I was trying to find a way to extract the boot and dtbo images from recovery.img/, but wasn’t able to understand the instructions for Windows 10. I found a simpler (for me) method and wrote this tutorial. It didn’t work on recovery.img, but it did work to get boot and dtbo from an e/OS build zip file.
[NB: Should you wish to paste in terminal, position your cursor in the window and right-click]
Here we go…
- Create a new folder on your C: drive. Name it AAA
[Left-click on This PC, double-click on Local Disc (C:), right-click in an empty space, click New, click Folder, type AAA.]
- In a browser window go to: Releases · ssut/payload-dumper-go · GitHub
Scroll down to “Assets”
Download “payload_dumper_go_x.x.x_windows_amd64.tar.gz”
Go to Downloads and rename it pay.tar
[Select the file, right-click on it, select Rename.]
- Extract pay.tar to AAA by:
a) going to your taskbar’s search box
b) typing cmd, and selecting Run as administrator
c) typing in or pasting this command:
tar -xvzf C:\PATH\TO\FILE\FILE-NAME.tar.gz -C C:\PATH\TO\FOLDER\EXTRACTION
BUT!!!..don’t press Enter until after changing
C:\PATH\TO\FILE\FILE-NAME.tar and
C:\PATH\TO\FOLDER\EXTRACTION
to the paths used by your computer. `
For example, on mine the command is:
tar -xvzf C:\Users\User\Downloads\pay.tar.gz -C `C:\AAA
d) THEN press Enter
- Go back to your Downloads folder and:
a) right-click on the e/OS zip file you downloaded for flashing
b) left-click Extract All
c) verify that the “Show extracted files when complete” box is checked
d) Left-click Extract.
e) After the extraction completes, right-click on the payload BIN file and left-click on Copy.
- Open AAA, right-click inside and click Paste.
Right above the files you should see a rectangular box with something akin to This PC > Local Disc (C:) > AAA written inside. Left-click on a blank spot in that box, type cmd and press Enter.
Another terminal window will appear. In it type or paste:
payload-dumper-go.exe payload.bin
Press Enter.
When the extraction is complete, open AAA and double-click on “extracted_xxxxxxxx_xxxxxx” to see your unzipped files.
(Thanks to aibd in e/OS, ssut and siayi in github and Rootk1t in xda forums.)