تجارب الأعضاء الناجحة على واجهة UMT Dongle

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113
Xiaomi Redmi Note 9 Reset Mi Account & fix relock


Untitled.png

Untitled1.png

كود:
Brand/Model    :    *Auto* / *Auto Detect*
Operation    :    Reset Mi Account
Waiting for Device...Found
Port    :    MediaTek USB Port_V1633 (COM46)
Device Path    :    \\?\usb#vid_0e8d&pid_0003#5&21e739f&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver    :    MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode    :    BROM
Hw ID    :    MT6768 [0707] Helio P65/G85 k68v1
Details    :    8A00,CA00,0000
Sec. Config    :    [SBA:True] [SLA:True] [DAA:True]
MEID    :    4A141BCB8A57FE88B0BA97C3E7CA0BF5
SoC ID[0]    :    780B11899DBA5A6D3A1580B14D809023
SoC ID[1]    :    37919957490114ABB8D336D5DFE2604C
Running Exploit...Done
Downloading Preloader...OK
Saved as    :    preloader_merlin.bin
Loading EMI Config from Preloader...OK
Sec. Config    :    [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection    :    brom
Speed    :    HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID    :    15010044563644414202231CDC0D37CB [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM    :    0x0000000000070000 [448.00 KB]
Ext. RAM    :    0x0000000100000000 [4.00 GB]
Flash ID    :    DV6DAB
CID    :    15010044563644414202231CDC0D37CB
BOOT1    :    0x0000000000400000 [4.00 MB]
BOOT2    :    0x0000000000400000 [4.00 MB]
RPMB    :    0x0000000001000000 [16.00 MB]
USERAREA    :    0x0000001D1EC00000 [116.48 GB]
PRE EOL    :    NORMAL
Life. Est.A    :    0%-10% LIFE TIME USED
Life. Est.B    :    0%-10% LIFE TIME USED
Reading Partition Table...OK
Manuf.    :    Xiaomi
And. Ver.    :    11
Build Dt.    :    Wed Jul 28 21:03:41 CST 2021
Display ID    :    RP1A.200720.011
Ver. Inc.    :    V12.5.1.0.RJOMIXM
Locale    :    en-GB
Mod. Dev.    :    merlin_global
Patch    :    2021-07-01
Bootloader    :    UNLOCKED
Reading Data...OK
Backup    :    Persist_Xiaomi_unknown_20240304_114006.zip
Resetting Mi Account Data...OK
Formatting Userdata (Safe Mode)...OKOK
Operation Finished.
[UltimateMTK2 v1.1]
Log Saved    :    20240304_114017.log
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113

Samsung F12 (SM-F127G) FRP Bypass [2023 New Method]



Untitled.png

كود:
Model    : Samsung
Operation    : FRP Bypass [2023 New Method]
Searching for Phone...Found
Hw ID    : USB\VID_04E8&PID_6860&REV_0419&Modem
Port:     : COM136 : SAMSUNG Mobile USB Modem
Checking for Device...Found [Normal Mode]
Reading Phone Information...OK
Model:     : SM-F127G
IMEI:     : 35***********05
Software:     : F127GXXU5DWF2/F127GODM5DWE1/F127GDDU5DWE1/F127GXXU5DWF2
Product    : INS
Enabling ADB (2023 New Method)...OK
Searching for Device...Found
Brand    : samsung
Model    : SM-F127G
Product    : f12
Device    : f12
Andriod Ver.    : 13
Patch Level    : 2023-06-01
PDA    : F127GXXU5DWF2
Bootloader    : F127GXXU5DWF2
Build ID    : TP1A.220624.014.F127GXXU5DWF2
Build Date    : Mon Jun 19 21:03:42 KST 2023
Checking Root Status...Done
Root    : No Root
Resetting FRP Lock...Done
HINT    : This method work for QC/Exynos model with Security Patch < June 2023
Elapsed Time 31:55
[UltimateSams v0.7]
Saved to Logs\240306_143155.log
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113

Samsung A24 (SM-A245F) FRP Bypass [2023 New Method]



