تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

ممكن فك تشفير
modem 4g b311-221
 

HUAWEI Y7 2019 (DUB-LX1) Pattern/FRP Remove done


2024-02-14_200207.png
2024-02-14_200729.png
 

المرفقات

  • 2024-02-14_200729.png
    2024-02-14_200729.png
    58.7 KB · المشاهدات: 3
السلام عليكم

frp / rmx 3760 بووت للهاتف أولا ثم حذف الحماية مباشرة
أزرار الصوت معًا :

1.JPG

2.JPG


الله الموفق.
 

SECURITY PATCH 5_9_2024

INFINIX SMART 8 PLUS X6526
FRP REMOVE
MTP MODE


2.jpg
 

المرفقات

  • 1.jpg
    1.jpg
    151.1 KB · المشاهدات: 1

Xiaomi Redmi 9A (M2006C3LG) Factory Reset



Untitled1.png

كود:
Hydra Tool  Ver 2025.2.5.2
Windows 10 (Version 22H2, OS Build 19045.5440, 64-bit Edition)
Intel(R) Core(TM)2 Duo CPU     E7500  @ 2.93GHz
AMD Radeon HD 5450
Ram Installed : 4 GB
Windows Access Right : Admin
Software Run As Admnistrator

******* Dongle Info *******
Version    : Hydra Tool v 2.0
Serial     : 220300024327
Initialize : OKAY
Status     : Activated
Life       : 0 [0-0-0-0-0]

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                      Service Function
              Format/Factory Reset/ScreenLock
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM
  FriendlyName    : MediaTek USB Port (COM281)
  Device          : /5&21e739f&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&21e739f&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/01/2021,1.0.0.0
  Service         : usbser [Slow Driver] *Please Update Driver


Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  SOC_ID          : FEEE97281FD287A7C0236B410CC29547E0FBD169916AC5BBB782345DB0E0BB8D
  Connection      : BROM
  Target config   : E7
  SBC             : 01 (True)
  SLA             : 02 (True)
  DAA             : 04 (True)
  SWJTAG          : 06 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  ME_ID           : 152298F0894C3B342521C0C9D0638160

Exploiting Device...
Successfully Exploited..

Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00039704
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_k62v1_64_bsp.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..
Preparing Download Agent..[MTK_DA_V5.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok.... 0xC0
Successfully received DA sync
DAPubKVendor_InfinixV5
  ONNECTION_AGENT : brom
  DRAM config needed for : 9B01005932503033
Sending auto preloader from dump...  [preloader_k62v1_64_bsp_E1626EE4E5.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Error:  on sending data: DA hash mismatch
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
DA SLA Disabled..
Executing DA Ext Method 1
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Device Chip Info...
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 9B010059325030333200CB5438E389EB - Y2P032
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed

Reading Partition Table ..
  Partition Count : 46

Reading Phone Info...
  Brand          : Redmi
  Vendor         : Xiaomi
  Model          : M2006C3LG
  Product        : dandelion
  Manufacturer   : Xiaomi
  Marketname   : ro.product.systemRedmi 9A
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : dandelion-user 11 RP1A.200720.011 V12.5.7.0.RCDEUXM release-keys
  Miui Ver       : V125
  Device         : dandelion
  Display ID     : RP1A.200720.011
  Security Patch : 2022-11-01
  Fingerprint    : Redmi/dandelion_eea/dandelion:11/RP1A.200720.011/V12.5.7.0.RCDEUXM:user/release-keys
  StorageType    : mtp

Reading IMEI........
 IMEI1 [nvdata-CSSD_000] : 86***********44
 IMEI2 [nvdata-CSSD_000] : 86***********51
 IMEI1 [nvdata-LD0B_001] : 86***********44
 IMEI2 [nvdata-LD0B_001] : 86***********51
 IMEI1 : 86***********44
 IMEI2 : 86***********51
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_k62v1_64_bsp.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_152298F0894C3B342521C0C9D0638160\Auto\020925144218\0766_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 10.867 MB                   = Ok
 - persist(persist.bin), 48 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 2 MB                                    = Ok
 - flashinfo(flashinfo.bin), 16 MB                     = Ok
Backup Done!!!
------------------------------
   Factory Reset Flash Mode.. 
------------------------------
Operation : Safeformat Universal...

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:02:54
 
عودة
أعلى