GSM Shield [03/09/2024] GSM Shield Box MTK Exploit tool v1.1 Released

GSM Shield Box & Dongle

Fast Unlocking

Product Manager
Oct 4, 2018
54
89
NCK Team Projects
Skype
[email protected]
Sonork ID
100.8888


MTK Exploit Tool v1.1

Added MTK V6 Support Preloader Exploit

  • MT6789
  • MT6835
  • MT6895
  • MT6983
  • MT6985

  1. Reset FRP
  2. Format Userdata

Added MT6835 Preloader Exploit (OPPO V2)

  • Realme 11 5G
  • Realme 11x 5G
  • Realme 12 5G
  • Realme 12x 5G

Added MT6985 Preloaer Exploit (OPPO V2)

  • Oppo Find N3 Flip
  • Oppo Find X6

Added Vivo Demo Reset

  • Vivo T2x 5G (Tested)
  • Vivo Y28 5G (Tested)

Added Xiaomi Preloader Exploit

Supported Models:

  • Redmi A3 (blue)
  • Redmi 13C (gale)
  • Redmi Note 13 5G (gold)
  • Redmi Note 13R Pro (gold)
  • POCO C65 (gale)
  • POCO X6 Neo 5G (gold)

  1. Reset FRP
  2. Format Userdata



No Activation Needed
No Yearly Charges
No Internet Needed





Official Website

Download Support Access


Download from:

GSMShield_MTK_Preloader_Tool_v1.1.rar

Pass: GsmShield

Extract files from zip into Gsmshield directory.



Br,
GSMShield

 
  • Like
Reactions: FAROK and GsmToto

halima

Active Member
Mar 1, 2017
36
10
tanzania


MTK Exploit Tool v1.1

Added MTK V6 Support Preloader Exploit


  • MT6789
  • MT6835
  • MT6895
  • MT6983
  • MT6985

  1. Reset FRP
  2. Format Userdata

Added MT6835 Preloader Exploit (OPPO V2)

  • Realme 11 5G
  • Realme 11x 5G
  • Realme 12 5G
  • Realme 12x 5G

Added MT6985 Preloaer Exploit (OPPO V2)

  • Oppo Find N3 Flip
  • Oppo Find X6

Added Vivo Demo Reset

  • Vivo T2x 5G (Tested)
  • Vivo Y28 5G (Tested)

Added Xiaomi Preloader Exploit

Supported Models:


  • Redmi A3 (blue)
  • Redmi 13C (gale)
  • Redmi Note 13 5G (gold)
  • Redmi Note 13R Pro (gold)
  • POCO C65 (gale)
  • POCO X6 Neo 5G (gold)

  1. Reset FRP
  2. Format Userdata



No Activation Needed
No Yearly Charges
No Internet Needed





Official Website

Download Support Access


Download from:

GSMShield_MTK_Preloader_Tool_v1.1.rar

Pass: GsmShield

Extract files from zip into Gsmshield directory.



Br,
GSMShield
password not work
 

Attachments

  • gsmsheld.PNG
    gsmsheld.PNG
    322 KB · Views: 14
  • Like
Reactions: Komogasparyan

jose1990

Active Member
Jan 30, 2021
35
9
beira
[Reset FRP]
Waiting for device...Found
Port Info : PreLoader USB VCOM Port (COM4) [\\?\usb#vid_0e8d&pid_2000#5&130b0151&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}]
: MediaTek Inc., 2.0.0.0 [usbser.sys]
: PRELOADER PORT
HW ID : MT6765 [0766] Helio P35/G35
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 6F444A34F47665B763D1189DCB21D630
SoC ID[0] : 6E41DC6B6515003695EC402A3546B97D
SoC ID[1] : 61B396C3EBEAAE302FE27AA9B1310309
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Running Exploit (Old)...Done
Sending DA2...OK
Activating DA Extension...Done
SRAM : 0x0000000000038000 [224.00 KB]
DRAM : 0x00000000C0000000 [3.00 GB]
EMMC ID : 4X62MB
EMMC CID : 150100345836324D42005CE5909CAADF
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[GSMShield MTK Exploit Tool v1.1]
LOG TXT : 20240919_105304.txt

DONE
 

Malik Bilal7

Member
Oct 27, 2022
5
0
Rawalpindi
[Reset FRP]
Waiting for device...Found
Port Info : PreLoader USB VCOM Port (COM4) [\\?\usb#vid_0e8d&pid_2000#5&130b0151&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}]
: MediaTek Inc., 2.0.0.0 [usbser.sys]
: PRELOADER PORT
HW ID : MT6765 [0766] Helio P35/G35
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 6F444A34F47665B763D1189DCB21D630
SoC ID[0] : 6E41DC6B6515003695EC402A3546B97D
SoC ID[1] : 61B396C3EBEAAE302FE27AA9B1310309
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Running Exploit (Old)...Done
Sending DA2...OK
Activating DA Extension...Done
SRAM : 0x0000000000038000 [224.00 KB]
DRAM : 0x00000000C0000000 [3.00 GB]
EMMC ID : 4X62MB
EMMC CID : 150100345836324D42005CE5909CAADF
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[GSMShield MTK Exploit Tool v1.1]
LOG TXT : 20240919_105304.txt

DONE
Sir I need GSM shield card updater pasword
 
Top