تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Lenovo C2 (K10a40) Ultra Power Option



161372328476011.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : LENOVO Model : K10a40 (Lenovo C2) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


Reading System Info
  Brand          : Lenovo
  Vendor         : LENOVO
  Model          : Lenovo K10a40
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_lcsh6735m_35u_m-user 6.0 MRA58K 1495015561 release-keys
  Device         : K10a40
  Display ID     : K10a40_S230_170517_ROW_WE
  Security Patch : 2017-03-05
  Platform       : mt6735m
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : Lenovo/K10a40/K10a40:6.0/MRA58K/K10a40_S230_170517_ROW_WE:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:07
[/SIZE][/FONT][/B]
 

dahane

عضو أساسي
إنضم
30 سبتمبر 2012
المشاركات
186
مستوى التفاعل
87
النقاط
0
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi 9 FRP Remove
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Redmi Note 8 Pro (begonia) Remove MiAccount[Patch Method]




161389764466471.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Plume P6 Pro LTE (PGN528) Ultra Power Option




161390510125041.png



161390510143492.png
 

tontonflach

عضو نشط
إنضم
1 أكتوبر 2013
المشاركات
73
مستوى التفاعل
72
النقاط
0
الإقامة
BALLOTE
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

REDMI 8 OLIVE Format with TP

FORMATTING USER DATA

كود:
Hydra Qualcomm  Tool  Ver 1.0.2 Build 72
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
Pentium(R) Dual-Core  CPU      E5400  @ 2.70GHz
Famille de jeu de puces Express Intel(R) G33/G31 (Microsoft Corporation - WDDM 1.0)
Ram Installed : 2 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial     : 201000009103
Initialize : OKAY
Status     : Activated
Life       : 0 [0-0-0-0-0]

PreOperation Configuration 
 Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
 Loader: Xiaomi_Redmi_8_Olive.mbn
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM39)
 SymbolicName :\??\USB#VID_05C6&PID_9008#5&94b8c27&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 20937263
Firmware Version    : 842018864
Product Name        : hC9aP3
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Phone Information......
  Vendor         : Xiaomi
  ID             : QKQ1.191014.001
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Miui Ver       : V12
  Mod_device     : olive_global
  Security Patch : 2020-12-01
  Emmc_size      : 16GB

Reading GPT[3]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

Formatting Userdata...
Method : 
Auto 
Processing... 
 - Formatting Userdata
Executing ...
 - Formatting Userdata  [Safe method] OkOkOk

Elapsed Time : 00:00:08


FRP REMOVE
كود:
Hydra Qualcomm  Tool  Ver 1.0.2 Build 72
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
Pentium(R) Dual-Core  CPU      E5400  @ 2.70GHz
Famille de jeu de puces Express Intel(R) G33/G31 (Microsoft Corporation - WDDM 1.0)
Ram Installed : 2 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial     : 201000009103
Initialize : OKAY
Status     : Activated
Life       : 0 [0-0-0-0-0]

PreOperation Configuration 
 Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
 Loader: Xiaomi_Redmi_8_Olive.mbn
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM78)
 SymbolicName :\??\USB#VID_05C6&PID_9008#5&27710402&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xFE72ACC8
MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver   : 00000000
PK HASH   : 57158EAF1814D78FD2B3105ECE4DB18A
            817A08AC664A5782A925F3FF8403D39A
 
Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok 
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[-2j14DJGqiYydC7bPEWqeBsIfyf]
Checking Internet connection....
 - Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 20937263
Firmware Version    : 842018864
Product Name        : hC9aP3
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Phone Information......
  Vendor         : Xiaomi
  ID             : QKQ1.191014.001
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Miui Ver       : V12
  Mod_device     : olive_global
  Security Patch : 2020-12-01
  Emmc_size      : 16GB

Reading GPT[3]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

Removing FRPta...
Method : 
Auto 
Processing... 
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:24
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor P8 lite (PGN610) FRP Remove


