تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi 9 (lancelot) Removing FRP By Hydra Tool



166533124149281.png



كود:
[B][FONT=Arial Black]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM3)
 Device       :5&df74106&0&2
 SymbolicName ??\USB#VID_0E8D&PID_0003#5&df74106&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2016,3.2

Trying to Open Port [COM3] Ok
Handshaking...Ok
HwCode    : 0707 {MT6768}
Hwver     : 0000
 Target config : E7
 SBC           : 01 (True)
 SLA           : 02 (True)
 DAA           : 04 (True)
 SWJTAG        : 06 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)
Device Connection : BROM
HW Subcode: 8A00
HW Ver    : CA00
SW Ver    : 0000
ME_ID     : 476380D5F08011B4B3066C5EE4418456
SOC_ID    : E17B052FB7305F13D21AF5587CD401852668A4D33BBA27F3F733AC652D5E5E21
Device not yet filterd...
Executing LibUSB Filter..
Device Now Filtered...Restarting Device Port..
Trying to Open Port [COM3] Ok
Handshaking...
Device Connection : BROM
Exploiting Device...
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x000436D0
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_lancelot.bin]
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)
Device Connection : BROM
Download Agent...
DA :MTK_AllInOne_DA_5.2152.bin
Patching da2 ... Ok
Uploading data
Successfully uploaded stage 1, jumping ..
Jumping to 0x00200000
Successfully received DA sync
CONNECTION_AGENT : brom
DRAM config needed for : 150100444436384D
Sending emi data.. 
DRAM setup passed.
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size: 0x0000000000070000-448 KB
IRAM Size: 0x0000000100000000-4 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID       :  150100444436384D420991F9F4FA67D5 - DD68MB
HW-CODE         : 0x707
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x1
DA-VERSION      :  1.0
Speed          : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 50
--------------- Reading build.prop content ---------------
  Brand          : Redmi
  Vendor         : Xiaomi
  Model          : lancelot
  Product        : lancelot
  Manufacturer   : Xiaomi
  Marketname   : Redmi 9
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : lancelot-user 10 QP1A.190711.020 V12.0.4.0.QJCMIXM release-keys
  Display ID     : build-20210331141959
  Security Patch : 2021-03-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 860957054XXXXXX
 IMEI2 : 860957054XXXXXX
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 -preloader .....Ok  [preloader_lancelot.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_476380D5F08011B4B3066C5EE4418456\Auto\100922161502\6768_Android_scatter.txt
 -pgpt .....Ok
 -nvram .....Ok
 -nvdata .....Ok
 -frp .....Ok
 -protect1 .....Ok
 -protect2 .....Ok
 -persist .....Ok
 -proinfo .....Ok
 -nvcfg .....Ok
 -sec1 .....Ok
 -seccfg .....Ok
Backup Done!!!
Reading Partition Table .. 
ERAM Size: 0x0000000000070000-448 KB
IRAM Size: 0x0000000100000000-4 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID       :  150100444436384D420991F9F4FA67D5 - DD68MB
HW-CODE         : 0x707
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x1
DA-VERSION      :  1.0
Speed          : high-speed
Partition Count : 50
--------------- Reading build.prop content ---------------
  Brand          : Redmi
  Vendor         : Xiaomi
  Model          : lancelot
  Product        : lancelot
  Manufacturer   : Xiaomi
  Marketname   : Redmi 9
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : lancelot-user 10 QP1A.190711.020 V12.0.4.0.QJCMIXM release-keys
  Display ID     : build-20210331141959
  Security Patch : 2021-03-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 860957054XXXXXX
 IMEI2 : 860957054XXXXXX
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
------------------------------
   Removing FRP Flash Mode..  
------------------------------
Operation : Uni_FMFRP_Erase
Status:  Ok
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!
[/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A53m Ultra Power Done By Hydra Tool


166549432606211.png


كود:
[B][FONT=Arial Black]PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :
 SymbolicName :\??\USB#VID_05C6&PID_9008#5&15c311e1&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :03/25/2016,2.1.2.2

Getting device info.....
Serial No.: 0x06B60A02
HW_ID     : 0090B0E100000000
MSM ID    : 0x0090B0E1, MSM8936-Qualcomm Snapdragon 615/ 
MODEL_ID  : 0x0000
OEM_ID    : 0x0000 - QUALCOMM
PBL Ver   : 00000000
PK HASH   : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f

Hydra Enable Auto search Firehose..
 #Please wait...
 #Search by filename filter.....
 #Found 1 Compatible Files..Found match Firehose...
 
