Download Android Utility Tool V115 - Dongle Edition [Latest Version]

0

Android Utility v115 - A Tool for Flashing Firmware, Bypass DAA and SLA Auth, and Unlocking Android Devices

Android Utility v115 is a powerful tool that can be used to flash firmware, bypass Digital Authentication Authority (DAA) and Software Licensing Authentication (SLA) on Android devices, and unlock the device. It is a free program that makes it easy for advanced users to bypass secure boot protection on their MediaTek phones.


This article outlines various features and functions of Android Utility Tool 115, designed for Advance device manipulation and management. Some of the key features include:

1. Disable Auth: Bypassing device authentication and security locks (DAA/SLA).

2. Read ADB Info: Retrieve device information using ADB (Android Debug Bridge).

3. Dump Preloader: Extract the preloader data from your device.

4. Read Fastboot Info: Obtain device information via Fastboot mode.

5. Read Part (Meta): Read device partition information.

6. Analyze Preloader: Analyze the preloader data on your device.

7. Format Part (Meta): Format device partitions.

8. Analyze MTK DA: Analyze MediaTek Device Authentication on your device.

9. Reboot Meta: Reboot your device in Meta mode.

10. Write Part (Meta): Write data to device partitions.

11. Crash Preloader Brom: Cause the preloader to crash on your device.

12. Reboot Factory Mode: Reboot your device into factory mode.

13. Dump NV Regions (Meta): Extract NV regions from your device.

14. FRL-L22 Y9A DL to Brom: Switch your device to Brom mode.

15. Reboot AT Mode: Reboot your device in AT mode.

16. Dump Userarea (Meta): Dump the user area of your device.

17. Vivo Demo Remove (AT): Remove the demo version from Vivo devices.

18. Reboot Fastboot: Reboot your device in fastboot mode.

19. Dump PGPT (Meta): Dump the PGPT (Partition Table) of your device.

20. Extract Super IMG: Extract the Super IMG file from your device.

21. Dump EXT_CSD (Meta): Dump the EXT_CSD (Extended Card Specific Data) of your device.

22. Disable Payjoy App (ADB): Disable the Payjoy app on your device.

23. Extract OFP (MTK + Qualcomm): Extract the OFP file from your device.

24. PGPT to Scatter: Convert the PGPT data to scatter format.

25. Read NVRAM (Meta): Read the NVRAM (Non-Volatile RAM) of your device.

26. Extract Samsung ROM (MTK): Extract the Samsung ROM from your device.

27. Scatter to PGPT: Convert scatter format to PGPT format.

28. Write NVRAM (Meta): Write data to the NVRAM of your device.

29. Extract Huawei Update (MTK): Extract Huawei updates from your device.

30. EMMC Health Check (Meta): Check the health status of the EMMC (Embedded MultiMedia Card) on your device.

31. Wipe NVRAM (Meta): Erase the NVRAM data on your device.

32. Unlock Network (Meta): Unlock your device's network.

33. Extract RedMagic (Payload.bin): Extract the RedMagic file from your device.

34. GEN FRP Reset PKG (Meta): Generate the FRP (Factory Reset Protection) reset package.


These features offer a range of functionalities for manipulating and managing various aspects of your device, including security, data extraction, and system configuration.

Download Links;

1.Android Utility Tool 115 - Download 

2.Android Utility Tool 115 (Without Smart Card Edition) - Release Soon...


How to use?
1.First, you need to download the zip file from the below link
2.Next, you can unzip all files at c: drive (important)
3.Ensure you have disabled the antivirus before running the installation
4.Next, open the folder and install the setup file with some basic instruction
Run the "AndroidUtility.exe"
5.Next, you can install all drivers if you already installed skip this step
Connect the phone and try to do any function
Enjoy !!!

Changelog

⦿ added Samsung A03S [A037F] Clear RPMB via preloader mode
⦿ added Samsung A03S [A037F] Write RPMB via preloader mode (you can use this option to change Knox guard status from (01) to (11) - you will need some extra tricks, figure it out).
⦿ added VIVO Qualcomm WRITE protected devices (RESET/WRITE) EFS (bypass via FH poke exploit).
⦿ added OPPO Qualcomm READ protected devices (RESET/WRITE) EFS  (bypass via fw_upate FH loader, write via patch - raw progress xml + fw update firehose required).
⦿ Qualcomm restore (EFS/NV) option, now can work on other partitions as well - (boot, recovery, modem, etc.) - compress any partition, and you can restore as NV.
⦿ Improved Samsung Activate ADB via MTP Android 13 (it works till June Patch LEVEL (01.06.2023) - need to repeat the operation (2,3,5) times), we're working on (July+) updates but not yet ready.
⦿ Improved Ext4 FS Explorer engine (now you can modify SUPER IMG directly without unpack and repack - SUPER IMG read from the device, not the one from factory firmware images).
⦿ Fixed Smart card connection (the software was a little bit slow while checking for smart cards. Now it works faster).
⦿ Android Utility v115 No Smart Card edition will be ready in a few days

Post a Comment

0 Comments
Post a Comment (0)
To Top