Name | unisoc-unlock JSON |
Version |
0.0.1
JSON |
| download |
home_page | |
Summary | Tool for unlocking a Unisoc/Spreadtrum Android bootloader |
upload_time | 2023-10-18 12:36:46 |
maintainer | |
docs_url | None |
author | |
requires_python | >=3.6 |
license | |
keywords |
|
VCS |
 |
bugtrack_url |
|
requirements |
No requirements were recorded.
|
Travis-CI |
No Travis.
|
coveralls test coverage |
No coveralls.
|
# unisoc-unlock
This is a tool to unlock a Unisoc / Spreadtrum (SPD) Android bootloader using its Identifier Token.
It is a port of a WebUSB based tool [1] to Python. The WebUSB based tool does not work on Linux for some reason.
There is also a custom fastboot binary in circulation [2] which implements a custom command for unlocking the bootloader.
`unisoc-unlock` implements the same functionality, but without resorting to a custom fastboot binary. Since it is a pure Python solution it should be able to run on any platform running Python.
## python-adb
`unisoc-unlock` is implemented with python-adb [3]. Since python-adb is abandoned and
requires some tweaking to work with the Unisoc, it is not referenced as dependency, but bundled instead.
## Usage
* Reboot device into fastboot mode
```
adb reboot bootloader
```
* Run the python script
```
python3 unisoc-unlock.py
```
* Confirm unlocking on the device
Note: on the RG405M, the text on the device screen will ask for 'volume down' button to confirm unlock,
but the home/back button has to be pressed instead!
## References
[1] https://github.com/turtleletortue/turtleletortue.github.io
[2] https://www.hovatek.com/forum/thread-32287.html
[3] https://github.com/google/python-adb
Raw data
{
"_id": null,
"home_page": "",
"name": "unisoc-unlock",
"maintainer": "",
"docs_url": null,
"requires_python": ">=3.6",
"maintainer_email": "",
"keywords": "",
"author": "",
"author_email": "Patrick Huesmann <info@patrick-huesmann.de>",
"download_url": "https://files.pythonhosted.org/packages/02/57/c1f26cfef79cb9c08221a7a31beadfa5b0b57ff4c32329ec97ec0f392459/unisoc_unlock-0.0.1.tar.gz",
"platform": null,
"description": "# unisoc-unlock\n\nThis is a tool to unlock a Unisoc / Spreadtrum (SPD) Android bootloader using its Identifier Token.\n\nIt is a port of a WebUSB based tool [1] to Python. The WebUSB based tool does not work on Linux for some reason.\nThere is also a custom fastboot binary in circulation [2] which implements a custom command for unlocking the bootloader.\n`unisoc-unlock` implements the same functionality, but without resorting to a custom fastboot binary. Since it is a pure Python solution it should be able to run on any platform running Python.\n\n## python-adb\n\n`unisoc-unlock` is implemented with python-adb [3]. Since python-adb is abandoned and\nrequires some tweaking to work with the Unisoc, it is not referenced as dependency, but bundled instead.\n\n## Usage\n\n* Reboot device into fastboot mode\n```\nadb reboot bootloader\n```\n\n* Run the python script\n```\npython3 unisoc-unlock.py\n```\n\n* Confirm unlocking on the device\n\n Note: on the RG405M, the text on the device screen will ask for 'volume down' button to confirm unlock,\n but the home/back button has to be pressed instead!\n\n## References\n\n[1] https://github.com/turtleletortue/turtleletortue.github.io\n\n[2] https://www.hovatek.com/forum/thread-32287.html\n\n[3] https://github.com/google/python-adb\n",
"bugtrack_url": null,
"license": "",
"summary": "Tool for unlocking a Unisoc/Spreadtrum Android bootloader",
"version": "0.0.1",
"project_urls": {
"Homepage": "https://github.com/pypa/sampleproject"
},
"split_keywords": [],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "750be7186a033339f8971b8fb5520502fa4c6345965b49a5307963c86076aa12",
"md5": "2b55a18669e7411b3c373622b2f82b47",
"sha256": "e008e375185779a18f94963251b8538072f4956f789ef18d014b50d5a38167f4"
},
"downloads": -1,
"filename": "unisoc_unlock-0.0.1-py3-none-any.whl",
"has_sig": false,
"md5_digest": "2b55a18669e7411b3c373622b2f82b47",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.6",
"size": 15641,
"upload_time": "2023-10-18T12:36:45",
"upload_time_iso_8601": "2023-10-18T12:36:45.299788Z",
"url": "https://files.pythonhosted.org/packages/75/0b/e7186a033339f8971b8fb5520502fa4c6345965b49a5307963c86076aa12/unisoc_unlock-0.0.1-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "0257c1f26cfef79cb9c08221a7a31beadfa5b0b57ff4c32329ec97ec0f392459",
"md5": "b637d2f44e7374acbcf5777115804e73",
"sha256": "be36f7257ad722416b0c44ef8c20480d358c78ec00a22cd5e9ba1fcaae1a01a1"
},
"downloads": -1,
"filename": "unisoc_unlock-0.0.1.tar.gz",
"has_sig": false,
"md5_digest": "b637d2f44e7374acbcf5777115804e73",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.6",
"size": 13009,
"upload_time": "2023-10-18T12:36:46",
"upload_time_iso_8601": "2023-10-18T12:36:46.918574Z",
"url": "https://files.pythonhosted.org/packages/02/57/c1f26cfef79cb9c08221a7a31beadfa5b0b57ff4c32329ec97ec0f392459/unisoc_unlock-0.0.1.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2023-10-18 12:36:46",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "pypa",
"github_project": "sampleproject",
"travis_ci": false,
"coveralls": false,
"github_actions": true,
"tox": true,
"lcname": "unisoc-unlock"
}