Firehose Loader[0090b0e10029001f_cc3153a80293939b_97419bc8_asus_qualcomm technologies, inc._peek_8936.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8936
  Tag            : _peek
  Version        : 3
  Code_size      : 96
  Signature_size : 256
  fhVendor       : QUALCOMM TECHNOLOGIES, INC.
  HW_ID          : 0090B0E10029001F
  Vendor         : ASUS
  OEM_ID         : 0029
  MODEL_ID       : 001F
  SW_ID          : 0000000000000003
  APP_ID         : 
  pk_hash        : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f
  OEM_VERSION    : 
  IMAGE_VARIANT  : 
  QC_VERSION     : 
--------------------------------------------------

SaharaBoot... Ok
Sending .....Ok
Connecting to Firehose...
Ping. Ok 
Configuration........
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8936
 Version : 1


Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 40 Items
          Drive [1] 0 Items
          Drive [2] 4 Items

 
Phone Information.....
  Brand          : OPPO
  Vendor         : OPPO
  Model          : OPPO A53m
  ID             : LMY47V
  SDK            : 22
  Release        : 5.1.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Description    : msm8916_64-user 5.1.1 LMY47V eng.root.20160627.205258 dev-keys
  Device         : A53m
  Board          : msm8916
  Display ID     : A53_11_A.911_160627
  Security Patch : 2015-10-01
  Platform       : msm8916
  FRPPST         : /dev/block/bootdevice/by-name/config
  Fingerprint    : OPPO/A53/A53:5.1.1/LMY47V/1434708000:user/release-keys


Backup Security partitions...
Reading Security Items....
 > modemst1
 > modemst2
 > fsg
 > fsc
C:\Hydra Tool\Backup\Security_Backup\OPPO A53m_msm8916_5.1.1_Security_101122140109.sec
Backup Security Success....
Processing Auto....
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOk
 - Formatting Userdata
Executing ...
 - Formatting Userdata  [Safe Format - eMMc] OkOk
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:10
[/FONT][/B]
 

ALICHAIMA

:: عضو محترف ::
إنضم
6 يناير 2016
المشاركات
975
مستوى التفاعل
639
النقاط
93
الإقامة
DZGSM
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO -A5S-CPH1909-ULtra POWER DONE
p_2477pqhwc1.png
 

ALICHAIMA

:: عضو محترف ::
إنضم
6 يناير 2016
المشاركات
975
مستوى التفاعل
639
النقاط
93
الإقامة
DZGSM
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO-A31 -(CPH2015)- REPAIR IMIE DONE
p_2479md63u1.png
p_2479473ka2.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A74 (CPH2219) Zerowipe FRP Patch Done Hydra Tool



16664280497021.png


كود:
[B][FONT=Arial Black]PreOperation Configuration 
 Brand : OPPO Model : A74 (CPH2219) Storage : Auto
 Loader: NULL
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :
 SymbolicName :\??\USB#VID_05C6&PID_9008#5&15c311e1&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0x6B7D7DE7
HW_ID     : 0014D0E100510000
MSM ID    : 0x0014D0E1, SM_KAMORTA_H- /
MODEL_ID  : 0x0000
OEM_ID    : 0x0051 - OPPO/ONEPLUS
PBL Ver   : 00000000
PK HASH   : 49445e14621312dfeccd4389f267e6b71674ddd36b1bc41d1f605aa991d14ad6
Assigned Loader Not Found...
Hydra Enable Auto search Firehose..
 #Please wait...
 #Search by filename filter.....
 #Found 5 Compatible Files..Found match Firehose...
 
Firehose Loader[0000000000510000_49445e14621312df_31bbdfbd_oppo_oneplus_oppo.fhprg]
--------------------------------------------------
  Header Type    : New
  TargetMSM      : 
  Tag            : 
  Version        : 6
  Code_size      : 816
  Signature_size : 256
  fhVendor       : OPPO
  HW_ID          : 0000000000510000
  Vendor         : OPPO/ONEPLUS
  OEM_ID         : 0051
  MODEL_ID       : 0000
  SW_ID          : 00000003
  APP_ID         : 00000000
  pk_hash        : 49445e14621312dfeccd4389f267e6b71674ddd36b1bc41d1f605aa991d14ad687834378cf2129259dfaf107d75ee329
  OEM_VERSION    : ubuntu-120-106
  IMAGE_VARIANT  : KamortaPkgLAA
  QC_VERSION     : BOOT.XF.4.1-00213-KAMORTALAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ................................Ok
Connecting to Firehose...
Ping................... Ok 
Configuration........
Identifying Chip........UFS 
Ok
Chip Configuration :
 MemoryName : UFS
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 
 MaxXMLSizeInBytes : 4096
 TargetName : 
 Version : 1
 DateTime : Jan 26 2021 - 17:25:57