161435744460712.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0321MT6737T[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 0321MT6737T[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   : 6735.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
00000000000000000000
PRMMCCID   : 520001154D4231451CC90742F1030CF0
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000003A3E00000 -14,561 GB
ERAM Size  : 0x00000000C0000000 -3 GB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 0336FD0D3E9646EB950997513644E39E
eMMC CID   : 520001154D4231451CC90742F1C30CF0
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM16]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
  Brand          : condor
  Vendor         : condor
  Model          : PGN610
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gionee6737t_66_m0-user 6.0 MRA58K 1473218164 release-keys
  Device         : PGN610
  Board          : PGN610
  Display ID     : PGN610
  Security Patch : 2016-11-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN610/PGN610:6.0/MRA58K/1473218164:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_gionee6737t_66_m0.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\condor_PGN610_0321-mt6737t-6.0_PGN610_260221172555\MT6737T_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x06A00000] 1024 KB -> frp.bin...Ok
 -nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
[COLOR="#FF0000"]C:\Hydra Tool\\Backup\Auto\condor_PGN610_0321-mt6737t-6.0_PGN610_260221172555
MTK Phone Loader is NOW RUNNING.
[/COLOR]
TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:31
[/SIZE][/FONT][/B]


161435765718391.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


Reading System Info
  Brand          : condor
  Vendor         : condor
  Model          : PGN610
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gionee6737t_66_m0-user 6.0 MRA58K 1473218164 release-keys
  Device         : PGN610
  Board          : PGN610
  Display ID     : PGN610
  Security Patch : 2016-11-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN610/PGN610:6.0/MRA58K/1473218164:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Encrypted

-------------------------------------
[COLOR="#FF0000"]Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok
[/COLOR]
TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor P8 lite Ultra Power Option


161449817747241.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : CONDOR Model : PGN610 (Plume P8 Lite) Connection : Flash Mode

=====================================How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0321MT6737T[6735]
 BROM HW_SW_VER : 8A00 CB00 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 0321MT6737T[6735]
 BROM HW_SW_VER : 8A00 CB00 0000 0000 
 FUSEID         : 00000000
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   : [Not Exist]
Trying Default 6735.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
00000000000000000000
PRMMCCID   : 520001154D4231455C6A07420B196590
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000003A3E00000 -14,561 GB
ERAM Size  : 0x00000000C0000000 -3 GB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : BFEE3A710801E634EBD4994F47A58A2F
eMMC CID   : 520001154D4231455C6A07420BB36590
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM16]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
  Brand          : condor
  Vendor         : condor
  Model          : PGN610
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gionee6737t_66_m0-user 6.0 MRA58K 1473218164 release-keys
  Device         : PGN610
  Board          : PGN610
  Display ID     : PGN610
  Security Patch : 2016-11-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN610/PGN610:6.0/MRA58K/1473218164:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_gionee6737t_66_m0.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\condor_PGN610_0321-mt6737t-6.0_PGN610_270221162229\MT6737T_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x06A00000] 1024 KB -> frp.bin...Ok
 -nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
[COLOR="#FF0000"]C:\Hydra Tool\\Backup\Auto\condor_PGN610_0321-mt6737t-6.0_PGN610_270221162229
MTK Phone Loader is NOW RUNNING.
[/COLOR]
TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:25
[/SIZE][/FONT][/B]

161449817833182.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : CONDOR Model : PGN610 (Plume P8 Lite) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


Reading System Info
  Brand          : condor
  Vendor         : condor
  Model          : PGN610
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gionee6737t_66_m0-user 6.0 MRA58K 1473218164 release-keys
  Device         : PGN610
  Board          : PGN610
  Display ID     : PGN610
  Security Patch : 2016-11-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN610/PGN610:6.0/MRA58K/1473218164:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Encrypted

-------------------------------------
[COLOR="#FF0000"]Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Safeformat Universal...(tmp.bin)240 Bytes Ok Ok
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

IRIS G7020 Read Pattern



161451695372721.png


كود:
[B][FONT=Arial Black][SIZE=2][COLOR="#FF0000"]Brand : By CPU Model : MT6572[/COLOR] Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 6572MT6572[6572]
 BROM HW_SW_VER : 8A00 CA01 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 6572MT6572[6572]
 BROM HW_SW_VER : 8A00 CA01 0000 0000 
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   : [Not Exist]
Trying Default 6572.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID   : 8801034E436172642041AD1DB322C273
Init Configuration
Running DA 4.2 on BBID : 0x88 Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000020000 -128 KB
eMMC USER  : 0x00000001CE100000 -7,22 GB
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 146CEB8B613353429C4CBFB109E1FC2F
eMMC CID   : 4E030188647261431DAD412073C222B3
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM16]


