تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi Note 8 Flash Fastboot Done



161900214478341.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching Device By Fastboot
Device Found...

Reading Information...getvar:version FAILED (remote: GetVar Variable Not found)
Product    : ginkgo
version    : getvar:version FAILED (remote: GetVar Variable Not found)
Secure     : yes
Device Info: 
    Verity mode: true
    Device unlocked: true
    Device critical unlocked: true
    Charger screen enabled: true
--------------------------
Fastboot Flashing...
 -qupfw(qupv3fw.elf) Ok
 -qupfwbak(qupv3fw.elf) Ok
 -vbmeta(vbmeta.img) Ok
 -vbmetabak(vbmeta.img) Ok
 -xbl_config(xbl_config.elf) Ok
 -xbl_configbak(xbl_config.elf) Ok
 -devcfg(devcfg.mbn) Ok
 -devcfgbak(devcfg.mbn) Ok
 -storsec(storsec.mbn) Ok
 -rpm(rpm.mbn) Ok
 -rpmbak(rpm.mbn) Ok
 -hyp(hyp.mbn) Ok
 -hypbak(hyp.mbn) Ok
 -keymaster(km4.mbn) Ok
 -keymasterbak(km4.mbn) Ok
 -cmnlib(cmnlib.mbn) Ok
 -cmnlib64(cmnlib64.mbn) Ok
 -cmnlibbak(cmnlib.mbn) Ok
 -cmnlib64bak(cmnlib64.mbn) Ok
 -abl(abl.elf) Ok
 -ablbak(abl.elf) Ok
 -bluetooth(BTFM.bin) Ok
 -bluetoothbak(BTFM.bin) Ok
 -imagefv(imagefv.elf) Ok
 -imagefvbak(imagefv.elf) Ok
 -uefisecapp(uefi_sec.mbn) Ok
 -uefisecappbak(uefi_sec.mbn) Ok
 -xbl(xbl.elf) Ok
 -xblbak(xbl.elf) Ok
 -tz(tz.mbn) Ok
 -tzbak(tz.mbn) Ok
 -logfs(logfs_ufs_8mb.bin) Ok
 -metadata(metadata.img) Ok
 -dtbo(dtbo.img) Ok
 -dtbobak(dtbo.img) Ok
 -dsp(dspso.bin) Ok
 -dspbak(dspso.bin) Ok
 -persist(persist.img) Skipped
 -boot(boot.img) Ok
 -bootbak(boot.img) Ok
 -recovery(recovery.img) Ok
 -modem(NON-HLOS.bin) Ok
 -modembak(NON-HLOS.bin) Ok
 -cache(cache.img) Ok
 -cust(cust.img) Ok
 -vendor(vendor.img) Ok
 -system(system.img) Ok
 -userdata(userdata.img) Ok
All Done
--------------------------

Elapsed Time : 00:04:36
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

STREAM HT16 Ultra Power Option



161901895115211.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : STREAM Model : HT16 Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM4]

TPortConnection.Create...(COM4)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 6580 (0000)MT6580[6580]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 6580 (0000)MT6580[6580]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00001002
 FUSEID         : 00001002
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   :  [Not Exist]
Trying Default 6580.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID   : 7001005432323730380116974AEDA5AF
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000001C8000000 -7,125 GB
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : BF170135A8CBA8691A29ACA5DF1A9C78
eMMC CID   : 540001703037323297160138AFA5ED4A
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM5]


Reading Partition Table
SIZE[0x00000948] 27 Items > Done

Reading System Info
  Brand          : STREAM
  Vendor         : STREAM
  Model          : HT16
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_k80_bsp-user 8.1.0 O11019 1545741812 release-keys
  Device         : HT16
  Security Patch : 2018-12-05
  Fingerprint    : STREAM/HT16/HT16:8.1.0/O11019/1545741812:user/release-keys
  StorageType    : mtp
  Userdata State : Not Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_k80_bsp.bin
   Creating Scatter file... C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\STREAM_HT16_6580--8.1.0__210421160821\MT6580_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x1F800000] 1024 KB -> frp.bin...Ok
 -nvdata[0x20300000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\STREAM_HT16_6580--8.1.0__210421160821
MTK Phone Loader is NOW RUNNING.


