I am a network traffic-monitoring, packet-injecting, arp-spoofing, dns-hijacking, ssid-honeypotting, password-cracking, video game-playing cuddly asshole that loves eating more than my weight in food.
I’ve compiled a small program that assists with bypassing Google FRP (factory reset protection) activation locks.
Please go to Projects > FastFRP
to view it. 🙂
I’ve cleaned up my AtvDB application a bit..
I’ve removed the Installation tab, and have added the options directly onto the main tab.
Added some error checking, changed hubwizard to indigo, and added the ability to factory reset Kodi.
Check it out here:
First off, I’d like to give a huge shoutout to @rootjunky for all of his methods that he has already came up with, and also the files that he has provided for all of us to download from his website!
In this video, I’ll show you how to bypass the Android FRP (factory reset protection) aka Google Account Lock on a device running Android 6.0.1
The device that I’m using in the video is an LG Style 2 Plus (LGMS550) on MetroPCS, running Android 6.0.1 (May 1st, 2016 update.)
This should work on most other devices as well..
This will specifically help people that have these problems when following other bypass methods:
– Can’t click “Share” – it does nothing when you do
– Can’t click home button in Accessibility – it tells you that the phone needs to complete setup first
– Can’t open APK files downloaded in Chrome – it tells you that it’s “unable to scan” the file
– Unknown Sources is completely disabled in System Settings
I had EVERY one of these issues on this phone (LG & Metro really tried to lock this one down..) but was able to overcome them!
The link that I used in the video is:
Please leave a comment and let me know if I have helped you!
I’ve released a tool that I’ve been using for quite a while for the Amazon FireTV and FireTV Stick.
You can check out the features and details here:
It’s been a while since I’ve sold my Ouya, but I’ve recently gotten another one! It’s quite a bit different now than what I remember from the original launch, however.. I like that they’ve integrated ADB over WiFi, and improved a lot with the network performance, and overall system performance.
Anyway, once I updated it to it’s most current firmware (as of this post, anyway,) I noticed that none of the available root methods worked for me – except for my Ouya Toolbox that I wrote last year. Pretty cool, haha.
Well, now that I have another one, I’m going to take a little time here and there to continue with Ouya Toolbox, and see what else I can do with it. As a lot of you know, I had written two versions of it – 1.1.2, and 1.1.2test – of which 1.1.2 auto-detected Ouya devices automatically, while 1.1.2test did not detect the Ouya device, and would push commands blindly. I did this because, a lot of people had an issue with device detection, while others did not – I was one of those that did not have the issue. However, my new Ouya DID in fact have the detection issue, so I had to use my own test version to root it. I’ve messed around with the code a little bit already, and got it to detect my device now with no problems, and am thinking about publishing it as a *fixed* version (I hope!)
My future goal with this program is going to be rooting via WiFi, and just eliminating the need for the USB cable for the Ouya systems that are on a firmware that natively supports AoU.
Keep an eye here, and on XDA for it 🙂