mirror of
https://cdm-project.com/Android-Tools/dumper-wvdumper.git
synced 2025-04-30 00:54:25 +02:00
Update README.md
This commit is contained in:
parent
b9807173b6
commit
d667c67655
11
README.md
11
README.md
@ -6,15 +6,20 @@ Dumper is a Frida script to dump L3 CDMs from any Android device.
|
|||||||
|
|
||||||
Use pip to install the dependencies:
|
Use pip to install the dependencies:
|
||||||
|
|
||||||
* frida
|
`pip3 install -r requirements.txt`
|
||||||
* protobuf
|
|
||||||
* pycryptodome
|
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
* Enable USB debugging
|
* Enable USB debugging
|
||||||
* Start frida-server on the device
|
* Start frida-server on the device
|
||||||
* Execute dump_keys.py
|
* Execute dump_keys.py
|
||||||
|
* Start streaming some DRM-protected content
|
||||||
|
|
||||||
|
## Temporary disabling L1 to use L3 instead
|
||||||
|
A few phone brands let us use the L1 keybox even after unlocking the bootloader (like Xiaomi). In this case, installation of a Magisk module called [liboemcrypto-disabler](https://github.com/umylive/liboemcrypto-disabler) is necessary.
|
||||||
|
|
||||||
|
## Known issues
|
||||||
|
It seems like Google made some changes in their OEMCrypto library and it broke the script. Further investigation is needed to make it work on Android 11+, feel free to open PRs.
|
||||||
|
|
||||||
## Credits
|
## Credits
|
||||||
Thanks to the original author of the code.
|
Thanks to the original author of the code.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user