Reading System Info
  Brand          : STREAM
  Vendor         : STREAM
  Model          : HT16
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_k80_bsp-user 8.1.0 O11019 1545741812 release-keys
  Device         : HT16
  Security Patch : 2018-12-05
  Fingerprint    : STREAM/HT16/HT16:8.1.0/O11019/1545741812:user/release-keys
  StorageType    : mtp
  Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:09
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi 9 FRP Remove



161927395611521.png


كود:
[B][FONT=Arial Black][SIZE=2]=====================================
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM38)
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&944c330&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0707MT6768[6768]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 getMTKPayloadExploit : 0707
 #Executing Exploit..
 #SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0707MT6768[6768]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 SECURE VERSION : 05 
 BL VERSION     : FE 
 BR Secured     : E0

Preparing Download Agent..
 DA   : MT6768_Xiaomi_New.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing preloader_lancelot.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 3C95DA307E901455A3BF665ED4939262
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29,121 GB
 eMMC CID   : 150100444436384D420991F9F4FA67D5 - DD68MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_lancelot.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__042421150927\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__042421150927
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 3C95DA307E901455A3BF665ED4939262
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29,121 GB
 eMMC CID   : 150100444436384D420991F9F4FA67D5 - DD68MB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:12
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Alcatel OT-5010U (Pixi 4-5) FRP Remove



161934244918861.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : ALCATEL [TCL] Model : OT-5010U (Pixi 4-5) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM4]

TPortConnection.Create...(COM4)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 6580 (0000)MT6580[6580]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 6580 (0000)MT6580[6580]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 FUSEID         : 00000000
 SECURE VERSION : FF 
 BL VERSION     : 01 
 BR Secured     : 00

Preparing Download Agent..
 DA   : [Not Exist]
Trying Default 6580.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID   : 150100463732324D420044E190E053E1
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000080000 -512 KB
eMMC USER  : 0x00000001D2000000 -7,281 GB
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 0CF6ED128C6A579F4D2A93BFB069503F
eMMC CID   : 460001154D323237E1440042E153E090
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM5]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_pixi4_5.bin
   Creating Scatter file... C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\__6580--__250421101114\MT6580_Android_scatter.txt
 -nvram[0x00E80000] 5 MB -> nvram.bin...Ok
 -frp[0x09000000] 8 MB -> frp.bin...Ok
 -nvdata[0x09800000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\__6580--__250421101114
MTK Phone Loader is NOW RUNNING.


Reading System Info

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:33
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

C-idea CM800 Remove Lock Without Data Loss
ازالة النمط (شيما) بدون ضياع البيانات



161935559962291.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok


Reading System Info
  Brand          : alps
  Vendor         : alps
  Model          : CM800
  ID             : LRX21M
  SDK            : 21
  Release        : 6.1
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : full_b906-user 5.1 LRX21M 1575957105 test-keys
  Device         : CM800
  Display ID     : LRX21M test-keys
  Platform       : mt6582
  Fingerprint    : alps/full_b906/b906:5.1/LRX21M/1575957105:user/test-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Remove Lock Without Data Loss
Processing...
Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok].. [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:04
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A71 (2018) CPH1801 Format Userdata By HydraTool



161951959053121.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 Brand : OPPO Model : A71 (2018) CPH1801 Storage : Auto
 Loader: a71_firehose.bin
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM20)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

0x2011F9DC
Getting device info......
Serial No.: 0x2080D522
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
PBL Ver : 00000000
PK HASH : 05F06BA44EEB2ABDF14BB644AABC2E69
3DDF7B8711CC7CF07D4CD0EB2E1A8728

Firehose Loader[a71_firehose.bin]
SaharaBoot... Ok
Sending ..................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
<?xml version="1.0" encoding="UTF-8" ?><data><log value="logbuf@0x0806CD20 fh@0x08069B88" /></data>.
<?xml version="1.0" encoding="UTF-8" ?><data><response value="ACK" MinVersionSupported="1" MemoryName="eMMC" MaxPayloadSizeFromTargetInBytes="4096" MaxPayloadSizeToTargetInBytes="1048576" MaxPayloadSizeToTargetInBytesSupported="1048576" MaxXMLSizeInBytes="4096" Version="1" TargetName="8953" /></data>.
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

Protocol : Universal
Running : Ok
Processing A71 Format Userdata....
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:04
[/SIZE][/FONT][/B]
 
التعديل الأخير:

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi Note 9 Ultra Power Option



161997398103621.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM38)
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&944c330&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0707MT6768[6768]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 getMTKPayloadExploit : 0707
 #Executing Exploit..
 #SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0707MT6768[6768]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 SECURE VERSION : 05 
 BL VERSION     : FE 
 BR Secured     : E0

Preparing Download Agent..
 DA   : MT6768_Xiaomi_New.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing preloader_merlin.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : B267EB411777C40E7CE767D3147026D9
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58,242 GB
 eMMC CID   : 13014E53304A394A38101EAFCF3E77C3 - S0J9J8

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_merlin.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__050221173452\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__050221173452
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : B267EB411777C40E7CE767D3147026D9
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58,242 GB
 eMMC CID   : 13014E53304A394A38101EAFCF3E77C3 - S0J9J8

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
[COLOR="#008000"]Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal... Ok
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:44
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Lenovo C2 (K10a40) Remove Lock Without Data Loss



16200389491981.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : LENOVO Model : K10a40 (Lenovo C2) Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL +
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM4]

TPortConnection.Create...(COM4)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0335 (0000)MT6737[6735]
 BROM HW_SW_VER : 8A00 CB00 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 0335 (0000)MT6737[6735]
 BROM HW_SW_VER : 8A00 CB00 0000 0000 
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 01
NORMAL BOOT

Preparing Download Agent..
 DA   : 6735_SWSEC_Lenovo_3.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.00.00
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
00000000000000000000
PRMMCCID   : 460001154D3232377C890042658E39D6
Init Configuration
Running DA 4.2 on BBID : 0x93 Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000080000 -512 KB
eMMC USER  : 0x00000001D2000000 -7,281 GB
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : CDD0FC3DCAFE19F4C9E5085B62911777
eMMC CID   : 460001154D3232377C890042658339D6
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM5]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
  Brand          : Lenovo
  Vendor         : LENOVO
  Model          : Lenovo K10a40
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_lcsh6735m_35u_m-user 6.0 MRA58K 1472611130 release-keys
  Device         : K10a40
  Display ID     : K10a40_S003_160809_ROW_DJEZZY
  Security Patch : 2016-09-05
  Platform       : mt6735m
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : Lenovo/K10a40/K10a40:6.0/MRA58K/K10a40_S003_160831_ROW_DJEZZY:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_lcsh6735m_35u_m.bin
   Creating Scatter file... C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\Lenovo_Lenovo K10a40_0335-mt6735m-6.0_K10a40_S003_160809_ROW_DJEZZY_030521114015\MT6737_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x06A00000] 1024 KB -> frp.bin...Ok
 -nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\Lenovo_Lenovo K10a40_0335-mt6735m-6.0_K10a40_S003_160809_ROW_DJEZZY_030521114015
MTK Phone Loader is NOW RUNNING.

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:19
[/SIZE][/FONT][/B]


162003894947162.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : LENOVO Model : K10a40 (Lenovo C2) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok


Reading System Info
  Brand          : Lenovo
  Vendor         : LENOVO
  Model          : Lenovo K10a40
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_lcsh6735m_35u_m-user 6.0 MRA58K 1472611130 release-keys
  Device         : K10a40
  Display ID     : K10a40_S003_160809_ROW_DJEZZY
  Security Patch : 2016-09-05
  Platform       : mt6735m
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : Lenovo/K10a40/K10a40:6.0/MRA58K/K10a40_S003_160831_ROW_DJEZZY:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
[COLOR="#008000"]Operation : Remove Lock Without Data Loss
Processing...
Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok].. [Ok] Ok
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:04
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor P8 Lite [PGN-610] Ultra Power Option



16202977883771.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :DA_HIGHSPEED_VCOM
 FriendlyName :MediaTek DA USB VCOM (Android) (COM5)
 SymbolicName :\??\USB#VID_0E8D&PID_2001#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0



Reading System Info
  Brand          : condor
  Vendor         : SPA Condor Electronics
  Model          : PGN610
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gnsz6737t_66_n-user 7.0 NRD90M 1535626513 release-keys
  Device         : PGN610
  Board          : PGN610
  Display ID     : PGN610
  Security Patch : 2018-08-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN610/PGN610:7.0/NRD90M/1535626513:user/release-keys
  StorageType    : mtp
  Userdata State : Not Encrypted

-------------------------------------
[COLOR="#FF0000"]Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Safeformat Universal...(tmp.bin)512 Bytes Ok Ok
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A33F (Neo 7) Read Pattern Code



162039247148891.png


كود:
[B][FONT=Arial Black][SIZE=2]
PreOperation Configuration 
 Brand : OPPO Model : A33F (Neo 7) Storage : Auto
 Loader: 8916.mbn
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/04/2013,2.1.0.5

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8916
 Version : 1


Protocol : Universal
Running : Ok
 
Phone Information.....
  Brand          : OPPO
  Vendor         : OPPO
  Model          : A33f
  ID             : LMY47V
  SDK            : 22
  Release        : 5.1.1
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : msm8916_32-user 5.1.1 LMY47V eng.root.20170531 release-keys
  Device         : A33
  Board          : msm8916
  Display ID     : A33fEX_11_170531
  Security Patch : 2017-04-01
  Platform       : msm8916
  FRPPST         : /dev/block/bootdevice/by-name/config

Reading GPT[3]
          Drive [0] 40 Items
          Drive [1] 0 Items
          Drive [2] 4 Items

Operation : ScreenLock Security
Read Pattern 
Processing... 
Trying to search : gatekeeper.pattern.key
Trying to search :  personalpattern.key
Trying to search : cm_gesture.key
Trying to search : gesture.key FOUND
Gesture Data : 0AE21E5011AC665E93189D7700251654222C5A78
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 14752369
1 2 3
4 5 6
7 8 9


Ok

Elapsed Time : 00:00:05[/SIZE][/FONT][/B]
 
التعديل الأخير:

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor P8 Lite (PGN-610) Flash system.img Partition Done


162046434549291.png


BOOT/INFO

162046434578912.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Redmi Note 8 (ginkgo) No Service
Fixed Writing Selected Partitions persist from firmware BY HYDRA TOOL

162072687495641.png


162072687518912.png


كود:
[B][FONT=Arial Black][SIZE=2]
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :03/19/2014,2.1.1.2

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping..................... Ok 
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 
 MaxXMLSizeInBytes : 4096
 TargetName : 
 Version : 1
 DateTime : Jul  3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 19
Serial Number       : 444241469
Firmware Version    : 4
Product Name        : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  32768[16 MB]

Protocol : UniversalOk
 
Phone Information......
  Brand          : xiaomi
  Vendor         : Xiaomi
  Model          : Redmi Note 8
  ID             : PKQ1.190616.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : ginkgo-user 9 PKQ1.190616.001 V11.0.9.0.PCOMIXM release-keys
  Miui Ver       : V11
  Device         : ginkgo
  Mod_device     : ginkgo_global
  Display ID     : PKQ1.190616.001
  Security Patch : 2020-05-01
  Fingerprint    : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.9.0.PCOMIXM:user/release-keys

Reading GPT[4]
          Drive [0] 88 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 

[COLOR="#FF0000"]Writing Selected Partitions 
 > persist Ok
Done!
[/COLOR]
Elapsed Time : 00:00:18
[/SIZE][/FONT][/B]

