تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor P8 lite (PGN610) Rebuild Userdata Done

الهاتف يدخل لمود ريكوفري (Recovery Mode) ثم يعيد التشغيل

تم الحل باستعمال خاصية Rebuild Userdata



اولا بوت انفو BOOT INFO على الهايدرا


161701612147191.png


كود:
[B][FONT=Arial][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL +
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Found...
 -PreLoader...[COM4]

TPortConnection.Create...(COM4)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0321 (0000)MT6737T[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 0321 (0000)MT6737T[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   : 6735.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
00000000000000000000
PRMMCCID   : 520001154D423145CACD0742C336D9F0
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000003A3E00000 -14,561 GB
ERAM Size  : 0x00000000C0000000 -3 GB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 84B0C3BBB637173870B889E5117B9A56
eMMC CID   : 520001154D423145CACD0742C3C3D9F0
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM5]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
  Brand          : condor
  Vendor         : SPA Condor Electronics
  Model          : PGN610
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gnsz6737t_66_n-user 7.0 NRD90M 1535626513 release-keys
  Device         : PGN610
  Board          : PGN610
  Display ID     : PGN610
  Security Patch : 2018-08-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN610/PGN610:7.0/NRD90M/1535626513:user/release-keys
  StorageType    : mtp
  Userdata State : Not Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_gnsz6737t_66_n.bin
   Creating Scatter file... C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\condor_PGN610_0321-mt6737t-7.0_PGN610_290321120129\MT6737T_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x06A00000] 1024 KB -> frp.bin...Ok
 -nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\condor_PGN610_0321-mt6737t-7.0_PGN610_290321120129
MTK Phone Loader is NOW RUNNING.

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:17
[/SIZE][/FONT][/B]

ترك الهاتف متصل بالكابل والذهاب لخاصية Ulta Power Option ثم Rebuild Userdata


161701520871131.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok


Reading System Info
  Brand          : condor
  Vendor         : SPA Condor Electronics
  Model          : PGN610
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gnsz6737t_66_n-user 7.0 NRD90M 1535626513 release-keys
  Device         : PGN610
  Board          : PGN610
  Display ID     : PGN610
  Security Patch : 2018-08-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN610/PGN610:7.0/NRD90M/1535626513:user/release-keys
  StorageType    : mtp
  Userdata State : Not Encrypted

-------------------------------------
[COLOR="#FF0000"]Operation : Rebuild Userdata
Processing...
Erasing FRP Partition...
Rebuilding Userdata... Ok
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:08
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Honor 8C (BKK-LX2) Remove FRP




161702246259241.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration
Brand : HUAWEI Model : BKK-LX2 (Honor 8C) Storage : Auto
Loader: Huawei-BKK-Honor.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xC80BA4E6
MSM ID : 0x000BA0E1, SDM632-Qualcomm Snapdragon 632
PBL Ver : 00000000
PK HASH : 6BC369511DA9CADB3A7AF61574F89DB3
85003D6241BDD1FF573DBA61BF6AE119

Firehose Loader[Huawei-BKK-Honor.mbn]
SaharaBoot... Ok
Sending .............Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : XXXXXXXXXX
Firmware Version : 0
Product Name : 
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.root.20201208.111438 test-keys
Display ID : System 8.2.0.036(1RUN)
Security Patch : 2020-09-01

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:17
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Huawei Y7 Prime 2018 (LDN-L21) Remove FRP




161718109972271.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

XIAOMI Redmi 8a dual (olivewood) Downgrade Android From 10 To 9

Downgrade From V12.0.1.0.QCQINXM To V11.0.8.0.PCQINXM



161719534602191.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :05/18/2016,1.0.26.0

Getting device info......
Serial No.: 0x80B2128A
MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver   : 00000000
PK HASH   : 57158EAF1814D78FD2B3105ECE4DB18A
            817A08AC664A5782A925F3FF8403D39A
 
Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok 
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[sOdvriHQ04YKh4SWKf1IOvnnQtN]
Checking Internet connection....
 - Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 15881614
Firmware Version    : 875573296
Product Name        : hC8aP>
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Phone Information......
  Vendor         : Xiaomi
  ID             : QKQ1.191014.001
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Miui Ver       : V12
  Mod_device     : olivewood_in_global
  Security Patch : 2021-01-01
  Emmc_size      : 16GB

