تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,591
مستوى التفاعل
1,789
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

GEANT F5 Read Code/Passwords [NOR] Done

Hydra Unisoc Tool



163620678521741.png


كود:
[B][FONT=Arial Black][SIZE=2]Port : [Auto] Scanning...COM35
Opening Port...(COM35)Ok
------------------------------------------
Screenlock Security...
------------------------------------------
Executing... Read Code/Passwords [NOR]
FlashID : [C81660] Size : 0x00400000
Serial   : 75971887230242
IMEI [1] : 35817XXXXXXX340
IMEI [2] : 35817XXXXXXX357
IMEI [3] : 35817XXXXXXX340
IMEI [4] : 35817XXXXXXX357

Scanning.....
[COLOR="#FF8C00"]Code[/COLOR][[COLOR="#FF8C00"]00[/COLOR]] : [COLOR="#008000"]20933[/COLOR]

Action Result..Ok

Elapsed Time : 00:00:03


Closing Port...Ok..
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,591
مستوى التفاعل
1,789
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

STREAM B1S Reset to Factory (MetaMode) Done

First Reboot Phone To Metamode Auto
Second Factory reset/Format Userdata

Hydra MTK Tool




163621014904072.png


163621014893151.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :METAMODE BROM
 FriendlyName :MediaTek USB VCOM (Android) (COM38)
 Device       :7&38c46629&0&0001
 SymbolicName :\??\COM38
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..

META Phone Info . . .
MCUID: [COLOR="#FF8C00"]8U  `    mt6580,S01[/COLOR]
ME_SO: [COLOR="#FF8C00"]S01 [/COLOR]
DATE : 
MODEL: 
ME_SWVER: [COLOR="#FF8C00"]alps-mp-o1.mp2[/COLOR] 


[COLOR="#008000"]Reset to Factory Default[/COLOR] Ok
Rebooting....
Done!!!

Elapsed Time : 00:00:02
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,591
مستوى التفاعل
1,789
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

تصليح ايمي STREAM B2Plus (HT28) IMEI Repair

Hydra MTK Tool





Read Sytem Info


163628859762721.png


IMEI REPAIR FUNCTION


163628859839232.png


كود:
[B][FONT=Arial Black][SIZE=2]***[COLOR="#008000"]IMEI REPAIR FUNCTION[/COLOR]****
Univ FlashMode
Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1633 (Android) (COM3)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0



Reading System Info
  Brand          : STREAM
  Vendor         : EastAeon
  Model          : HT28
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_k37mv1_bsp-user 8.1.0 O11019 1542348863 release-keys
  Device         : B2Plus
  Display ID     : HB45B2Plus.DZ.V10.0.0.2018.11.22
  Security Patch : 2018-10-05
  Fingerprint    : STREAM/B2Plus/B2Plus:8.1.0/O11019/1542348863:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted
IMEI INFO..
  IMEI1         : 000000000000000
  IMEI2         : 000000000000000 [[COLOR="#008000"]Ok[/COLOR]]

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]


Read Sytem Info


163628859857063.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,591
مستوى التفاعل
1,789
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Redmi 9T (lime) Flash Firmware (V12.0.17.0.QJQMIXM) Done

the system has been destroyed

Hydra Qualcomm Tool



163636595612321.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,591
مستوى التفاعل
1,789
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Redmi Note 8 2021 (biloba) Relock Bootloader Done

الهاتف جديد في العلبة جاء مفتوح بوت لودر تم غلقه لتفادي اي مشاكل

HYDRA MTK TOOL



163637325028831.png


كود:
[B][FONT=Arial Black]Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1633 (Android) (COM3)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 52B884712CF06441265C80EF7859FF44
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 90012C44287850004E098AC82D12B336 - hC8aP>

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : [COLOR="#008000"]Relock Bootloader[/COLOR]
Processing...
-------------------------------
Bootloader Status...
Bootloader : [COLOR="#FF0000"]Unlocked[/COLOR]
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : [COLOR="#008000"]Locked[/COLOR]
-------------------------------
[COLOR="#008000"]Action Result : Ok
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:03
[/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,591
مستوى التفاعل
1,789
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor A8 (PGN611) Ultra Power Option


Hydra MTK Tool


163663717788021.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :DA_HIGHSPEED_VCOM
 FriendlyName :MediaTek DA USB VCOM (Android) (COM4)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2001#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..