Reading Partition Table
SIZE[0x00000840] 22 Items > Done

Reading System Info
  Brand          : alps
  Vendor         : alps
  Model          : d716
  ID             : KOT49H
  SDK            : 19
  Release        : 4.4.2
  ABI            : armeabi-v7a
  Description    : d716-user 4.4.2 KOT49H vCJ0015 release-keys
  Device         : d716
  Board          : d716
  Display ID     : ALPS.KK1.MP6.V1
  Fingerprint    : alps/d716/d716:4.4.2/KOT49H/1451958506:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

Autobackup Partitions
 -PRELOADER[0x00000000] 512 KB -> PRELOADER.bin...Ok
   -> Renaming Preloader....  preloader_d716.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\alps_d716_6572--4.4.2_ALPS.KK1.MP6.V1_280221134739\MT6572_Android_scatter.txt
 -NVRAM[0x01000000] 5 MB -> NVRAM.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\alps_d716_6572--4.4.2_ALPS.KK1.MP6.V1_280221134739
MTK Phone Loader is NOW RUNNING.


Reading System Info
  Brand          : alps
  Vendor         : alps
  Model          : d716
  ID             : KOT49H
  SDK            : 19
  Release        : 4.4.2
  ABI            : armeabi-v7a
  Description    : d716-user 4.4.2 KOT49H vCJ0015 release-keys
  Device         : d716
  Board          : d716
  Display ID     : ALPS.KK1.MP6.V1
  Fingerprint    : alps/d716/d716:4.4.2/KOT49H/1451958506:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
[COLOR="#FF0000"]Operation : Read Pattern
Processing...
Searching PatternKey : . Found
Gesture Data : 6B4D9F72D885728C6B2E16FC1DD3CF4A75AE2265
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 1589
1 2 3
4 5 6
7 8 9

 Ok
[/COLOR]
TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:18
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

XIAOMI Redmi 9 (lancelot) FRP Remove


161458836013891.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : XIAOMI Model : Redmi 9 (lancelot) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : E5CCDEA9CC6616E05733AE170D9FA364
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000010000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 1500475036424D420203B0E47314A395 - DP6DAB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:06
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

DOOGEE X20L Factory Reset Metamode



161460531951561.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Meta Mode

---------------------------------
Please wait..Searching for META Port..
TPortConnection.Create...(COM102)..Opening...Ok

[COLOR="#FF0000"]META Phone Info . . .
MCUID: 8U  `    mt6737m,S01
ME_SO: S01 
DATE : 2018    03    13  Z            16:21:07 CST 
MODEL: DOOGEE-X20L-Android7.0-20170805 
ME_SWVER: DOOGEE-X20L-Android7.0-20170805 
[/COLOR]

[COLOR="#008000"]Reset to Factory Default Ok
Rebooting....
Done!!!
[/COLOR]
TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:25
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

CONDOR F4 PLUS FP213 Read Security Code



161467570379091.png



161467570484822.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Plume P8 Lite (PGN610) Flash Done



161468890972571.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : CONDOR Model : PGN610 (Plume P8 Lite) Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok


Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0321MT6737T[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 0321MT6737T[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   : [Not Exist]
Trying Default 6735.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
00000000000000000000
PRMMCCID   : 520001154D42314572CF0742F50927D0
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000003A3E00000 -14,561 GB
ERAM Size  : 0x00000000C0000000 -3 GB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : C34D2CCEF678689A85FF3B81343DE264
eMMC CID   : 520001154D42314572CF0742F5C327D0
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM16]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
  Brand          : condor
  Vendor         : condor
  Model          : PGN610
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gionee6737t_66_m0-user 6.0 MRA58K 1473218164 release-keys
  Device         : PGN610
  Board          : PGN610
  Display ID     : PGN610
  Security Patch : 2016-11-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN610/PGN610:6.0/MRA58K/1473218164:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_gionee6737t_66_m0.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\condor_PGN610_0321-mt6737t-6.0_PGN610_020321131703\MT6737T_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x06A00000] 1024 KB -> frp.bin...Ok
 -nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\condor_PGN610_0321-mt6737t-6.0_PGN610_020321131703
MTK Phone Loader is NOW RUNNING.


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

[COLOR="#FF0000"]Preparing to flash selected partitions
Flashing....
 preloader(preloader_PGN610.bin) Ok
 lk(lk.bin)290,906 KB Ok
 boot(boot.img)8,747 MB Ok
 recovery(recovery.img)9,722 MB Ok
 logo(logo.bin)1,248 MB Ok
 secro(secro.img)132 KB Ok
 tee1(trustzone.bin)59,5 KB Ok
 tee2(trustzone.bin)59,5 KB Ok
 system(system.img)3,345 GB Ok
 cache(cache.img)8 MB Ok
 userdata(userdata.img)26,524 MB Ok
Done!!!!
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:05:41
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi 6A Erase MiAccount + Disable Anti-Relock


Erase MiAccount


161476604820872.png


Disable Anti-Relock



161476604774251.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Oppo A1k (CPH1923) Formatting Userdata



161477680883941.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Plume P8 Lite (PGN610) Flash Done


161485459506941.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok


Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0321MT6737T[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 0321MT6737T[6735]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   : 6735.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
00000000000000000000
PRMMCCID   : 520001154D423145CACD0742C336D9F0
Init Configuration
Running DA 4.2 on BBID : 0x9B Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000003A3E00000 -14,561 GB
ERAM Size  : 0x00000000C0000000 -3 GB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 84B0C3BBB637173870B889E5117B9A56
eMMC CID   : 520001154D423145CACD0742C3C3D9F0
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM16]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
  Brand          : condor
  Vendor         : condor
  Model          : PGN610
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_gionee6737t_66_m0-user 6.0 MRA58K 1473218164 release-keys
  Device         : PGN610
  Board          : PGN610
  Display ID     : PGN610
  Security Patch : 2016-11-05
  Platform       : mt6737t
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : condor/PGN610/PGN610:6.0/MRA58K/1473218164:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_gionee6737t_66_m0.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\condor_PGN610_0321-mt6737t-6.0_PGN610_040321113425\MT6737T_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x06A00000] 1024 KB -> frp.bin...Ok
 -nvdata[0x06B00000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\condor_PGN610_0321-mt6737t-6.0_PGN610_040321113425
MTK Phone Loader is NOW RUNNING.


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Preparing to flash selected partitions
Flashing....
 preloader(preloader_PGN610.bin) Ok
 lk(lk.bin)290,906 KB Ok
 boot(boot.img)8,747 MB Ok
 recovery(recovery.img)9,722 MB Ok
 logo(logo.bin)1,248 MB Ok
 secro(secro.img)132 KB Ok
 tee1(trustzone.bin)59,5 KB Ok
 tee2(trustzone.bin)59,5 KB Ok
 system(system.img)3,345 GB Ok
 cache(cache.img)8 MB Ok
 userdata(userdata.img)26,524 MB Ok
Done!!!!

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:06:12
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Starlight My_Star_X Ultra power Option


161486433281021.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : STARLIGHT Model : My Star X Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 6580MT6580[6580]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 6580MT6580[6580]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 40001002
 FUSEID         : 40001002
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   :  [Not Exist]
Trying Default 6580.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID   : 88010344394431364724F302292236A5
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x000000039D000000 -14,453 GB
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 7DA78A4A0292CDE19D14231C33F00E36
eMMC CID   : 440301883631443902F32447A5362229
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM16]


Reading Partition Table
SIZE[0x00000948] 27 Items > Done

Reading System Info
  Brand          : Starlight
  Vendor         : Starlight
  Model          : My_Star_X
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_a600w_v1_g_hxgj_ac69c_sta_go-user 8.1.0 O11019 1547544444 release-keys
  Device         : My_Star_X
  Display ID     : Starlight.My_Star_X.V3.03_20190115
  Security Patch : 2018-12-05
  Fingerprint    : Starlight/My_Star_X/My_Star_X:8.1.0/O11019/1547544444:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_a600w_v1_g_hxgj_ac69c_sta_go.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\Starlight_My_Star_X_6580--8.1.0_Starlight.My_Star_X.V3.03_20190115_040321141900\MT6580_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x17FA0000] 1024 KB -> frp.bin...Ok
 -nvdata[0x18AA0000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\Starlight_My_Star_X_6580--8.1.0_Starlight.My_Star_X.V3.03_20190115_040321141900
MTK Phone Loader is NOW RUNNING.

