تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

DZ-Djamel-GSM

:: مراقب عام ::
إنضم
9 يوليو 2018
المشاركات
5,457
مستوى التفاعل
4,346
النقاط
113
الإقامة
DzGsm
بسم الله الرحمن الرحيم

تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle
الأسباب الرئيسية لعمل هذا الموضوع تبادل للخبرات من باب أولى لأن المنتدى أنشئ لهذا الغرض
كذلك طرح طرق الفلاش لموديلات قد توجد فيها خطوات قد تخفى على الأخرين ويمكن توضيحها في هذا الموضوع و كذلك أيضاً لتجب وضع مواضيع في القسم للتجارب الناجحة تجنباً للفوضى وتحقيقاً لمزيد من التنظيم.

يمنع الردود في الموضوع لأنه مخصص فقط للتجارب
أي رد يحذف مباشرة
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

IRIS VOX4+ ULTRA POWER OPTION

BOOT/INFO

160810896131391.png


كود:
[B]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL +
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0335 (0000)MT6737[6735]
 BROM HW_SW_VER : 8A00 CB00 0000 0000 
 FUSEID         : 00000000
 SECURE VERSION : FF 
 BL VERSION     : 01 
 BR Secured     : 00

Preparing Download Agent..
 DA   : 6735.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
00000000000000000000
PRMMCCID   : 484A0190653147385755070579524B85
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000001D2000000 -7,281 GB
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 5709316F9B386AE229F66992E64D3D60
eMMC CID   : 484A0190653147385755070579634B85
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM16]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

[COLOR="#FF0000"]Reading System Info
  Brand          : VOX4+
  Vendor         : VOX4+
  Model          : VOX4+
  ID             : LMY47D
  SDK            : 22
  Release        : 5.1
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : full_bird6735m_35gu_a_l-user 5.1 LMY47D 1467355807 dev-keys
  Device         : VOX4+
  Board          : Android
  Display ID     : LMY47D dev-keys
  Security Patch : 2015-11-01
  Platform       : mt6735m
  FRPPST         : /dev/block/platform/mtk-msdc.0/by-name/frp
  Fingerprint    : alps/full_bird6735m_35gu_a_l/bird6735m_35gu_a_l:5.1/LMY47D/1467355807:user/dev-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted[/COLOR]

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_bird6735m_35gu_a_l.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\VOX4+_VOX4+_0335-mt6735m-5.1_LMY47D dev-keys_161220094432\MT6737_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x06A00000] 1024 KB -> frp.bin...Ok
 -nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
[COLOR="#008000"]Done!!!
C:\Hydra Tool\\Backup\Auto\VOX4+_VOX4+_0335-mt6735m-5.1_LMY47D dev-keys_161220094432
MTK Phone Loader is NOW RUNNING.[/COLOR]

TPortConnection.Destroy.....Closing...Ok..[/B]


ULTRA POWER OPTION

16081089619412.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Oppo A37F (Neo 9) ULTRA POWER OPTION



160820412823661.jpg
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

TAB ALLIA A774G Read Pattern


160828297882361.jpg


كود:
[B]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL +
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 6580 (0000)MT6580[6580]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 60001002
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   : 6580.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID   : 1501003857504433520044E2B6AD621D
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000080000 -512 KB
eMMC USER  : 0x00000001D2000000 -7,281 GB
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : FD964D135F1B965602D84E7776C3CCE3
eMMC CID   : 3800011533445057E24400521D62ADB6
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM16]


Reading Partition Table
SIZE[0x00000790] 22 Items > Done

Reading System Info
  Brand          : alps
  Vendor         : alps
  Model          : elink8321_emmc
  ID             : LMY47I
  SDK            : 22
  Release        : 5.1
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : full_elink8321_emmc-user.2016120821
  Device         : elink8321_emmc
  Display ID     : full_elink8321_emmc-user.2016120821
  Security Patch : 2016-03-01
  Platform       : mt6580
  FRPPST         : /dev/block/platform/mtk-msdc.0/by-name/frp
  Fingerprint    : alps/full_elink8321_emmc/elink8321_emmc:5.1/LMY47I/1481202181:user/test-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_elink8321_emmc.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\alps_elink8321_emmc_6580-mt6580-5.1_full_elink8321_emmc-user.2016120821_181220095119\MT6580_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x050A0000] 1024 KB -> frp.bin...Ok
 -nvdata[0x051A0000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\alps_elink8321_emmc_6580-mt6580-5.1_full_elink8321_emmc-user.2016120821_181220095119
MTK Phone Loader is NOW RUNNING.