*** STORAGE DEVICE INFO ***
Memory Type         : UFS
Block Size in Bytes : 4096
Page Size           : 4096
Manufacturer ID     : 429
Serial Number       : 2037279096
Firmware Version    : 002
Product Name        : H9HQ15AECMBDAR
Physical Partitions : 6
Total Logical Blocks:
          Drive [0]  30931968[117.996 GB]
          Drive [1]  2048[8 MB]
          Drive [2]  2048[8 MB]
          Drive [3]  8192[32 MB]
          Drive [4]  189440[740 MB]
          Drive [5]  104448[408 MB]

Protocol : Universal
Running : Ok

Reading GPT[6]
          Drive [0] ERROR: Failed to run the last command -1
          Drive [1] ERROR: Failed to run the last command -1
          Drive [2] ERROR: Failed to run the last command -1
          Drive [3] ERROR: Failed to run the last command -1
          Drive [4] ERROR: Failed to run the last command -1
          Drive [5] ERROR: Failed to run the last command -1

Removing FRPta...
Method : 
Zerowipe 
Processing... Ok

Elapsed Time : 00:00:06
[/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Oppo F11 Pro (CPH1969) Removing Passcode/FRP
Without Data Lost By HYDRA TOOL



166680535738691.png



كود:
[B][FONT=Arial Black]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM3)
 Device       :5&df74106&0&2
 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&df74106&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2016,3.2

Trying to Open Port [COM3] Ok
Handshaking...Ok
HwCode    : 0788 {MT6771/MT8385/MT8183/MT8666}
Hwver     : 0000
 Target config : E5
 SBC           : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)
 SWJTAG        : 04 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)
Device Connection : BROM
HW Subcode: 8A00
HW Ver    : CA00
SW Ver    : 0000
ME_ID     : 0744300E6B6EE1F432BCC3DB2DEF5CE9
SOC_ID    : AE07254A4B7D3D5FD37477C4ECCE4EAB61489A670CE208C2FCA2D77746ED6840
Exploiting Device...
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00049798
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_oppo6771.bin]
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)
Device Connection : BROM
Download Agent...
DA :MTK_AllInOne_DA_5.2152.bin
Patching da2 ... Ok
Uploading data
Successfully uploaded stage 1, jumping ..
Jumping to 0x00200000
Successfully received DA sync
CONNECTION_AGENT : brom
DRAM config needed for : 90014A6844456150
Sending emi data.. 
DRAM setup passed.
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size: 0x0000000000039000-228 KB
IRAM Size: 0x0000000180000000-6 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1F000000-116.484 GB
EMMC CID       :  90014A68444561503303490B545A46AD - hDEaP3
HW-CODE         : 0x788
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x0
DA-VERSION      :  1.0
Speed          : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 46
--------------- Reading build.prop content ---------------
  Brand          : alps
  Vendor         : alps
  Model          : oplus_mssi_64_cn
  Product        : oplus_mssi_64_cn
  Manufacturer   : alps
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : sys_oplus_mssi_64_cn-user 11 RP1A.200720.011 1648824731399 release-keys
  Display ID     : RP1A.200720.011 release-keys
  Security Patch : 2022-04-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 -preloader .....Ok  [preloader_oppo6771.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0788_0744300E6B6EE1F432BCC3DB2DEF5CE9\Auto\102622153718\6771_Android_scatter.txt
 -pgpt .....Ok
 -nvram .....Ok
 -nvdata .....Ok
 -frp .....Ok
 -protect1 .....Ok
 -protect2 .....Ok
 -persist .....Ok
 -proinfo .....Ok
 -oppo_custom .....Ok
 -opporeserve1 .....Ok
 -opporeserve2 .....Ok
 -nvcfg .....Ok
 -sec1 .....Ok
 -seccfg .....Ok
Backup Done!!!
---------------------------
        Ultra Power    
---------------------------
Formatting Userdata : 
Operation : Safeformat Universal... Ok
Removing FRP : 
Operation : Uni_FMFRP_Erase Ok
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!
[/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Wiko View 4 Lite (W-V730-EEA) Removing FRP Done Hydra Tool



