تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi 9A (dandelion) Remove FRP Done


162574342816741.png



كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM6)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E7
 SB            : 01 (True)
 SLA           : 02 (True)
 DAA           : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SB            : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : FE 
 NORMAL BOOT

Preparing Download Agent..
 DA   : 6765_Xiaomi_wb.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020/03/17.ÉÏÎç10:04_497508
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing preloader_redmi9a_Hydra_V2.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 678F333DE593FF11F7C63D72B8A2CFC3
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 4501004441343033320190977C156791 - DA4032

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_k62v1_64_bsp.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__070821121211\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x3BD88000]1024 KB ->frp.bin...Ok
-nvdata[0x3DE88000]64 MB ->nvdata.bin...Ok
-protect1[0x45522000]8 MB ->protect1.bin...Ok
-protect2[0x45D22000]10.867 MB ->protect2.bin...Ok
-persist[0x47000000]48 MB ->persist.bin...Ok
-nvram[0x52E80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__070821121211
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 678F333DE593FF11F7C63D72B8A2CFC3
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 4501004441343033320190977C156791 - DA4032

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:04
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

LG K7 (LGX210ds) ADB Removing FRP



162582311185561.png


كود:
[B][FONT=Arial Black][SIZE=2]Starting ADB Server....
Searching Device By ADB
Device Found...
   Model : LG-X210
   Brand : LG Electronics
   Android Ver : 5.1
   CPU abi : armeabi-v7a
   Bootloader : LGX210dsAT-00-V10d-AME-XX-FEB-24-2019+0
   Display ID : 2017-02-05
   Emmc_size : mt6580
   Platform : 2017-02-05
   SYS USB CONFIG : persist.mtp,adb
   FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
   FingerPrint : lge/m13g_global_com/m13g:5.1/LMY47I/1550982276:user/release-keys

Checking Root Status.... 
Root Status : Not Rooted

[COLOR="#FF0000"]Operation : ADB FRP
Removing FRP ...  Ok
[/COLOR]
Elapsed Time : 00:00:05
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor P8 lite (PGN610) Safeformat Done



162582303955891.png


كود:
[B][FONT=Arial Black][SIZE=2]How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0321MT6737T [6735]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SB            : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 FUSEID         : 00000182
 FUSEID         : 1000B02B
 SECURE VERSION : FF 
 BL VERSION     : 01 

Preparing Download Agent..
 DA   : [Not Exist]
Trying Default 6735.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old
C4 - eMMC
0005
00000000000000000000
PRMMCCID   : 520001154D423145E7830742BFEEB89B
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000003A3E00000 -14.561 GB
ERAM Size  : 0x00000000C0000000 -3 GB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 3857B0C84A875E0F4B4E351E05C4198F
eMMC CID   : 520001154D423145E7830742BFB3B89B

Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
  Brand          : condor
  Vendor         : condor
  Model          : PGN610
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gionee6737t_66_m0-user 6.0 MRA58K 1473218164 release-keys
  Device         : PGN610
  Board          : PGN610
  Display ID     : PGN610
  Security Patch : 2016-11-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN610/PGN610:6.0/MRA58K/1473218164:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_gionee6737t_66_m0.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0321_condor_PGN610_PGN610_6.0_MRA58K_1473218164_070921100040\MT6737T_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x06A00000] 1024 KB -> frp.bin...Ok
 -nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0321_condor_PGN610_PGN610_6.0_MRA58K_1473218164_070921100040
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:28
[/SIZE][/FONT][/B]


162582303961622.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0



Reading System Info
  Brand          : condor
  Vendor         : condor
  Model          : PGN610
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gionee6737t_66_m0-user 6.0 MRA58K 1473218164 release-keys
  Device         : PGN610
  Board          : PGN610
  Display ID     : PGN610
  Security Patch : 2016-11-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN610/PGN610:6.0/MRA58K/1473218164:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Encrypted

-------------------------------------
[COLOR="#008000"]Operation : Auto
Processing...
Safeformat Universal...(tmp.bin)512 Bytes Ok Ok

[/COLOR]Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

دراجي سوفت

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
28 فبراير 2016
المشاركات
1,458
مستوى التفاعل
4,143
النقاط
113
الإقامة
تيارت
Samsung m01 core m013f ( boot done + read info + frp remove + read fw u1 u3 )

السلام عليكم و رحمة الله تعالى و بركاته













ملف البريلودر المستخدم




بالتوفيق للجميع

 

hassan GSM

:: عضو محترف ::
إنضم
27 فبراير 2016
المشاركات
1,876
مستوى التفاعل
1,741
النقاط
113
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

حذف قفل الشاشة بدون فقدان البيانات OPPO A1K

 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Huawei Y9 2019 (JKM-LX1) Remove FRP Done


162590942002781.png



كود:
[B][FONT=Arial Black][SIZE=2]Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len : 0x0000005D
#C_version : C185
#D_version : D000
#PLMN : 47002
#BoardID : 7254
#DeviceName : [COLOR="#FF0000"]JKM-LX1[/COLOR]
Build number : [COLOR="#FF0000"]JKM-LX1 9.1.0.331(C185E2R1P2)[/COLOR]
Product Model : [COLOR="#FF0000"]JKM-LX1[/COLOR]
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : kirin710
system_update_state :
vendorcountry : hw/spcseas
soc_id :
build_fingerprint :
build_version_full :
build_version_qcom : \par
psid.........
#SN : XXXXXXXXXXXX
#IMEI1 : XXXXXXXXXXXXXX
#IMEI2 : XXXXXXXXXXXXXX

Security Info....
#Dongle_info : RSA-2048,0x9001,0x7000,0x6000,0x5100,0x5000
#FB Lock State : [COLOR="#FF0000"]UNLOCKED[/COLOR]
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
[COLOR="#008000"]Huawei Fastboot Service...
[/COLOR][COLOR="#0000FF"]Factory Reset Protection...[/COLOR]
[COLOR="#0000FF"]Removing.... [/COLOR][COLOR="#008000"]Ok[/COLOR]

[COLOR="#008080"]Elapsed Time : 00:00:02
[/COLOR][/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Samsung A10S (A107F/DS) Frp Remove
Formatting (persistent) In PM Tab

BY HYDRA TOOL



16259181049131.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Oppo A12 (CPH2083) Erase UserData To Unlock Password

BY HYDRA TOOL





162592374135991.png
 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
761
مستوى التفاعل
525
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Realme C11 rmx2185 Read FW
Version:RMX2185_11_A.95 -- Android 10 -- Updated Android security patch: June 2021

تبويت الجهاز




كود:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1633 (COM11)
 Device       :7&f1a6710&0&4
 SymbolicName :\??\USB#VID_0E8D&PID_0003#7&f1a6710&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E5
 SB            : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SB            : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 FUSEID         : 00000000
 SECURE VERSION : 05 
 BL VERSION     : FE 
 NORMAL BOOT

Preparing Download Agent..
 DA   : [Not Exist]
Trying Default 6765.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020/03/17.أ‰أڈأژç10:04_497508
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing 0766_preloader_oppo6765_3A5B7402C1.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 297AA12B1F96377C39C9506794DFAF07
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 90014A68423861503E03007DC4D9871B - hB8aP>

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:15


سحب الفلاشة


كود:
=====================================
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1633 (COM11)
 Device       :7&f1a6710&0&4
 SymbolicName :\??\USB#VID_0E8D&PID_0003#7&f1a6710&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 297AA12B1F96377C39C9506794DFAF07
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 90014A68423861503E03007DC4D9871B - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Backup All By Partitions Except Userdata
Processing...

Reading Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_oppo6765.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Full\__0766--()_100721211039\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-boot_para[0x00008000]1024 KB ->boot_para.bin...Ok
-recovery[0x00108000]98 MB ->recovery.bin...Ok
-para[0x06308000]512 KB ->para.bin...Ok
-opporeserve1[0x06388000]8 MB ->opporeserve1.bin...Ok
-opporeserve2[0x06B88000]128 MB ->opporeserve2.bin...Ok
-opporeserve3[0x0EB88000]64 MB ->opporeserve3.bin...Ok
-oppo_custom[0x12B88000]1024 KB ->oppo_custom.bin...Ok
-expdb[0x12C88000]20 MB ->expdb.bin...Ok
-vbmeta_system[0x14088000]8 MB ->vbmeta_system.bin...Ok
-vbmeta_vendor[0x14888000]8 MB ->vbmeta_vendor.bin...Ok
-frp[0x15088000]1024 KB ->frp.bin...Ok
-nvcfg[0x15188000]32 MB ->nvcfg.bin...Ok
-nvdata[0x17188000]64 MB ->nvdata.bin...Ok
-md_udc[0x1B188000]22.602 MB ->md_udc.bin...Ok
-metadata[0x1C822000]32 MB ->metadata.bin...Ok
-protect1[0x1E822000]8 MB ->protect1.bin...Ok
-protect2[0x1F022000]15.867 MB ->protect2.bin...Ok
-seccfg[0x20000000]8 MB ->seccfg.bin...Ok
-persist[0x20800000]48 MB ->persist.bin...Ok
-sec1[0x23800000]2 MB ->sec1.bin...Ok
-proinfo[0x23A00000]3 MB ->proinfo.bin...Ok
-md1img[0x23D00000]100 MB ->md1img.bin...Ok
-spmfw[0x2A100000]1024 KB ->spmfw.bin...Ok
-scp1[0x2A200000]1024 KB ->scp1.bin...Ok
-scp2[0x2A300000]1024 KB ->scp2.bin...Ok
-sspm_1[0x2A400000]1024 KB ->sspm_1.bin...Ok
-sspm_2[0x2A500000]1024 KB ->sspm_2.bin...Ok
-gz1[0x2A600000]16 MB ->gz1.bin...Ok
-gz2[0x2B600000]16 MB ->gz2.bin...Ok
-nvram[0x2C600000]64 MB ->nvram.bin...Ok
-cdt_engineering[0x30600000]8 MB ->cdt_engineering.bin...Ok
-special_preload[0x30E00000]768 MB ->special_preload.bin...Ok
-my_custom[0x60E00000]256 MB ->my_custom.bin...Ok
-ocdt[0x70E00000]8 MB ->ocdt.bin...Ok
-lk[0x71600000]4 MB ->lk.bin...Ok
-lk2[0x71A00000]4 MB ->lk2.bin...Ok
-boot[0x71E00000]32 MB ->boot.bin...Ok
-logo[0x73E00000]8 MB ->logo.bin...Ok
-dtbo[0x74600000]8 MB ->dtbo.bin...Ok
-tee1[0x74E00000]5 MB ->tee1.bin...Ok
-tee2[0x75300000]5 MB ->tee2.bin...Ok
-super[0x75800000]6.824 GB ->super.bin...Ok
-vbmeta[0x22A400000]12 MB ->vbmeta.bin...Ok
-cache[0x22B000000]432 MB ->cache.bin...Ok
-otp[0x7440FBE00]43 MB ->otp.bin...Ok
-flashinfo[0x746BFBE00]16 MB ->flashinfo.bin...Ok
Reading Done!!!
C:\Hydra Tool\\Backup\Full\__0766--()_100721211039 Ok

Elapsed Time : 00:07:55
 

mouh@med

عضو أساسي
إنضم
12 سبتمبر 2012
المشاركات
761
مستوى التفاعل
525
النقاط
93
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Infinix Smart 3 X5516b FRP




كود:
=====================================
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1633 (COM11)
 Device       :7&f1a6710&0&4
 SymbolicName :\??\USB#VID_0E8D&PID_0003#7&f1a6710&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : EBF3363B01ED96515C43A1BDEAE22EAC
 ERAM Size  : 0x000000000003A000 -232 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x000000039D000000 -14.453 GB
 eMMC CID   : 88010344394431364738600B0315568D - D9D16G

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : Infinix
  Vendor         : INFINIX MOBILITY LIMITED
  Model          : Infinix X5516B
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_x5516_go-user 9 PPR1.180610.011 35993 release-keys
  Device         : Infinix-X5516B
  Display ID     : X5516B-H613OPQ-PGo-190719V250
  Security Patch : 2019-07-05
  Fingerprint    : Infinix/H613/Infinix-X5516B:9/PPR1.180610.011/OPQ-190719V250:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Format/Erase
Processing...
Erasing FRP Partition... Ok

Elapsed Time : 00:00:03
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Plume H1 (SP620) Ultra Power Option




162618874001491.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 Brand : CONDOR Model : Plume H1 Storage : Auto
 Loader: Mi_8953.mbn
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM42)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/31/2015,2.1.2.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8953
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 934817224
Firmware Version    : 165
Product Name        : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30777344[14.676 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
          Drive [0] 48 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

 
[COLOR="#008000"]Phone Information.....
  Brand          : Condor
  Vendor         : SPA Condor Electronics
  Model          : Plume H1
  ID             : N2G47H
  SDK            : 25
  Release        : 7.1.2
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : msm8953_64-user 7.1.2 N2G47H 2578 release-keys
  Device         : SP620
  Board          : SP620
  Display ID     : N2G47H release-keys
  Security Patch : 2018-03-01
  Emmc_size      : 16GB
  Platform       : msm8953
  FRPPST         : /dev/block/bootdevice/by-name/config
  Fingerprint    : Condor/SP620/SP620:7.1.2/N2G47H/SP620_V11.0_20170925:user/release-keys
[/COLOR]
Processing Auto....
[COLOR="#0000FF"] - Removing FRP
[COLOR="#008000"]Executing ...
[/COLOR] - Removing FRP [Zero Wipe] [COLOR="#008000"]OkOk[/COLOR]
 - Formatting Userdata
[COLOR="#008000"]Executing ...
[/COLOR] - Formatting Userdata  [Safe Format - eMMc] [COLOR="#008000"]OkOk[/COLOR]
Action Result : [COLOR="#008000"]Ok[/COLOR]

[/COLOR]Rebooting Phone.... Ok

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

hassan GSM

:: عضو محترف ::
إنضم
27 فبراير 2016
المشاركات
1,876
مستوى التفاعل
1,741
النقاط
113
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Plume H1 (SP620) Remove FRP Done

 
التعديل الأخير:

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

قراءة النمط OPPO A37f Read Pattern



162619954320611.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM42)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/31/2015,2.1.2.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8916
 Version : 1


Protocol : Universal
Running : Ok
 
Phone Information.....
  Brand          : OPPO
  Vendor         : OPPO
  Model          : A37f
  ID             : LMY47V
  SDK            : 22
  Release        : 5.1.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Description    : msm8916_64-user 5.1.1 LMY47V eng.root.20190711.032745 release-keys
  Board          : msm8916
  Display ID     : A37fEX_11_190711
  Security Patch : 2018-03-01
  Platform       : msm8916
  FRPPST         : /dev/block/bootdevice/by-name/config

Reading GPT[3]
          Drive [0] 40 Items
          Drive [1] 0 Items
          Drive [2] 4 Items

[COLOR="#008000"]Operation : ScreenLock Security
[/COLOR][COLOR="#800080"]Read Pattern[/COLOR] 
[COLOR="#DDA0DD"]Processing... 
[/COLOR][COLOR="#008000"]Trying to search : gatekeeper.pattern.key
Trying to search :  personalpattern.key
Trying to search : cm_gesture.key
Trying to search : gesture.key FOUND
Gesture Data : 71890FAED57A325C08EB04BE0F4FD8C05845C972
[/COLOR][COLOR="#0000FF"]Bruteforcing pattern hash..Please wait for few seconds[/COLOR]
[COLOR="#EE82EE"]Pattern Code : 95487
[/COLOR][COLOR="#008000"]1 2 3
4 5 6
7 8 9[/COLOR]
[COLOR="#008080"]Ok[/COLOR]

[COLOR="#008080"]Elapsed Time : 00:00:04
[/COLOR][/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

قراءة الكود Samsung B310E


162636744442261.png


كود:
[B][FONT=Arial Black][SIZE=2]Port : [Auto] Scanning...COM35
Opening Port...(COM35)Ok
------------------------------------------
Screenlock Security...
------------------------------------------
Executing... Read Code/Passwords [NOR]
FlashID : [C81760] Size : 0x00800000
IMEI [1] : 3570570XXXXXX
IMEI [2] : 3570570XXXXXX
IMEI [3] : 3570570XXXXXX
IMEI [4] : 3570570XXXXXX

Scanning.....
Code[80] : @@    x
Code[40] : €أ€
Code[40] : €أ€
Code[40] : €أ€
Code[40] : €أ€
Code[80] : €€€€€@è
Code[40] : @@@@@€h
Code[40] : @@@@@*h
Code[A0] : @
Code[A0] : @
Code[40] : *
Code[40] : *
Code[A0] : *@
Code[A0] : *@
Code[00] : 
[COLOR="#FF0000"]Code[01] : 1452
[/COLOR]
Action Result..Ok

Elapsed Time : 00:00:40


Closing Port...Ok..
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

IRIS IS6Plus Ultra power Option

162636878509411.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :DA_HIGHSPEED_VCOM
 FriendlyName :MediaTek DA USB VCOM (Android) (COM7)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2001#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0



Reading System Info
  Brand          : IRIS
  Vendor         : IRIS
  Model          : IS6Plus
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_bird_o1mp2_k80_bsp_g-user 8.1.0 O11019 1550023848 release-keys
  Device         : IS6Plus
  Board          : IS6Plus
  Display ID     : IS6Plus__20190226V1.0
  Security Patch : 2019-01-05
  Fingerprint    : IRIS/IS6Plus/IS6Plus:8.1.0/O11019/1550023848:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
[COLOR="#008000"]Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok Ok
Erasing FRP Partition...
Safeformat Universal...(tmp.bin)512 Bytes Ok Ok
[/COLOR]
Elapsed Time : 00:00:02
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

STREAM B1s IMEI REPAIR



162652145898891.png


كود:
[B][FONT=Arial Black][SIZE=2]***IMEI REPAIR FUNCTION****
Univ FlashMode
Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0



Reading System Info
  Brand          : STREAM
  Vendor         : STREAM
  Model          : B1s
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_bird_o1mp2_k80_bsp_g-user 8.1.0 O11019 1541227651 release-keys
  Device         : B1s
  Board          : B1s
  Display ID     : MD40B1s.DZ.V5.0.0.20181108
  Security Patch : 2018-10-05
  Fingerprint    : STREAM/B1s/B1s:8.1.0/O11019/1541227651:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted
IMEI INFO..
[COLOR="#008000"]  IMEI1         : 35678XXXXXXXXX9
  IMEI2         : 35678XXXXXXXXX6 [[COLOR="#FF0000"]Ok[/COLOR]]
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:02
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Samsung Galaxy S4 mini LTE (GT-i9195) Volume Button Not Work
ازرار الصوت لا تعمل وبه كود تم الفورمات
Password Lost Successfully Formatted by HDRA TOOL




162652145961852.png


كود:
[B][FONT=Arial Black][SIZE=2]Scanning port....
TPortConnection.Create...(COM15)..Opening...Ok
Device Mode : Download Mode
CPU         : QUALCOMM
Format Userdata 
SamFormatUDZeroWipe
Total Binary Size is 0.25MB
Initialize Phone : Ok
Partition Information Table(PIT)
 - Backup 
Backup PIT (COM_TAR2MSM8930) Ok
 - Reading.. Ok
 - Mapping..Ok
[COLOR="#008000"]Successfully Formatted!!!
[/COLOR]
TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:09
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

LG K4 2017 X230 Format userdata + FRP (Fastboot mode)



162671790457881.png




16267179046632.png
 

tontonflach

عضو نشط
إنضم
1 أكتوبر 2013
المشاركات
73
مستوى التفاعل
72
النقاط
0
الإقامة
BALLOTE
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

السلام عليكم و رحمة الله

بعد الفتح المؤقت للبوت لودر temp bootloader unlock تم حدف huawei id تماما من جهاز huawei y9 prime 2019

stk-l22 :strongly:

كود:
******* Dongle Info *******\cf1\par
Version    : \cf2\b Hydra Tool v 1.2\cf1\b0\par
Serial     : \cf2\b 201000009103\cf1\b0\par
Initialize : \cf2 OKAY\cf1\par
Status     : \cf2 Activated\par
Life       : 0 [0-0-0-0-0]\cf1\par
\par
Searching Device By Fastboot\cf4\par
Device Found...\cf1\par
\par
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\par
                  Reading Device Information...               \par
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\par
hotainfo...... \par
  #hotainfo_len       : 0x0000005E\par
  #C_version          : C185\par
  #D_version          : D000\par
  #PLMN               : 60301\par
  #BoardID            : 7708\par
  #DeviceName         : STK-L21M\par
Build number          : STK-L21M 10.0.0.405(C185E6R4P1)\par
Product Model         : STK-L21\par
hwnff_ver             : Ver2.3\par
key_version           : huawei_key_v1\par
product               : kirin710\par
system_update_state   : \par
vendorcountry         : hw/meafnaf\par
soc_id                : \par
ro_build_fingerprint  : \par
ro_build_version_full : \par
ro_build_version_qcom : \par
psid.........\par
  #SN                 : \par
  #IMEI1              : \par
  #IMEI2              : \par
\par
Security Info....\par
 #Dongle_info         : RSA-2048,0x9001,0x7000,0x6000,0x5100,0x5000\par
 #FB Lock State       : UNLOCKED\par
 #USER Lock State     : LOCKED\par
\par
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\cf3\par
Huawei Fastboot Service...\cf5\par
Remove Huawei Account....\par
Processing...\cf3 Ok\cf1\par
\cf2\par
Elapsed Time : 00:00:06\cf1\par
\par
}

 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

iTEL A56 FRP Remove

Select CPU SC7731E



162694108925441.png
 
أعلى