mirror of
https://github.com/melontini/bootloader-unlock-wall-of-shame.git
synced 2025-01-15 00:26:46 -05:00
Updated Vivo and ZTE readme, check and if them look good feel free to update them (#52)
* Update README.md * Update README.md * Update README.md Finally got around to checking this in more detail. * Update README.md --------- Co-authored-by: melontini <104443436+melontini@users.noreply.github.com>
This commit is contained in:
parent
97e345ded0
commit
1cc3b75013
@ -11,6 +11,13 @@ On pre-May 2022 firmware. I believe these methods *were* ~universal, but proceed
|
||||
* Vivo x70 Pro+: [xdaforums.com][Vivo x70 Pro+]
|
||||
* Vivo Y31 2021: [xdaforums.com][Vivo x70 Pro+]
|
||||
|
||||
There is also a chance that your device is vulnerable to one of the MTK or Unisoc [exploits](/README.md/#universal-soc-based-methods).
|
||||
|
||||
## Magisk
|
||||
Vivo devices have kernel-level patches to block the `su` binary, so to use Magisk you should flash this modified version with `suu`.
|
||||
- [Magisk][patched-magisk]
|
||||
- [Magisk Delta][patched-magisk-delta]
|
||||
|
||||
\* BBK Electronics was deregistered as a company on 7 April 2023.
|
||||
|
||||
***
|
||||
@ -18,4 +25,6 @@ Authored by [melontini](https://github.com/melontini).
|
||||
|
||||
[BBK Fastboot]:https://xdaforums.com/t/how-to-unlock-bootloader-of-vivo-phones.3686690/
|
||||
[Vivo x70 Pro+]:https://xdaforums.com/t/vivo-x70-pro-bootloader-unlock-how-to-guide.4444989/
|
||||
[Vivo Y31 2021]:https://xdaforums.com/t/unlocking-bootloader-rebooting-in-edl-without-testpoint-vivo-y31-2021.4440801/
|
||||
[Vivo Y31 2021]:https://xdaforums.com/t/unlocking-bootloader-rebooting-in-edl-without-testpoint-vivo-y31-2021.4440801/
|
||||
[patched-magisk]:https://github.com/4accccc/vivo-Magisk-suu/
|
||||
[patched-magisk-delta]:https://github.com/4accccc/vivo-Magisk-Delta-suu
|
||||
|
@ -7,7 +7,17 @@
|
||||
Old devices (pre Android 8):<br/>
|
||||
[xdaforums.com][pre-android-8]
|
||||
|
||||
Devices Until Android 11 with engineering firmware:<br/>
|
||||
[xdaforums.com][until-android-11-few-models]
|
||||
|
||||
There is also a chance that your device is vulnerable to one of the MTK or Unisoc [exploits](/README.md/#universal-soc-based-methods).
|
||||
|
||||
Side note, on the A11 link there is a collection of apps to grant a system shell, but they would probably only work on old models.
|
||||
|
||||
***
|
||||
Additional info provided by [Skorpion96](https://github.com/Skorpion96).
|
||||
Authored by [melontini](https://github.com/melontini).
|
||||
|
||||
[pre-android-8]:https://xdaforums.com/t/bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/
|
||||
[pre-android-8]:https://xdaforums.com/t/bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/
|
||||
[until-android-11-few-models]:https://xdaforums.com/t/zte-blade-a5-2019-2020-etc-root-guide-locked-bootloader-valid-for-all-unisoc-zte-models-with-an-engineering-firmware.4612391/
|
||||
[unisoc-cve]:https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader/releases/tag/1.72
|
||||
|
Loading…
Reference in New Issue
Block a user