# Qualcomm Sahara / Firehose Client (c) B. Kerler 2018 Why === - Because we'd like to flexible dump smartphones - Because attacking firehose is kewl Installation ============= - Get python 3.7 64-Bit Linux/Windows: - "python -m pip install pyusb pyserial" Windows: - Use Filter Installer to install libusb filter driver on Qualcomm 9008 port otherwise we won't detect the device Run === - "python edl.py -h" -> to see help - "python edl.py -loader firehoseloader.elf -printgpt -memory emmc" -> if you use your own Loader - "python edl.py -printgpt -memory ufs -lun 0" -> to print gpt on first lun on device with ufs - "python edl.py -printgpt -memory emmc" -> to print gpt on device with emmc - "python edl.py -rf flash.bin -memory emmc" -> to dump whole flash on device with emmc Remarks ======= Put your loaders into the Loader directory for autodetection. See PutYourLoadersInHere.txt on how to store the loaders correctly to make the autodetection work :) Issues ====== - Tested with : Oneplus One, Oneplus X, Oneplus 3T, BQ X, BQ X5, Xiaomi Mi A1, Xiaomi Mi A2, Gigaset ME Pure, etc. - Secure loader with SDM660 on Xiaomi not yet supported, but regular SDM660/845 is supported Published under MIT license Additional license limitations: No use in commercial products without prior permit. Enjoy !