Reading GPT[3]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
 > modemst1
 > modemst2
 > fsg
C:\Hydra Tool\Backup\Security_Backup\__10_Security_033121133602.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
 - sec(0)[sec.dat]  Skipped
 - config(0)[config.bin]  Skipped
 - vbmeta(0)[vbmeta.img]  Ok
 - vbmetabak(0)[vbmeta.img]  Ok
 - devcfg(0)[devcfg.mbn]  Ok
 - devcfgbak(0)[devcfg.mbn]  Ok
 - apdp(0)[dummy.img]  Ok
 - msadp(0)[dummy.img]  Ok
 - sbl1(0)[sbl1.mbn]  Ok
 - sbl1bak(0)[sbl1.mbn]  Ok
 - rpm(0)[rpm.mbn]  Ok
 - rpmbak(0)[rpm.mbn]  Ok
 - cmnlib(0)[cmnlib_30.mbn]  Ok
 - cmnlibbak(0)[cmnlib_30.mbn]  Ok
 - cmnlib64(0)[cmnlib64_30.mbn]  Ok
 - cmnlib64bak(0)[cmnlib64_30.mbn]  Ok
 - keymaster(0)[km4.mbn]  Ok
 - keymasterbak(0)[km4.mbn]  Ok
 - misc(0)[misc.img]  Ok
 - aboot(0)[emmc_appsboot.mbn]  Ok
 - abootbak(0)[emmc_appsboot.mbn]  Ok
 - tz(0)[tz.mbn]  Ok
 - tzbak(0)[tz.mbn]  Ok
 - dtbo(0)[dtbo.img]  Ok
 - dtbobak(0)[dtbo.img]  Ok
 - splash(0)[splash.img]  Ok
 - dsp(0)[adspso.bin]  Ok
 - dspbak(0)[adspso.bin]  Ok
 - persist(0)[persist.img]  Skipped
 - mdtp(0)[mdtp.img]  Ok
 - mdtpbak(0)[mdtp.img]  Ok
 - boot(0)[boot.img]  Ok
 - recovery(0)[recovery.img]  Ok
 - cache(0)[cache.img]  Ok
 - modem(0)[NON-HLOS.bin]  Ok
 - system(0)[system.img]  Ok
 - vendor(0)[vendor.img]  Ok
 - cust(0)[cust.img]  Ok
 - userdata(0)[userdata.img]  Ok
 - PrimaryGPT(0)[gpt_main0.bin]  Ok

Flashing Patch Configuration.. 
0 [NUM_DISK_SECTORS-34.]   OK
0 [NUM_DISK_SECTORS-34.]   OK
0 [NUM_DISK_SECTORS-34.]   OK
0 [NUM_DISK_SECTORS-34.]   OK
0 [NUM_DISK_SECTORS-1.]   OK
0 [NUM_DISK_SECTORS-1.]   OK
0 [NUM_DISK_SECTORS-33.]   OK
0 [CRC32(2,8192)]   OK
0 [CRC32(NUM_DISK_SECTORS-33.,8192)]   OK
0 [0]   OK
0 [CRC32(1,92)]   OK
0 [0]   OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:54
[/SIZE][/FONT][/B]

161719584148071.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Allure A8 (PGN611) Ultra power option




161755379685441.png



كود:
[B][FONT=Arial Black][SIZE=2]Brand : CONDOR Model : PGN611 (Allure A8) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok


Reading System Info
  Brand          : condor
  Vendor         : SPA Condor Electronics
  Model          : PGN611
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gnsz6753_66_n-user 7.0 NRD90M 1530497184 release-keys
  Device         : PGN611
  Board          : PGN611
  Display ID     : PGN611
  Security Patch : 2018-05-05
  Platform       : mt6753
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN611/PGN611:7.0/NRD90M/1530497184:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:04
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Griffe G5 (PHQ520) Ultra Power Option




161763834902081.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Huawei Y3II (LUA-U22) Remove Lock Without Data Loss

حذف الباسوور بدون فقدان البيانات



161769800998061.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : HUAWEI Model : LUA-U22 (Y3 II) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...
 -PreLoader...[COM4]

TPortConnection.Create...(COM4)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 6582 (0000)MT6582[6582]
 BROM HW_SW_VER : 8A00 CA01 0001 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 6582 (0000)MT6582[6582]
 BROM HW_SW_VER : 8A00 CA01 0001 0000 
 FUSEID         : 00000380
 SECURE VERSION : FF 
 BL VERSION     : 01 
 BR Secured     : 00

