تجارب الاعضاء فى تفليش وعمل ريبير وفك الشفرة على NckBox

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113
Condor Allure M3 Lite Reset FRP


Allure M3 Lite.png

كود:
[Reset FRP]
Waiting for device...Found
Port Info    :    MediaTek USB Port_V1633 (COM46) [\\?\usb#vid_0e8d&pid_0003#5&21e739f&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
     :    MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
     :    BROM PORT
Hw ID    :    MT6765 [0766] Helio P35/G35
Details    :    8A00,CA00,0000
Sec. Cfg    :    [SBA Active] [SLA Inactive] [DAA Active]
MEID    :    767256725AE2F5C806BB26BE0E6A192A
SoC ID[0]    :    EFF20E08AAF1051AE246A877B0A772BC
SoC ID[1]    :    97EA2B3CABE3E5B92A0E73EE5480368A
Executing Exploit...Done
Reading Preloader...OK
Saved as    :    preloader_k62v1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Cfg    :    [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection    :    brom
Speed    :    HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID    :    150100474436424D4201F016CE4D2519
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
Int. RAM    :    0x0000000000038000 [224.00 KB]
Ext. RAM    :    0x00000000C0000000 [3.00 GB]
Flash ID    :    GD6BMB
CID    :    150100474436424D4201F016CE4D2519
BOOT1    :    0x0000000000400000 [4.00 MB]
BOOT2    :    0x0000000000400000 [4.00 MB]
RPMB    :    0x0000000000400000 [4.00 MB]
USERAREA    :    0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
Brand    :    Condor
Manufacturer    :    SPA Condor Electronics
Model    :    Allure M3 Lite
Device    :    Allure_M3_Lite
And. Ver.    :    8.1.0
Prod. Name    :    Allure_M3_Lite
Build Dt.    :    Wed Apr 17 18:41:20 CST 2019
Display ID    :    Allure_M3_Lite
Ver. Inc.    :    1555497684
Locale    :    en-US
Patch    :    2019-04-05
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.0]
LOG TXT    :    20240225_155611.txt
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113
Xiaomi Redmi A2+ Reset FRP


Redmi A2+.png

كود:
[Reset FRP]
Waiting for device...Found
Port Info    :    MediaTek USB Port_V1633 (COM112) [\\?\usb#vid_0e8d&pid_0003#5&21e739f&0&4#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
     :    MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
     :    BROM PORT
Hw ID    :    MT6765 [0766] Helio P35/G35
Details    :    8A00,CA00,0000
Sec. Cfg    :    [SBA Active] [SLA Active] [DAA Active]
MEID    :    BA69F8B92985798AE266298E286D9377
SoC ID[0]    :    EC599B2A9FC36C0EDCA5C9FF52B50BF2
SoC ID[1]    :    BB259D51433922BC0A334404CCAAFDEA
Executing Exploit...Done
Reading Preloader...OK
Saved as    :    preloader_water.bin
Loading EMI Config from Preloader...OK
Sec. Cfg    :    [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection    :    brom
Speed    :    HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID    :    9B0100593250303332004AFB224F9923
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
Int. RAM    :    0x0000000000038000 [224.00 KB]
Ext. RAM    :    0x0000000080000000 [2.00 GB]
Flash ID    :    Y2P032
CID    :    9B0100593250303332004AFB224F9923
BOOT1    :    0x0000000000400000 [4.00 MB]
BOOT2    :    0x0000000000400000 [4.00 MB]
RPMB    :    0x0000000001000000 [16.00 MB]
USERAREA    :    0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.0]
LOG TXT    :    20240227_174354.txt
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113
Oppo A94 (cph2203) Reset FRP