Untitled.png

كود:
Model    : Samsung
Operation    : FRP Bypass [2023 New Method]
Searching for Phone...Found
Hw ID    : USB\VID_04E8&PID_6860&REV_0223&Modem
Port:     : COM144 : SAMSUNG Mobile USB Modem #6
Checking for Device...Found [Normal Mode]
Reading Phone Information...OK
Model:     : SM-A245F
IMEI:     : 35***********59
Software:     : A245FXXU1AWC3/A245FOJM1AWC3/A245FXXU1AWC3/A245FXXU1AWC3
Product    : MID
Enabling ADB (2023 New Method)...OK
Searching for Device...Found
Brand    : samsung
Model    : SM-A245F
Product    : a24
Device    : a24
Andriod Ver.    : 13
Patch Level    : 2023-03-01
PDA    : A245FXXU1AWC3
Bootloader    : A245FXXU1AWC3
Build ID    : TP1A.220624.014.A245FXXU1AWC3
Build Date    : Fri Mar 10 14:51:41 KST 2023
Checking Root Status...Done
Root    : No Root
Resetting FRP Lock...Done
HINT    : This method work for QC/Exynos model with Security Patch < June 2023
Elapsed Time 58:13
[UltimateSams v0.7]
Saved to Logs\240311_115813.log
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113

Samsung J5 Pro (SM-J530G) FRP Bypass [2023 Method]



Untitled.png

كود:
Model    : Samsung
Operation    : FRP Bypass [2023 Method]
Searching for Phone...Found
Hw ID    : USB\VID_04E8&PID_6860&REV_0400&Modem
Port:     : COM147 : SAMSUNG Mobile USB Modem #8
Checking for Device...Found [Normal Mode]
Reading Phone Information...OK
Model:     : SM-J530G
IMEI:     : 35***********70
Software:     : J530GUBU2ARB1/J530GUUB2ARB1/J530GUBU2ARB1/J530GUBU2ARB1
Product    : TPA
HINT    : This method work for QC/Exynos model with Security Patch < May 2023
Enabling ADB (2023)...OK
Searching for Device...Found
Brand    : samsung
Model    : SM-J530G
Product    : j5y17lte
Device    : j5y17lte
Andriod Ver.    : 7.0
Patch Level    : 2018-02-01
PDA    : J530GUBU2ARB1
Bootloader    : J530GUBU2ARB1
Build ID    : NRD90M.J530GUBU2ARB1
Build Date    : Fri Feb  2 20:40:52 KST 2018
Checking Root Status...Done
Root    : No Root
Resetting FRP Lock...Done
HINT    : This method work for QC/Exynos model with Security Patch < May 2023
Elapsed Time 38:10
[UltimateSams v0.7]
Saved to Logs\240312_113810.log
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113

Samsung F13 (SM-E135F) FRP Bypass [2023 New Method]



Untitled.png

كود:
Model    : Samsung
Operation    : FRP Bypass [2023 New Method]
Searching for Phone...Found
Hw ID    : USB\VID_04E8&PID_6860&REV_0419&Modem
Port:     : COM148 : SAMSUNG Mobile USB Modem #9
Checking for Device...Found [Normal Mode]
Reading Phone Information...OK
Model:     : SM-E135F
IMEI:     : 35************06
Software:     : E135FXXU3CWE5/E135FODM3CWE5/E135FXXU3CWE2/E135FXXU3CWE5
Product    : INS
Enabling ADB (2023 New Method)...OK
Searching for Device...Found
Brand    : samsung
Model    : SM-E135F
Product    : m13
Device    : m13
Andriod Ver.    : 13
Patch Level    : 2023-05-01
PDA    : E135FXXU3CWE5
Bootloader    : E135FXXU3CWE5
Build ID    : TP1A.220624.014.E135FXXU3CWE5
Build Date    : Tue May 30 19:27:00 KST 2023
Checking Root Status...Done
Root    : No Root
Resetting FRP Lock...Done
HINT    : This method work for QC/Exynos model with Security Patch < June 2023
Elapsed Time 41:24
[UltimateSams v0.7]
Saved to Logs\240312_144124.log
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113
Huawei Y6s (2019) (JAT-L29) Resetting FRP Via Test Point