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:30[/B]

160828297892112.jpg


كود:
[B]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


Reading System Info
  Brand          : alps
  Vendor         : alps
  Model          : elink8321_emmc
  ID             : LMY47I
  SDK            : 22
  Release        : 5.1
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : full_elink8321_emmc-user.2016120821
  Device         : elink8321_emmc
  Display ID     : full_elink8321_emmc-user.2016120821
  Security Patch : 2016-03-01
  Platform       : mt6580
  FRPPST         : /dev/block/platform/mtk-msdc.0/by-name/frp
  Fingerprint    : alps/full_elink8321_emmc/elink8321_emmc:5.1/LMY47I/1481202181:user/test-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : . Found
Gesture Data : 348B815DE91856B69DBFDAB35692FD149C7B6CEE
Bruteforcing pattern hash..Please wait for few seconds
[SIZE=4][COLOR="#FF0000"]Pattern Code : 7532198[/COLOR][/SIZE]
1 2 3
4 5 6
7 8 9
 
 Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:02[/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Griffe T7 (SP632) ULTRA POWER OPTION



160830515358751.png


كود:
[B]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL +
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0699 (0000)MT6739[6739]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 SECURE VERSION : FF 
 BL VERSION     : 03 
 BR Secured     : 00

Preparing Download Agent..
 DA   : 6739.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : preloader

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : EE06B1A743A091CF60E0CEB54AD0BD76
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x00000003A3E00000 -14,561 GB
 eMMC CID   : 150100464536324D4203516568FB55A3 - FE62MB

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
  Brand          : Condor
  Vendor         : SPA Condor Electronics
  Model          : Griffe T7
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : Griffe_T7-user 8.1.0 O11019 1594199147 release-keys
  Device         : Griffe_T7
  Display ID     : SP632_V13_20200708
  Security Patch : 2020-07-05
  Fingerprint    : Condor/Griffe_T7/Griffe_T7:8.1.0/O11019/1594199147:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_k39tv1_bsp_1g.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Condor_Griffe T7_0699--8.1.0_SP632_V13_20200708_181220160453\MT6739_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x02D88000]1024 KB ->frp.bin...Ok
-nvdata[0x03688000]32 MB ->nvdata.bin...Ok
-persist[0x09000000]48 MB ->persist.bin...Ok
-nvram[0x13700000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Condor_Griffe T7_0699--8.1.0_SP632_V13_20200708_181220160453
MTK Phone Loader is NOW RUNNING.

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:22[/B]


160830515371632.png


كود:
[B]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : EE06B1A743A091CF60E0CEB54AD0BD76
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x00000003A3E00000 -14,561 GB
 eMMC CID   : 150100464536324D4203516568FB55A3 - FE62MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : Condor
  Vendor         : SPA Condor Electronics
  Model          : Griffe T7
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : Griffe_T7-user 8.1.0 O11019 1594199147 release-keys
  Device         : Griffe_T7
  Display ID     : SP632_V13_20200708
  Security Patch : 2020-07-05
  Fingerprint    : Condor/Griffe_T7/Griffe_T7:8.1.0/O11019/1594199147:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:07[/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor P6 Pro LTE (PGN528) ULTRA POWER OPTION


160837928530471.png


كود:
[B]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL +
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0321 (0000)MT6737T[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : A2010000
 FUSEID         : A2010000
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   : 6735.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
00000000000000000000
PRMMCCID   : 510001154D333645DD790342D9ECB307
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000003A3E00000 -14,561 GB
ERAM Size  : 0x0000000080000000 -2 GB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 7336E0FB0ED8789AA5A7C70001824048
eMMC CID   : 510001154D333645DD790342D9C4B307
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM16]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
  Brand          : condor
  Vendor         : SPA Condor Electronics
  Model          : PGN528
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gnsz6737t_66_n-user 7.0 NRD90M 1510022999 release-keys
  Device         : PGN528
  Board          : PGN528
  Display ID     : PGN528
  Security Patch : 2017-10-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN528/PGN528:7.0/NRD90M/1510022999:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_gnsz6737t_66_n.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\condor_PGN528_0321-mt6737t-7.0_PGN528_191220111304\MT6737T_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x06A00000] 1024 KB -> frp.bin...Ok
 -nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\condor_PGN528_0321-mt6737t-7.0_PGN528_191220111304
MTK Phone Loader is NOW RUNNING.