16668595307881.png


كود:
[B][FONT=Arial Black]Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
 Device       :5&15c311e1&0&9
 SymbolicName :\??\USB#VID_0E8D&PID_2000#5&15c311e1&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Trying to Open Port [COM4] Ok
Handshaking...Ok
HwCode    : 0766 {MT6765/MT8768t}
Hwver     : 0000
 Target config : 01
 SBC           : 01 (True)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)
Device Connection : Preloader
HW Subcode: 8A00
HW Ver    : CA00
SW Ver    : 0000
ME_ID     : B62236777681CFE1B9577BD9E0DA4CB9
Crashing da... Method = 0
Uploading data

Successfully Crash Preloader.
Device now is BROM Port
Trying to Open Port [COM5] Ok
Handshaking...Ok
Device Connection : BROM
Exploiting Device...
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0003B9DC
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_v730.bin]
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)
Device Connection : BROM
Download Agent...
DA :MTK_AllInOne_DA_5.2152.bin
Patching da2 ... Ok
Uploading data
Successfully uploaded stage 1, jumping ..
Jumping to 0x00200000
Successfully received DA sync
CONNECTION_AGENT : brom
DRAM config needed for : 880103534C443332
Sending emi data.. 
DRAM setup passed.
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size: 0x000000000003A000-232 KB
IRAM Size: 0x0000000080000000-2 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x000000073A000000-28.906 GB
EMMC CID       :  880103534C443332475539BE3441275F - SLD32G
HW-CODE         : 0x766
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x0
DA-VERSION      :  1.0
Speed          : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 49
--------------- Reading build.prop content ---------------
  Brand          : WIKO
  Vendor         : WIKO
  Model          : W-V730-EEA
  Product        : W-V730
  Manufacturer   : WIKO
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_v730-user 10 QP1A.190711.020 7 release-keys
  Device         : W-V730
  Display ID     : QP1A.190711.020 release-keys
  Security Patch : 2022-01-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 354XXXXXXXXX727
 IMEI2 : 354XXXXXXXXX729
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 -preloader .....Ok  [preloader_v730.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_B62236777681CFE1B9577BD9E0DA4CB9\Auto\102722092551\6765_Android_scatter.txt
 -pgpt .....Ok
 -nvram .....Ok
 -nvdata .....Ok
 -frp .....Ok
 -protect1 .....Ok
 -protect2 .....Ok
 -persist .....Ok
 -proinfo .....Ok
 -nvcfg .....Ok
 -sec1 .....Ok
 -seccfg .....Ok
Backup Done!!!
Reading Partition Table .. 
ERAM Size: 0x000000000003A000-232 KB
IRAM Size: 0x0000000080000000-2 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x000000073A000000-28.906 GB
EMMC CID       :  880103534C443332475539BE3441275F - SLD32G
HW-CODE         : 0x766
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x0
DA-VERSION      :  1.0
Speed          : high-speed
Partition Count : 49
--------------- Reading build.prop content ---------------
  Brand          : WIKO
  Vendor         : WIKO
  Model          : W-V730-EEA
  Product        : W-V730
  Manufacturer   : WIKO
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_v730-user 10 QP1A.190711.020 7 release-keys
  Device         : W-V730
  Display ID     : QP1A.190711.020 release-keys
  Security Patch : 2022-01-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 354XXXXXXXXX727
 IMEI2 : 354XXXXXXXXX729
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
------------------------------
   Removing FRP Flash Mode..  
------------------------------
Operation : Uni_FMFRP_Erase
Status:  Ok
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!
[/FONT][/B]
 

mounirblidaa

عضو أساسي
إنضم
5 أبريل 2016
المشاركات
784
مستوى التفاعل
520
النقاط
93
الإقامة
BLIDA BLIDA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

realme rmx3263 factory reset

p_2492ho7qd1.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Realme C11 2021 (RMX3231) Removing FRP Done Hydra Tool


166704466769041.png


كود:
[B][FONT=Arial Black]Port : [Auto] Scanning...COM4
Opening Port...(COM4)Ok
------------------------------------------
Service_FRP_Flashmode...
------------------------------------------
Reading IMEI....
IMEI 1 : 000000000000000
IMEI 2 : 000000000000000
IMEI 3 : 000000000000000
IMEI 4 : 000000000000000

Reading System Info.
Removing FRP...Ok

Closing Port...Ok..