Preparing Download Agent..
 DA   : da_mt6582_lua_u22.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.00.00
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
00000000000000000000
PRMMCCID   : 150100464E31324D420649FCCAF27329
Init Configuration
Running DA 4.2 on BBID : 0x87 Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000080000 -512 KB
eMMC USER  : 0x00000001D2000000 -7,281 GB
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 9249709E10A1E3A51962F0A1B4ED300A
eMMC CID   : 460001154D32314EFC4906422973F2CA
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM5]


Reading Partition Table
SIZE[0x000008A0] 23 Items > Done

Reading System Info
  Brand          : HUAWEI
  Vendor         : HUAWEI
  Model          : HUAWEI LUA-U22
  ID             : HUAWEILUA-U22
  SDK            : 22
  Release        : 5.1
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : LUA-U22-user 5.1 HUAWEILUA-U22 C328B014 release-keys
  Device         : HWLUA-U6582
  Board          : LUA-U22
  Display ID     : LUA-U22C328B014
  Security Patch : 2017-12-05
  Platform       : mt6582
  FRPPST         : emmc@frp
  Fingerprint    : HUAWEI/LUA-U22/HWLUA-U6582:5.1/HUAWEILUA-U22/C328B014:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

Autobackup Partitions
 -PRELOADER[0x00000000] 512 KB -> PRELOADER.bin...Ok
   -> Renaming Preloader....  preloader_wt96582_s96582aa51.bin
   Creating Scatter file... C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\HUAWEI_HUAWEI LUA-U22_6582-mt6582-5.1_LUA-U22C328B014_060421091902\MT6582_Android_scatter.txt
 -NVRAM[0x01000000] 5 MB -> NVRAM.bin...Ok
 -FRP[0x1DD80000] 1024 KB -> FRP.bin...Ok
Done!!!
C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\HUAWEI_HUAWEI LUA-U22_6582-mt6582-5.1_LUA-U22C328B014_060421091902
MTK Phone Loader is NOW RUNNING.


Reading System Info
  Brand          : HUAWEI
  Vendor         : HUAWEI
  Model          : HUAWEI LUA-U22
  ID             : HUAWEILUA-U22
  SDK            : 22
  Release        : 5.1
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : LUA-U22-user 5.1 HUAWEILUA-U22 C328B014 release-keys
  Device         : HWLUA-U6582
  Board          : LUA-U22
  Display ID     : LUA-U22C328B014
  Security Patch : 2017-12-05
  Platform       : mt6582
  FRPPST         : emmc@frp
  Fingerprint    : HUAWEI/LUA-U22/HWLUA-U6582:5.1/HUAWEILUA-U22/C328B014:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
[COLOR="#FF0000"]Operation : Remove Lock Without Data Loss
Processing...
Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok].. [Ok] Ok
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:26
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

XIAOMI Redmi Note 8T (wiilow) Remove MiAccount [New Method]
ازالة حساب شاومي Redmi Note 8T


بدون تفليش اي ملفات سواء تفليش كامل او جزئي
يعمل بدون وسيط او اي تطبيقات VPN
يمكن فورمات الهاتف دون الخوف من رجوع الحساب


No Flash any File
No VPN
You Can Factory Your Devices (MiAccount No back)


161778298555521.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

قراءة كود هاتف Samsung B310E



161778846901781.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Oppo Realme 3 (RMX1821) Ultra Power Option



161805045055721.png


كود:
[B][FONT=Arial Black][SIZE=2]Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 42051C32B554822D4405675EE4008805
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 9008617074A0085E554BC122E88012C4 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 08805472cb0b87b3 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-01-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:47
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

STARLIGHT Star Plus Ultra Power Option





161807375825351.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : STARLIGHT Model : Star Plus Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok


Reading System Info
  Brand          : Starlight
  Vendor         : Vanzo
  Model          : Star_Plus
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_wd45bl-user 8.1.0 O11019 20190619 release-keys
  Device         : Star_Plus
  Display ID     : Starlight.Star.Plus.V3.03_20190619
  Security Patch : 2019-05-05
  Fingerprint    : Starlight/Star_Plus/Star_Plus:8.1.0/O11019/20190619:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:04
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi 9 (lancelot) IMEI Repair


