alexax66 / carliv_image_kitchenLinks
☆14Updated 4 years ago
Alternatives and similar repositories for carliv_image_kitchen
Users that are interested in carliv_image_kitchen are comparing it to the libraries listed below
Sorting:
- Tiny and simple library to tinker with MediaTek bootloader images (LK).☆28Updated 2 months ago
- Bootloader Unlock from EDL.☆137Updated 4 years ago
- A friendly Spreadtrum / Unisoc flashing tool.☆31Updated 4 months ago
- Full-fledged Android Image Kitchen in Android☆30Updated 2 years ago
- Simple Unpack & Repack Tool - Kitchen for Windows supporting Android 10☆64Updated 5 years ago
- This contains maintainer modified manifests to include in our build trees☆18Updated 6 months ago
- FASTBOOT UNBRICK MAKER☆10Updated 3 years ago
- ☆89Updated 4 years ago
- Spreadtrum / Unisoc Bootloader Unlock Tool☆28Updated 4 years ago
- TWRP standard device files for Qualcomm SoCs☆52Updated 10 months ago
- Disables FBE, proca, Vaultkeeper and auto-reflash of stock recovery on Samsung Pie devices, including S10, N10, A10 - A50 and Tab A 10.1.☆111Updated 2 years ago
- An alternative to well-known Heimdall.☆35Updated 2 years ago
- Unpack/Repack recovery and boot images easy with Carliv Image Kitchen for Windows and Linux.☆51Updated 3 years ago
- Qualcomm Tool GUI☆45Updated 3 years ago
- ☆25Updated last year
- convert your read-only super partition (including all sub-partitions) from read-only to read/write-able (compatible with EXT4, EROFS and …☆47Updated 2 years ago
- TWRP A/B Installer Zip Template☆82Updated 7 months ago
- (A very hacky) Tool to read and extract logs from MTK's expdb image☆20Updated 3 years ago
- vbmeta-sign.img keys extractor for Unisoc firmware.☆25Updated 4 years ago
- Autmated Script to Patch a Super.img with a GSI in python 3☆22Updated 3 months ago
- THIS HAS BEEN DEPRECATED. USE THE NEW VERSION INSTEAD.☆24Updated 7 months ago
- This repository contains magiskboot and mkbootimg based android image kitchen.☆66Updated 2 months ago
- ROM Dumper, Based Upon Dumpyara from AndroidDumps, Infused w/ their Firmware_extractor