TPortConnection.Destroy.....Closing...Ok..[/B]


16083792854592.png


كود:
[B]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


Reading System Info
  Brand          : condor
  Vendor         : SPA Condor Electronics
  Model          : PGN528
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gnsz6737t_66_n-user 7.0 NRD90M 1510022999 release-keys
  Device         : PGN528
  Board          : PGN528
  Display ID     : PGN528
  Security Patch : 2017-10-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN528/PGN528:7.0/NRD90M/1510022999:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:02[/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor T9 (SP648) Ultra Power Option


160847588146281.png


كود:
[B]*************  PRESS BOOT KEY ************* 
 VOL + OR VOL - , OR Combination Vol - +
 Feature Phone :  Call Button
 Please hold boot key until second boot.. 
*******************************************
Port : [Auto] Scanning...COM5
TPortConnection.Create...(COM5)..Opening...Ok
Identifying... [SPRD3]
Sending Config Ok
Boot1 [hydra.fdl1] Ok
Spreadtrum Boot Block version 1.1
Boot2 [hydra.fdl2]
Verifying Loader 2.... Ok
Sending To phone.... Ok
Successfully booted..Ready to go...

Reading System Info.
Reading IMEI...
Error : 84.
IMEI 1 : 000000000000000
IMEI 2 : 000000000000000

[COLOR="#FF0000"]*** ONE BOOT PROCESSS ***
SPD Loader are now running...
Please do not remove cable[/COLOR]

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:08[/B]

160847588164392.png


كود:
[B]Port : [Auto] Scanning...COM5
TPortConnection.Create...(COM5)..Opening...Ok
Reading IMEI...
Error : 84.
IMEI 1 : 000000000000000
IMEI 2 : 000000000000000

Reading System Info.
[COLOR="#FF0000"]*** Flash Mode #Ultra Power  ***
Resetting FRP...Ok
Formatting userdata...Ok[/COLOR]
Rebooting Phone..Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:22[/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Redmi Note 8 (ginkgo) Mi Account Remove



160848098195611.png


كود:
[B]PreOperation Configuration 
 Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
 Loader: Xiaomi_redminote8_loader.elf
 Port  : Auto
 Connection  : Flash Mode


Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM16)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&1e3ed538&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xACA6B7FC
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000002
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 
Firmware Version : 4
Product Name : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


[COLOR="#008000"]Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 8
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V11.0.9.0.PCOIDXM release-keys
Miui Ver : V11
Device : ginkgo
Mod_device : ginkgo_id_global
Display ID : PKQ1.190616.001
Security Patch : 2020-05-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.9.0.PCOIDXM:user/release-keys[/COLOR]

[COLOR="#FF0000"]Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok[/COLOR]

[COLOR="#0000FF"]Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 26
Successfully patched address..[/COLOR]
Action Result : Ok

Elapsed Time : 00:01:44 [/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi 5 (Rosy) Mi Account Remove



160853995489631.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Redmi 8 (Olive) Remove Mi Account




160854400389291.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Oppo F5 clone ultra power option



160898977920982.png



كود:
[B]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM42]

TPortConnection.Create...(COM42)..Opening...Ok


Reading System Info
  Brand          : alps
  Vendor         : alps
  Model          : F5
  ID             : LMY47I
  SDK            : 22
  Release        : 7.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : M5_80L_WEG_3GW_B15_BH_EMMC_32_4_QHD_DDR3_PMZ_L_A579_A2_ZX_20171223
  Device         : keytak6580_weg_l
  Display ID     : M5_80L_WEG_3GW_B15_BH_EMMC_32_4_QHD_DDR3_PMZ_L_A579_A2_ZX_20171223
  Security Patch : 2016-03-01
  Platform       : mt6580
  FRPPST         : /dev/block/platform/mtk-msdc.0/by-name/frp
  Fingerprint    : alps/full_keytak6580_weg_l/keytak6580_weg_l:7.0/LMY47I/1514012954:user/test-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:08[/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Redmi 8A Mi Accoout Remove



160898977901581.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 [COLOR="#FF0000"]Brand : XIAOMI Model : Redmi 8A (olivelite) Storage : Auto[/COLOR]
 Loader: Xiaomi_Redmi_8_Olive.mbn
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :11/06/2020,2.17.6.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 1723257846
Firmware Version    : 4
Product Name        : QD63MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29,121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

 
[COLOR="#008000"]Phone Information......
  Brand          : Xiaomi
  Vendor         : Xiaomi
  Model          : Redmi 8A
  ID             : PKQ1.190319.001
  SDK            : 28
  Release        : 9
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : olivelite-user 9 PKQ1.190319.001 V11.0.9.0.PCPINXM release-keys
  Miui Ver       : V11
  Device         : olivelite
  Mod_device     : olivelite_in_global
  Display ID     : ZQL2116-olivelite-build-20200530052012
  Security Patch : 2020-05-01
  Emmc_size      : 16GB
  Fingerprint    : Xiaomi/olivelite/olivelite:9/PKQ1.190319.001/V11.0.9.0.PCPINXM:user/release-keys[/COLOR]

