تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

IRIS IS3Plus Removing FRP (ADB MODE)



163014786630211.png



كود:
[B]Searching Device By ADB
Device Found...
   Model : IS3Plus
   Brand : IRIS
   Android Ver : 8.1.0
   CPU abi : armeabi-v7a
   Board : S239
   Bootloader : IS3Plus20190108V1.0
   Display ID : 2018-12-05
   Emmc_size : mt6580
   Platform : 2018-12-05
   SYS USB CONFIG : persist.adb
   FRPPST : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
   FingerPrint : IRIS/IS3Plus/IS3Plus:8.1.0/O11019/1544153345:user/release-keys

Checking Root Status.... 
Root Status : Not Rooted

Operation : ADB FRP
Removing FRP ...  Ok

Elapsed Time : 00:00:04
[/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Samsung Galaxy J5 (SM-J500H) Successfully Formatted (Download Mode)




163031166968041.png



كود:
[B][FONT=Arial Black][SIZE=2]Scanning port....
TPortConnection.Create...(COM15)..Opening...Ok
Device Mode : Download Mode
CPU         : QUALCOMM
Format Userdata 
SamFormatUDZeroWipe
Total Binary Size is 0.25MB
Initialize Phone : Ok
Partition Information Table(PIT)
 - Backup 
Backup PIT (COM_TAR2MSM8916) Ok
 - Reading.. Ok
 - Mapping..Ok
Successfully Formatted!!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:11
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Griffe T1 (SP413)


Factory Reset/Format Userdata

163034764606791.png



Service_FRP_Flashmode

163034764617382.png

 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Oppo A3S (CPH1803) Unlock Password Done

Without Data Loss SafeFormat

ISP EMMC HYDRA TOOL



163059070451621.png


كود:
[B][FONT=Arial Black][SIZE=2]Cylinders           : 1900
Tracks Per Cylinder : 255 
Sectors Per Track   : 63
Bytes Per Sector    : 512
DriveSize           : 15628032000- 14.555 GB
Total Disk Size     : 15634268160- 14.561 GB

Reading partitions...[COLOR="#008000"](64- Items)[/COLOR]
[COLOR="#008000"][COLOR="#008000"]SafeFormatUserData Method 2
FRP Remove.
[/COLOR][/COLOR][COLOR="#800080"]Action Result :[/COLOR] [COLOR="#008080"]Ok[/COLOR]

[COLOR="#008080"]Elapsed Time : 00:00:05
[/COLOR][/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Oppo A15 (CPH2185) Factory Reset + Remove FRP

Done By Hydra Tool



163075968378381.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Samsung Galaxy A01 Core (SM-A013F) FRP Remove

Formatting Presistent Done





163076133137132.png
 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
761
مستوى التفاعل
524
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

oppo a93 cph2121 Format + frp

 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

HUAWEI Y6II (CAM-L21) FRP Remove Done Manufacturer Mode


163077760039361.png


كود:
[B][FONT=Arial Black][SIZE=2]Scanning port....
TPortConnection.Create...(COM19)..Opening...Ok

no permission

--------------------
FASTBOOT: DailyBuild_201807121304_FASTBOOT
BOOT: C900B162_BOOT
RECOVERY: DailyBuild_201807121304_RECOVERY
SYSTEM: CAM-L21C900B162_SYSTEM
MAINVER: CAM-L21C900B162
DATAVER: (unknow)
APTIME: Thu Jul 12 13:11:32 CST 2018
CUSTTIME: Thu Jul 12 13:27:02 CST 2018
--------------------
RAM      : ssion
EMMC     : sion
VendorCountry: hw,meafnaf
MACWLAN  : ssion
MACBT    : mission
Board SN : DU3SGD17CK089894
Mobile SN: LHTDU18118003545
MEID     : ission
IMEI 1   : 
IMEI 2   : 
no permission
DEVMODEL : no permission
DONGLEINFO: no permission
[COLOR="#FF0000"]Executing Factory Reset...... Ok
[/COLOR]
TPortConnection.Destroy.....Closing...Ok..
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Realme C15 (RMX2180) Ultra Power Option