162072687527983.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Plume L3 SP625
Dump Preloader Flash Init + Format/Erase FRP


Dump Preloader Flash Init


162107393664291.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM10)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok
Reading Device hardware info..
 hw code       : 0699
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E5
 SB            : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)

Exploiting BROM...
Successfully Exploited..
Reading Flash Init...
Flash init Size 0x02A4
Done!!!
----------------------------------------------------------
C:\Hydra Tool\Backup\Prel_FlashInit\0699_preloader_k39tv1_64_bsp_12D2D3FA78.bin
----------------------------------------------------------
[/SIZE][/FONT][/B]

Format/Erase FRP

162107393685092.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM10)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0699MT6739 [6739]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E5
 SB            : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)

Exploiting Device...
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0699MT6739 [6739]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SB            : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : FE 
 NORMAL BOOT

Preparing Download Agent..
 DA   : [Not Exist]
Trying Default 6739.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing 0699_preloader_k39tv1_64_bsp_12D2D3FA78.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 376586D07153CD86069C5F4D3E8CB3E0
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x00000000C0000000 -3 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29,121 GB
 eMMC CID   : 150100474436424D42018D7C979525DF - GD6BMB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
  Brand          : Condor
  Vendor         : SPA Condor Electronics
  Model          : Plume L3
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k39tv1_64_bsp-user 8.1.0 O11019 1523506141 release-keys
  Device         : Plume_L3
  Board          : CSW1705A
  Display ID     : Plume_L3
  Security Patch : 2018-05-05
  Fingerprint    : Condor/Plume_L3/Plume_L3:8.1.0/O11019/1523506141:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_k39tv1_64_bsp.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0699_Condor_Plume_L3_Plume_L3_8.1.0_O11019_1523506141_051521111252\MT6739_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x02D88000]1024 KB ->frp.bin...Ok
-nvdata[0x03688000]32 MB ->nvdata.bin...Ok
-persist[0x09000000]48 MB ->persist.bin...Ok
-nvram[0x13780000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0699_Condor_Plume_L3_Plume_L3_8.1.0_O11019_1523506141_051521111252
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 376586D07153CD86069C5F4D3E8CB3E0
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x00000000C0000000 -3 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29,121 GB
 eMMC CID   : 150100474436424D42018D7C979525DF - GD6BMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : Condor
  Vendor         : SPA Condor Electronics
  Model          : Plume L3
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k39tv1_64_bsp-user 8.1.0 O11019 1523506141 release-keys
  Device         : Plume_L3
  Board          : CSW1705A
  Display ID     : Plume_L3
  Security Patch : 2018-05-05
  Fingerprint    : Condor/Plume_L3/Plume_L3:8.1.0/O11019/1523506141:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Format/Erase
Processing...
Erasing FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:50
[/SIZE][/FONT][/B]
 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
761
مستوى التفاعل
525
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi 6A FRP removed

 

tontonflach

عضو نشط
إنضم
1 أكتوبر 2013
المشاركات
73
مستوى التفاعل
72
النقاط
0
الإقامة
BALLOTE
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

redmi 9a frp success remove



كود:
Hydra MediaTeK Tool  Ver 1.0.3 Build 39
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
Pentium(R) Dual-Core  CPU      E5400  @ 2.70GHz
Intel(R) G33/G31 Express Chipset Family
Ram Installed : 2 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial     : 201000009103
Initialize : OKAY
Status     : Activated
Life       : 0 [0-0-0-0-0]


=====================================
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM23)
 Device       :5&94b8c27&0&3
 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&94b8c27&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E7
 SB            : 01 (True)
 SLA           : 02 (True)
 DAA           : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SB            : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : FE 
 NORMAL BOOT

Preparing Download Agent..
 DA   : 6765_Xiaomi_wb.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020/03/17.ةدخ_10:04_497508
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing preloader_redmi9a_Hydra_V2.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : D17ABAB06EC4B54FFD8D9BC88019F157
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29,121 GB
 eMMC CID   : 150100424A54443452097190FA948743 - BJTD4R

