تجارب الاعضاء فى تفليش وعمل ريبير وفك الشفرة على NckBox

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,125
مستوى التفاعل
2,963
النقاط
113
Condor Allure M3 Lite Reset FRP


Allure M3 Lite.png

كود:
[Reset FRP]
Waiting for device...Found
Port Info    :    MediaTek USB Port_V1633 (COM46) [\\?\usb#vid_0e8d&pid_0003#5&21e739f&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
     :    MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
     :    BROM PORT
Hw ID    :    MT6765 [0766] Helio P35/G35
Details    :    8A00,CA00,0000
Sec. Cfg    :    [SBA Active] [SLA Inactive] [DAA Active]
MEID    :    767256725AE2F5C806BB26BE0E6A192A
SoC ID[0]    :    EFF20E08AAF1051AE246A877B0A772BC
SoC ID[1]    :    97EA2B3CABE3E5B92A0E73EE5480368A
Executing Exploit...Done
Reading Preloader...OK
Saved as    :    preloader_k62v1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Cfg    :    [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection    :    brom
Speed    :    HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID    :    150100474436424D4201F016CE4D2519
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
Int. RAM    :    0x0000000000038000 [224.00 KB]
Ext. RAM    :    0x00000000C0000000 [3.00 GB]
Flash ID    :    GD6BMB
CID    :    150100474436424D4201F016CE4D2519
BOOT1    :    0x0000000000400000 [4.00 MB]
BOOT2    :    0x0000000000400000 [4.00 MB]
RPMB    :    0x0000000000400000 [4.00 MB]
USERAREA    :    0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
Brand    :    Condor
Manufacturer    :    SPA Condor Electronics
Model    :    Allure M3 Lite
Device    :    Allure_M3_Lite
And. Ver.    :    8.1.0
Prod. Name    :    Allure_M3_Lite
Build Dt.    :    Wed Apr 17 18:41:20 CST 2019
Display ID    :    Allure_M3_Lite
Ver. Inc.    :    1555497684
Locale    :    en-US
Patch    :    2019-04-05
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.0]
LOG TXT    :    20240225_155611.txt
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,125
مستوى التفاعل
2,963
النقاط
113
Xiaomi Redmi A2+ Reset FRP


Redmi A2+.png

كود:
[Reset FRP]
Waiting for device...Found
Port Info    :    MediaTek USB Port_V1633 (COM112) [\\?\usb#vid_0e8d&pid_0003#5&21e739f&0&4#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
     :    MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
     :    BROM PORT
Hw ID    :    MT6765 [0766] Helio P35/G35
Details    :    8A00,CA00,0000
Sec. Cfg    :    [SBA Active] [SLA Active] [DAA Active]
MEID    :    BA69F8B92985798AE266298E286D9377
SoC ID[0]    :    EC599B2A9FC36C0EDCA5C9FF52B50BF2
SoC ID[1]    :    BB259D51433922BC0A334404CCAAFDEA
Executing Exploit...Done
Reading Preloader...OK
Saved as    :    preloader_water.bin
Loading EMI Config from Preloader...OK
Sec. Cfg    :    [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection    :    brom
Speed    :    HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID    :    9B0100593250303332004AFB224F9923
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
Int. RAM    :    0x0000000000038000 [224.00 KB]
Ext. RAM    :    0x0000000080000000 [2.00 GB]
Flash ID    :    Y2P032
CID    :    9B0100593250303332004AFB224F9923
BOOT1    :    0x0000000000400000 [4.00 MB]
BOOT2    :    0x0000000000400000 [4.00 MB]
RPMB    :    0x0000000001000000 [16.00 MB]
USERAREA    :    0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.0]
LOG TXT    :    20240227_174354.txt
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,125
مستوى التفاعل
2,963
النقاط
113
Oppo A94 (cph2203) Reset FRP