اولا تفليش ملفات NVDATA و NVRAM
نجد ملف في سيبور البوكس Xiaomi MTK Fix IMEI 0.rar


161807375845062.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1633 (Android) (COM9)
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&34ba95f&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 73394EC7EE19EE5A9028DC46137D2CC5
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58,242 GB
 eMMC CID   : 15010044503644414203A185CA338713 - DP6DAB

Reading GPT-EMMC [0x00008000] 130 Items

Write Selected Partition
 - nvdata Ok
 - nvram Ok
=====================================

Elapsed Time : 00:00:11
[/SIZE][/FONT][/B]


بعدها نقوم بتصليخ الايمي الثاني


161807375851253.png


كود:
[B][FONT=Arial Black][SIZE=2]***IMEI REPAIR FUNCTION****
Xiaomi Flashmode
Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1633 (Android) (COM9)
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&34ba95f&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 73394EC7EE19EE5A9028DC46137D2CC5
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58,242 GB
 eMMC CID   : 15010044503644414203A185CA338713 - DP6DAB

Reading GPT-EMMC [0x00008000] 130 Items

IMEI INFO..
  IMEI1         : FFFFFFFFFFFFFFF
  IMEI2         : 111111111111119
ERROR : CMD=07000400, ACK : 0x00200000[]
IMEI INFO..
  IMEI1         : FFFFFFFFFFFFFFF
  IMEI2         : 86546ْْْْْWXXXXX6458

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:05
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Mi8 SE (Sirius) Remove MiAccount[New Method]




16181307603331.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration
 Brand : XIAOMI Model : Mi 8 SE (Sirius) Storage : Auto
 Loader: prog_emmc_firehose_sdm670_ddr.elf
 Port : Auto
 Connection :

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7


Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping..................... Ok
Configuration........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 24 2018 - 20:05:37

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1558432290
Firmware Version : 5
Product Name : 
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 84 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information......
Vendor : Xiaomi
ID : QKQ1.190828.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Miui Ver : V11
Security Patch : 2020-03-01

Processing Remove MiAccount[New Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 3
Successfully patched address..
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:29
[/SIZE][/FONT][/B]
 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
761
مستوى التفاعل
524
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

huawei P30 Lite mar-lx1m frp Remove







لتشغيل الجهاز يرجى الضغط على زر التشغيل مع خفض الصوت
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

IRIS IS-6 Fix Black Screen




161850277448161.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL +
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok



Reading Partition Table
SIZE[0x00000738] 21 Items > Done

Preparing to flash selected partitions
Flashing....
 preloader(preloader_keytak6580_weg_l.bin) Ok
 lk(lk.bin)240,473 KB Ok
 boot(boot.img)6,461 MB Ok
 recovery(recovery.img)7,133 MB Ok
 logo(logo.bin)554,706 KB Ok
 secro(secro.img)132 KB Ok
 system(system.img)1,178 GB Ok
 cache(cache.img)6,102 MB Ok
 userdata(userdata.img)26,524 MB Ok
Done!!!!

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:02:31
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor A8 Safe Format Done



161874068826161.png


كود:
[B][FONT=Arial Black][SIZE=2]=====================================
Searching for MTK Device...Found
 Port Identification :DA_HIGHSPEED_VCOM
 FriendlyName :MediaTek DA USB VCOM (Android) (COM5)
 SymbolicName :\??\USB#VID_0E8D&PID_2001#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0



Reading System Info
  Brand          : condor
  Vendor         : SPA Condor Electronics
  Model          : PGN611
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gnsz6753_66_n-user 7.0 NRD90M 1530497184 release-keys
  Device         : PGN611
  Board          : PGN611
  Display ID     : PGN611
  Security Patch : 2018-05-05
  Platform       : mt6753
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN611/PGN611:7.0/NRD90M/1530497184:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Safe Format
Processing...
Safeformat Universal...(tmp.bin)512 Bytes Ok Ok

Elapsed Time : 00:00:04
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

DOOGEE X6 S Ultra Power Option



161891164856231.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok


Reading System Info
  Brand          : DOOGEE
  Vendor         : DOOGEE
  Model          : X6 S
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : x2605_a40t_ah_32-user 6.0 MRA58K 1489390674 release-keys
  Device         : x2605_a40t_ah_32
  Board          : x2605_dg_a40t_ah_32_35m35u
  Display ID     : DOOGEE-X6S-AH-Android6.0-20170313
  Security Patch : 2016-03-01
  Platform       : mt6735m
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : DOOGEE/x2605_a40t_ah_32/x2605_a40t_ah_32:6.0/MRA58K/1489390674:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:05
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

CONDOR Plume P6 (PGN517)
ازالة الباسوورد بدون ضياع البيانات


16189148969491.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : CONDOR Model : PGN517 (Plume P6) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok


Reading System Info
  Brand          : condor
  Vendor         : condor
  Model          : PGN517
  ID             : LMY47I
  SDK            : 22
  Release        : 5.1
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : user 5.1 LMY47I 1450360929 release-keys
  Device         : PGN517
  Display ID     : PGN517
  Security Patch : 2016-04-01
  Platform       : mt6580
  FRPPST         : /dev/block/platform/mtk-msdc.0/by-name/frp
  Fingerprint    : condor/PGN517/PGN517:5.1/LMY47I/1450360929:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Remove Lock Without Data Loss
Processing...
Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:06
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A1K (CPH1923) Format Done Metamode by HYDRA



161893763580011.png



161893716950911.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM10)
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Rebooting phone 
Handshaking...Ok
Switching to META..
Please wait for until phone is in META mode...
Done!!!

----------------------------------

Elapsed Time : 00:00:04
[/SIZE][/FONT][/B]



161893716982682.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :METAMODE Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM11)
 SymbolicName :\??\USB#VID_22D9&PID_0006#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


META Phone Info . . .
MCUID: 8U  `    mt6765
ME_SO: 
DATE : Wed Feb 24 17:52:58 CST 2021
MODEL: CPH1923EX_11_A.39
ME_SWVER: CPH1923_11_A.39_210224_6db7754b
MANUFACTURER : OPPO
BOARD : oppo6762_18540
MODEL : CPH1923
NAME : unknown
BUILD.DISPLAY.ID : CPH1923EX_11_A.39
USB.MODEL : CPH1923EX_11_A.39
BUILD.VERSION.RELEASE : 9
BUILD.VERSION.SECURITY_PATCH : 2021-03-05
DEVICE : unknown
BRAND : OPPO
SERVICE CALL IPHONESUBINFO 1 : unknown
PERSIST.MTK.WCN.COMBO.CHIPID : unknown
SERIALNO : unknown
MEDIATEK.PLATFORM : unknown
MEDIATEK.CHIP_VER : unknown
HARDWARE : mt6765
MEDIATEK.VERSION.RELEASE : CPH1923_11_A.39_210224
OEM_UNLOCK_SUPPORTED : unknown
EXPECT.RECOVERY_ID : unknown
FRP.PST : /dev/block/platform/bootdevice/by-name/frp
BUILD.FINGERPRINT : unknown
GSM.VERSION.BASEBAND : unknown
SW.BUILDID : unknown
RIL.IMEI : unknown
SYS.USB.CONFIG : unknown

IMEI 1 : 
IMEI 2 : 

Rebooting....
Done!!!

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]


161893716987873.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :METAMODE Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM11)
 SymbolicName :\??\USB#VID_22D9&PID_0006#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


META Phone Info . . .
MCUID: 8  [ FT       rcVT  brand`cJT  
ME_SO: i]T     keyhash TT        ZT  ~-  YT     EXP HT     SINcYT d  
DATE : seq FT      R9m FT      NewqUT  ~-  FT       D FT      nvram WT     MOD9]T H(    } har VT  
MODEL:  ]T j   FT       
ME_SWVER: MATCHCQZT j   RT   /   9 


Reset to Factory Default Ok
Rebooting....
Done!!!

Elapsed Time : 00:00:01
[/SIZE][/FONT][/B]

161893763592042.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi note 8 Fastboot Format Userdata



161899383240681.png


كود:
[B][FONT=Arial Black][SIZE=2]Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial     : 000000000000
Initialize : OKAY
Status     : Activated
Life       : 0 [0-0-0-0-0]

Searching Device By Fastboot
Device Found...
Fastboot Factory Reset...
Fastboot Format Userdata....
Processing... 
Action Result : Ok

Elapsed Time : 00:00:00
[/SIZE][/FONT][/B]
 
أعلى