Untitled.png

كود:
[Reset FRP]
Waiting for device...Found
Port Info    :    MediaTek USB Port_V1633 (COM46) [\\?\usb#vid_0e8d&pid_0003#5&21e739f&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
     :    MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
     :    BROM PORT
Hw ID    :    MT6779 [0725] Helio P90 k79v1
Details    :    8A00,CA01,0000
Sec. Cfg    :    [SBA Active] [SLA Inactive] [DAA Active]
MEID    :    09A4A795C4574229B834422C386F1B20
SoC ID[0]    :    13EFBBB00EE529895D2C63496217EA58
SoC ID[1]    :    BA33B7C73A6D927BED3A7E43E61B28B0
Executing Exploit...Done
Reading Preloader...OK
Saved as    :    preloader_k79v1_64.bin
Loading EMI Config from Preloader...OK
Sec. Cfg    :    [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection    :    brom
Speed    :    HIGH-SPEED
Reading EMI Configuration...OK
UFS CID    :    CE014B4D3856383030314A4D2D423831
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
Int. RAM    :    0x0000000000080000 [512.00 KB]
Ext. RAM    :    0x0000000200000000 [8.00 GB]
Flash ID    :    KM8V8001JM-B81
CID    :    CE014B4D3856383030314A4D2D423831
BOOT1    :    0x0000000000400000 [4.00 MB]
BOOT2    :    0x0000000000400000 [4.00 MB]
RPMB    :    0x0000000000400000 [4.00 MB]
USERAREA    :    0x0000001DCB000000 [119.17 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.0]
LOG TXT    :    20240302_154246.txt
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113
Realme C11 (2021) Wipe Userdata(misc) & Erase FRP


Untitled.png

Untitled1.png

كود:
First 16 bytes from public rsa key.
D1F7C96DA0D8B4E54A27307039E61823
***************
Phone Storage: EMMC
SELECTED: RMX3231
ACTION: Wipe Userdata(misc)
Loader format:NEW
Start Detect phone.
Phone must be off(you can service this phone without battery also).
Long press "VOL -"+ "VOL +" key while inserting usb cable.
Keep key untill boot complete.
Detected: SPRD U2S Diag (COM133)
Sending loader, keep boot key untill loader start.
Loader send OK
Changing bautrate OK.
Send Second Loader.
Length RSA: 256
RET RSA: 256
Rsa autorization: Tecno S6301 - success
New flash metod detected.
FileSystem: EMMC
Read partition info is supported by loader.
Build product name: RMX3231
Build description: RMX3231-user 11 RP1A.201005.001 464 release-keys
Build Id: RP1A.201005.001
Android Release: 11
Android Version: RMX3231_11.A.121
Security patch: 2023-12-05
[misc]Formating userdata, wait...
[can take 0-10 sec]Wait untill phone restart.
Exe version: Unisoc Module 2.2.8
Log saved:
C:\nckdongle\spreadtrum_module\spreadtrum_module_backup_folder\Saved_Logs\RMX3231_11_A_121_format_userdata_misc.txt
Total Time: 00:00:22
Done.

كود:
First 16 bytes from public rsa key.
D1F7C96DA0D8B4E54A27307039E61823
***************
Phone Storage: EMMC
SELECTED: RMX3231
ACTION: Erase FRP
Loader format:NEW
Start Detect phone.
Phone must be off(you can service this phone without battery also).
Long press "VOL -"+ "VOL +" key while inserting usb cable.
Keep key untill boot complete.
Detected: SPRD U2S Diag (COM133)
Sending loader, keep boot key untill loader start.
Loader send OK
Changing bautrate OK.
Send Second Loader.
Length RSA: 256
RET RSA: 256
Rsa autorization: Tecno S6301 - success
New flash metod detected.
FileSystem: EMMC
Read partition info is supported by loader.
***************
[S]Manufacturer: realme
[S]Brand: realme
[S]Device: RMX3231
[S]Model: RMX3231
Build ID: RP1A.201005.001
CPU arhitecture: armeabi-v7a
Build product name: RMX3231
Build description: RMX3231-user 11 RP1A.201005.001 464 release-keys
Build Id: RP1A.201005.001
Android Release: 11
Android Version: RMX3231_11.A.121
Security patch: 2023-12-05
CPU NAME: SC9863A
Removing frp, wait...
[1]FRP: persist
Format OK.
[can take 0-10 sec]Wait untill phone restart.
Exe version: Unisoc Module 2.2.8
Log saved:
C:\nckdongle\spreadtrum_module\spreadtrum_module_backup_folder\Saved_Logs\realme_RMX3231_11_A_121_erase_frp.txt
Total Time: 00:00:23
Done.
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113

