CDMA SPC codes calculators:
MetroPCS:
- supported models: all MetroPCS devices
Verizon Prepay:
- supported models: many of Verizon Prepay devices
ZTE:
- supported models: ZTE C201, C202, C203, C204, C205, C321, C332 Ping, C1602, etc
Palm USB Passthrough unlock code:
- supported models: Palm Pre, Pixi
GSM SIM unlock codes calculators:
Blackberry:
- supported models: most of Blackberry smartphones, 250+ global networks, right now 275 MEPs supported
ZTE:
supported models:
- ZTE SFR 114, SFR 231, SFR 232, SFR 341, SFR 342, SFR 343, Orange Vegas, Vodafone Indie, X760, X761, X960, GX760, GX761, GR230, A261+, X990, SFR 251, SFR 251 Messenger Edition, T-Mobile Vairy Touch, Touch II, Vodafone 547i, etc
- ZTE Blade, X850, Racer, Mercury, Link, Xiang, N61, Mercury, 811, Raise, Optus, TMN SilverBelt, BlueBelt I, BlueBelt II, Softstone, SFR 522, Orange SanFransisco, T-Mobile Zest, Vodafone 1230, 1231, 945/Joe, Telstra Smart Touch T3020, etc
- ZTE SFR 132
- ZTE SFR 151
Huawei 3G modems:
- supported models: Huawei E122, E155, E156, E156G, E160, E160G, E161, E166, E169, E169G, E170, E172, E173, E176, E180, E182E, E196, E226, E270, E271, E272, E510, E612, E618, E620, E630, E630+, E660, E660A, E800, E870, E880, E1550, E1552, E1553, E1762, E1750, EG162, E880, EG162, EG162G, EG602, EG602G, EM770, T156, Vodafone K2540, K3515, K3520, K3565, K3715, etc
VK:
- supported models: VK 200, i200, i230, etc
Doro:
- supported models: Doro 345 GSM, PhoneEasy 345, 409, 409s, 410, 410s, 610, 610s, etc
Pantech:
- supported models: Pantech P1010, P2000 Breeze, P2020 Ease, P7040 Link, P7000 Impact, P8000 Crossover, P9020 Pursuit, P9050 Laser, C600, C610, C740 Matrix, C790 Alladin Duo, C810 Duo, C820 Matrix Pro, P6010, P5000, P7040P, P2030 Breeze III, etc
Alcatel:
supported models:
- Alcatel V670, C700, C701, Playboy, C707, C717, Elle N3
- Alcatel V770, C820, C825, Mandarina Duck
- Alcatel S215, S218, S319, S320, S321
- Alcatel S520, Miss Sixty
- Alcatel S853
Keyboard codes searcher:
This tool lets you search secret keypad codes in firmware files, search and extract serial numbers (ESN, MEID, IMEI, Bluetooth, WiFi), security codes (user lock, SPC, FSC, OTKSL, NCK), authentication keys (A-key, SSD_A, SSD_B), EVDO logins/passwords and Mobile IP profiles from EFS, RAM, full-flashes or any other memory dumps gotten from mobile devices by using methods in CDMA Workshop or JTag. Very useful.
Test SPC codes:
What if you found a lot of different probably SPC codes in EFS, RAM or in full-flashes? Then you just can use "Test SPC codes" tool to fastly and fully automatically test all found probably security codes in order to find a valid unlock SPC code. Very useful.
pESN -> MEID bruteforcer:
MEID and pESN must be matching each other in CDMA devices, otherwise they will not work properly. It is not possible to retrieve exact original MEID value from the known pESN. But we can find (via bruteforce attack) any other MEID value that will match our pESN. This function is sometimes very useful when re-flashing MEID-based CDMA devices in ESN-based networks. Take less than a minute and this tool will find a correct MEID for you.
@