Realme Stock ROM (Firmware) OZIP Extraction Guide
The following tutorial will show you how to extract Realme Stock Firmware from OZIP files. Having set foot in India not long ago, the OEM is fairly new in the country. However, the fact that it has managed to garner such a large fan base in such a short period of time is quite commendable. Feature-rich devices are offered at an affordable price, what more could one ask for? Moreover, it is quite versatile when it comes to custom development.
In addition to unlocking the bootloader, there are also many tips and tricks for gaining administrative privileges. Furthermore, there is no shortage of custom ROMs. There seems to be maximum hype surrounding rooting Realme devices at the moment. In this respect, there are two different ways to gain root access: TWRP and without. It’s pretty simple- just flash the Magisk Installer ZIP via TWRP Recovery and you’re done.
A second method involves extracting the stock boot image file, patching it with Magisk, and then flashing the patched boot.img file. The latter seems to be the most popular among users. To do that, you will need to extract the Realme stock firmware that is in OZIP format. We will list out the steps to extract the stock boot.img file from the Realme OZIP firmware package after checking out why this need arises. Keep up with us.
OZIP Realme Stock Firmware: Everything You Need to Know
Let me tell you something. Stock firmware used to be bundled in a ZIP package by OEMs earlier. All that was needed is to simply extract that ZIP package and you could then easily get a hold of boot, vendor, vbmeta among other partition files. All of this has changed now, however. In recent years, OEMs such as OnePlus and Google have been packaging all their firmware contents inside the payload.bin file.
However, Realme’s stock firmware is packaged in the OZIP format. This OZIP package must be extracted before you can root your device without using TWRP. However, this isn’t a regular file that can be extracted with WinZip or WinRAR. In order to accomplish this, you will need Python and Ozipdecrypt.
When you decrypt the OZIP firmware with both of these tools, you will be presented with the stock firmware ZIP file. Once this is done, it can be easily extracted with either WinZIP or WinRAR. As soon as you have the necessary files, including the stock boot image, you can start the installation process. After patching the boot.img file via Magisk, we will flash the file via fastboot commands. All the instructions related to extracting OZIP Realme Stock Firmware using Python are included here. Let’s get started.
How to Extract OZIP Realme Stock Firmware
In order to use your device, it must first satisfy a few requirements. Prior to following the steps, make sure you download the files from the below section.
In the first place, you should download and install Python on your computer. Installing it shouldn’t take more than a few minutes if you follow the on-screen instructions.
Next, you’ll need to download Ozipdecrypt tool from GitHub. The download will begin after you click on the Code button on GitHub and then on the Download ZIP button.
As a final step, download your Realme device’s stock firmware. The file will be in OZIP format.
The OZIP Realme Stock Firmware can be extracted by following the steps below once all the files have been downloaded.
SETTING UP YOUR WORKING ENVIRONMENT
- Download Python and install it on your PC. You can install the software by following the on-screen instructions, and it should be completed within minutes. However, changing the installation directory is not mandatory (but it is recommended).
In this case, the installation directory will be C:\Users\YOURNAME\AppData\Local\Programs\Python\Python37-32. This is the location you need to keep in mind.
After downloading the Ozipdecrypt tool, extract it inside the Python installation folder. A .gitignore file, a README.md file, an ozipdecrypt.py file, and a requirements.txt file should be contained within it. Ensure that all four files are placed inside the Python installation directory.
Place the Realme stock firmware (in OZIP format) within the Python folder as well. Now we have the Python files, the four Ozipdecrypt files, and the OZIP stock firmware in the Python folder.
We will have to input the same name later on in the command prompt, so rename the stock ROM to something shorter. Because we have named the firmware Realme.ozip, the full name becomes Realme.ozip.
Launch CMD Window
- You can find Python’s installation folder in the program’s directory. The installation directory will be C:/Users/YOURNAME/AppData/Local/Programs/Python/Python37-32 if you haven’t changed it. You can enter CMD into the folder’s address bar by typing it in. You will now be able to access the Command Prompt.
- The Command Prompt can also be launched from the Start menu as an administrator by typing ic CD followed by the Python installation directory. As an example, we will copy the Python 37-32 program to C:\Users\YOURNAME\AppData\Local\Programs\Python\Python37-32. I would recommend taking the first route, i.e. only opening CMD in the Python folder.
Install Pycryptodome via CMD
- To install Pycryptodome, copy and paste the following command into the CMD window:
python -m pip install pycryptodome
Install Docopt via CMD
- To install Docopt, copy-paste the following command into the same CMD window:
python -m pip install docopt
Extract Realme OZIP Stock ROM (Firmware)
- You can now extract the Realme OZIP firmware package by running the following command in the same CMD window.
python ozipdecrypt.py realme.ozip
- Due to the fact that the stock ROM is named Realme, the above command is necessary. You will need to modify the code accordingly as per the name of the Realme firmware file.
- As a result, you should see the following message
Found correct AES key: your_key
- Once you see the above message, you should see the Realme stock firmware file in the ZIP format inside the Python folder. Our Python37-32 folder is located at
Extract Realme Boot.img Image File
- The above steps will allow you to extract the Realme stock ZIP firmware you have obtained. Extraction of the desired file/files can be achieved by using WinRAR or WinZIP software.
- Throughout this guide, we will only be using the stock boot.img. All you have to do is extract it to a convenient location and that’s it! With the help of these guides, you may now proceed to root your device:
Our guide on how to extract OZIP Realme Stock ROM or Firmware file comes to an end here. You can let us know in the comments section if you encounter any problems with any of the aforementioned steps.
How to Extract. DAT.BR from OZIP Firmware
Following the above steps, you should have received the stock boot.img file in IMG format. You can flash this by using the Fastboot commands. Is there anything else I should know about partition files? Other files, such as system and vendor, are in .dat.br format, which cannot be flashed directly via Fastboot.
How would you go about converting it to a Fastboot flashable IMG file? To extract Fastboot images from Realme/Oppo OZIP firmware, please refer to this guide: How to Extract Fastboot Images from Realme/Oppo OZIP Firmware. What are the benefits of this conversion? The partition files can also be manually flashed via Fastboot commands if you end up bricking your device.
User Requested Realme Stock Boot.img Extracted from OZIP
Since some users were having issues decrypting the OZIP firmware, I extracted it and uploaded the stock boot.img file. You can access the same directly by clicking here. You should double-check that both the device and the software are the same.
The file should be renamed boot.img and flashed via Fastboot commands after downloading. Also, feel free to comment on your device if you want it included as well. Make sure you list out the complete information (including the software version). The firmware was downloaded from Realme’s official website [link], so please follow the filename format provided there. As a final note, I cannot guarantee the exact time frame for the upload, it might take even a week (since I am the sole administrator of this site), so please accept my apologies!