Key features of ChimeraTool

NotificationsTurn on notifications to get up-to-date application version information!Subscribe!  No thanks

Search for...

Key features

Get device information

Get device information

Every important bit of information and device status can be read directly from the phone, for example: the serial number, factory data, hardware data, etc.

Change software

Change software

The most common uses for this function are either upgrades to new firmware versions or downgrades to older ones. Sometimes it is used to change or add languages. In 90% of the cases, most of the restart, freeze and no-boot errors are solved after a software update of this type.

Read codes

Read codes

If you are wondering about your phone’s default unlock code, or you have repeatedly used the wrong code and the device now requires a so-called “unfreeze” code, this feature is for you. Usually this is free and can be used unlimited times after the purchase of your license, but some cases require more resources. This may cost credits, but you will be warned during the process, or you can refer to our website for specific phone model information.

Read & Write certificate

Read & Write certificate

Reading and writing digitally signed certificates became necessary because in some Samsung models the serial number (IMEI) was stored and protected in this manner. Thus the manufacturer aimed to prevent one from manipulating the originally stored serial number without authorization. Sometimes this part gets damaged or overwritten by an improper tool. If this occurs, having a backup of that part can be very useful, enabling the ability to make a hassle-free restoration. In some cases, a previously saved content can also be restored to other devices by repairing them in the same way. It is important to note that in the latter situation this means that this serial number is cloned as well.

Modem repair

Modem repair

The modem repair function is needed when it is likely that the factory partition – the so called "golden partition" – is also somehow damaged. In this case error messages can appear, for example: there is no network, no IMEI number in the device, or in the instance that you simply get a numerical message such as "12345600654321". In any of these situations it is advisable to try this more complex feature in order to make the proper correction.

Repair IMEI & MAC

Repair IMEI & MAC

In some cases it happens that the serial number becomes overwritten or just simply damaged. If the case arises, it is possible to fix. Because this feature is not available for all devices, you should beforehand always check out our current list of supported devices.

Backup & Restore

Backup & Restore

One frequently asked question is, "How do I restore the original state of my device?". We cannot back up all individual calibration and safety parameters before each process, because this would be quite time consuming, but we do give you the opportunity to do it yourself. Obviously, we are trying to create backups automatically before each critical part of the process; this is a functionality which provides extra safety.

Screenshots

Easy to use UIBuilt in driver installerFirmware downloader for every modelYou can select any firware you wantEach procedure in few secondsLicense managerJob history

Dear Guest,

We would like to inform you that as from 25 May 2018, our company acts according to the General Data Protection Regulation (GDPR) of the European Union.

Please note some of our main aspirations to protect our customers’ security and personal data. We have always paid special attention to user data and the way we process them, but let us show you some examples:

We provide the option to delete your profile
You can initiate this on the https://chimeratool.com/#user-settings page.

You can always check where else you are signed in from to the site, and if that is not you, you can sign out that browser. https://chimeratool.com/#user-sessions

As a first line of defense, your data is protected by security systems specialized in preventing hacking attacks, but our other self-developed security solutions and our ever-running monitoring systems enable us to declare with great certainty that we do everything to prevent unauthorized users from acquiring any sensitive data.

In case of a potential unauthorized physical access to any of our servers, the data stored there is useless, as our storage media are protected by sector-level AES encryption.

All passwords we store are unknown to us as well, since only the passwords’ hash values are stored, randomized with “salt”. This minimizes the risk of any leakage of actual user passwords in case of a potential database leak.

 Got it