Get Fastboot-Flashable Firmware Files for Any OnePlus Device by Extracting the Payload.bin « OnePlus :: Gadget Hacks

[ad_1]

OnePlus supplies the manufacturing facility firmware for all its telephones on a first-party obtain web page. It is an important instrument to have for those who ever brick your cellphone, but it surely’s not precisely straightforward to make use of. As a substitute of offering the manufacturing facility firmware as a set of picture information in an archive like Google does for Pixels, OnePlus tucks them away in a “payload.bin” file which you can’t flash in fastboot.

So on this information, you will be studying how one can take the payload.bin file you extracted out of your OnePlus firmware ZIP and switch it right into a set of IMG information you possibly can truly use. As an example, you might take the boot.img file out and run it via Magisk to get a fastboot-flashable root technique. Or you might re-flash the system.img and vendor.img information for those who’ve utilized a root mod and soft-bricked your cellphone, then you definately’d be again up and operating.

Step 1: Obtain Python

Python is the programming language that’s used to run the required instructions for the Payload Dumper Instrument. So earlier than you will get began extracting your payload.bin file, you will want to put in Python in your pc. Hit up the one of many hyperlinks beneath to obtain Python on your working system.

Each the 32-bit and 64-bit variations for Home windows are utilizing the brand new internet installer, which implies it is going to obtain and set up the most recent information routinely. For those who’re utilizing a Mac, you ought to be conscious that Python solely helps 64-bit variations going ahead. 32-bit help for macOS has been formally dropped with model 3.8.1, however nonetheless exists with model 3.7.6 and beneath.

As soon as downloaded, open the installer and click on the “Set up Now” choice to proceed.

Ensure to notice the set up location of Python. You can even set up it in your desktop for fast entry. Ensure to create a folder in your desktop and put Python in there; in any other case, all of the information might be spammed throughout your desktop.

Observe the short on-screen directions, and it’ll set up in a minute or so. As soon as the method winds up, click on the “Shut” button to proceed. From right here, you possibly can transfer onto the following step.

Step 2: Obtain the Payload Dumper Instrument

Now that Python has been put in in your pc, the following factor you will must do is seize the Payload Dumper Instrument by geminids14. This is what will be used to actually take the “payload.bin” file and crack it wide open, so you can view the core system image files. You can download the tool using the link below.

Once the Payload Dumper Tool has been downloaded, you need to extract and move its contents over to your newly installed Python folder from the previous step.

You also need to take your “payload.bin” file and put it in the same Python folder as well so that everything is in the same location.

Step 3: Open a Command Window in the Python Folder

Now that you have all the necessary files in the Python folder, you need to open a command window before you can begin extracting the payload.bin file.

If you’re using Windows, you can click the address bar in the Python folder, then type “cmd” and hit enter to open a command window right there. You can also hold the Shift key and right-click a blank spot in the Python folder, then select “Open PowerShell window here.” Now the command window is ready to go! You can move onto the next step.

If you’re using Mac or Linux, you can open the Terminal app, type “cd” and a space, then drag and drop the Python folder onto the command window itself. Hit enter and it will automatically link the Python folder to your Terminal app. Now the command window is ready to go! You can move onto the next step.

Step 4: Extract the Payload.bin File

You’re almost there now — the final step is to actually execute the proper commands and extract the payload.bin file. From the command window opened in the previous step, you’ll want to copy and paste (or type) the following command, then hit enter to continue.

python -m pip install -r requirements.txt

Note: Mac, Linux, and Windows PowerShell users might have to add a period and a slash before entering certain commands (e.g., ./python -m pip install -r requirements.txt).

The above command will download the required dependencies for the process of extracting the payload.bin file. It won’t take long for that to finish up.

After that, you’ll want to copy and paste (or type) the next command, then hit enter to continue.

python payload_dumper.py payload.bin

The above command is where the magic happens — it will now begin breaking down your payload.bin file into individual system image files. Since this can take some time to complete, you’ll need to have a bit of patience here.

Once the entire process has successfully finished, all of the system image files extracted from the payload.bin file will be placed in the “Output” folder of your Python directory.

The initial process can be kind of a pain to set up, but you’re past the hard part now. From this point on, all you have to do is take a payload.bin file, drop it into the Python folder, then run the Payload Dumper Tool via the proper command. You can now use whatever system image files you want for your device and flash them in Fastboot Mode with ease. Enjoy!

Cover photo and screenshots by Stephen Perkins/Gadget Hacks
[ad_2]
Source link

Total
0
Shares
Leave a Reply

Your email address will not be published.

Previous Post

Python backdoor attacks and how to prevent them

Next Post

Park Min Young Refuses To Give Up On Seo Kang Joon In “I’ll Go To You When The Weather Is Nice”

Related Posts