Realme C31 (RMX3501) Wipe Userdata(misc) + Erase FRP



Untitled.png

Untitled1.png

كود:
SELECTED: RMX3501
ACTION: Wipe Userdata(misc)
Start Detect phone...
Phone must be off with battery inside.
Long press "VOL -" key and insert usb cable.
For some phones need to
Long press "VOL -"+ "VOL +" key and insert usb cable.
Detected: SPRD U2S Diag (COM133)
Sending payload, keep boot key untill loader start.
Exploiting phone.....
Sending preloader 1
Sending preloader 2
Sending FDL 1.....
Sending FDL 2.....
New flash metod detected.
[5f] 741888 [5e] 2110904
UID: M1R812_4_18_4
FileSystem: UFS
Read partition info is supported by loader.
Build product name: ums9230_nico
Build description: ums9230_nico_Natv-user 11 RP1A.201005.001 699 release-keys
Build Id: RP1A.201005.001
Android Release: 11
Android Version: RMX3501EU_11_A.26
Security patch: 2022-05-05
[misc]Formating userdata, wait...
[can take 0-10 sec]Wait untill phone restart.
Exe version: Unisoc Module 2.2.9
Log saved:
C:\nckdongle\spreadtrum_module\spreadtrum_module_backup_folder\Saved_Logs\RMX3501EU_11_A_26_format_userdata_misc.txt
Total Time: 00:00:34
Done.


كود:
SELECTED: RMX3501
ACTION: Erase FRP
Start Detect phone...
Phone must be off with battery inside.
Long press "VOL -" key and insert usb cable.
For some phones need to
Long press "VOL -"+ "VOL +" key and insert usb cable.
Detected: SPRD U2S Diag (COM133)
Sending payload, keep boot key untill loader start.
Exploiting phone.....
Sending preloader 1
Sending preloader 2
Sending FDL 1.....
Sending FDL 2.....
New flash metod detected.
[5f] 741888 [5e] 2110904
UID: M1R812_4_18_4
FileSystem: UFS
Read partition info is supported by loader.
***************
[S]Manufacturer: realme
[S]Brand: realme
[S]Device: ums9230_nico
[S]Model: RMX3501
Build ID: RP1A.201005.001
CPU arhitecture: arm64-v8a
Build product name: ums9230_nico
Build description: ums9230_nico_Natv-user 11 RP1A.201005.001 699 release-keys
Build Id: RP1A.201005.001
Android Release: 11
Android Version: RMX3501EU_11_A.26
Security patch: 2022-05-05
CPU NAME: T612
Removing frp, wait...
[1]FRP: persist
Done.
[can take 0-10 sec]Wait untill phone restart.
Exe version: Unisoc Module 2.2.9
Log saved:
C:\nckdongle\spreadtrum_module\spreadtrum_module_backup_folder\Saved_Logs\realme_RMX3501EU_11_A_26_erase_frp.txt
Total Time: 00:00:37
Done.
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113

itel A70 (A665L) Erase Userdata + Erase FRP



Untitled.png

Untitled1.png

كود:
SELECTED: A70(A665L)
ACTION: Erase Userdata
If phone will stuck on logo, perform factory reset from diag mode tab.
Start Detect phone.
Phone must be off(you can service this phone without battery also).
Long press "VOL -"+ "VOL +" key while inserting usb cable.
Keep key untill boot complete.
Detected: SPRD U2S Diag (COM133)
Sending payload, keep boot key untill loader start.
Exploiting phone.....
Sending preloader 1
Sending preloader 2
Sending FDL 1.....
Sending FDL 2.....
New flash metod detected.
[5f] 121C4B03 [5e] 7434C8
UID: M3C893_17_22_3
FileSystem: EMMC
Read partition info is supported by loader.
[misc]Format OK.
[metadata]Format OK.
[userdata]Format OK.
[cache]Format OK.
[can take 0-10 sec]Wait untill phone restart.
Exe version: Unisoc Module 2.2.9
Log saved:
C:\nckdongle\spreadtrum_module\spreadtrum_module_backup_folder\Saved_Logs\_format_userdata_emmc.txt
Total Time: 00:00:31


كود:
SELECTED: A70(A665L)
ACTION: Erase FRP
Start Detect phone.
Phone must be off(you can service this phone without battery also).
Long press "VOL -"+ "VOL +" key while inserting usb cable.
Keep key untill boot complete.
Detected: SPRD U2S Diag (COM133)
Sending payload, keep boot key untill loader start.
Exploiting phone.....
Sending preloader 1
Sending preloader 2
Sending FDL 1.....
Sending FDL 2.....
New flash metod detected.
[5f] 121C4B03 [5e] 7434C8
UID: M3C893_17_22_3
FileSystem: EMMC
Read partition info is supported by loader.
CPU NAME: SC9863A
Removing frp, wait...
[1]FRP: persist
Done.
[can take 0-10 sec]Wait untill phone restart.
Exe version: Unisoc Module 2.2.9
Log saved:
C:\nckdongle\spreadtrum_module\spreadtrum_module_backup_folder\Saved_Logs\_erase_frp_10.txt
Total Time: 00:00:37
Done.
 
أعلى