vivo Y30
- Vivo Y30 SE
This software is provided 'as-is', without any express or implied warranty.
In no event will the authors be held liable for any damages arising from the use of this software.
- Use it at your own risk.
How to Use:
- Download & Unzip the MTK Auth Bypass Tool or MTK Meta Mode Utility to your computer.
- Run MTKMETAUtility.exe
- Install LibUSB Win32 driver to your computer (Skip this if already completed)
- Now Power Off your phone
- Press Volume Up And Power and Insert a USB cable
- Click Disable Secure Boot
- If the Disable Secure Boot process does not work, use the Force BROM function.
- That’s it.
- It will bypass Auth Security from your phone.
Download (71.9 MB)
0 comments: