تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor T9 (SP648) Ultra Power Option



161226113534231.png


كود:
[B][FONT=Arial Black][SIZE=2]*************  PRESS BOOT KEY ************* 
 VOL + OR VOL - , OR Combination Vol - +
 Feature Phone :  Call Button
 Please hold boot key until second boot.. 
*******************************************
Port : [Auto] Scanning...COM5
TPortConnection.Create...(COM5)..Opening...Ok
Identifying... [SPRD3]
Sending Config Ok
Boot1 [hydra.fdl1] Ok
Spreadtrum Boot Block version 1.1
Boot2 [hydra.fdl2]
Verifying Loader 2.... Ok
Sending To phone.... Ok
Successfully booted..Ready to go...

Reading System Info.
Reading IMEI...
Error : 84.
IMEI 1 : 000000000000000
IMEI 2 : 000000000000000

[COLOR="#008000"]*** ONE BOOT PROCESSS ***
SPD Loader are now running...
Please do not remove cable
[/COLOR]
TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:14
[/SIZE][/FONT][/B]

161226131237271.png


كود:
[B][FONT=Arial Black][SIZE=2]Port : [Auto] Scanning...COM5
TPortConnection.Create...(COM5)..Opening...Ok
Reading IMEI...
Error : 84.
IMEI 1 : 000000000000000
IMEI 2 : 000000000000000

Reading System Info.
[COLOR="#008000"]*** Flash Mode #Ultra Power  ***
Resetting FRP...Ok
Formatting userdata...Ok
Rebooting Phone..Ok
[/COLOR]
TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:33
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Starlight Star_Mix_2 Backup All By Partitions Except Userdata

161227395462021.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0690 (0000)MT6763T[6763]
 BROM HW_SW_VER : 8A00 CA01 0001 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 0690 (0000)MT6763T[6763]
 BROM HW_SW_VER : 8A00 CA01 0001 0000 
 SECURE VERSION : FF 
 BL VERSION     : 03 
 BR Secured     : 00

Preparing Download Agent..
 DA   : 6763.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : preloader

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : E6E23BF234AC19A2C760F6ECE6757F97
 ERAM Size  : 0x0000000000040000 -256 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000E8F800000 -58,242 GB
 eMMC CID   : 90014A484347386134A235283157543B - HCG8a4

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

[COLOR="#FF0000"]Reading System Info
  Brand          : Starlight
  Vendor         : Starlight
  Model          : Star_Mix_2
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_g1863ps_v2_gx_hxgj_ac991b_p-user 9 PPR1.180610.011 0719175234 release-keys
  Device         : Star_Mix_2
  Display ID     : Starlight_Star_Mix_2.V1.05_20190719
  Security Patch : 2019-07-05
  Fingerprint    : Starlight/Star_Mix_2/Star_Mix_2:9/PPR1.180610.011/0719175234:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted
[/COLOR]
Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_g1863ps_v2_gx_hxgj_ac991b_p.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Starlight_Star_Mix_2_0690--9_Starlight_Star_Mix_2.V1.05_20190719_020221144350\MT6763T_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03588000]1024 KB ->frp.bin...Ok
-nvdata[0x05688000]64 MB ->nvdata.bin...Ok
-persist[0x0D000000]48 MB ->persist.bin...Ok
-nvram[0x17800000]64 MB ->nvram.bin...Ok
[COLOR="#008000"]Done!!!
C:\Hydra Tool\\Backup\Auto\Starlight_Star_Mix_2_0690--9_Starlight_Star_Mix_2.V1.05_20190719_020221144350
MTK Phone Loader is NOW RUNNING.
[/COLOR]
TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:31
[/SIZE][/FONT][/B]



161227395493062.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : E6E23BF234AC19A2C760F6ECE6757F97
 ERAM Size  : 0x0000000000040000 -256 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000E8F800000 -58,242 GB
 eMMC CID   : 90014A484347386134A235283157543B - HCG8a4

Reading GPT-EMMC [0x00008000] 130 Items


[COLOR="#FF0000"]Reading System Info
  Brand          : Starlight
  Vendor         : Starlight
  Model          : Star_Mix_2
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_g1863ps_v2_gx_hxgj_ac991b_p-user 9 PPR1.180610.011 0719175234 release-keys
  Device         : Star_Mix_2
  Display ID     : Starlight_Star_Mix_2.V1.05_20190719
  Security Patch : 2019-07-05
  Fingerprint    : Starlight/Star_Mix_2/Star_Mix_2:9/PPR1.180610.011/0719175234:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted
[/COLOR]
-------------------------------------
[COLOR="#0000FF"]Operation : Backup All By Partitions Except Userdata
[/COLOR]Processing...

Reading Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_g1863ps_v2_gx_hxgj_ac991b_p.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Full\Starlight_Star_Mix_2_0690--9(Starlight_Star_Mix_2.V1.05_20190719)_020221144433\MT6763T_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-boot_para[0x00008000]1024 KB ->boot_para.bin...Ok
-recovery[0x00108000]32 MB ->recovery.bin...Ok
-para[0x02108000]512 KB ->para.bin...Ok
-expdb[0x02188000]20 MB ->expdb.bin...Ok
-frp[0x03588000]1024 KB ->frp.bin...Ok
-nvcfg[0x03688000]32 MB ->nvcfg.bin...Ok
-nvdata[0x05688000]64 MB ->nvdata.bin...Ok
-metadata[0x09688000]32 MB ->metadata.bin...Ok
-protect1[0x0B688000]8 MB ->protect1.bin...Ok
-protect2[0x0BE88000]9,469 MB ->protect2.bin...Ok
-seccfg[0x0C800000]8 MB ->seccfg.bin...Ok
-persist[0x0D000000]48 MB ->persist.bin...Ok
-sec1[0x10000000]2 MB ->sec1.bin...Ok
-proinfo[0x10200000]3 MB ->proinfo.bin...Ok
-md1img[0x10500000]64 MB ->md1img.bin...Ok
-md1dsp[0x14500000]16 MB ->md1dsp.bin...Ok
-spmfw[0x15500000]1024 KB ->spmfw.bin...Ok
-sspm_1[0x15600000]1024 KB ->sspm_1.bin...Ok
-sspm_2[0x15700000]1024 KB ->sspm_2.bin...Ok
-gz1[0x15800000]16 MB ->gz1.bin...Ok
-gz2[0x16800000]16 MB ->gz2.bin...Ok
-nvram[0x17800000]64 MB ->nvram.bin...Ok
-lk[0x1B800000]1024 KB ->lk.bin...Ok
-lk2[0x1B900000]1024 KB ->lk2.bin...Ok
-boot[0x1BA00000]32 MB ->boot.bin...Ok
-logo[0x1DA00000]8 MB ->logo.bin...Ok
-dtbo[0x1E200000]8 MB ->dtbo.bin...Ok
-tee1[0x1EA00000]5 MB ->tee1.bin...Ok
-tee2[0x1EF00000]5 MB ->tee2.bin...Ok
-teksunhw[0x1F400000]4 MB ->teksunhw.bin...Ok
-vendor[0x1F800000]448 MB ->vendor.bin...Ok
-system[0x3B800000]2,586 GB ->system.bin...Ok
-cache[0xE1000000]112 MB ->cache.bin...Ok
-flashinfo[0xE8E7FBE00]16 MB ->flashinfo.bin...Ok
[COLOR="#008000"]Reading Done!!!
C:\Hydra Tool\\Backup\Full\Starlight_Star_Mix_2_0690--9(Starlight_Star_Mix_2.V1.05_20190719)_020221144433 Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!
[/COLOR]
TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:02:25
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A1K (CPH1923) Format
بدون isp او tp فقط usb
By Hydra




161227996976211.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Plume P6 Pro LTE PGN528 Remove FRP


161279838639921.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0321MT6737T[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 0321MT6737T[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   : 6735.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
00000000000000000000
PRMMCCID   : 510001154D3336454A650342298E3AC2
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000003A3E00000 -14,561 GB
ERAM Size  : 0x0000000080000000 -2 GB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 05B2A8DB2A4653FD7E4A7FBF37058927
eMMC CID   : 510001154D3336454A65034229B43AC2
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM16]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

[COLOR="#FF0000"]Reading System Info
  Brand          : condor
  Vendor         : SPA Condor Electronics
  Model          : PGN528
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gnsz6737t_66_n-user 7.0 NRD90M 1533873701 release-keys
  Device         : PGN528
  Board          : PGN528
  Display ID     : PGN528
  Security Patch : 2018-08-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN528/PGN528:7.0/NRD90M/1533873701:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted
[/COLOR]
Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_gnsz6737t_66_n.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\condor_PGN528_0321-mt6737t-7.0_PGN528_080221160039\MT6737T_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x06A00000] 1024 KB -> frp.bin...Ok
 -nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
[COLOR="#008000"]C:\Hydra Tool\\Backup\Auto\condor_PGN528_0321-mt6737t-7.0_PGN528_080221160039
MTK Phone Loader is NOW RUNNING.
[/COLOR]
TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:29
[/SIZE][/FONT][/B]


161279838652092.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


[COLOR="#FF0000"]Reading System Info
  Brand          : condor
  Vendor         : SPA Condor Electronics
  Model          : PGN528
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gnsz6737t_66_n-user 7.0 NRD90M 1533873701 release-keys
  Device         : PGN528
  Board          : PGN528
  Display ID     : PGN528
  Security Patch : 2018-08-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN528/PGN528:7.0/NRD90M/1533873701:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted
[/COLOR]
-------------------------------------
[COLOR="#008000"]Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Tab Condor TFX711G Flash Done




161295354019131.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok



Reading Partition Table
SIZE[0x00000790] 22 Items > Done

Preparing to flash selected partitions
Flashing....
 preloader(preloader_elink8321_tb_m.bin) Ok
 lk(lk.bin)245,828 KB Ok
 ITEMS(items.img)16 KB Ok
 boot(boot.img)8,332 MB Ok
 recovery(recovery.img)9,012 MB Ok
 logo(logo.bin)810,21 KB Ok
 secro(secro.img)132 KB Ok
 system(system.img)2,344 GB Ok
 cache(cache.img)6,102 MB Ok
 userdata(userdata.img)74,587 MB
Unable to read phone ack FAILED

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:07:56
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi Note 8

Ultra Power Option + Remove MiAccount [Patch Method]



Ultra Power Option

161297221409712.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
 Loader: Xiaomi_redminote8_loader.elf
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x0CF764A4
MSM ID    : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver   : 00000000
PK HASH   : 1BEBE3863A6781DB4B01086063007334
            DE9E5CA14971C7C4F4358EC9D79CDA46
 
Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok 
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 
 MaxXMLSizeInBytes : 4096
 TargetName : 
 Version : 1
 DateTime : Jul  3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 19
Serial Number       : 326211206
Firmware Version    : 4
Product Name        : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
          Drive [0] 88 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 

 
[COLOR="#FF0000"]Phone Information......
  Brand          : xiaomi
  Vendor         : Xiaomi
  Model          : Redmi Note 8
  ID             : PKQ1.190616.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : ginkgo-user 9 PKQ1.190616.001 V11.0.9.0.PCOMIXM release-keys
  Miui Ver       : V11
  Device         : ginkgo
  Mod_device     : ginkgo_global
  Display ID     : PKQ1.190616.001
  Security Patch : 2020-05-01
  Fingerprint    : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.9.0.PCOMIXM:user/release-keys
[/COLOR]
[COLOR="#008000"]Processing Auto....
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOk
 - Formatting Userdata
Executing ...
 - Formatting Userdata  [Safe method] OkOk
Action Result : Ok
[/COLOR]
Rebooting Phone.... Ok

Elapsed Time : 00:00:10
[/SIZE][/FONT][/B]

Remove MiAccount -Patch Method

161297221368141.jpg


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
 Loader: Xiaomi_redminote8_loader.elf
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x0CF764A4
MSM ID    : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver   : 00000000
PK HASH   : 1BEBE3863A6781DB4B01086063007334
            DE9E5CA14971C7C4F4358EC9D79CDA46
 
Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok 
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 
 MaxXMLSizeInBytes : 4096
 TargetName : 
 Version : 1
 DateTime : Jul  3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 19
Serial Number       : 326211206
Firmware Version    : 4
Product Name        : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  32768[16 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
          Drive [0] 88 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 

 
[COLOR="#FF0000"]Phone Information......
  Brand          : xiaomi
  Vendor         : Xiaomi
  Model          : Redmi Note 8
  ID             : PKQ1.190616.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : ginkgo-user 9 PKQ1.190616.001 V11.0.9.0.PCOMIXM release-keys
  Miui Ver       : V11
  Device         : ginkgo
  Mod_device     : ginkgo_global
  Display ID     : PKQ1.190616.001
  Security Patch : 2020-05-01
  Fingerprint    : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.9.0.PCOMIXM:user/release-keys
[/COLOR]
[COLOR="#008000"]Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]Done!!
Total Items patched : 56
Successfully patched address..
Action Result : Ok
[/COLOR]
Rebooting Phone.... Ok

Elapsed Time : 00:02:02
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

XIAOMI Redmi 6A (cactus) Remove MiAccount[Erase Method]




161303085557741.png



كود:
[B][FONT=Arial Black][SIZE=2]Brand : XIAOMI Model : Redmi 6A (cactus) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AB502B485654254FF684D00224E88A46
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 161000800036880002AE170D9FA34731 - HAG4a2

Reading GPT-EMMC [0x00008000] 130 Items


[COLOR="#FF0000"]Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 9 PPR1.180610.011 V11.0.9.0.PCBMIXM release-keys
Miui Ver : V11
Device : cactus
Mod_device : cactus_global
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-08-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.9.0.PCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted
[/COLOR]
-------------------------------------
[COLOR="#008000"]Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok
[/COLOR]
TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:20
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi Note 8 Pro (begonia)
Bypass MiAccount
Remove FRP

على Hydra Tool

بدون Testpoint
بدون auth
بدون سرفر

[/SIZE][/FONT][/B]


161304829187441.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Samsung J7 2016 (J710F) FRP Remove



161314398187381.png


كود:
[B][FONT=Arial Black][SIZE=2]Scanning port....
TPortConnection.Create...(COM28)..Opening...Ok
Device Mode : Download Mode
CPU         : EXYNOS
Factory Reset Protection
Removing...
Total Binary Size is 0,25MB
Initialize Phone : Ok
Partition Information Table(PIT)
 - Backup 
Backup PIT (COM_TAR2LSI7870) Ok
 - Reading.. Ok
 - Mapping..Ok
Remove FRP Successfully!!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:08
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi 7A (Pine) Remove MiAccount Patch Method




161338420079871.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

CONDOR Plume P8 PGN605 Ultra Power Option



161339214151311.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : CONDOR Model : PGN605 (Plume P8) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


Reading System Info
  Brand          : condor
  Vendor         : condor
  Model          : PGN605
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gionee6753_65u_m0-user 6.0 MRA58K 1467163973 release-keys
  Device         : PGN605
  Board          : PGN605
  Display ID     : PGN605
  Security Patch : 2017-09-05
  Platform       : mt6753
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN605/PGN605:6.0/MRA58K/1467163973:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Encrypted

-------------------------------------
[COLOR="#FF0000"]Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:15
[/SIZE][/FONT][/B]
 

tontonflach

عضو نشط
إنضم
1 أكتوبر 2013
المشاركات
73
مستوى التفاعل
72
النقاط
0
الإقامة
BALLOTE
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

فك قفل FRP على تابليت كوندور TFX711Gبكبسة زر
:strongly::strongly::strongly:


 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor P4 Pro Remove Pattren Without Loss Data

ازالة النمط بدون فقدان البيانات



161346680657251.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : CONDOR Model : PGN515 (Plume P4 Pro) Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0335MT6737[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 0335MT6737[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   :  [Not Exist]
Trying Default 6735.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
00000000000000000000
PRMMCCID   : 510001154D533238B06A0042D13AEAE4
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000003A3E00000 -14,561 GB
ERAM Size  : 0x0000000060000000 -1,5 GB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 6D7B98708E196F766D89BC7BFEB191C0
eMMC CID   : 510001154D533238B06A0042D1C2EAE4
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM16]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
  Brand          : condor
  Vendor         : condor
  Model          : PGN515
  ID             : LMY47D
  SDK            : 22
  Release        : 5.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Description    : full_gionee6735m_65u_l1-user 5.1 LMY47D 1451362193 release-keys
  Device         : PGN515
  Display ID     : PGN515
  Security Patch : 2015-11-01
  Platform       : mt6735m
  FRPPST         : /dev/block/platform/mtk-msdc.0/by-name/frp
  Fingerprint    : condor/PGN515/PGN515:5.1/LMY47D/1451362193:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_gionee6735m_65u_l1.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\condor_PGN515_0335-mt6735m-5.1_PGN515_160221095534\MT6737_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x06A00000] 1024 KB -> frp.bin...Ok
 -nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\condor_PGN515_0335-mt6735m-5.1_PGN515_160221095534
MTK Phone Loader is NOW RUNNING.

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:20
[/SIZE][/FONT][/B]

161346680665412.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : CONDOR Model : PGN515 (Plume P4 Pro) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


Reading System Info
  Brand          : condor
  Vendor         : condor
  Model          : PGN515
  ID             : LMY47D
  SDK            : 22
  Release        : 5.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Description    : full_gionee6735m_65u_l1-user 5.1 LMY47D 1451362193 release-keys
  Device         : PGN515
  Display ID     : PGN515
  Security Patch : 2015-11-01
  Platform       : mt6735m
  FRPPST         : /dev/block/platform/mtk-msdc.0/by-name/frp
  Fingerprint    : condor/PGN515/PGN515:5.1/LMY47D/1451362193:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Remove Lock Without Data Loss
Processing...
Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor T2 SP530 FRP Remove



161355347836371.png


كود:
[B][FONT=Arial Black][SIZE=2]*************  PRESS BOOT KEY ************* 
 VOL + OR VOL - , OR Combination Vol - +
 Feature Phone :  Call Button
 Please hold boot key until second boot.. 
*******************************************
Port : [Auto] Scanning...COM5
TPortConnection.Create...(COM5)..Opening...Ok
Identifying... [SPRD3]
Sending Config Ok
Boot1 [hydra.fdl1] Ok
Spreadtrum Boot Block version 1.1
Boot2 [hydra.fdl2]
Verifying Loader 2.... Ok
Sending To phone.... Ok
Successfully booted..Ready to go...

[COLOR="#008000"]Reading System Info..
  Vendor : SPA Condor Electronics
  Model : Griffe T2
  Android Ver : 7.0
  Device : SP530
  Board : zsl866_an
  Display ID : NRD90M release-keys
  Security Patch : 2017-05-05
  Platform : sc8830
  FRPPST : /dev/block/platform/sdio_emmc/by-name/persist
  Fingerprint : Condor/SP530/SP530:7.0/NRD90M/SP530_V4.0_20170607_CTS:user/release-keys
  ro_product_hardware : SP9832A-2_V1.1.0(4M)
[/COLOR]
Reading IMEI...
Error : 96.
IMEI 1 : 000000000000000
IMEI 2 : 000000000000000

[COLOR="#FF0000"]*** ONE BOOT PROCESSS ***
SPD Loader are now running...
Please do not remove cable
[/COLOR]
TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:14
[/SIZE][/FONT][/B]


161355347898022.png


كود:
[B][FONT=Arial Black][SIZE=2]Port : [Auto] Scanning...COM5
TPortConnection.Create...(COM5)..Opening...Ok
Reading IMEI...
Error : 96.
IMEI 1 : 000000000000000
IMEI 2 : 000000000000000

Reading System Info.
[COLOR="#FF0000"]*** Flash Mode #Remove FRP ***
Resetting FRP...Ok
Rebooting Phone..Ok
[/COLOR]
TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:05
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi Note 8 Flash Fastboot Done



161356426852651.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching Device By Fastboot
Device Found...

Reading Information...getvar:version FAILED (remote: GetVar Variable Not found)
Product : ginkgo
version : getvar:version FAILED (remote: GetVar Variable Not found)
Secure : yes
Device Info:
Verity mode: true
Device unlocked: false
Device critical unlocked: false
Charger screen enabled: false
--------------------------
Fastboot Flashing...
-qupfw(qupv3fw.elf) Ok
-qupfwbak(qupv3fw.elf) Ok
-vbmeta(vbmeta.img) Ok
-vbmetabak(vbmeta.img) Ok
-xbl_config(xbl_config.elf) Ok
-xbl_configbak(xbl_config.elf) Ok
-devcfg(devcfg.mbn) Ok
-devcfgbak(devcfg.mbn) Ok
-storsec(storsec.mbn) Ok
-rpm(rpm.mbn) Ok
-rpmbak(rpm.mbn) Ok
-hyp(hyp.mbn) Ok
-hypbak(hyp.mbn) Ok
-keymaster(km4.mbn) Ok
-keymasterbak(km4.mbn) Ok
-cmnlib(cmnlib.mbn) Ok
-cmnlib64(cmnlib64.mbn) Ok
-cmnlibbak(cmnlib.mbn) Ok
-cmnlib64bak(cmnlib64.mbn) Ok
-abl(abl.elf) Ok
-ablbak(abl.elf) Ok
-bluetooth(BTFM.bin) Ok
-bluetoothbak(BTFM.bin) Ok
-imagefv(imagefv.elf) Ok
-imagefvbak(imagefv.elf) Ok
-uefisecapp(uefi_sec.mbn) Ok
-uefisecappbak(uefi_sec.mbn) Ok
-xbl(xbl.elf) Ok
-xblbak(xbl.elf) Ok
-tz(tz.mbn) Ok
-tzbak(tz.mbn) Ok
-logfs(logfs_ufs_8mb.bin) Ok
-metadata(metadata.img) Ok
-dtbo(dtbo.img) Ok
-dtbobak(dtbo.img) Ok
-dsp(dspso.bin) Ok
-dspbak(dspso.bin) Ok
-persist(persist.img) Skipped
-boot(boot.img) Ok
-bootbak(boot.img) Ok
-recovery(recovery.img) Ok
-modem(NON-HLOS.bin) Ok
-modembak(NON-HLOS.bin) Ok
-cache(cache.img) Ok
-cust(cust.img) Ok
-vendor(vendor.img) Ok
-system(system.img) Ok
-userdata(userdata.img) Ok
All Done
--------------------------

Elapsed Time : 00:03:44
[/SIZE][/FONT][/B]

210217012410431169.png
 
التعديل الأخير:

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,595
مستوى التفاعل
1,794
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor PGN528 (Plume P6 Pro LTE) Ultra Power Option



161356795648141.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : CONDOR Model : PGN528 (Plume P6 Pro LTE) Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0321MT6737T[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 0321MT6737T[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 FUSEID         : 00000000
 SECURE VERSION : FF 
 BL VERSION     : 01 
 BR Secured     : 00

Preparing Download Agent..
 DA   : [Not Exist]
Trying Default 6735.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
00000000000000000000
PRMMCCID   : 510001154D333645E0F303426F0F3FE0
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000003A3E00000 -14,561 GB
ERAM Size  : 0x0000000080000000 -2 GB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 2B137B974BF03C9C575DA1227349E40A
eMMC CID   : 510001154D333645E0F303426F153FE0
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM16]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
  Brand          : condor
  Vendor         : SPA Condor Electronics
  Model          : PGN528
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gnsz6737t_66_n-user 7.0 NRD90M 1510022999 release-keys
  Device         : PGN528
  Board          : PGN528
  Display ID     : PGN528
  Security Patch : 2017-12-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN528/PGN528:7.0/NRD90M/1510022999:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_gnsz6737t_66_n.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\condor_PGN528_0321-mt6737t-7.0_PGN528_170221141105\MT6737T_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x06A00000] 1024 KB -> frp.bin...Ok
 -nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\condor_PGN528_0321-mt6737t-7.0_PGN528_170221141105
MTK Phone Loader is NOW RUNNING.

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:26
[/SIZE][/FONT][/B]


161356795664192.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : CONDOR Model : PGN528 (Plume P6 Pro LTE) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


Reading System Info
  Brand          : condor
  Vendor         : SPA Condor Electronics
  Model          : PGN528
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gnsz6737t_66_n-user 7.0 NRD90M 1510022999 release-keys
  Device         : PGN528
  Board          : PGN528
  Display ID     : PGN528
  Security Patch : 2017-12-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN528/PGN528:7.0/NRD90M/1510022999:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Safeformat Universal...(tmp.bin)240 Bytes Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:04
[/SIZE][/FONT][/B]
 

nadirsoft

عضو نشط
إنضم
18 يونيو 2013
المشاركات
96
مستوى التفاعل
47
النقاط
18
الإقامة
ALGERIE
wiko tommy2 plus frp done

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&15c311e1&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3391087777
Firmware Version : 3
Product Name : FE62MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14,561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : WIKO
Vendor : WIKO
Model : Tommy2 Plus
ID : NMF26F
SDK : 25
Release : 7.1.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : v3941_32-user 7.1.1 NMF26F eng.android.1503886484 release-keys
Device : v3941
Board : QC_Reference_Phone
Display ID : NMF26F release-keys
Security Patch : 2017-07-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : WIKO/v3941/v3941:7.1.1/NMF26F/androi07032103:user/release-keys

Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:05
 

hossam

عضو أساسي
إنضم
18 مارس 2013
المشاركات
328
مستوى التفاعل
282
النقاط
63
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

قرأة المعلومات info
عبر test point
Huawei Y7 Prime 2018 LDN-Lx2

كود:
Hydra Qualcomm  Tool  Ver 1.0.2 Build 72
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
Intel(R) Core(TM) i3-4005U CPU @ 1.70GHz
Intel(R) HD Graphics Family
Ram Installed : 2 GB
Windows Access Right Admin
******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial     : 210100011724
Initialize : OKAY
Status     : Activated
Life       : 0 [0-0-0-0-0]

PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM51)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&9d0d236&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xAC0DD313
MSM ID    : 0x0004F0E1, MSM8937-Qualcomm Snapdragon 430
PBL Ver   : 00000000
PK HASH   : 6BC369511DA9CADB3A7AF61574F89DB3
            85003D6241BDD1FF573DBA61BF6AE119
 
Firehose Loader[Firehose LDN.mbn]
SaharaBoot... Ok
Sending ...........Ok
Connecting to Firehose...
Ping... Ok 
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 3774416829
Firmware Version    : 0
Product Name        : GD6BMB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29,121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Phone Information.....
  Vendor         : unknown
  ID             : OPR6.170623.013
  SDK            : 26
  Release        : 8.0.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : generic_a53-user 8.0.0 OPR6.170623.013 eng.jenkin.20190509.142908 test-keys
  Display ID     : System 8.0.0.073(00UV)
  Security Patch : 2019-05-01
  Fingerprint    : Huawei/generic_a53/generic_a53:8.0.0/OPR6.170623.013/jenkin05091429:user/test-keys


Elapsed Time : 00:00:09
نزع الحماية frp
[] [

كود:
Hydra Qualcomm  Tool  Ver 1.0.2 Build 72
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
Intel(R) Core(TM) i3-4005U CPU @ 1.70GHz
Intel(R) HD Graphics Family
Ram Installed : 2 GB
Windows Access Right Admin
******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial     : 210100011724
Initialize : OKAY
Status     : Activated
Life       : 0 [0-0-0-0-0]

PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM51)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&9d0d236&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xAC0DD313
MSM ID    : 0x0004F0E1, MSM8937-Qualcomm Snapdragon 430
PBL Ver   : 00000000
PK HASH   : 6BC369511DA9CADB3A7AF61574F89DB3
            85003D6241BDD1FF573DBA61BF6AE119
 
Firehose Loader[Firehose LDN.mbn]
SaharaBoot... Ok
Sending ...........Ok
Connecting to Firehose...
Ping... Ok 
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 3774416829
Firmware Version    : 0
Product Name        : GD6BMB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29,121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
          Drive [0] 56 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

Processing Remove FRP....
 - Removing FRP [Zero Wipe] Ok
Action Result : Ok

Elapsed Time : 00:00:08
 
التعديل الأخير:

tontonflach

عضو نشط
إنضم
1 أكتوبر 2013
المشاركات
73
مستوى التفاعل
72
النقاط
0
الإقامة
BALLOTE
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

WIKO SANNY 2 PLUS with ULTRA POWAER OPTION

كود:
Hydra MediaTeK Tool  Ver 1.0.2 Build 82
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
Pentium(R) Dual-Core  CPU      E5400  @ 2.70GHz
Famille de jeu de puces Express Intel(R) G33/G31 (Microsoft Corporation - WDDM 1.0)
Ram Installed : 2 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial     : 201000009103
Initialize : OKAY
Status     : Activated
Life       : 0 [0-0-0-0-0]


Brand : WIKO Model : V2600 (Sunny 2 Plus) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM25]

TPortConnection.Create...(COM25)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 6580MT6580[6580]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 6580MT6580[6580]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 40001002
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 01
NORMAL BOOT

Preparing Download Agent..
 DA   : 6580_SWSEC_Wiko.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.00.00
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID   : 90014A483847346132A55660D25954BB
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000001D2000000 -7,281 GB
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 25986E676102CE851F79C477DF61039B
eMMC CID   : 484A0190613447386056A532BB5459D2
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM51]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
  Brand          : WIKO
  Vendor         : WIKO
  Model          : Sunny2 Plus
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : full_v2600cn-user 7.0 NRD90M 1500866217 release-keys
  Device         : v2600cn
  Display ID     : alps-mp-n0.mp2-V1_tinno6580.we.n_P144
  Security Patch : 2017-07-05
  Platform       : mt6580
  FRPPST         : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
  Fingerprint    : WIKO/v2600cn/v2600cn:7.0/NRD90M/1500866217:user/release-keys
  StorageType    : mtp
  Userdata State : Not Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_v2600cn.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\WIKO_Sunny2 Plus_6580-mt6580-7.0_alps-mp-n0.mp2-V1_tinno6580.we.n_P144_180221190519\MT6580_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x063A0000] 1024 KB -> frp.bin...Ok
 -nvdata[0x064A0000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\WIKO_Sunny2 Plus_6580-mt6580-7.0_alps-mp-n0.mp2-V1_tinno6580.we.n_P144_180221190519
MTK Phone Loader is NOW RUNNING.


Reading System Info
  Brand          : WIKO
  Vendor         : WIKO
  Model          : Sunny2 Plus
  ID             : NRD90M
  SDK            : 24
  Release        : 7.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Description    : full_v2600cn-user 7.0 NRD90M 1500866217 release-keys
  Device         : v2600cn
  Display ID     : alps-mp-n0.mp2-V1_tinno6580.we.n_P144
  Security Patch : 2017-07-05
  Platform       : mt6580
  FRPPST         : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
  Fingerprint    : WIKO/v2600cn/v2600cn:7.0/NRD90M/1500866217:user/release-keys
  StorageType    : mtp
  Userdata State : Not Encrypted

[COLOR="#FF0000"]-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Safeformat Universal...(tmp.bin)240 Bytes Ok Ok

TPortConnection.Destroy.....Closing...Ok..
[/COLOR]
Elapsed Time : 00:00:42
 

dahane

عضو أساسي
إنضم
30 سبتمبر 2012
المشاركات
186
مستوى التفاعل
87
النقاط
0
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

huawei P smath FIG-LX1 new security FRP remove by Hydra Dongle
العملية تتطلب testpoint

 
أعلى