Reading System Info

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Safeformat Universal...(tmp.bin)512 Bytes Ok
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:01
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,591
مستوى التفاعل
1,789
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Redmi 9A (dandelion) Unlock Bootloader Done

Hydra MTK Tool



163664443652321.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM7)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 39576C356EB3A3DDDA6A35EA76FA6989
 ERAM Size  : 0x0000000000038000 -224 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 4501004441343033320198B15F1E68F3 - DA4032

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : [COLOR="#FF0000"]Unlock Bootloader[/COLOR]
Processing...
-------------------------------
Bootloader Status...
  Bootloader : [COLOR="#FF0000"]Locked[/COLOR]
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
  Bootloader : [COLOR="#008000"]Unlocked[/COLOR]
-------------------------------
Action Result :  Ok

Elapsed Time : 00:00:02
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,591
مستوى التفاعل
1,789
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi 9A (dandelion) Remove FRP Done

Hydra MTK Tool




163681677271751.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM7)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..
Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E7
 SBC           : 01 (True)
 SLA           : 02 (True)
 DAA           : 04 (True)
 SWJTAG        : 06 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking...Ok

C:\Hydra Tool\Backup\Preloader_dump\prel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)

MEID : 7B5728614B55819EC0180EC7340EE5E9
Stage 1..[Size:216440]
 Sending :  Please wait.. Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Preloader Initialization...
 Parsing prel.tmp
 Init : Accepted
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 059506388D3389B22BE1DFC44C3293EA
 ERAM Size  : 0x0000000000038000 -224 KB
 IRAM Size  : 0x00000000C0000000 -3 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 150100424A54443452097ED45E5C97F1 - BJTD4R
 Executing : ACCEPTED...

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_k62v1_64_bsp.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__111321161313\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x3BD88000]1024 KB ->frp.bin...Ok
-nvdata[0x3DE88000]64 MB ->nvdata.bin...Ok
-protect1[0x45522000]8 MB ->protect1.bin...Ok
-protect2[0x45D22000]10.867 MB ->protect2.bin...Ok
-persist[0x47000000]48 MB ->persist.bin...Ok
-nvram[0x52E80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__111321161313
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 059506388D3389B22BE1DFC44C3293EA
 ERAM Size  : 0x0000000000038000 -224 KB
 IRAM Size  : 0x00000000C0000000 -3 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 150100424A54443452097ED45E5C97F1 - BJTD4R

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
[COLOR="#FF8C00"]Operation : Auto
Processing...
ZeroWipe FRP Partition...
Action Result :  Ok
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:39
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,591
مستوى التفاعل
1,789
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Brandt BSTAR + Ultra Power Option
Safeformat Universal + ZeroWipe FRP
Hydra MTK Tool


163706629963861.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM (Android) (COM3)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : BFF3CCDC818AE99246C9D727DE032435
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x00000003A3E00000 -14.561 GB
 eMMC CID   : 150100523832314D42002777D4467255 - R821MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : Brandt
  Vendor         : Vanzo
  Model          : BSTAR+
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : fr-DZ
  Description    : full_fd3903o-user 8.1.0 O11019 20180817 release-keys
  Device         : BSTAR_PLUS
  Display ID     : BTA55H8S17082018
  Security Patch : 2018-08-05
  Fingerprint    : Brandt/BSTAR_PLUS/BSTAR_PLUS:8.1.0/O11019/20180817:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
[COLOR="#008000"]ZeroWipe FRP Partition...
Safeformat Universal...
Action Result :  Ok
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,591
مستوى التفاعل
1,789
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A1K (CPH1923) Remove Password Without Data loss


Hydra MTK Tool



163722547516762.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,591
مستوى التفاعل
1,789
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Huawei Y7 2019 (DUB-LX3) Remove FRP Done

Hydra Qualcomm Tool



163722582328421.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,591
مستوى التفاعل
1,789
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi Note 8 (ginkgo) Remove FRP Done

Hydra Qualcomm Tool



16372258234132.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,591
مستوى التفاعل
1,789
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

INFINIX SMART 5 (X657C) Ultra Power Option
Safeformat Universal + ZeroWipe FRP

Hydra MTK Tool


163739710871741.png


163739710885982.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM7)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 6C506F6173E26D1ADCF61066D2D4802D
 ERAM Size  : 0x0000000000039000 -228 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000750000000 -29.25 GB
 eMMC CID   : 7001004432363033321028B883EF9723 - D26032

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
[COLOR="#FF8C00"]Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal...
Action Result :  Ok
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:02
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,591
مستوى التفاعل
1,789
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A15 (CPH2185) Ultra power Option
Safe Format + Erasing FRP

بدون ضياع البيانات

Hydra MTK Tool


16375889142171.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM7)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..
Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E5
 SBC           : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)
 SWJTAG        : 04 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking...Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:\Hydra Tool\Backup\Preloader_dump\prel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)

MEID : FE0A98149CE631FC22BA12659F9E227C
Stage 1..[Size:216440]
 Sending :  Please wait.. Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Preloader Initialization...
 Parsing prel.tmp
 Init : Accepted
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 61B069BCE2498712BE2ACF0B95FBD285
 ERAM Size  : 0x0000000000038000 -224 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 1501003458364B4D42035C3BD488A747 - 4X6KMB
 Executing : ACCEPTED...

