تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Tecno F1 Reset to Factory (METAMODE)




162412178890441.png


كود:
[B][FONT=Arial Black][SIZE=3]Searching for MTK Device...Found
 Port Identification :METAMODE BROM
 FriendlyName :MediaTek USB VCOM (Android) (COM26)
 Device       :7&28e87109&0&0001
 SymbolicName :\??\COM26
 Driver Ver   :01/22/2015,3.0.1504.0


[COLOR="#008000"]META Phone Info . . .
MCUID: 8U  `    mt6580,S01
ME_SO: S01 
DATE : 
MODEL: 
ME_SWVER: F1-VP510EFG-GO-201214V23 
[/COLOR]

[COLOR="#FF0000"]Reset to Factory Default Ok
Rebooting....
Done!!!
[/COLOR]
Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Starlight Star_Plus_Plus Ultra Power Option



162412317430151.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM19)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0699MT6739 [6739]
 hw subcode    : 8A00
 hw version    : CB00
 sw version    : 0002
 Target config : 00
 SB            : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 FUSEID         : 00000000
 SECURE VERSION : FF 
 BL VERSION     : 03 

Preparing Download Agent..
 DA   : 6739.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : preloader

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : FCD05B603F9B7267BFE50420DDC5A2F0
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x00000001D2000000 -7,281 GB
 eMMC CID   : 110100303038473330003341A32AC2E3 - 008G30


Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
  Brand          : starlight
  Vendor         : starlight
  Model          : star_plus_plus
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_bird6739tv1_bsp_1g-user 8.1.0 O11019 1547111980 release-keys
  Device         : star_plus_plus
  Board          : star_plus_plus
  Display ID     : 8140TQF_GA02E.MV88.P1.V00.A1.AD81.1.132.HD.20190110.TST.EN
  Security Patch : 2018-12-05
  Fingerprint    : starlight/star_plus_plus/star_plus_plus:8.1.0/O11019/1547111980:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_bird6739tv1_bsp_1g.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0699_starlight_star_plus_plus_star_plus_plus_8.1.0_O11019_1547111980_061921181129\MT6739_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x02D88000]1024 KB ->frp.bin...Ok
-nvdata[0x03688000]32 MB ->nvdata.bin...Ok
-protect1[0x07688000]8 MB ->protect1.bin...Ok
-protect2[0x07E88000]9,469 MB ->protect2.bin...Ok
-nvram[0x10700000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0699_starlight_star_plus_plus_star_plus_plus_8.1.0_O11019_1547111980_061921181129
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:29
[/SIZE][/FONT][/B]


162412317440772.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM19)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : FCD05B603F9B7267BFE50420DDC5A2F0
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x00000001D2000000 -7,281 GB
 eMMC CID   : 110100303038473330003341A32AC2E3 - 008G30

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : starlight
  Vendor         : starlight
  Model          : star_plus_plus
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_bird6739tv1_bsp_1g-user 8.1.0 O11019 1547111980 release-keys
  Device         : star_plus_plus
  Board          : star_plus_plus
  Display ID     : 8140TQF_GA02E.MV88.P1.V00.A1.AD81.1.132.HD.20190110.TST.EN
  Security Patch : 2018-12-05
  Fingerprint    : starlight/star_plus_plus/star_plus_plus:8.1.0/O11019/1547111980:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:02
[/SIZE][/FONT][/B]
 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
761
مستوى التفاعل
525
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A83 CPH 1729 RESET

أولا الدخول الى Metamode عن طريق تبويت الهاتف من وضع flash mode



ثم عمل reset

 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
761
مستوى التفاعل
525
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO F9 cph1823 factory reset



 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

TAB MODIO M12 Read Pattern


162454029042691.png


162454038115241.bmp


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM19)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0



Reading System Info
  Brand          : MODIO
  Vendor         : MODIO
  Model          : M12
  ID             : KOT49H
  SDK            : 19
  Release        : 6.0
  ABI            : armeabi-v7a
  Description    : b708_tab-user 4.4.2 KOT49H eng.qxbin.1608878658 test-keys
  Device         : M12
  Board          : M12
  Display ID     : ALPS.KK1.MP1.V2.36
  Platform       : MT6582
  Fingerprint    : alps/b708_tab/b708_tab:4.4.2/KOT49H/1608878658:user/test-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : . Found
Gesture Data : D71027C254CD14D777F57E35644C073787A18C17
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 158963
1 2 3
4 5 6
7 8 9