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:32
[/SIZE][/FONT][/B]

161486433294872.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : STARLIGHT Model : My Star X Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


Reading System Info
  Brand          : Starlight
  Vendor         : Starlight
  Model          : My_Star_X
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_a600w_v1_g_hxgj_ac69c_sta_go-user 8.1.0 O11019 1547544444 release-keys
  Device         : My_Star_X
  Display ID     : Starlight.My_Star_X.V3.03_20190115
  Security Patch : 2018-12-05
  Fingerprint    : Starlight/My_Star_X/My_Star_X:8.1.0/O11019/1547544444:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Safeformat Universal...(tmp.bin)240 Bytes Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Realme 7 (RMX2151) Factory Reset Meta Mode

161486645989751.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Meta Mode

---------------------------------
Please wait..Searching for META Port..
TPortConnection.Create...(COM16)..Opening...Ok

META Phone Info . . .
MCUID: 8U ` mt6785
ME_SO:
DATE : Sun Dec 20 20:41:18 CST 2020
MODEL: RMX2151_11_A.75
ME_SWVER: RMX2151_11_A.75_201220_00000000

Reset to Factory Default Ok
Rebooting....
Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

تصليح ايمي Condor Plume P8 Lite



161487317887621.png


كود:
[B][FONT=Arial Black][SIZE=2]******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial     : XXXXXXXXX
Initialize : OKAY
Status     : Activated
Life       : 0 [0-0-0-0-0]


=====================================
***IMEI REPAIR FUNCTION****
Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM10]

TPortConnection.Create...(COM10)..Opening...Ok

Rebooting phone 
SWITCH TO : META MODE
Done!!!


TPortConnection.Destroy.....Closing...Ok..
Please wait..Searching for META Port..
TPortConnection.Create...(COM103)..Opening...Ok

META Phone Info . . .
MCUID: 8 L@     qF@      G@ ,N  
ME_SO:  I@        ?@     ((     ?@    h      ?@           ?@           ?@    
DATE :  J@  porter J@ ,N   N@       aG@  simple N@     SIN I@  brand` O@        M@  s  
MODEL:        ?@           ?@          
ME_SWVER:  ?@    x      O@       


IMEI [1]   : 3531ْْْXXXXXXXXXX3
IMEI [2]   : 3531ْْْXXXXXXXXXX1

Repairing IMEI ONE
IMEI [1] [OLD] : 3531ْْْXXXXXXXXXX3
IMEI [1] [NEW] : 3531ْْْXXXXXXXXXX6

Repairing IMEI TWO
IMEI [2] [OLD] : 3531ْْْXXXXXXXXXX1
IMEI [2] [NEW] : 3531ْْْXXXXXXXXXX0

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:29
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

XIAOMI REDMI 8 Removing FRP Done


Testpoint

210307115248496552.png


161511381629221.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
 Loader: Xiaomi_Redmi_8_Olive.mbn
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x1141376D
MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver   : 00000000
PK HASH   : 57158EAF1814D78FD2B3105ECE4DB18A
            817A08AC664A5782A925F3FF8403D39A
 
Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok 
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[81efKfdvcrugmyzSW9IDx8TkwRL]
Checking Internet connection....
 - Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 19
Serial Number       : 333567215
Firmware Version    : 4
Product Name        : S0J9N8
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Phone Information......
  Brand          : Xiaomi
  Vendor         : Xiaomi
  Model          : Redmi 8
  ID             : PKQ1.190319.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : olive-user 9 PKQ1.190319.001 V11.0.6.0.PCNEUXM release-keys
  Miui Ver       : V11
  Device         : olive
  Mod_device     : olive_eea_global
  Display ID     : ZQL2115-olive-build-20200322162723
  Security Patch : 2020-03-01
  Emmc_size      : 16GB
  Fingerprint    : Xiaomi/olive_eea/olive:9/PKQ1.190319.001/V11.0.6.0.PCNEUXM:user/release-keys

Reading GPT[3]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

Removing FRPta...
Method : 
Auto 
Processing... 
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:23
[/SIZE][/FONT][/B]


210307115239157921.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Ace Buzz 1 lite Ultra Power Option



161519418966431.png


كود:
[B][FONT=Arial Black][SIZE=2]Port : [Auto] Scanning...COM5
TPortConnection.Create...(COM5)..Opening...Ok
Reading IMEI...
Error : 84
Error : 84.
IMEI 1 : 35184XXXXXXXX25
IMEI 2 : 35184XXXXXXXX33

Reading System Info.
[COLOR="#FF0000"]*** Flash Mode #Ultra Power  ***
Resetting FRP...Ok
Formatting userdata...Ok
[/COLOR]Rebooting Phone..Ok

TPortConnection.Destroy.....Closing...
[/SIZE][/FONT][/B]
 
أعلى