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_oppo6765.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__112221123948\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x15088000]1024 KB ->frp.bin...Ok
-nvdata[0x17188000]64 MB ->nvdata.bin...Ok
-protect1[0x1E822000]8 MB ->protect1.bin...Ok
-protect2[0x1F022000]15.867 MB ->protect2.bin...Ok
-persist[0x20800000]48 MB ->persist.bin...Ok
-nvram[0x2C600000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__112221123948
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 61B069BCE2498712BE2ACF0B95FBD285
 ERAM Size  : 0x0000000000038000 -224 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 1501003458364B4D42035C3BD488A747 - 4X6KMB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
[COLOR="#008000"]Operation : Safe Format Method 1
Processing...
Erasing FRP Partition...
Safeformat Universal...
Action Result :  Ok
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:50
[/SIZE][/FONT][/B]
 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
758
مستوى التفاعل
517
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi 9A auto restart solution
الفلاشة dandelion_global_images_V12.0.16.0.QCDMIXM_20210821.0000.00_10.0_global



كود:
Brand : XIAOMI Model : Redmi 9A (dandelion) Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM9)
 Device       :6&186afa3&0&4
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&186afa3&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 6061988D32E4DC8CA1EAEC8E35081D7C
 ERAM Size  : 0x0000000000038000 -224 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 150100424A5444345209DAA3B6E0A779 - BJTD4R

Reading GPT-EMMC [0x00008000] 130 Items

Flashing Selected Partitions....
 - preloader[preloader_k62v1_64_bsp.bin] 256 KB Skipped
 - recovery[recovery.img] 64 MB  Flash ->    = Ok
 - cust[cust.img] 832 MB  Flash ->           = Ok
 - vbmeta_system[vbmeta_system.img] 8 MB  Flash ->= Ok
 - vbmeta_vendor[vbmeta_vendor.img] 8 MB  Flash ->= Ok
 - efuse[efuse.img] 512 KB  Flash ->         = Ok
 - md1img[md1img.img] 100 MB  Flash ->       = Ok
 - spmfw[spmfw.img] 1024 KB  Flash ->        = Ok
 - scp1[scp.img] 1024 KB  Flash ->           = Ok
 - scp2[scp.img] 1024 KB  Flash ->           = Ok
 - sspm_1[sspm.img] 1024 KB  Flash ->        = Ok
 - sspm_2[sspm.img] 1024 KB  Flash ->        = Ok
 - lk[lk.img] 2 MB  Flash ->                 = Ok
 - lk2[lk.img] 2 MB  Flash ->                = Ok
 - boot[boot.img] 64 MB  Flash ->            = Ok
 - logo[logo.bin] 8 MB  Flash ->             = Ok
 - dtbo[dtbo.img] 8 MB  Flash ->             = Ok
 - tee1[tee.img] 5 MB  Flash ->              = Ok
 - tee2[tee.img] 8.5 MB  Flash ->            = Ok
 - super[super.img] 4.5 GB  Flash ->         = Ok
 - vbmeta[vbmeta.img] 8 MB  Flash ->         = Ok
 - cache[cache.img] 432 MB  Flash ->         = Ok
 - userdata[userdata.img] 3 GB  Flash ->     = Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!
=====================================

Elapsed Time : 00:06:49
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,591
مستوى التفاعل
1,789
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi 9 (lancelot) Unlock Bootloader Done

Hydra MTK Tool



163853747383151.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM7)
 Device       :5&15c311e1&0&10
 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c311e1&0&10#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..
Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0707MT6768 [6768]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E7
 SBC           : 01 (True)
 SLA           : 02 (True)
 DAA           : 04 (True)
 SWJTAG        : 06 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking...Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:\Hydra Tool\Backup\Preloader_dump\prel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0707MT6768 [6768]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)

MEID : 23CCF9662B90EE8D9E78404339F4DA67
Stage 1..[Size:256504]
 Sending :  Please wait.. Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Preloader Initialization...
 Parsing prel.tmp
 Init : Accepted
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : D7559F78F2B1D560065D7134EC68ECF9
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58.242 GB
 eMMC CID   : 15010044503644414203CB959A3D57E9 - DP6DAB
 Executing : ACCEPTED...