[COLOR="#FFA07A"]Processing Remove MiAccount[Patch Method]....[/COLOR]
Backing up Partition for safety...Ok

Scanning Patching address...
[COLOR="#0000FF"]  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]Done!![/COLOR]
[COLOR="#EE82EE"]Total Items patched : 38[/COLOR]
[COLOR="#40E0D0"]Successfully patched address..
Action Result : Ok[/COLOR]

Elapsed Time : 00:00:17[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Redmi Note 8 (ginkgo) Mi Account Remove



160905731971341.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: Xiaomi_redminote8_loader.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&376aba2d&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info......
Serial No.: 0x3C80AD2F
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 424465444
Firmware Version : 4
Product Name : S0J9K9
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244285440[116,484 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 8
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V11.0.9.0.PCOMIXM release-keys
Miui Ver : V11
Device : ginkgo
Mod_device : ginkgo_global
Display ID : PKQ1.190616.001
Security Patch : 2020-05-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.9.0.PCOMIXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 3
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:01:39 [/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

CONDOR Plume P8 (PGN-605) Ultra Power Option


160914445924771.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : CONDOR Model : PGN605 (Plume P8) Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL +
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0337 (0000)MT6753[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 SECURE VERSION : FF 
 BL VERSION     : 01 
 BR Secured     : 00

Preparing Download Agent..
 DA   : [Not Exist]
Trying Default 6735.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
00000000000000000000
PRMMCCID   : 510001154D3332386B740042FD955696
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000003A3E00000 -14,561 GB
ERAM Size  : 0x0000000080000000 -2 GB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 2F63D7676EDD83E8B2A4F36602F52101
eMMC CID   : 510001154D3332386B740042FD735696
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM16]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

[COLOR="#FF0000"]Reading System Info
  Brand          : condor
  Vendor         : condor
  Model          : PGN605
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gionee6753_65u_m0-user 6.0 MRA58K 1467163973 release-keys
  Device         : PGN605
  Board          : PGN605
  Display ID     : PGN605
  Security Patch : 2017-09-05
  Platform       : mt6753
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN605/PGN605:6.0/MRA58K/1467163973:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Encrypted[/COLOR]

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_gionee6753_65u_m0.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\condor_PGN605_0337-mt6753-6.0_PGN605_281220092426\MT6753_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x06A00000] 1024 KB -> frp.bin...Ok
 -nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\condor_PGN605_0337-mt6753-6.0_PGN605_281220092426
[COLOR="#008000"]MTK Phone Loader is NOW RUNNING.[/COLOR]

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:01:19[/SIZE][/FONT][/B]


160914445954232.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : CONDOR Model : PGN605 (Plume P8) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


[COLOR="#FF0000"]Reading System Info
  Brand          : condor
  Vendor         : condor
  Model          : PGN605
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gionee6753_65u_m0-user 6.0 MRA58K 1467163973 release-keys
  Device         : PGN605
  Board          : PGN605
  Display ID     : PGN605
  Security Patch : 2017-09-05
  Platform       : mt6753
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN605/PGN605:6.0/MRA58K/1467163973:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Encrypted[/COLOR]

-------------------------------------
[COLOR="#008000"]Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!![/COLOR]

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:11[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A5S (CPH1909) Pincode Remove - Format Userdata



16093303071711.png


كود:
[B][FONT=Arial Black][SIZE=3]******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial     : *******
Initialize : OKAY
Status     : Activated
Life       : 0 [0-0-0-0-0]

Brand : AUTO Model : AUTO Connection : Meta Mode

---------------------------------
TPortConnection.Create...(COM20)..Opening...Ok

META Phone Info . . .
MCUID: 8U  `    mt6765,S01
ME_SO: S01 
DATE : Tue Oct 20 21:35:33 CST 2020
MODEL: CPH1909EX_11_A.42 
ME_SWVER: CPH1909_11_A.42_201020_00000000


Reset to Factory Default Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:04[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