Honor-8A-JAT-L29-Testpoint-2.jpg

Untitled.png

كود:
Operation : MTK One Click
Hold VOL UP + DOWN and connect USB Cable.
Some phone may have different key combination for BROM mode.
Waiting for device in BROM mode...
Port: COM137 [MediaTek USB Port_V1633 (COM137)]
Device Path: \\?\usb#vid_0e8d&pid_0003#5&21e739f&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Chipset: 0x0766, [MT6765] [Helio P35/G35]
Hardware Info: 0x8A00, 0xCA00, 0x00
Config : [SecureBoot: True] [SLA: False] [DA Auth: True]
MEID: F713A8E4E39272C7BB54711FEB2D1407
Preparing device...
-- Success!
Preloader saved as : preloader_k62v1_64_mexico_240319_140725.bin
DA : MTK_AllInOne_DA.bin
Waiting for Phone in Flash Mode...
Connect Power Off phone within 30 secs...
Port : MediaTek USB Port_V1633 (COM137)
Connected to BROM.
Sending Download Agent...
connect DA end stage: 2, enable DRAM in 1st DA: 0
Connected to Download Agent..
Syncing with Target...
Reading Partition Table...
Storage : eMMC
Reading Information...
-- Could not read!
Userdata is ENCRYPTED
Seeking FRP Data...
Resetting FRP...
- Success!
Disconnect Battery/Cable and Power On Phone.
[UltimateMTK Ver. 5.1]
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113
Samsung F23 (SM-E236B) FRP Bypass [2023 New Method]


Untitled.png

كود:
Model    : Samsung
Operation    : FRP Bypass [2023 New Method]
Searching for Phone...Found
Hw ID    : USB\VID_04E8&PID_6860&REV_0400&Modem
Port:     : COM153 : SAMSUNG Mobile USB Modem #14
Checking for Device...Found [Normal Mode]
Reading Phone Information...OK
Model:     : SM-E236B
IMEI:     : 35***********46
Software:     : E236BXXS4CWG2/E236BODM4CWG2/E236BXXS4CWG2/E236BXXS4CWG2
Product    : INS
Enabling ADB (2023 New Method)...OK
Searching for Device...Found
Brand    : samsung
Model    : SM-E236B
Product    : qssi
Device    : m23xq
Andriod Ver.    : 13
Patch Level    : 2023-06-01
PDA    : E236BXXS4CWG2
Bootloader    : E236BXXS4CWG2
Build ID    : TP1A.220624.014.E236BXXS4CWG2
Build Date    : Thu Jul 20 19:45:31 KST 2023
Checking Root Status...Done
Root    : No Root
Resetting FRP Lock...Done
HINT    : This method work for QC/Exynos model with Security Patch < June 2023
Elapsed Time 11:30
[UltimateSams v0.7]
Saved to Logs\240324_150811.log
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113

Samsung J7 Core (SM-J701F) FRP Bypass [2023 Method]



Untitled.png

كود:
Model    : Samsung
Operation    : FRP Bypass [2023 Method]
Searching for Phone...Found
Hw ID    : USB\VID_04E8&PID_6860&REV_0400&Modem
Port:     : COM156 : SAMSUNG Mobile USB Modem #17
Checking for Device...Found [Normal Mode]
Reading Phone Information...OK
Model:     : SM-J701F
IMEI:     : 35***********55
Software:     : J701FDDSACUA4/J701FODDACUA4/J701FXXSACUA1/J701FDDSACUA4
Product    : INS
HINT    : This method work for QC/Exynos model with Security Patch < May 2023
Enabling ADB (2023)...OK
Searching for Device...Found
Brand    : samsung
Model    : SM-J701F
Product    : j7velte
Device    : j7velte
Andriod Ver.    : 9
Patch Level    : 2020-12-01
PDA    : J701FDDSACUA4
Bootloader    : J701FDDSACUA4
Build ID    : PPR1.180610.011.J701FDDSACUA4
Build Date    : Mon Jan 11 20:05:42 KST 2021
Checking Root Status...Done
Root    : No Root
Resetting FRP Lock...Done
HINT    : This method work for QC/Exynos model with Security Patch < May 2023
Elapsed Time 12:20
[UltimateSams v0.7]
Saved to Logs\240401_112357.log
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113
Samsung F62 (SM-E625F) FRP Bypass [2023 New Method]