 Ok

Elapsed Time : 00:00:02
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor PGN610 ZeroWipe FRP


162487066391131.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM19)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0



Reading System Info
  Brand          : condor
  Vendor         : condor
  Model          : PGN610
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gionee6737t_66_m0-user 6.0 MRA58K 1473218164 release-keys
  Device         : PGN610
  Board          : PGN610
  Display ID     : PGN610
  Security Patch : 2016-11-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN610/PGN610:6.0/MRA58K/1473218164:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:02
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A31 (CPH2015) ZeroWipe FRP


162496013158531.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM6)
 Device       :6&12e3c9ed&0&2
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 85923004107E9D78E28F2473FB35728D
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58,242 GB
 eMMC CID   : 90014A6843396150330151098E7D274B - hC9aP3

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Vendor         : OPPO
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6765_19581-user 9 PPR1.180610.011 eng.root.20210506.162150 release-keys
  Security Patch : 2021-05-05
  StorageType    : mtp
  Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:02
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Starlight Star_Plus_Plus Ultra Power Option




16249601323082.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
 Device       :6&12e3c9ed&0&2
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : F8FDBEEB578AC7DE6BEB9EEFED48338C
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x00000001D2000000 -7,281 GB
 eMMC CID   : 110100303038473730005B73BF16426F - 008G70

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : starlight
  Vendor         : starlight
  Model          : star_plus_plus
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_bird6739tv1_bsp_1g-user 8.1.0 O11019 1547111980 release-keys
  Device         : star_plus_plus
  Board          : star_plus_plus
  Display ID     : 8140TQF_GA02E.MV88.P1.V00.A1.AD81.1.132.HD.20190110.TST.EN
  Security Patch : 2018-12-05
  Fingerprint    : starlight/star_plus_plus/star_plus_plus:8.1.0/O11019/1547111980:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

دراجي سوفت

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
28 فبراير 2016
المشاركات
1,458
مستوى التفاعل
4,142
النقاط
113
الإقامة
تيارت
Oppo a1k cph1923 ( boot done + read info + reset frp user data + read fw )

السلام عليكم و رحمة الله تعالى و بركاته


 

دراجي سوفت

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
28 فبراير 2016
المشاركات
1,458
مستوى التفاعل
4,142
النقاط
113
الإقامة
تيارت
Ace urban 1 ( boot done + read fw )

السلام عليكم و رحمة الله تعالى و بركاته






 
التعديل الأخير:

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

XIAOMI Redmi 9 (lancelot) ZeroWipe FRP



16252491243511.png



كود:
[B][FONT=Arial Black][SIZE=2]Brand : XIAOMI Model : Redmi 9 (lancelot) Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM6)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0707MT6768 [6768]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E7
 SB            : 01 (True)
 SLA           : 02 (True)
 DAA           : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0707MT6768 [6768]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SB            : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : FE 
 NORMAL BOOT

Preparing Download Agent..
 DA   : MT6768_Xiaomi_New.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing preloader_lancelot.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 30263BFE58D88F3B6DEE94656B7A2271
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58.242 GB
 eMMC CID   : 15010044503644414203340B07856795 - DP6DAB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_lancelot.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__070221185645\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-protect1[0x164A2000]8 MB ->protect1.bin...Ok
-protect2[0x16CA2000]11.367 MB ->protect2.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__070221185645
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:36
[/SIZE][/FONT][/B]


162524912462552.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM6)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 30263BFE58D88F3B6DEE94656B7A2271
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58.242 GB
 eMMC CID   : 15010044503644414203340B07856795 - DP6DAB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:01
[/SIZE][/FONT][/B]
 

NoriDz

:: عضو مميز ::
إنضم
18 ديسمبر 2012
المشاركات
690
مستوى التفاعل
1,249
النقاط
93
الإقامة
Beni_Saf
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

huawei dra-l21 frp بدون تست بوان
تبويت بزر خفض الصوت .