Elapsed Time : 00:00:02
[/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi 9 (lancelot) Flash Done Hydra Tool



166721373436071.png


كود:
[B][FONT=Arial Black]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1633 (COM4)
 Device       :5&15c311e1&0&9
 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c311e1&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Trying to Open Port [COM4] Ok
Handshaking...Ok
HwCode    : 0707 {MT6768}
Hwver     : 0000
 Target config : E7
 SBC           : 01 (True)
 SLA           : 02 (True)
 DAA           : 04 (True)
 SWJTAG        : 06 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)
Device Connection : BROM
HW Subcode: 8A00
HW Ver    : CA00
SW Ver    : 0000
ME_ID     : 3ADF6D0C80B928379C7510CF7E9FB668
SOC_ID    : 00E94FEE066A645EA820D3FD0C20C50217AA8A8BBC3AB0B008EBD04BFDD67086
Exploiting Device...
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x000447A8
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_lancelot.bin]
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)
Device Connection : BROM
Download Agent...
DA :MTK_AllInOne_DA_5.2152.bin
Patching da2 ... Ok
Uploading data
Successfully uploaded stage 1, jumping ..
Jumping to 0x00200000
Successfully received DA sync
CONNECTION_AGENT : brom
DRAM config needed for : 1501004450364441
Sending emi data.. 
DRAM setup passed.
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size: 0x0000000000070000-448 KB
IRAM Size: 0x0000000100000000-4 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E8F800000-58.242 GB
EMMC CID       :  15010044503644414203F95C9079A7B3 - DP6DAB
HW-CODE         : 0x707
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x1
DA-VERSION      :  1.0
Speed          : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 50
--------------- Reading build.prop content ---------------
  Brand          : Redmi
  Vendor         : Xiaomi
  Model          : lancelot
  Product        : lancelot
  Manufacturer   : Xiaomi
  Marketname   : Redmi 9
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : lancelot-user 11 RP1A.200720.011 V12.5.4.0.RJCMIXM release-keys
  Display ID     : RP1A.200720.011
  Security Patch : 2022-01-01
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
Backing up Security..
 -preloader .....Ok  [preloader_lancelot.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0707_3ADF6D0C80B928379C7510CF7E9FB668\Auto\103122112140\6768_Android_scatter.txt
 -pgpt .....Ok
 -nvram .....Ok
 -nvdata .....Ok
 -frp .....Ok
 -protect1 .....Ok
 -protect2 .....Ok
 -persist .....Ok
 -proinfo .....Ok
 -nvcfg .....Ok
 -sec1 .....Ok
 -seccfg .....Ok
Backup Done!!!

Write Selected Partitions..
 -preloader .....
 -recovery ..... Ok
 -vbmeta ..... Ok
 -vbmeta_system ..... Ok
 -vbmeta_vendor ..... Ok
 -logo ..... Ok
 -md1img ..... Ok
 -spmfw ..... Ok
 -scp1 ..... Ok
 -scp2 ..... Ok
 -sspm_1 ..... Ok
 -sspm_2 ..... Ok
 -lk ..... Ok
 -lk2 ..... Ok
 -boot ..... Ok
 -dtbo ..... Ok
 -tee1 ..... Ok
 -tee2 ..... Ok
 -exaid ..... Ok
 -cust ..... Ok
 -super ..... Ok
 -cache ..... Ok
 -userdata ..... Ok
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!
Done Writing...


=====================================

Elapsed Time : 00:05:25
[/FONT][/B]
 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
761
مستوى التفاعل
525
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Oppo A16 CPH2269 FRP Remove


كود:
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM4)
 Device       :6&186afa3&0&4
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&186afa3&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Trying to Open Port [COM4] Ok
Reading Partition Table .. 
ERAM Size: 0x000000000003A000-232 KB
IRAM Size: 0x0000000100000000-4 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E8F800000-58.242 GB
EMMC CID       :  90014A68433861503E03106B1C03785B - hC8aP>
HW-CODE         : 0x766
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x0
DA-VERSION      :  1.0
Speed          : high-speed
Partition Count : 50
--------------- Reading build.prop content ---------------
  Brand          : alps
  Vendor         : alps
  Model          : oplus_mssi_64_cn
  Product        : oplus_mssi_64_cn
  Manufacturer   : alps
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : sys_oplus_mssi_64_cn-user 11 RP1A.200720.011 1626980523742 release-keys
  Display ID     : RP1A.200720.011 release-keys
  Security Patch : 2021-08-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Reading Partition Table .. 
ERAM Size: 0x000000000003A000-232 KB
IRAM Size: 0x0000000100000000-4 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E8F800000-58.242 GB
EMMC CID       :  90014A68433861503E03106B1C03785B - hC8aP>
HW-CODE         : 0x766
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x0
DA-VERSION      :  1.0
Speed          : high-speed
Partition Count : 50
--------------- Reading build.prop content ---------------
  Brand          : alps
  Vendor         : alps
  Model          : oplus_mssi_64_cn
  Product        : oplus_mssi_64_cn
  Manufacturer   : alps
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : sys_oplus_mssi_64_cn-user 11 RP1A.200720.011 1626980523742 release-keys
  Display ID     : RP1A.200720.011 release-keys
  Security Patch : 2021-08-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
------------------------------
   Removing FRP Flash Mode..  
------------------------------
Operation : Uni_FMFRP_Erase
Status:  Ok
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!
 