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_lancelot.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__120321135459\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-protect1[0x164A2000]8 MB ->protect1.bin...Ok
-protect2[0x16CA2000]11.367 MB ->protect2.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__120321135459
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : D7559F78F2B1D560065D7134EC68ECF9
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58.242 GB
 eMMC CID   : 15010044503644414203CB959A3D57E9 - DP6DAB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:59
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,591
مستوى التفاعل
1,789
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A15 (CPH2185) Ultra power Option
Safe Format + Erasing FRP

بدون ضياع البيانات

Hydra MTK Tool



163860423765311.png



كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM20)
 Device       :5&15c311e1&0&9
 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c311e1&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..
Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E5
 SBC           : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)
 SWJTAG        : 04 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking...Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:\Hydra Tool\Backup\Preloader_dump\prel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)

MEID : 7F1ED625D702CBEB5A0F6DACDCCA6B95
Stage 1..[Size:216440]
 Sending :  Please wait.. Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Preloader Initialization...
 Parsing prel.tmp
 Init : Accepted
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 7402479E6F1321C2B17CA56E0C4D83BA
 ERAM Size  : 0x0000000000038000 -224 KB
 IRAM Size  : 0x00000000C0000000 -3 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 90014A68423861503E03004E9B1BB79D - hB8aP>
 Executing : ACCEPTED...

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_oppo6765.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__120421084459\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x15088000]1024 KB ->frp.bin...Ok
-nvdata[0x17188000]64 MB ->nvdata.bin...Ok
-protect1[0x1E822000]8 MB ->protect1.bin...Ok
-protect2[0x1F022000]15.867 MB ->protect2.bin...Ok
-persist[0x20800000]48 MB ->persist.bin...Ok
-nvram[0x2C600000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__120421084459
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 7402479E6F1321C2B17CA56E0C4D83BA
 ERAM Size  : 0x0000000000038000 -224 KB
 IRAM Size  : 0x00000000C0000000 -3 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 90014A68423861503E03004E9B1BB79D - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Safe Format Method 1
Processing...
Erasing FRP Partition...
Safeformat Universal...
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:55
[/SIZE][/FONT][/B]
 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
758
مستوى التفاعل
517
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Poco M3 mi account remove [No relock, No VPN]


كود:
PreOperation Configuration 
 Brand : XIAOMI Model : Poco M3 (citrus) Storage : Auto
 Loader: 0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM44)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&186afa3&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping...................... Ok 
Configuration........
Identifying Chip........UFS 
Ok
Chip Configuration :
 MemoryName : UFS
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 
 MaxXMLSizeInBytes : 4096
 TargetName : 
 Version : 1
 DateTime : Nov 16 2020 - 01:25:39

*** STORAGE DEVICE INFO ***
Memory Type         : UFS
Block Size in Bytes : 4096
Page Size           : 4096
Manufacturer ID     : 429
Serial Number       : 2037279096
Firmware Version    : 002
Product Name        : H9HQ15ACPMBDAR
Physical Partitions : 6
Total Logical Blocks:
          Drive [0]  30119936[114.898 GB]
          Drive [1]  2048[8 MB]
          Drive [2]  2048[8 MB]
          Drive [3]  32768[128 MB]
          Drive [4]  1048576[4 GB]
          Drive [5]  32768[128 MB]

Protocol : Universal
Running : Ok
Reading GPT[6]
          Drive [0] 32 Items
          Drive [1] 32 Items
          Drive [2] 32 Items
          Drive [3] 32 Items
          Drive [4] 64 Items
          Drive [5] 32 Items

 
Failed to read information from phone.

Processing Remove MiAccount[New Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]Done!!
Total Items patched : 7
Successfully patched address..
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:38
 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
758
مستوى التفاعل
517
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Huawei Y6 Pro 2017 [SLA-L22] Frp Remove



كود:
PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM45)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&2953c98d&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8917
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 153416425
Firmware Version    : 13
Product Name        : QE13MB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30535680[14.561 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Phone Information.....
  Brand          : Huawei
  Vendor         : unknown
  Model          : generic_a53_32
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : generic_a53_32-user 7.0 NRD90M eng.jenkin.20190505.092208 test-keys
  Device         : generic_a53_32
  Display ID     : System 5.1.0.78(1EG6)
  Security Patch : 2019-05-01
  Fingerprint    : Huawei/generic_a53_32/generic_a53_32:7.0/NRD90M/jenkin05050922:user/test-keys

Reading GPT[3]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

Removing FRPta...
Method : 
Auto 
Processing... 
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:04
 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
758
مستوى التفاعل
517
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Huawei Y6 Prime 2019 MRD-LX1F FRP remove

العملية بــ TP


كود:
=====================================
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM23)
 Device       :6&2953c98d&0&4
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&2953c98d&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 367A550C524EEFBF7982E0DFC26D7E90
 ERAM Size  : 0x0000000000039000 -228 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 90014A68423861503E0100F23ECA3789 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Action Result :  Ok

Elapsed Time : 00:00:02
 
أعلى