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_k62v1_64_bsp.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__051821202738\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x3BD88000]1024 KB ->frp.bin...Ok
-nvdata[0x3DE88000]64 MB ->nvdata.bin...Ok
-protect1[0x45522000]8 MB ->protect1.bin...Ok
-protect2[0x45D22000]10,867 MB ->protect2.bin...Ok
-persist[0x47000000]48 MB ->persist.bin...Ok
-nvram[0x52E80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__051821202738
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : D17ABAB06EC4B54FFD8D9BC88019F157
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29,121 GB
 eMMC CID   : 150100424A54443452097190FA948743 - BJTD4R

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Elapsed Time : 00:00:58

:clapping::clapping::strongly::strongly::clap:
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Kiowa S5 Cristal Ulta Power (FRP+Factory Reset)



162144562211271.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Oppo A15 (CPH2185) Ultra Power Option
(FRP+Factory Reset)



162162020172271.png


كود:
[B][B][FONT=Arial Black][SIZE=2]=====================================
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM10)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E5
 SB            : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SB            : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 FUSEID         : 00000000
 SECURE VERSION : 05 
 BL VERSION     : FE 
 NORMAL BOOT

Preparing Download Agent..
 DA   :  [Not Exist]
Trying Default 6765.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020/03/17.ÉIIç10:04_497508
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing A15s_preloader_oppo6765.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 61B069BCE2498712BE2ACF0B95FBD285
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29,121 GB
 eMMC CID   : 1501003458364B4D42035C3BD488A747 - 4X6KMB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_oppo6765.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__052121185538\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x15088000]1024 KB ->frp.bin...Ok
-nvdata[0x17188000]64 MB ->nvdata.bin...Ok
-protect1[0x1E822000]8 MB ->protect1.bin...Ok
-protect2[0x1F022000]15,867 MB ->protect2.bin...Ok
-persist[0x20800000]48 MB ->persist.bin...Ok
-nvram[0x2C600000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__052121185538
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 61B069BCE2498712BE2ACF0B95FBD285
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29,121 GB
 eMMC CID   : 1501003458364B4D42035C3BD488A747 - 4X6KMB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:46
[/SIZE][/FONT][/B][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Brandt BPRIME ZeroWipe FRP Partition



162162177103041.png


كود:
[B][FONT=Arial Black][SIZE=2]=====================================
Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
ERROR : ACK : 0x00010009[]

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : Brandt
  Vendor         : Brandt
  Model          : BPRIME
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-DZ
  Description    : full_d3966_2g-user 8.1.0 O11019 1540283952 release-keys
  Device         : BPRIME
  Display ID     : BTA57H8S_V1.03
  Security Patch : 2018-10-05
  Fingerprint    : Brandt/BPRIME/BPRIME:8.1.0/O11019/1540283952:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
761
مستوى التفاعل
525
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

oppo A31 cph1205 reset user data



كود:
=====================================
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1633 (COM11)
 Device       :7&f1a6710&0&4
 SymbolicName :\??\USB#VID_0E8D&PID_0003#7&f1a6710&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E5
 SB            : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SB            : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : FE 
 NORMAL BOOT

Preparing Download Agent..
 DA   :  [Not Exist]
Trying Default 6765.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing preloader_oppo6765_19581.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : CE468EE4F698EF58067BFA546410A700
 ERAM Size  : 0x000000000003A000 -232 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58.242 GB
 eMMC CID   : 90014A68433961503301C26058E477AF - hC9aP3

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
  Vendor         : OPPO
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6765_19581-user 9 PPR1.180610.011 eng.root.20210309.210105 release-keys
  Security Patch : 2021-03-05
  StorageType    : mtp
  Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_oppo6765_19581.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__052221002024\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x0BE88000]1024 KB ->frp.bin...Ok
-nvdata[0x0DF88000]64 MB ->nvdata.bin...Ok
-protect1[0x13F88000]8 MB ->protect1.bin...Ok
-protect2[0x14788000]8.469 MB ->protect2.bin...Ok
-persist[0x15800000]48 MB ->persist.bin...Ok
-nvram[0x21600000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__052221002024
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : CE468EE4F698EF58067BFA546410A700
 ERAM Size  : 0x000000000003A000 -232 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58.242 GB
 eMMC CID   : 90014A68433961503301C26058E477AF - hC9aP3