Hafidi

عضو أساسي
إنضم
22 نوفمبر 2014
المشاركات
572
مستوى التفاعل
594
النقاط
0
الإقامة
Algerie Msila
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

KONROW SWEET5 Reading Firmware Done


--------------- Reading build.prop content ---------------
Brand : KONROW
Vendor : KONROW
Model : SWEET5
Product : AGN_8149TQF_L5002B_E1_MV88_RGO_V01
Manufacturer : KONROW
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : fr-FR
Description : full_AGN_8149TQF_L5002B_E1_MV88_RGO_V01-user 11 RP1A.200720.011 1645214567 release-keys
Display ID : KONROW_SWEET5_V1-20210803
Security Patch : 2021-07-05
--------------- end of build.prop content ---------------


Reading IMEI........
IMEI1 : 354**********99
IMEI2 : 354**********07
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
------------------------------
Partition Tool Operation..
------------------------------
Backup All By Partitions
Reading Partitions
-preloader ..... Ok [preloader_agn_8149tqf_l5002b_e1_mv88_rgo_v01.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0699_BEC60B93433F13ADDF7F22D312E6E683\FULL\110222170139\6739_Android_scatter.txt
-pgpt ..... Ok
-boot_para ..... Ok
-para ..... Ok
-expdb ..... Ok
-frp ..... Ok
-nvcfg ..... Ok
-nvdata ..... Ok
-md_udc ..... Ok
-metadata ..... Ok
-protect1 ..... Ok
-protect2 ..... Ok
-seccfg ..... Ok
-sec1 ..... Ok
-proinfo ..... Ok
-nvram ..... Ok
-logo ..... Ok
-vbmeta_a ..... Ok
-vbmeta_system_a ..... Ok
-vbmeta_vendor_a ..... Ok
-md1img_a ..... Ok
-md1dsp_a ..... Ok
-spmfw_a ..... Ok
-mcupmfw_a ..... Ok
-gz_a ..... Ok
-lk_a ..... Ok
-loader_ext_a ..... Ok
-boot_a ..... Ok
-vendor_boot_a ..... Ok
-dtbo_a ..... Ok
-tee_a ..... Ok
-vbmeta_b ..... Ok
-vbmeta_system_b ..... Ok
-vbmeta_vendor_b ..... Ok
-md1img_b ..... Ok
-md1dsp_b ..... Ok
-spmfw_b ..... Ok
-mcupmfw_b ..... Ok
-gz_b ..... Ok
-lk_b ..... Ok
-loader_ext_b ..... Ok
-boot_b ..... Ok
-vendor_boot_b ..... Ok
-dtbo_b ..... Ok
-tee_b ..... Ok
-super ..... Ok
-userdata ..... Ok
-flashinfo ..... Ok


Reading Done!!!
C:\Hydra Tool\Backup\MTKBKUP\0699_BEC60B93433F13ADDF7F22D312E6E683\FULL\110222170139
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A1K (CPH1923) IMEI REPAIR Done Hydra Tool


16674928325152.png


كود:
[B][FONT=Arial Black]***IMEI REPAIR FUNCTION****
Oppo Flash Mode
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1633 (COM4)
 Device       :5&15c311e1&0&9
 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c311e1&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Trying to Open Port [COM4] Ok
Reading Partition Table .. 
ERAM Size: 0x000000000003A000-232 KB
IRAM Size: 0x0000000080000000-2 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID       :  150100514436334D42039116D8B016E3 - QD63MB
HW-CODE         : 0x766
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x0
DA-VERSION      :  1.0
Speed          : high-speed
Partition Count : 44
--------------- Reading build.prop content ---------------
  Vendor         : OPPO
  Manufacturer   : OPPO
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6762_18540-user 9 PPR1.180610.011 eng.root.20210506.165532 release-keys
  Security Patch : 2021-05-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
---------------------------
Oppo Method Auto
---------------------------
Backing up Security..
 - boot Ok
 - nvram Ok
 - nvdata Ok
 - vbmeta Ok
 - seccfg Ok
 - md1img Ok
Writing certificate and IMEI..
Please wait...
Step 1
Trying Method 1 Failed
Trying Method 2
Has been patched already.. Ok
Step 2 Ok
Step 3 Ok
Step 4 Ok
Step 5 Ok
[COLOR="#FF8C00"]Writing IMEI Done!!!
[/COLOR]
[COLOR="#008000"]Reading IMEI........
 IMEI1 : 35248XXXXXXX5
 IMEI2 : 35248XXXXXXX6
[/COLOR]Rebooting Device...
Reboot Option : RebootToNormal
[COLOR="#FF0000"]Rebooting Operation Done!!!!
[/COLOR]


