Created
January 16, 2023 11:35
-
-
Save jamesy0ung/919ef51fea4631e9dfe0bd26dc85c8f0 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1. Download STLinkReflash (Version 190812 tested) | |
2. Modify the following offsets in STLinkReflash.exe | |
2566 3C > 38 | |
2567 40 > C0 | |
26B2 3C > 38 | |
26B3 4A > C0 | |
3. Run STLinkReflash.exe and accept, selecting option 1. | |
4. Fun and profit! |
Someone did write a decrypter (https://github.com/lujji/st-decrypt), that may be worth looking at, although it is a bit old. Sorry I have mostly work on AVR, RP2040 and ESP32 series due to their open toolchains and programmers.
Has anyone located an updater for a version older than V2.J36.S2? I'd like to try V2.J16.S4, but don't have another ST-Link to flash the bin directly at the moment. If anyone knows of a way to get onto that low of a firmware without an external programmer, please share!
Hi could anyone provide the hex file dump of the final jlink firmware? I don't have access to windows pc and cannot run the STLinkReflash.exe
.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Yeah honestly if we can just directly flash the ST-Link firmware, why are we fucking about with a janky old utility that doesn't work half the time? Someone should just extract the binary from STLinkReflash or dump it from a clone ST-Link after flashing it with the utility.