IRIS NEXT P PLUS Reset FRP

160934774691121.png


كود:
[B][SIZE=2][FONT=Arial Black]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL +
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0337 (0000)MT6753[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   : 6735.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
00000000000000000000
PRMMCCID   : 520001154D423132766D0642212DB5AC
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x0000000747C00000 -29,121 GB
ERAM Size  : 0x00000000C0000000 -3 GB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 95B5FD8A7108549FACC83E99C131A01A
eMMC CID   : 520001154D423132766D064221C3B5AC
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM16]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
  Brand          : IRIS
  Vendor         : KONKA
  Model          : NEXT P+
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : IRIS-user 7.0 NRD90M 1516963748 release-keys
  Device         : NEXT_P_PLUS
  Board          : IRIS
  Display ID     : KAAE3_DZE_FR_0.09.0126
  Security Patch : 2018-01-05
  Platform       : mt6753
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : IRIS/NEXT_P_PLUS/NEXT_P_PLUS:7.0/NRD90M/1516963748:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_kon6753_e3_65_53_n.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\IRIS_NEXT P+_0337-mt6753-7.0_KAAE3_DZE_FR_0.09.0126_301220175418\MT6753_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x06A00000] 1024 KB -> frp.bin...Ok
 -nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\IRIS_NEXT P+_0337-mt6753-7.0_KAAE3_DZE_FR_0.09.0126_301220175418
MTK Phone Loader is NOW RUNNING.

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:20[/FONT][/SIZE][/B]

160934774742792.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


Reading System Info
  Brand          : IRIS
  Vendor         : KONKA
  Model          : NEXT P+
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : IRIS-user 7.0 NRD90M 1516963748 release-keys
  Device         : NEXT_P_PLUS
  Board          : IRIS
  Display ID     : KAAE3_DZE_FR_0.09.0126
  Security Patch : 2018-01-05
  Platform       : mt6753
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : IRIS/NEXT_P_PLUS/NEXT_P_PLUS:7.0/NRD90M/1516963748:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Plume P6 Pro LTE (PGN528) Ultra Power Option


160942572296821.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : CONDOR Model : PGN528 (Plume P6 Pro LTE) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


Reading System Info
  Brand          : condor
  Vendor         : condor
  Model          : PGN528
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gionee6737t_66_m0-user 6.0 MRA58K 1474520619 release-keys
  Device         : PGN528
  Board          : PGN528
  Display ID     : PGN528
  Security Patch : 2016-08-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN528/PGN528:6.0/MRA58K/1474520619:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:05[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Starlight Star_Plus Ultra Power Option

16095748895561.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL +
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 6580 (0000)MT6580[6580]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   : 6580.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID   : 700100543232373038010F75B21F85BD
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000001C8000000 -7,125 GB
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 35F44642137B102145185AAC6DB0EF94
eMMC CID   : 5400017030373232750F0138BD851FB2
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM16]


Reading Partition Table
SIZE[0x000008F0] 26 Items > Done

Reading System Info
  Brand          : Starlight
  Vendor         : Vanzo
  Model          : Star_Plus
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_wd45bl-user 8.1.0 O11019 20200512 release-keys
  Device         : Star_Plus
  Display ID     : Starlight.Star.Plus.V3.05_20200515
  Security Patch : 2020-05-05
  Fingerprint    : Starlight/Star_Plus/Star_Plus:8.1.0/O11019/20200512:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_wd45bl.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Starlight_Star_Plus_6580--8.1.0_Starlight.Star.Plus.V3.05_20200515_010121162345\MT6580_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x18000000] 1024 KB -> frp.bin...Ok
 -nvdata[0x18B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Starlight_Star_Plus_6580--8.1.0_Starlight.Star.Plus.V3.05_20200515_010121162345
MTK Phone Loader is NOW RUNNING.

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:43[/SIZE][/FONT][/B]

160957488983282.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


Reading System Info
  Brand          : Starlight
  Vendor         : Vanzo
  Model          : Star_Plus
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_wd45bl-user 8.1.0 O11019 20200512 release-keys
  Device         : Star_Plus
  Display ID     : Starlight.Star.Plus.V3.05_20200515
  Security Patch : 2020-05-05
  Fingerprint    : Starlight/Star_Plus/Star_Plus:8.1.0/O11019/20200512:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:04[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi 7A (Pine) Mi Account Remove



160966585136411.png


كود:
 PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM20)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&2679771a&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xFEC9C803
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[ca9bp-DncIYGhcy1yCfnkqSbExM]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : *********
 Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 7A
ID : PKQ1.190319.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : pine-user 9 PKQ1.190319.001 V11.0.2.0.PCMCNXM release-keys
Miui Ver : V11
Device : pine
Mod_device : pine_global
Display ID : ZQL1533-pine-build-20191124181032
Security Patch : 2019-11-01
Emmc_size : 16GB
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V11.0.2.0.PCMCNXM:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 3
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:30
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi 5 Plus (Vince) Mi Account Remove




160975569200861.png
 
أعلى