162532131237471.jpeg


162532131261932.jpeg


162532131265013.jpeg


162532137362251.jpeg
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Allure M1 Ultra Power Option



162533823119711.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 3F639B18679CEAB0751A36EB2ED40201
 ERAM Size  : 0x0000000000038000 -224 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 150100525831344D4207DD97A8A7344B - RX14MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : Condor
  Vendor         : SPA Condor Electronics
  Model          : Allure M1
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gnsz6755_66_n-user 7.0 NRD90M 1496388540 release-keys
  Device         : Allure_M1
  Board          : Allure_M1
  Display ID     : Allure_M1
  Security Patch : 2017-06-05
  Platform       : mt6755
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : Condor/Allure_M1/Allure_M1:7.0/NRD90M/1496388540:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal...
ERROR : CMD=07000400, ACK : 0x00200000[] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:02
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Samsung Galaxy J5 Prime (SM-G570F) FRP Bypass




162539445272932.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching Device On Modem Port....
Scanning port....
TPortConnection.Create...(COM8)..Opening...Ok
Searching for Device ....Found !!

Reading Device Informations....
Model           	: SM-G570F
HW Version      	: G570FXXU1API4/G570FOXE1APK2/G570FXXU1API4/G570FXXU1API4
SW Version      	: G570FXXU1API4/G570FOXE1APK2/G570FXXU1API4/G570FXXU1API4
MNC             	: 03
MCC             	: 603
IMEI            	: 35776208XXXXXXX
SN              	: R58JXXXXXXX
Unqiue Code     	: CQ3002DD4D4F554
Connection      	: AT,MTP
SWVER           	: G570FXXU1API4/G570FOXE1APK2/G570FXXU1API4/G570FXXU1API4
IMEINUM         	: 35776208XXXXXXX
Reactivation Status  : On


TPortConnection.Destroy.....Closing...Ok..
Exploiting MTP..
Installing driver...
Pooling browser..
UnInstalling driver...

Elapsed Time : 00:00:22
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Infinix Smart 5 (X657C) Ultra Power Option


Dump Preloader Flash Init
BootInfo
Ultra Power Option


162548329227631.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM6)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok
Reading Device hardware info..
 hw code       : 0717
 hw subcode    : 8A00
 hw version    : CA01
 sw version    : 0200
 Target config : E5
 SB            : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)

Exploiting BROM...
Exploit Sent..
Successfully Exploited..
Reading Flash Init...
Flash init Size 0x06B0
Done!!!
----------------------------------------------------------
C:\Hydra Tool\Backup\Prel_FlashInit\0717_preloader_x657c_h6117_487966326C.bin
----------------------------------------------------------
[/SIZE][/FONT][/B]


162548329346432.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM6)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0717MT6761 [6761]
 hw subcode    : 8A00
 hw version    : CA01
 sw version    : 0200
 Target config : E5
 SB            : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0717MT6761 [6761]
 hw subcode    : 8A00
 hw version    : CA01
 sw version    : 0200
 Target config : 00
 SB            : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : FE 
 NORMAL BOOT

Preparing Download Agent..
 DA   : [Not Exist]
Trying Default 6761.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing 0717_preloader_x657c_h6117_487966326C.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : C305FC971E41D326BCA1352D8CFE4635
 ERAM Size  : 0x000000000003A000 -232 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x000000073A000000 -28.906 GB
 eMMC CID   : 880103534C4433324755631E082FC7A9 - SLD32G

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_x657c_h6117.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0717__070521112248\MT6761_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x01888000]1024 KB ->frp.bin...Ok
-nvdata[0x07022000]71.867 MB ->nvdata.bin...Ok
-persist[0x0B800000]48 MB ->persist.bin...Ok
-protect1[0x0E800000]8 MB ->protect1.bin...Ok
-protect2[0x0F000000]8 MB ->protect2.bin...Ok
-nvram[0x1B300000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0717__070521112248
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:34
[/SIZE][/FONT][/B]


162548329350493.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM6)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : C305FC971E41D326BCA1352D8CFE4635
 ERAM Size  : 0x000000000003A000 -232 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x000000073A000000 -28.906 GB
 eMMC CID   : 880103534C4433324755631E082FC7A9 - SLD32G

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal...
ERROR : ACK : 0xC002002A[STATUS_SEC_IMG_TYPE_MISMATCH] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:01
[/SIZE][/FONT][/B]


اللوغ يعطي خطا في الفورمات في الاخير لكن العملية ناجحة
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Samsung Galaxy J3 PRO (SM-J330F) FRP Bypass



162548388582071.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching Device On Modem Port....
Scanning port....
TPortConnection.Create...(COM16)..Opening...Ok
Searching for Device ....Found !!

