All Projects → R0rt1z2 → AutomatedRoot

R0rt1z2 / AutomatedRoot

Licence: GPL-3.0 License
Root your MediaTek device with CVE-2020-0069

Programming Languages

python
139335 projects - #7 most used programming language
shell
77523 projects

Projects that are alternatives of or similar to AutomatedRoot

device xiaomi begonia
Dependency of Xiaomi Redmi Note 8 Pro (begonia)
Stars: ✭ 26 (-69.77%)
Mutual labels:  mediatek
FirmWire
FirmWire is a full-system baseband firmware emulation platform for fuzzing, debugging, and root-cause analysis of smartphone baseband firmwares
Stars: ✭ 555 (+545.35%)
Mutual labels:  mediatek
mcs-lite
🎛 MCS Lite Common UI and Websites.
Stars: ✭ 75 (-12.79%)
Mutual labels:  mediatek
mcs-lite-app
An on-premises Internet of Things cloud platform, which can be quickly built and get started with.
Stars: ✭ 30 (-65.12%)
Mutual labels:  mediatek
platform-azure
PlatformIO for Azure Sphere
Stars: ✭ 39 (-54.65%)
Mutual labels:  mediatek

AutomatedRoot

GitHub GitHub release (latest by date including pre-releases) GitHub All Releases GitHub Maintained GitHub Issues Github Contributors

Root MediaTek devices using mtk-su exploit (CVE-2020-0069).

Requirements

  • Python 3.9 or newer(in %PATH% for Windows).
  • ADB (in %PATH% for Windows).
  • The CVE-2020-0069 PoC (mtk-su).

Usage

  • Download the mtk-su binaries from the MediaTek's SU XDA page and move them to their corresponding folders (automated_root/files/arm[64]).
  • Download the latest release of the tool.
  • If you're using Windows, open a PowerShell. If you're using Linux open a Terminal.
  • Install the requirements with pip3 install -r requirements.txt.
  • Run the script with Python: python3 mtk-su.py.

Available options

  1. Root the device. (system-mode + SuperSU).
  2. Root the device. (bootless-mode + Magisk).
  3. Unroot the device. (supports both bootless and system mode).

License

  • This tool is licensed under the GNU (v3) General Public License. See LICENSE for more details.
  • files/common/Initd.apk is property of RYO Software.
  • files/common/Magisk.apk and files/arm[64]/magiskinit are property of topjohnwu.
  • files/common/SuperSU.apk and files/arm[64]/{libsupol.so,su,supolicy} are property of Chainfire.

Special thanks

  • diplomatic (XDA): the creator of the mtk-su (CVE-2020-0069) exploit and the magisk-boot.sh script.
  • RYO Software: the creator of the Init.d Support App.
  • Chainfire: the creator of SuperSU (and its binaries).
  • topjohnwu: the creator of Magisk (and its binaries).
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].