163084664016611.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1633 (COM21)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 063D9F1C94868D6891F9E657F7441FA1
 ERAM Size  : 0x0000000000038000 -224 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000001D1F000000 -116.484 GB
 eMMC CID   : 13014E47314A395339100DFC3A60184F - G1J9S9

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal...
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:02
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A37F (Neo 9) Remove Pattren Without Loss Data

Safe Format - eMMc) Done)


163092267191561.png



كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 Brand : OPPO Model : A37F (Neo 9) Storage : Auto
 Loader: 8916.mbn
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :07/02/2015,2.00.05.00

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8916
 Version : 1


Protocol : Universal
Running : Ok
Reading GPT[3]
          Drive [0] 40 Items
          Drive [1] 0 Items
          Drive [2] 4 Items

 
Phone Information.....
  Brand          : OPPO
  Vendor         : OPPO
  Model          : A37f
  ID             : LMY47V
  SDK            : 22
  Release        : 5.1.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Description    : msm8916_64-user 5.1.1 LMY47V eng.root.20171008.172519 release-keys
  Board          : msm8916
  Display ID     : A37fEX_11_171008
  Security Patch : 2017-09-01
  Platform       : msm8916
  FRPPST         : /dev/block/bootdevice/by-name/config

Processing Safe Format....
 - Removing FRP [Zero Wipe] Ok
 - Formatting Userdata  [Safe Format - eMMc] Ok
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Lenovo Vibe C2 (k10a40) Erase Userdata Done


لا تضغط على bootinfo ضع ملف da واختر العملية اللازمة format او frp واضغط مباشرة على Execute

163102355485731.png
 

tontonflach

عضو نشط
إنضم
1 أكتوبر 2013
المشاركات
73
مستوى التفاعل
72
النقاط
0
الإقامة
BALLOTE
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

السلام عليكم
كما عودناكم .. بكبسة زر تم حدف جيمايل
OPPO A93 === CPH 2121

INFO
كود:
******* Dongle Info *******\cf1\par
Version    : \cf2\b Hydra Tool v 1.2\cf1\b0\par
Serial     : \cf2\b 201000009103\cf1\b0\par
Initialize : \cf2 OKAY\cf1\par
Status     : \cf2 Activated\par
Life       : 0 [0-0-0-0-0]\cf1\par
\par
\cf4\par
Brand : \cf5 OPPO\cf4  Model : \cf5 A93 (CPH2121)\cf4  Connection : \cf5 Flash Mode\cf1\par
\cf4\par
=====================================\par
How To Boot : Power off phone\par
 * BROM Mode : Press VOL + or Press VOL -+\par
 * Preloader Mode : Just Insert cable\cf1\par
\par
Searching for MTK Device...\cf3 Found\cf1\par
 Port Identification :\cf3 Flashmode BROM \cf1\par
 FriendlyName :\cf3 MediaTek USB Port (COM23)\cf1\par
 Device       :\cf3 5&94b8c27&0&3\cf1\par
 SymbolicName :\cf3\\??\\USB#VID_0E8D&PID_0003#5&94b8c27&0&3#\{a5dcbf10-6530-11d2-901f-00c04fb951ed\}\cf1\par
 Driver Ver   :\cf3 01/22/2015,3.0.1504.0\cf1\par
\par
Opened handle..\par
Handshaking...\cf4 Ok\cf1\par
\par
Identifying Hardware ID.....\par
Reading Device hardware info..\par
 hw code       : 0725\cf6 MT6779\cf7  [6779]\cf1\par
 hw subcode    : 8A00\par
 hw version    : CA01\par
 sw version    : 0000\par
 Target config : E5\par
 SBC           : 01 (True)\par
 SLA           : 00 (False)\par
 DAA           : 04 (True)\par
 SWJTAG        : 04 (True)\par
 EPP           : 00 (False)\par
 CERT          : 00 (False)\par
 MEMREAD       : 20 (True)\par
 MEMWRITE      : 40 (True)\par
 CMD_C8        : 80 (True)\par
\par
Exploiting Device...\par
Exploit Sent..\par
Successfully Exploited...\par
Handshaking...\cf4 Ok\cf1\par
\par
C:\\Hydra Tool\\Backup\\Preloader_dump\\prel.tmp\par
Handshaking...\par
\par
Identifying Hardware ID.....\par
Reading Device hardware info..\par
 hw code       : 0725\cf6 MT6779\cf7  [6779]\cf1\par
 hw subcode    : 8A00\par
 hw version    : CA01\par
 sw version    : 0000\par
 Target config : 00\par
 SBC           : 00 (False)\par
 SLA           : 00 (False)\par
 DAA           : 00 (False)\par
 SWJTAG        : 00 (False)\par
 EPP           : 00 (False)\par
 CERT          : 00 (False)\par
 MEMREAD       : 00 (False)\par
 MEMWRITE      : 00 (False)\par
 CMD_C8        : 00 (False)\par
\par
MEID : 9BC464D5F290CDA471BAB2E45DC63D90\par
Stage 1..\cf3 [Size:229592]\par
 Sending :  Please wait.. \cf1 Accepted\par
\cf4\par
Identifying Protocol...\cf3\par
 Protocol : \cf1 New\cf3\par
 Synchronization...\cf1 SYNC\par
 Preloader Initialization...\par
 Parsing \cf4 prel.tmp\cf1\par
 Init : \cf4 Accepted\cf3\par
 Executing : \cf1 SYNC\par
\cf4\par
Reading Device UniqueID, RAM and Flash Chip Info...\cf8\par
 UNIQUE ID  : \cf9 6741A1FD92FF5BBD9D8238D2A8FEB433\cf8\par
 ERAM Size  : \cf9 0x0000000000080000\cf7  -512 KB\cf8\par
 IRAM Size  : \cf9 0x0000000200000000\cf7  -8 GB\cf8\par
 UFS LU0 Size: \cf5 0x0000000000400000\cf7  -4 MB\cf8\par
 UFS LU1 Size: \cf5 0x0000000000400000\cf7  -4 MB\cf8\par
 UFS LU2 Size: \cf5 0x0000001DCB000000\cf7  -119,172 GB\cf8\par
 UFS CID     : \cf6\f1\rtlch\'ce\f0\ltrch\'01KM8V7001JM-B810\cf8\par
 UFS UNIQID  : \cf6 00330063006100350038006400340037\cf3\par
 Executing : \cf1 ACCEPTED...\par
\cf3\par
Reading GPT\cf10 -UFS \cf7 [0x00008000] \cf10 130 Items\cf8\par
\cf10\par
Autobackup Partitions\cf3\par
-preloader\cf7 [0x00000000]\cf4 512 KB ->\cf2 preloader.bin...\cf5 Ok\cf10\par
   -> Renaming Preloader....  \cf4 preloader_oppo6779.bin\cf10\par
   Creating Scatter file...\cf4  C:\\Hydra Tool\\\\Backup\\Auto\\0725__090721142639\\MT6779_Android_scatter.txt\cf3\par
-pgpt\cf7 [0x00000000]\cf4 32 KB ->\cf2 pgpt.bin...\cf5 Ok\cf3\par
-frp\cf7 [0x0DE08000]\cf4 1024 KB ->\cf2 frp.bin...\cf5 Ok\cf3\par
-nvdata\cf7 [0x10708000]\cf4 64 MB ->\cf2 nvdata.bin...\cf5 Ok\cf3\par
-protect1\cf7 [0x16708000]\cf4 8,969 MB ->\cf2 protect1.bin...\cf5 Ok\cf3\par
-protect2\cf7 [0x17000000]\cf4 8 MB ->\cf2 protect2.bin...\cf5 Ok\cf3\par
-persist\cf7 [0x17880000]\cf4 55,5 MB ->\cf2 persist.bin...\cf5 Ok\cf3\par
-nvram\cf7 [0x1B500000]\cf4 64 MB ->\cf2 nvram.bin...\cf5 Ok\par
Done!!!\cf10\par
C:\\Hydra Tool\\\\Backup\\Auto\\0725__090721142639\cf1\par
MTK Phone Loader is NOW RUNNING.\cf4\par
=====================================\par
\cf3\par
Elapsed Time : 00:00:49\cf4\par
\cf1\par
}

كود:
******* Dongle Info *******\cf1\par
Version    : \cf2\b Hydra Tool v 1.2\cf1\b0\par
Serial     : \cf2\b 201000009103\cf1\b0\par
Initialize : \cf2 OKAY\cf1\par
Status     : \cf2 Activated\par
Life       : 0 [0-0-0-0-0]\cf1\par
\cf3\par
\cf4\par
=====================================\cf1\par
Searching for MTK Device...\cf3 Found\cf1\par
 Port Identification :\cf3 Flashmode BROM \cf1\par
 FriendlyName :\cf3 MediaTek USB Port (COM23)\cf1\par
 Device       :\cf3 5&94b8c27&0&3\cf1\par
 SymbolicName :\cf3\\??\\USB#VID_0E8D&PID_0003#5&94b8c27&0&3#\{a5dcbf10-6530-11d2-901f-00c04fb951ed\}\cf1\par
 Driver Ver   :\cf3 01/22/2015,3.0.1504.0\cf1\par
\par
Opened handle..\par
\cf4\par
Reading Device UniqueID, RAM and Flash Chip Info...\cf5\par
 UNIQUE ID  : \cf6 6741A1FD92FF5BBD9D8238D2A8FEB433\cf5\par
 ERAM Size  : \cf6 0x0000000000080000\cf7  -512 KB\cf5\par
 IRAM Size  : \cf6 0x0000000200000000\cf7  -8 GB\cf5\par
 UFS LU0 Size: \cf8 0x0000000000400000\cf7  -4 MB\cf5\par
 UFS LU1 Size: \cf8 0x0000000000400000\cf7  -4 MB\cf5\par
 UFS LU2 Size: \cf8 0x0000001DCB000000\cf7  -119,172 GB\cf5\par
 UFS CID     : \cf9\f1\rtlch\'ce\f0\ltrch\'01KM8V7001JM-B810\cf5\par
 UFS UNIQID  : \cf9 00330063006100350038006400340037\cf1\par
\cf3\par
Reading GPT\cf10 -UFS \cf7 [0x00008000] \cf10 130 Items\cf3\par
\cf1\par
\cf4\par
-------------------------------------\cf7\par
Operation : \cf4 Auto\cf1\par
Processing...\cf4\par
ZeroWipe FRP Partition...\cf1\par
Action Result : \cf10  Ok\cf1\par
\cf3\par
Elapsed Time : 00:00:01\cf1\par
\par
}

 
التعديل الأخير:

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi Note 8 Pro (begonia) Flash Done




16310886818921.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A53 Ultra Power



163118168351071.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 Brand : OPPO Model : A53 Storage : Auto
 Loader: Oppo_A53_8936.mbn
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :07/02/2015,2.00.05.00

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8936
 Version : 1


Protocol : Universal
Running : Ok
Reading GPT[3]
          Drive [0] 40 Items
          Drive [1] 0 Items
          Drive [2] 4 Items

 
Phone Information.....
  Brand          : OPPO
  Vendor         : OPPO
  Model          : OPPO A53
  ID             : LMY47V
  SDK            : 22
  Release        : 5.1.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Description    : msm8916_64-user 5.1.1 LMY47V eng.root.20160627.205258 dev-keys
  Device         : A53
  Board          : msm8916
  Display ID     : A53_11_A.911_160627
  Security Patch : 2015-10-01
  Platform       : msm8916
  FRPPST         : /dev/block/bootdevice/by-name/config
  Fingerprint    : OPPO/A53/A53:5.1.1/LMY47V/1434708000:user/release-keys

Processing Auto....
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOk
 - Formatting Userdata
Executing ...
 - Formatting Userdata  [Safe Format - eMMc] OkOk
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:04
[/SIZE][/FONT][/B]
 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
761
مستوى التفاعل
524
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Essentiel B Heyou 30 frp Remove

 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

ALCATEL OT-5054D (Pop 3-5.5) Removing FRP


16312045189521.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 Brand : ALCATEL [TCL] Model : OT-5054D (Pop 3-5.5) Storage : Auto
 Loader: LYF_8909.mbn
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :07/02/2015,2.00.05.00

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8909
 Version : 1


Protocol : Universal
Running : Ok
 
Phone Information.....
  Brand          : TCL
  Vendor         : TCL
  Model          : 5054D
  ID             : LMY47V
  SDK            : 22
  Release        : 5.1.1
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : Pop355-user 5.1.1 LMY47V vC94-0 release-keys
  Device         : Pop355
  Board          : msm8909
  Display ID     : LMY47V release-keys
  Security Patch : 2016-02-01
  Platform       : msm8909
  FRPPST         : /dev/block/bootdevice/by-name/config
  Fingerprint    : TCL/5054D/Pop355:5.1.1/LMY47V/vC94-0:user/release-keys

Reading GPT[3]
          Drive [0] 40 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

Removing FRPta...
Method : 
Auto 
Processing... 
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] Ok
 - Removing FRP [Zero Wipe] OkOk
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] Ok
 - Removing FRP [Zero Wipe] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:04
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Samsung Galaxy J7 (SM-J700H/DS) Remove FRP



163120996036621.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi 8 (olive)

this miui version can't be installed on this device

Flash Done With HYDRA TOOL



163134839497791.png


كود:
[B][FONT=Arial Black][SIZE=2] Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :07/02/2015,2.00.05.00

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 2800291281
Firmware Version    : 162
Product Name        : HCG8a4
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  122142720[58.242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Phone Information......
  Brand          : Xiaomi
  Vendor         : Xiaomi
  Model          : Redmi 8
  ID             : PKQ1.190319.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : olive-user 9 PKQ1.190319.001 V11.0.11.0.PCNMIXM release-keys
  Miui Ver       : V11
  Device         : olive
  Mod_device     : olive_global
  Display ID     : ZQL2115-olive-build-20200519032343
  Security Patch : 2020-05-01
  Emmc_size      : 16GB
  Fingerprint    : Xiaomi/olive/olive:9/PKQ1.190319.001/V11.0.11.0.PCNMIXM:user/release-keys

Reading GPT[3]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
 > modemst1
 > modemst2
 > fsg
 > fsc
C:\Hydra Tool\Backup\Security_Backup\Redmi 8__9_Security_091121090706.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
 - sec(0)[sec.dat]  Skipped
 - config(0)[config.bin]  Ok
 - vbmeta(0)[vbmeta.img]  Ok
 - vbmetabak(0)[vbmeta.img]  Ok
 - devcfg(0)[devcfg.mbn]  Ok
 - devcfgbak(0)[devcfg.mbn]  Ok
 - apdp(0)[dummy.img]  Ok
 - msadp(0)[dummy.img]  Ok
 - sbl1(0)[sbl1.mbn]  Ok
 - sbl1bak(0)[sbl1.mbn]  Ok
 - rpm(0)[rpm.mbn]  Ok
 - rpmbak(0)[rpm.mbn]  Ok
 - cmnlib(0)[cmnlib_30.mbn]  Ok
 - cmnlibbak(0)[cmnlib_30.mbn]  Ok
 - cmnlib64(0)[cmnlib64_30.mbn]  Ok
 - cmnlib64bak(0)[cmnlib64_30.mbn]  Ok
 - keymaster(0)[km4.mbn]  Ok
 - keymasterbak(0)[km4.mbn]  Ok
 - misc(0)[misc.img]  Ok
 - aboot(0)[emmc_appsboot.mbn]  Ok
 - abootbak(0)[emmc_appsboot.mbn]  Ok
 - tz(0)[tz.mbn]  Ok
 - tzbak(0)[tz.mbn]  Ok
 - dtbo(0)[dtbo.img]  Ok
 - dtbobak(0)[dtbo.img]  Ok
 - splash(0)[splash.img]  Ok
 - dsp(0)[adspso.bin]  Ok
 - dspbak(0)[adspso.bin]  Ok
 - persist(0)[persist.img]  Ok
 - mdtp(0)[mdtp.img]  Ok
 - mdtpbak(0)[mdtp.img]  Ok
 - boot(0)[boot.img]  Ok
 - recovery(0)[recovery.img]  Ok
 - cache(0)[cache.img]  Ok
 - modem(0)[NON-HLOS.bin]  Ok
 - system(0)[system.img]  Ok
 - vendor(0)[vendor.img]  Ok
 - cust(0)[cust.img]  Ok
 - userdata(0)[userdata.img]  Ok
 - PrimaryGPT(0)[gpt_main0.bin]  Ok

Flashing Patch Configuration.. 
0 [NUM_DISK_SECTORS-34.]   OK
0 [NUM_DISK_SECTORS-34.]   OK
0 [NUM_DISK_SECTORS-34.]   OK
0 [NUM_DISK_SECTORS-34.]   OK
0 [NUM_DISK_SECTORS-1.]   OK
0 [NUM_DISK_SECTORS-1.]   OK
0 [NUM_DISK_SECTORS-33.]   OK
0 [CRC32(2,8192)]   OK
0 [CRC32(NUM_DISK_SECTORS-33.,8192)]   OK
0 [0]   OK
0 [CRC32(1,92)]   OK
0 [0]   OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:07:36
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Starlight Star Mini Flash Done



163136731782511.png


كود:
[B][FONT=Arial Black][SIZE=2]=====================================.
SC77XX
SC
2
Port : [Auto] Scanning...COM35
Opening Port...(COM35)Ok
C:\Users\Ahmed GSM\Desktop\STAR_MINI_sp7731c_1h10_32v4_6.0_Star_Mini_V004_20170922_Star_Mini.pac
 Project   : BP_R1.0.0
 SIZE      : 0x4488C0C5
 CPUID     : SC77xx
 DISPLAYID : SC7731_eMMC_MINI_SP7731C_1H10_32V4_INFINITY-BOX

Flashing Partitions...
NV_W [nvitem_w.bin] 
NV_WCN [nvitem_wcn.bin] 
ProdNV [prodnv.img] 
SPLLoader [u-boot-spl-16k.bin] 
Modem_W [sc7731C_CP0_modem.bin] 
DSP_W [DSP_DM_Gx.bin] 
Modem_WCN [sc8830g_modem_CP2_WCN_Trunk_W16.32.2_Release.bin] 
BootLogo [logo_540x960.bin] 
Fastboot_Logo [fblogo_540x960.bin] 
BOOT [boot.img] 
System [system.img] 
Cache [cache.img] 
Recovery [recovery.img] 
SysInfo [sysinfo.img] 
UserData [userdata.img] 
UBOOTLoader [u-boot.bin] 
Done!!!

Closing Port...Ok..
=====================================

Elapsed Time : 00:04:09
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi Note 5 Pro (Whyred)

Flashing MIUI 12 + Removing FRP

All Done By HYDRA TOOL

Flashing MIUI 12

163144054712351.png


كود:
[B][FONT=Arial Black][SIZE=2] Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :07/02/2015,2.00.05.00

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping...... Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : MSM8996
 Version : 1
 DateTime : Aug  2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 2676665404
Firmware Version    : 2
Product Name        : DD68MB
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Phone Information.....
  Brand          : xiaomi
  Vendor         : Xiaomi
  Model          : Redmi Note 5
  ID             : OPM1.171019.011
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : whyred-user 8.1.0 OPM1.171019.011 V10.0.6.0.OEIMIFH release-keys
  Miui Ver       : V10
  Device         : whyred
  Mod_device     : whyred_global
  Display ID     : OPM1.171019.011
  Security Patch : 2018-11-01
  Fingerprint    : xiaomi/whyred/whyred:8.1.0/OPM1.171019.011/V10.0.6.0.OEIMIFH:user/release-keys

