New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hid-Keyboard binary fix #120
Comments
I think this script is great, It has allowed me to unlock the mobile device of a family member who has passed. Compiling the binary yourself: If the binary is not on your device you will need to compile yourself. You will need to go and grab the hid-gadget-test utility as a basis for the file you will need. Using git:
Edit the hid_gadget_test.c file. You need to edit 3 sections:
Now you can move the directory to the device being used for the brute forcing. You have to compile the binary ON THAT DEVICE. The binary will not work if compiled on another device then transferred. On the device navigate to the directory you just transferred across. Run the “make” command In that directory. This should now work. Some tweaking may be required depending on the phone being brute forced. |
Thank you for this @Gr1MM-Hond0 ! 🎉 |
Same issue here op 7 pro |
step3 - remove print_options function call around line 260. really cant find it, could u be a bit more specific in step3 please? is it this line? print_options(argv[2][0]); UPDATE: it works, thank u very very much |
No description provided.
The text was updated successfully, but these errors were encountered: