NoGoolag
4.64K subscribers
19.6K photos
10.9K videos
752 files
19.7K links
Live free!

📡 @NoGoolag

FAQ:
http://t.me/NoGoolag/169

★Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

📡 @Libreware

📚 @SaveAlexandria

📡 @BallMemes

FORWARDS ARE NOT ENDORSEMENTS

💯 % satire OSINT
Download Telegram
XiaomiTool V2 fixed

PC software to unlock bootloader and mod xiaomi devices

MariosK239/XMT_V2-linux-fixed
https://github.com/MariosK239/XMT_V2-linux-fixed

You can git clone the repo and then follow the readme to compile and start the program

Forked the repository and applied all pull requests to the Linux branch, for ease of use from https://github.com/francescotescari/XiaoMiToolV2


#xiaomitool #xiaomi #unlock #bootloader
#Xiaomi #Bootloader #Unlock without PC (Phone-To-Phone)

Note: We are not responsible for any data loss or corrupt devices. Proceed at your own risk. This procedure requires the use of 2 Android phones and an OTG cable for ADB debugging. If this is your first time unlocking the bootloader or your device is using a new MIUI account, proceed with Step 2 after 7 days

Step 1 [Configuring Settings] [Primary Phone]:

» Go to Settings > About Phone: Click on MIUI Version multiple times until developer options are enabled

» Go to Settings Homepage > Additional Settings > Developer Options: Enable OEM Unlocking and USB Debugging

» Then go to Mi Unlock Status: Click on Add account and device

Step 2 [Installing Flash scripts] [Secondary Phone]:

» Download and install these APKs on your secondary phone: file1 | file2 | file3

» Connect the primary phone to the secondary phone via OTG

» Boot the primary phone into fastboot mode

» Open the Termux app: Follow and run these commands one by one according to the instructions

👤Credits
Techbuzznet (Video instructions for Indians)
RohitVerma888
@WildWaze ( thx for help and banner)
https://t.me/popMODS/3621
#Unlock #bootloader #xiaomi #Android

HyperSploit
Bypass HyperOS restrictions on bootloader unlocking
https://github.com/TheAirBlow/HyperSploit/
https://xdaforums.com/t/hypersploit-bypass-hyperos-bootloader-unlocking-restrictions.4668775/

MiUnlockTool
Retrieve encryptData(token) for Xiaomi devices to unlock bootloader, It is compatible with all platforms.
https://github.com/offici5l/MiUnlockTool

termux-miunlock
A program that can be used to retrieve the bootloader unlock token for Xiaomi devices. (and unlock the bootloader) using Termux
https://github.com/RohitVerma882/termux-miunlock/
#EU's new cybersecurity rules will impact #Android starting August 1, 2025. #Bootloader unlocking will likely be banned, limiting user control and custom ROM installations. #Samsung has already removed this feature in OneUI 8. A major shift for Android in Europe!"

https://xiaomitime.com/eu-kills-android-bootloader-unlock-starting-august-1-59449/

@xiaomiui

This is clickbait. There is no clause requiring to block bl unlock. There is stuff such as check to make sure updates are secure.
Samsung did remove it because they suck, but this wasn't a legal requirement.
#bootloader unlock wall of shame

https://github.com/melontini/bootloader-unlock-wall-of-shame

updated guide, check it before buying a #phone

Over the past few years, a suspicious number of companies have started to "take care of your data", aka block/strictly limit your ability to unlock the bootloader on your own devices.

While this may not affect you directly, it sets a bad precedent. You never know what will get the axe next: Shizuku? ADB? Sideloading? I thought it might be a good idea to keep track of bad companies and workarounds.

#android
How to run #ADB and #fastboot in #Termux without root to unlock #bootloader, run ADB commands, remove #bloatware, flash ROM, or even root another #Android

https://www.mobile-hacker.com/2025/06/16/how-to-run-adb-and-fastboot-on-a-non-rooted-android-smartphone-using-termux/:

1. It supports debloating of various manufacturers and mobile carriers such as LG, Samsung, Xiaomi, Huawei, Oppo, Realme, Vivo, ZTE, OnePlus, Nokia, Sony, Asus, Google, Fairphone, Motorola, Tecno, Unihertz.
2. Full access to the app’s private storage — including databases, tokens, cached credentials, config files, or even offline user data.
3. Another common issue in AndroidManifest.xml is this flag: When enabled (which it is by default unless explicitly disabled), Android allows the app’s private data to be backed up via ADB — again, even on non-rooted devices.

Android, use termux-adb command instead of adb
https://github.com/nohajc/termux-adb

Android debloater for pc and debloat lists
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation

#debloat