Untitled.png

كود:
Model    : Samsung
Operation    : FRP Bypass [2023 New Method]
Searching for Phone...Found
Hw ID    : USB\VID_04E8&PID_6860&REV_0400&Modem
Port:     : COM157 : SAMSUNG Mobile USB Modem #18
Checking for Device...Not Found
Could not check, ignoring!
Enabling ADB (2023 New Method)...OK
Searching for Device...Found
Brand    : samsung
Model    : SM-E625F
Product    : f62
Device    : f62
Andriod Ver.    : 13
Patch Level    : 2023-03-01
PDA    : E625FDDU3CWC2
Bootloader    : E625FDDU3CWC2
Build ID    : TP1A.220624.014.E625FDDU3CWC2
Build Date    : Wed Mar 22 19:21:25 KST 2023
Checking Root Status...Done
Root    : No Root
Resetting FRP Lock...Done
HINT    : This method work for QC/Exynos model with Security Patch < June 2023
Elapsed Time 30:49
[UltimateSams v0.7]
Saved to Logs\240402_103050.log
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113

Xiaomi Redmi 9A (M2006C3LG) Erase Data + FRP



Untitled.png

كود:
Brand/Model    :    *Auto* / *Auto Detect*
Operation    :    Erase Data + FRP
Waiting for Device...Found
Port    :    MediaTek USB Port_V1633 (COM137)
Device Path    :    \\?\usb#vid_0e8d&pid_0003#5&21e739f&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver    :    MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode    :    BROM
Hw ID    :    MT6765 [0766] Helio P35/G35
Details    :    8A00,CA00,0000
Sec. Config    :    [SBA:True] [SLA:True] [DAA:True]
MEID    :    FDB42BA71CC0FF618B399E49FA0EC03D
SoC ID[0]    :    2EC8B10258BB6C2346091123439F0A27
SoC ID[1]    :    27708280AEDB19A24280C00B75D3B161
Running Exploit...Done
Downloading Preloader...OK
Saved as    :    preloader_k62v1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Config    :    [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection    :    brom
Speed    :    HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID    :    150100424A5444345209661EFA1E5847 [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM    :    0x0000000000038000 [224.00 KB]
Ext. RAM    :    0x0000000080000000 [2.00 GB]
Flash ID    :    BJTD4R
CID    :    150100424A5444345209661EFA1E5847
BOOT1    :    0x0000000000400000 [4.00 MB]
BOOT2    :    0x0000000000400000 [4.00 MB]
RPMB    :    0x0000000000400000 [4.00 MB]
USERAREA    :    0x0000000747C00000 [29.12 GB]
PRE EOL    :    NORMAL
Life. Est.A    :    0%-10% LIFE TIME USED
Life. Est.B    :    0%-10% LIFE TIME USED
Reading Partition Table...OK
Manuf.    :    Xiaomi
And. Ver.    :    10
Build Dt.    :    Sat May 14 13:15:44 CST 2022
Display ID    :    QP1A.190711.020
Ver. Inc.    :    V12.0.20.0.QCDMIXM
Locale    :    en-GB
Mod. Dev.    :    dandelion_global
Patch    :    2022-05-01
Bootloader    :    LOCKED
Erasing Userdata...OK
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.2]
Log Saved    :    20240413_110211.log
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113

Samsung M10s (SM-M107F) FRP Bypass [2023 Method]



Untitled.png

كود:
Model    : Samsung
Operation    : FRP Bypass [2023 Method]
Searching for Phone...Found
Hw ID    : USB\VID_04E8&PID_6860&REV_0400&Modem
Port:     : COM163 : SAMSUNG Mobile USB Modem #21
Checking for Device...Not Found
Could not check, ignoring!
HINT    : This method work for QC/Exynos model with Security Patch < May 2023
Enabling ADB (2023)...OK
Searching for Device...Found
Brand    : samsung
Model    : SM-M107F
Product    : m10s
Device    : m10s
Andriod Ver.    : 10
Patch Level    : 2020-09-01
PDA    : M107FXXS4BTI1
Bootloader    : M107FXXS4BTI1
Build ID    : QP1A.190711.020.M107FXXS4BTI1
Build Date    : Thu Sep 10 15:17:36 KST 2020
Checking Root Status...Done
Root    : No Root
Resetting FRP Lock...Done
HINT    : This method work for QC/Exynos model with Security Patch < May 2023
Elapsed Time 20:55
[UltimateSams v0.7]
Saved to Logs\240415_132055.log
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113
Oppo A16k (CPH2349 ) Erase Data + FRP