Untitled.png

كود:
[Reset FRP]
Waiting for device...Found
Port Info    :    MediaTek USB Port_V1633 (COM46) [\\?\usb#vid_0e8d&pid_0003#5&21e739f&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
     :    MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
     :    BROM PORT
Hw ID    :    MT6779 [0725] Helio P90 k79v1
Details    :    8A00,CA01,0000
Sec. Cfg    :    [SBA Active] [SLA Inactive] [DAA Active]
MEID    :    09A4A795C4574229B834422C386F1B20
SoC ID[0]    :    13EFBBB00EE529895D2C63496217EA58
SoC ID[1]    :    BA33B7C73A6D927BED3A7E43E61B28B0
Executing Exploit...Done
Reading Preloader...OK
Saved as    :    preloader_k79v1_64.bin
Loading EMI Config from Preloader...OK
Sec. Cfg    :    [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection    :    brom
Speed    :    HIGH-SPEED
Reading EMI Configuration...OK
UFS CID    :    CE014B4D3856383030314A4D2D423831
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
Int. RAM    :    0x0000000000080000 [512.00 KB]
Ext. RAM    :    0x0000000200000000 [8.00 GB]
Flash ID    :    KM8V8001JM-B81
CID    :    CE014B4D3856383030314A4D2D423831
BOOT1    :    0x0000000000400000 [4.00 MB]
BOOT2    :    0x0000000000400000 [4.00 MB]
RPMB    :    0x0000000000400000 [4.00 MB]
USERAREA    :    0x0000001DCB000000 [119.17 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.0]
LOG TXT    :    20240302_154246.txt
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,125
مستوى التفاعل
2,963
النقاط
113
Realme C11 (2021) Wipe Userdata(misc) & Erase FRP


Untitled.png

Untitled1.png

كود:
First 16 bytes from public rsa key.
D1F7C96DA0D8B4E54A27307039E61823
***************
Phone Storage: EMMC
SELECTED: RMX3231
ACTION: Wipe Userdata(misc)
Loader format:NEW
Start Detect phone.
Phone must be off(you can service this phone without battery also).
Long press "VOL -"+ "VOL +" key while inserting usb cable.
Keep key untill boot complete.
Detected: SPRD U2S Diag (COM133)
Sending loader, keep boot key untill loader start.
Loader send OK
Changing bautrate OK.
Send Second Loader.
Length RSA: 256
RET RSA: 256
Rsa autorization: Tecno S6301 - success
New flash metod detected.
FileSystem: EMMC
Read partition info is supported by loader.
Build product name: RMX3231
Build description: RMX3231-user 11 RP1A.201005.001 464 release-keys
Build Id: RP1A.201005.001
Android Release: 11
Android Version: RMX3231_11.A.121
Security patch: 2023-12-05
[misc]Formating userdata, wait...
[can take 0-10 sec]Wait untill phone restart.
Exe version: Unisoc Module 2.2.8
Log saved:
C:\nckdongle\spreadtrum_module\spreadtrum_module_backup_folder\Saved_Logs\RMX3231_11_A_121_format_userdata_misc.txt
Total Time: 00:00:22
Done.

كود:
First 16 bytes from public rsa key.
D1F7C96DA0D8B4E54A27307039E61823
***************
Phone Storage: EMMC
SELECTED: RMX3231
ACTION: Erase FRP
Loader format:NEW
Start Detect phone.
Phone must be off(you can service this phone without battery also).
Long press "VOL -"+ "VOL +" key while inserting usb cable.
Keep key untill boot complete.
Detected: SPRD U2S Diag (COM133)
Sending loader, keep boot key untill loader start.
Loader send OK
Changing bautrate OK.
Send Second Loader.
Length RSA: 256
RET RSA: 256
Rsa autorization: Tecno S6301 - success
New flash metod detected.
FileSystem: EMMC
Read partition info is supported by loader.
***************
[S]Manufacturer: realme
[S]Brand: realme
[S]Device: RMX3231
[S]Model: RMX3231
Build ID: RP1A.201005.001
CPU arhitecture: armeabi-v7a
Build product name: RMX3231
Build description: RMX3231-user 11 RP1A.201005.001 464 release-keys
Build Id: RP1A.201005.001
Android Release: 11
Android Version: RMX3231_11.A.121
Security patch: 2023-12-05
CPU NAME: SC9863A
Removing frp, wait...
[1]FRP: persist
Format OK.
[can take 0-10 sec]Wait untill phone restart.
Exe version: Unisoc Module 2.2.8
Log saved:
C:\nckdongle\spreadtrum_module\spreadtrum_module_backup_folder\Saved_Logs\realme_RMX3231_11_A_121_erase_frp.txt
Total Time: 00:00:23
Done.
 
أعلى