Elapsed Time : 00:00:39
[/FONT][/B]
 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
761
مستوى التفاعل
525
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

ITEL Vision 1 Pro [L6502] FRP Remove





 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
761
مستوى التفاعل
525
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Oppo A15 [CPH2185] system error Solution




كود:
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM4)
 Device       :6&186afa3&0&4
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&186afa3&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Trying to Open Port [COM4] Ok
Reading Partition Table .. 
ERAM Size: 0x000000000003A000-232 KB
IRAM Size: 0x0000000080000000-2 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000747C00000-29.121 GB
EMMC CID       :  90014A68423861503E030007D5A8B7FD - hB8aP>
HW-CODE         : 0x766
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x0
DA-VERSION      :  1.0
Speed          : high-speed
Partition Count : 49
--------------- Reading build.prop content ---------------
  Brand          : OPPO
  Vendor         : OPPO
  Model          : oppoEffectModel
  Product        : oppo6765
  Manufacturer   : OPPO
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6765-user 10 QP1A.190711.020 bedd37e98646d3a1 release-keys
  Display ID     : QP1A.190711.020 release-keys
  Security Patch : 2022-10-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Write Selected Partitions..
 -preloader .....
 -boot_para ..... Ok
 -recovery ..... Ok
 -para ..... Ok
 -opporeserve1 ..... Ok
 -opporeserve3 ..... Ok
 -oppo_custom ..... Ok
 -expdb ..... Ok
 -vbmeta_system ..... Ok
 -vbmeta_vendor ..... Ok
 -nvcfg ..... Ok
 -md_udc ..... Ok
 -protect1 ..... Ok
 -protect2 ..... Ok
 -seccfg ..... Ok
 -persist ..... Ok
 -sec1 ..... Ok
 -md1img ..... Ok
 -spmfw ..... Ok
 -scp1 ..... Ok
 -scp2 ..... Ok
 -sspm_1 ..... Ok
 -sspm_2 ..... Ok
 -gz1 ..... Ok
 -gz2 ..... Ok
 -cdt_engineering ..... Ok
 -ocdt ..... Ok
 -special_preload ..... Ok
 -my_custom ..... Ok
 -lk ..... Ok
 -lk2 ..... Ok
 -boot ..... Ok
 -logo ..... Ok
 -dtbo ..... Ok
 -tee1 ..... Ok
 -tee2 ..... Ok
 -super ..... Ok
 -vbmeta ..... Ok
 -cache ..... Ok
 -otp ..... Ok
 -flashinfo ..... Ok
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!
Done Writing...


=====================================

Elapsed Time : 00:07:07
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Plume H1 (SP620) Removing FRP By Hydra Tool


166799066279461.png


كود:
[B][FONT=Arial Black]PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
 SymbolicName :\??\USB#VID_05C6&PID_9008#5&15c311e1&0&10#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :03/21/2018,2.1.3.1

Getting device info......
Serial No.: 0xDF198E3C
HW_ID     : 000460E100000000
MSM ID    : 0x000460E1, MSM8953-Qualcomm Snapdragon 625/JAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0000 - QUALCOMM
PBL Ver   : 00000000
PK HASH   : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f

Hydra Enable Auto search Firehose..
 #Please wait...
 #Search by filename filter.....
 #Found 1 Compatible Files..Found match Firehose...
 
