mirror of
https://github.com/bkerler/edl.git
synced 2024-11-14 19:14:58 -05:00
1.3 KiB
1.3 KiB
Qualcomm Sahara / Firehose Attack Client
(c) B. Kerler 2018
Why
- Because we'd like to flexible dump smartphones
- Because attacking firehose is kewl
Installation
- Get python 3.7 64-Bit
Linux/Windows:
- "python -m pip install pyusb pyserial"
Windows:
- Use Filter Installer to install libusb filter driver on Qualcomm 9008 port otherwise we won't detect the device
Run
- "python edl.py -h" -> to see help
- "python edl.py -loader firehoseloader.elf -printgpt -memory emmc" -> if you use your own Loader
- "python edl.py -printgpt -memory ufs -lun 0" -> to print gpt on first lun on device with ufs
- "python edl.py -printgpt -memory emmc" -> to print gpt on device with emmc
- "python edl.py -rf flash.bin -memory emmc" -> to dump whole flash on device with emmc
Remarks
Put your loaders into the Loader directory for autodetection. See PutYourLoadersInHere.txt on how to store the loaders correctly to make the autodetection work :)
Issues
- Tested with : Oneplus One, Oneplus X, Oneplus 3T, BQ X, BQ X5, Xiaomi Mi A1, Xiaomi Mi A2, Gigaset ME Pure, etc.
- Secure loader with SDM660 on Xiaomi not yet supported, but regular SDM660/845 is supported
Published under MIT license Additional license limitations: No use in commercial products without prior permit.
Enjoy !