Reading Device Informations....
Model           	: SM-J330F
HW Version      	: J330FXWU4CTJ1/J330FOJV4CTJ1/J330FXXU4CTJ1/J330FXWU4CTJ1
SW Version      	: J330FXWU4CTJ1/J330FOJV4CTJ1/J330FXXU4CTJ1/J330FXWU4CTJ1
MNC             	: 
MCC             	: 
IMEI            	: 3535050XXXXXXX
SN              	: R28JXXXXXXX
Unqiue Code     	: CQE00D846D41294
Connection      	: AT,MTP
SWVER           	: J330FXWU4CTJ1/J330FOJV4CTJ1/J330FXXU4CTJ1/J330FXWU4CTJ1
IMEINUM         	: 
Reactivation Status  : On


TPortConnection.Destroy.....Closing...Ok..
Exploiting MTP..
Installing driver...
Pooling browser..
UnInstalling driver...

Elapsed Time : 00:00:23
[/SIZE][/FONT][/B]

162548388594942.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Wise Tech A1 (SC6531E) Read Code/Passwords



162555988287512.png



162555988267871.png


كود:
[B][FONT=Arial Black][SIZE=2]Port : [Auto] Scanning...COM35
Opening Port...(COM35)Ok
------------------------------------------
Screenlock Security...
------------------------------------------
Executing... Read Code/Passwords [NOR]
FlashID : [EF1640] Size : 0x00400000
Serial   : 76419575383698
IMEI [1] : 35909XXXXXXX099
IMEI [2] : 35909XXXXXXX081
IMEI [3] : 35909XXXXXXX099
IMEI [4] : 35909XXXXXXX081

[COLOR="#FF0000"]Scanning.....
Code[00] : 12340909
[/COLOR]
Action Result..Ok

Elapsed Time : 00:00:03


Closing Port...Ok..
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

STREAM B2Plus (HT28) IMEI REPAIR FlashMode



16255680691551.png


كود:
[B][FONT=Arial Black][SIZE=2]Reading System Info

Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0



Reading System Info
  Brand          : STREAM
  Vendor         : EastAeon
  Model          : HT28
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_k37mv1_bsp-user 8.1.0 O11019 1542348863 release-keys
  Device         : B2Plus
  Display ID     : HB45B2Plus.DZ.V10.0.0.2018.11.22
  Security Patch : 2018-10-05
  Fingerprint    : STREAM/B2Plus/B2Plus:8.1.0/O11019/1542348863:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
IMEI INFO..
[COLOR="#FF0000"]  IMEI1         : 000000000000000
  IMEI2         : 000000000000000
[/COLOR]
Elapsed Time : 00:00:02
[/SIZE][/FONT][/B]



162556806981092.png


كود:
[B][FONT=Arial Black][SIZE=2]***IMEI REPAIR FUNCTION****
Univ FlashMode
Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0



Reading System Info
  Brand          : STREAM
  Vendor         : EastAeon
  Model          : HT28
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_k37mv1_bsp-user 8.1.0 O11019 1542348863 release-keys
  Device         : B2Plus
  Display ID     : HB45B2Plus.DZ.V10.0.0.2018.11.22
  Security Patch : 2018-10-05
  Fingerprint    : STREAM/B2Plus/B2Plus:8.1.0/O11019/1542348863:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted
[COLOR="#008000"]IMEI INFO..
  IMEI1         : 352548XXXXXX683
  IMEI2         : 352548XXXXXX691 [Ok]
[/COLOR]
Elapsed Time : 00:00:02
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi Note 7 Pro (violet) FRP Remove



162566821842151.png
 
أعلى