Untitled.png

كود:
Brand/Model    :    *Auto* / *Auto Detect*
Operation    :    Erase Data + FRP
Waiting for Device...Found
Port    :    MediaTek USB Port_V1633 (COM137)
Device Path    :    \\?\usb#vid_0e8d&pid_0003#5&21e739f&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}
Driver    :    MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
Mode    :    BROM
Hw ID    :    MT6765 [0766] Helio P35/G35
Details    :    8A00,CA00,0000
Sec. Config    :    [SBA:True] [SLA:False] [DAA:True]
MEID    :    22CDE371C077EE7E279CA35FF2C37351
SoC ID[0]    :    151C35AADE22EBE4CFD877C4A9859AD8
SoC ID[1]    :    224B66670603FA677EB85415C1F008D4
Running Exploit...Done
Downloading Preloader...OK
Saved as    :    preloader_oppo6765.bin
Loading EMI Config from Preloader...OK
Sec. Config    :    [SBA:False] [SLA:False] [DAA:False]
Using Internal DA!
DA Security Patched
Sending 1st DA...OK
Jump DA Address...OK
Syncing...OK
Checksum Level is Storage
Connection    :    brom
Speed    :    HIGH-SPEED
Reading RAM Configuration...OK
Reading EMI Configuration...OK
CID    :    90014A68423861503E0300028CE1A8BF [EMMC]
Initializing Storage...OK
Sending 2nd DA...OK
Initialize DA Extension...OK
Int. RAM    :    0x0000000000038000 [224.00 KB]
Ext. RAM    :    0x00000000C0000000 [3.00 GB]
Flash ID    :    hB8aP>
CID    :    90014A68423861503E0300028CE1A8BF
BOOT1    :    0x0000000000400000 [4.00 MB]
BOOT2    :    0x0000000000400000 [4.00 MB]
RPMB    :    0x0000000001000000 [16.00 MB]
USERAREA    :    0x0000000747C00000 [29.12 GB]
PRE EOL    :    NORMAL
Life. Est.A    :    UNDEFINED
Life. Est.B    :    10%-20% LIFE TIME USED
Reading Partition Table...OK
Bootloader    :    LOCKED
Erasing Userdata...OK
Resetting FRP...OK
Operation Finished.
[UltimateMTK2 v1.2]
Log Saved    :    20240416_135538.log
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113

Samsung A50s (SM-A5070) (Hong Kong) FRP Bypass [2023 New Method]



Untitled.png

كود:
Model    : Samsung
Operation    : FRP Bypass [2023 New Method]
Searching for Phone...Found
Hw ID    : USB\VID_04E8&PID_6860&REV_0400&Modem
Port:     : COM170 : SAMSUNG Mobile USB Modem #28
Checking for Device...Not Found
Could not check, ignoring!
Enabling ADB (2023 New Method)...OK
Searching for Device...Found
Brand    : samsung
Model    : SM-A5070
Product    : a50s
Device    : a50s
Andriod Ver.    : 11
PDA    : A5070ZHS6DWE1
Bootloader    : A5070ZHS6DWE1
Build ID    : RP1A.200720.012.A5070ZHS6DWE1
Build Date    : Tue May  9 17:47:36 KST 2023
Checking Root Status...Done
Root    : No Root
Resetting FRP Lock...Done
HINT    : This method work for QC/Exynos model with Security Patch < June 2023
Elapsed Time 35:04
[UltimateSams v0.7]
Saved to Logs\240420_183504.log
 

فيصل16

:: مشرف قسم Sigma/Z3x/Octoplus ::
إنضم
16 سبتمبر 2012
المشاركات
3,136
مستوى التفاعل
2,975
النقاط
113

Samsung Tab A7 Lite (SM-T225N) Reset FRP



SM-T225N.png

كود:
Model    : MediaTek FRP
Operation    : All MediaTek 2023
Searching for Phone...Found
Port:     : COM140 : SAMSUNG Mobile USB Modem #2
Checking for Device...Found [Download Mode]
Reading Data from Phone...Done
Chipset    : MTK6765 [HiSpeed]
Closing Session...Done
Port:     : COM140 : SAMSUNG Mobile USB Modem #2
Checking for Device...Found [Download Mode]
Resetting FRP Data...Done
Closing Session...Done
Operation Finished.
Elapsed Time 00:24
[UltimateSams v0.7]
Saved to Logs\240424_094456.log
 
أعلى