Firehose Loader[000460e100290021_cc3153a80293939b_95bf8174_asus_qualcomm technologies, inc._peek_8953.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8953
  Tag            : _peek
  Version        : 3
  Code_size      : 288
  Signature_size : 256
  fhVendor       : QUALCOMM TECHNOLOGIES, INC.
  HW_ID          : 000460E100290021
  Vendor         : ASUS
  OEM_ID         : 0029
  MODEL_ID       : 0021
  SW_ID          : 0000000000000003
  APP_ID         : 
  pk_hash        : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f
  OEM_VERSION    : GAVIN_C-PC1
  IMAGE_VARIANT  : JAADANAZA
  QC_VERSION     : BOOT.BF.3.3-00104
--------------------------------------------------

SaharaBoot... Ok
Sending .................Ok
Connecting to Firehose...
Ping... Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8953
 Version : 1


Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 48 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

 
Phone Information.....
  Brand          : Condor
  Vendor         : SPA Condor Electronics
  Model          : Plume H1
  ID             : N2G47H
  SDK            : 25
  Release        : 7.1.2
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : msm8953_64-user 7.1.2 N2G47H 2578 release-keys
  Device         : SP620
  Board          : SP620
  Display ID     : N2G47H release-keys
  Security Patch : 2018-03-01
  Emmc_size      : 16GB
  Platform       : msm8953
  FRPPST         : /dev/block/bootdevice/by-name/config
  Fingerprint    : Condor/SP620/SP620:7.1.2/N2G47H/SP620_V11.0_20170925:user/release-keys


Backup Security partitions...
Reading Security Items....
 > modemst1
 > modemst2
 > fsg
 > fsc
C:\Hydra Tool\Backup\Security_Backup\Plume H1_SP620_7.1.2_Security_110922103608.sec
Backup Security Success....
Removing FRPta...
Method : 
Auto 
Processing... 
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:04
[/FONT][/B]
 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
761
مستوى التفاعل
525
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Redmi Note 10s FRP Remove

 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
761
مستوى التفاعل
525
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

LLD-L21 [ Honor 9 Lite ] Frp Remove






كود:
earching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                  Reading Device Information...               
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo...... 
  #hotainfo_len       : 
  #C_version          : 
  #D_version          : 
  #PLMN               : 
  #BoardID            : 
  #DeviceName         : 
Build number          : LLD-L21 9.1.0.189(C185E11R1P5)
Product Model         : LLD-L21
hwnff_ver             : Ver2.3
key_version           : huawei_key_v1
product               : hi6250
system_update_state   : 
vendorcountry         : hw/meafnaf
soc_id                : 0.5
ro_build_fingerprint  : 0.5
ro_build_version_full : 0.5
ro_build_version_qcom : 0.5
psid.........
  #SN                 : MKxxxxxxx
  #IMEI1              : 86xxxxxxx
  #IMEI2              : 86xxxxxx

Security Info....
 #Dongle_info         : 0.5
 #FB Lock State       : UNLOCKED
 #USER Lock State     : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing....Ok

Elapsed Time : 00:00:05
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A54 (CPH2239) Remove Password + FRP Without Data Lost



166878695545791.png


كود:
[B][FONT=Arial Black]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1633 (COM4)
 Device       :5&15c311e1&0&9
 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c311e1&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Trying to Open Port [COM4] Ok
Reading Partition Table .. 
ERAM Size: 0x000000000003A000-232 KB
IRAM Size: 0x0000000100000000-4 GB
EMMC Boot1 Size: 0x0000000000400000-4 MB
EMMC Boot2 Size: 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1EC00000-116.48 GB
EMMC CID       :  15010044563644414202C08ECC412895 - DV6DAB
HW-CODE         : 0x766
HWSUB-CODE      : 0x8A00
HW-VERSION      : 0xCA00
SW-VERSION      : 0x0
CHIP-EVOLUTION  : 0x0
DA-VERSION      :  1.0
Speed          : high-speed
Partition Count : 49
--------------- Reading build.prop content ---------------
  Brand          : OPPO
  Vendor         : OPPO
  Model          : oppoEffectModel
  Product        : oppo6765
  Manufacturer   : OPPO
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6765-user 10 QP1A.190711.020 bedd37e98646d3a1 release-keys
  Display ID     : QP1A.190711.020 release-keys
  Security Patch : 2021-10-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 
 IMEI2 : 
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
---------------------------
        Ultra Power    
---------------------------
Formatting Userdata : 
Operation : Safeformat Universal... Ok
Removing FRP : 
Operation : Uni_FMFRP_Erase Ok
Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!
[/FONT][/B]
 

ALICHAIMA

:: عضو محترف ::
إنضم
6 يناير 2016
المشاركات
975
مستوى التفاعل
639
النقاط
93
الإقامة
DZGSM
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

REDMI -9- FACTORY RESET DONE
p_2514utnsp1.png
p_2514xssbh2.png
 
أعلى