Reading GPT[4]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 


Backup Security partitions...
Reading Security Items....
 > modemst1
 > modemst2
 > fsg
 > fsc
C:\Hydra Tool\Backup\Security_Backup\Redmi Note 5__8.1.0_Security_091221102032.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
 - storsec(0)[storsec.mbn]  Ok
 - storsecbak(0)[storsec.mbn]  Ok
 - rpm(0)[rpm.mbn]  Ok
 - rpmbak(0)[rpm.mbn]  Ok
 - hyp(0)[hyp.mbn]  Ok
 - hypbak(0)[hyp.mbn]  Ok
 - pmic(0)[pmic.elf]  Ok
 - pmicbak(0)[pmic.elf]  Ok
 - cmnlib(0)[cmnlib.mbn]  Ok
 - cmnlibbak(0)[cmnlib.mbn]  Ok
 - cmnlib64(0)[cmnlib64.mbn]  Ok
 - cmnlib64bak(0)[cmnlib64.mbn]  Ok
 - abl(0)[abl.elf]  Ok
 - ablbak(0)[abl.elf]  Ok
 - devcfgbak(0)[devcfg.mbn]  Ok
 - devcfg(0)[devcfg.mbn]  Ok
 - tz(0)[tz.mbn]  Ok
 - tzbak(0)[tz.mbn]  Ok
 - mdtpsecapp(0)[mdtpsecapp.mbn]  Ok
 - mdtpsecappbak(0)[mdtpsecapp.mbn]  Ok
 - keymaster(0)[keymaster.mbn]  Ok
 - keymasterbak(0)[keymaster.mbn]  Ok
 - bluetooth(0)[BTFM.bin]  Ok
 - xbl(0)[xbl.elf]  Ok
 - xblbak(0)[xbl.elf]  Ok
 - misc(0)[misc.img]  Ok
 - dsp(0)[dspso.bin]  Ok
 - mdtp(0)[mdtp.img]  Ok
 - splash(0)[splash.img]  Ok
 - persist(0)[persist.img]  Ok
 - modem(0)[NON-HLOS.bin]  Ok
 - boot(0)[boot.img]  Ok
 - recovery(0)[recovery.img]  Ok
 - cache(0)[cache.img]  Ok
 - system(0)[system.img]  Ok
 - vendor(0)[vendor.img]  Ok
 - cust(0)[cust.img]  Ok
 - userdata(0)[userdata.img]  Ok
 - PrimaryGPT(0)[gpt_main0.bin]  Ok

Flashing Patch Configuration.. 
0 [NUM_DISK_SECTORS-34.]   OK
0 [NUM_DISK_SECTORS-34.]   OK
0 [NUM_DISK_SECTORS-34.]   OK
0 [NUM_DISK_SECTORS-34.]   OK
0 [NUM_DISK_SECTORS-1.]   OK
0 [NUM_DISK_SECTORS-1.]   OK
0 [NUM_DISK_SECTORS-33.]   OK
0 [CRC32(2,8192)]   OK
0 [CRC32(NUM_DISK_SECTORS-33.,8192)]   OK
0 [0]   OK
0 [CRC32(1,92)]   OK
0 [0]   OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:27
[/SIZE][/FONT][/B]

Removing FRP

163144054735482.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) New V2 Storage : Auto
 Loader: Redmi_Note_7_lavender_Micron.elf
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM35)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/31/2015,2.1.2.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping....... Ok 
Configuration.......................
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 8192
 MaxPayloadSizeToTargetInBytesSupported : 8192
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : MSM8996
 Version : 1
 DateTime : Feb 10 2020 - 19:28:52

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 2676665404
Firmware Version    : 2
Product Name        : DD68MB
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  61071360[29.121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Phone Information.....
  Brand          : xiaomi
  Vendor         : Xiaomi
  Model          : Redmi Note 5
  ID             : PKQ1.180904.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : whyred-user 9 PKQ1.180904.001 V12.0.2.0.PEIMIXM release-keys
  Miui Ver       : V12
  Device         : whyred
  Mod_device     : whyred_global
  Display ID     : PKQ1.180904.001
  Security Patch : 2020-11-05
  Fingerprint    : xiaomi/whyred/whyred:9/PKQ1.180904.001/V12.0.2.0.PEIMIXM:user/release-keys

Reading GPT[4]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 

Removing FRPta...
Method : 
Auto 
Processing... 
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:06
[/SIZE][/FONT][/B]
 
أعلى