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Vendor         : OPPO
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6765_19581-user 9 PPR1.180610.011 eng.root.20210309.210105 release-keys
  Security Patch : 2021-03-05
  StorageType    : mtp
  Userdata State : Not Encrypted

-------------------------------------
Operation : Erase Userdata
Processing...
Erasing FRP Partition...
Formatting Userdata... Ok

Elapsed Time : 00:00:50
 
التعديل الأخير:

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Doogee VOYAGER2 (DG310) Test EMMC ReadWrite



162168786546911.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 6582MT6582 [6582]
 hw subcode    : 8A00
 hw version    : CB00
 sw version    : 0001
 Target config : 00
 SB            : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 FUSEID         : 80030000
 SECURE VERSION : FF 
 BL VERSION     : 01 

Preparing Download Agent..
 DA   : 6582.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old
C4 - eMMC
0005
00000000000000000000
PRMMCCID   : 90014A4838473165050764A1CCBA9257
Init Configuration
Running DA 4.2 on BBID : 0x87 Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000001D2000000 -7,281 GB
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : BB46B8066263B7C7352A37905371718E
eMMC CID   : 484A019065314738A16407055792BACC
Change to HIGH SPEED...
5A
Searching for MTK Device...Found
 Port Identification :DA_HIGHSPEED_VCOM
 FriendlyName :MediaTek DA USB VCOM (Android) (COM5)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2001#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Partition Table
SIZE[0x000007E0] 21 Items > Done

Reading System Info
  Brand          : DOOGEE
  Vendor         : DOOGEE
  Model          : VOYAGER2_DG310
  ID             : LRX21M
  SDK            : 21
  Release        : 5.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : VOYAGER2_DG310-user 5.0 LRX21M 1444964272 release-keys
  Device         : VOYAGER2_DG310
  Board          : dg_82
  Display ID     : DOOGEE-VOYAGER2_DG310-Android5.0-V35-20151016
  Platform       : mt6582
  Fingerprint    : DOOGEE/VOYAGER2_DG310/VOYAGER2_DG310:5.0/LRX21M/1444964272:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

Autobackup Partitions
 -PRELOADER[0x00000000] 512 KB -> PRELOADER.bin...Ok
   -> Renaming Preloader....  preloader_dg_82.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\6582_DOOGEE_VOYAGER2_DG310_VOYAGER2_DG310_5.0_LRX21M_1444964272_052221134335\MT6582_Android_scatter.txt
 -NVRAM[0x01800000] 5 MB -> NVRAM.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\6582_DOOGEE_VOYAGER2_DG310_VOYAGER2_DG310_5.0_LRX21M_1444964272_052221134335
MTK Phone Loader is NOW RUNNING.


Reading System Info
  Brand          : DOOGEE
  Vendor         : DOOGEE
  Model          : VOYAGER2_DG310
  ID             : LRX21M
  SDK            : 21
  Release        : 5.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : VOYAGER2_DG310-user 5.0 LRX21M 1444964272 release-keys
  Device         : VOYAGER2_DG310
  Board          : dg_82
  Display ID     : DOOGEE-VOYAGER2_DG310-Android5.0-V35-20151016
  Platform       : mt6582
  Fingerprint    : DOOGEE/VOYAGER2_DG310/VOYAGER2_DG310:5.0/LRX21M/1444964272:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
[COLOR="#FF0000"]Operation : ReadWrite Test
Processing... [Ok]
Verifying read write... [COLOR="#008000"][Ok] Ok[/COLOR]
[/COLOR]
Elapsed Time : 00:00:29
[/SIZE][/FONT][/B]
 
أعلى