تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Benzo G-PADLITE (K708) IMEI REPAIR




162695115849671.png


كود:
[B][FONT=Arial Black][SIZE=2]***IMEI REPAIR FUNCTION****
Univ FlashMode
Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0



Reading System Info
  Brand          : K708
  Vendor         : Benzo
  Model          : G-PADLITE
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_mt8321_tb_m-user 6.0 MRA58K 1557280441 dev-keys
  Device         : K708
  Board          : K708
  Display ID     : G-PADLITE-16G-2019-05-08
  Security Patch : 2017-11-05
  Platform       : mt6580
  FRPPST         : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
  Fingerprint    : alps/full_mt8321_tb_m/mt8321_tb_m:6.0/MRA58K/1557280441:user/dev-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted
IMEI INFO..
  IMEI1         : [COLOR="#40E0D0"]35689XXXXXXXXX9[/COLOR]
  IMEI2         : [COLOR="#40E0D0"]35689XXXXXXXXX7 [/COLOR][COLOR="#FF0000"][Ok][/COLOR]

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:02
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Oppo A5s (CPH1909) Format Flash Mode Done



162696650942621.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM6)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E5
 SBC           : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)
 SWJTAG        : 04 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : FE 
 NORMAL BOOT

Preparing Download Agent..
 DA   :  [Not Exist]
Trying Default 6765.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020/03/17.ÉÏÎç10:04_497508
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing preloader_oppo6765_18511_OPPO_a5s.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : A78629C05A612E2EE1A4B5EF246133E1
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x00000000C0000000 -3 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 150100474436424D42018BDB90F8177B - GD6BMB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

[COLOR="#008000"]Reading System Info
[/COLOR]  Vendor         : [COLOR="#FF0000"]OPPO[/COLOR]
  ID             : [COLOR="#FF0000"]O11019[/COLOR]
  SDK            : [COLOR="#FF0000"]27[/COLOR]
  Release        : [COLOR="#FF0000"]8.1.0[/COLOR]
  ABI            : [COLOR="#FF0000"]arm64-v8a[/COLOR]
  CPU abilist    : [COLOR="#FF0000"]arm64-v8a,armeabi-v7a,armeabi[/COLOR]
  Locale         : [COLOR="#FF0000"][COLOR="#FF0000"]en-US[/COLOR][/COLOR]
  Description    : [COLOR="#FF0000"]full_oppo6765_18511-user 8.1.0 O11019 1608036329 release-keys[/COLOR]
  Security Patch : [COLOR="#FF0000"]2020-12-05[/COLOR]
  StorageType    : [COLOR="#FF0000"][COLOR="#FF0000"]mtp[/COLOR][/COLOR]
  Userdata State : [COLOR="#FF0000"]Encrypted[/COLOR]

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_oppo6765_18511.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__072221160134\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x09E88000]1024 KB ->frp.bin...Ok
-nvdata[0x0BF88000]64 MB ->nvdata.bin...Ok
-protect1[0x11F88000]8 MB ->protect1.bin...Ok
-protect2[0x12788000]8.469 MB ->protect2.bin...Ok
-persist[0x13800000]48 MB ->persist.bin...Ok
-nvram[0x20000000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__072221160134
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : A78629C05A612E2EE1A4B5EF246133E1
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x00000000C0000000 -3 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 150100474436424D42018BDB90F8177B - GD6BMB

Reading GPT-EMMC [0x00008000] 130 Items


[COLOR="#008000"]Reading System Info
[/COLOR]  Vendor         : [COLOR="#FF0000"]OPPO[/COLOR]
  ID             : [COLOR="#FF0000"]O11019[/COLOR]
  SDK            : [COLOR="#FF0000"]27[/COLOR]
  Release        : [COLOR="#FF0000"]8.1.0[/COLOR]
  ABI            : [COLOR="#FF0000"]arm64-v8a[/COLOR]
  CPU abilist    : [COLOR="#FF0000"]arm64-v8a,armeabi-v7a,armeabi[/COLOR]
  Locale         : [COLOR="#FF0000"][COLOR="#FF0000"]en-US[/COLOR][/COLOR]
  Description    : [COLOR="#FF0000"]full_oppo6765_18511-user 8.1.0 O11019 1608036329 release-keys[/COLOR]
  Security Patch : [COLOR="#FF0000"]2020-12-05[/COLOR]
  StorageType    : [COLOR="#FF0000"][COLOR="#FF0000"]mtp[/COLOR][/COLOR]
  Userdata State : [COLOR="#FF0000"]Encrypted[/COLOR]

-------------------------------------
[COLOR="#808080"]Operation [/COLOR]: [COLOR="#008000"]Auto[/COLOR]
Processing...
[COLOR="#008000"]Safeformat Universal...
[/COLOR]Action Result :  Ok

Rebooting Device [Reboot To Normal]
[COLOR="#FF8C00"]Reboot Done!!
[/COLOR]
[COLOR="#0000FF"]Elapsed Time : 00:00:39
[/COLOR][/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO F11 Pro (CPH1969) Erase Userdata Successfully Done

And Backup All By Partitions Except Userdata


Erase Userdata


16270336383451.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM6)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0788MT6771 [6771]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E5
 SBC           : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)
 SWJTAG        : 04 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0788MT6771 [6771]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : FE 
 NORMAL BOOT

Preparing Download Agent..
 DA   :  [Not Exist]
Trying Default 6771.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing F11_PRO_preloader_oppo6771_18531.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : C651C02A9C511A582F855BE24E1FCBB6
 ERAM Size  : 0x0000000000039000 -228 KB
 IRAM Size  : 0x0000000180000000 -6 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000001D1F000000 -116.484 GB
 eMMC CID   : 90014A684445615033030B83B28A667B - hDEaP3

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
  Display ID     : QP1A.190711.020 release-keys
  Security Patch : 2021-02-05
  StorageType    : mtp
  Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_oppo6771.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0788__072321093938\MT6771_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x0DE88000]1024 KB ->frp.bin...Ok
-nvdata[0x0FF88000]64 MB ->nvdata.bin...Ok
-protect1[0x15F88000]8 MB ->protect1.bin...Ok
-protect2[0x16788000]8.469 MB ->protect2.bin...Ok
-persist[0x17800000]48 MB ->persist.bin...Ok
-nvram[0x26D00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0788__072321093938
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : C651C02A9C511A582F855BE24E1FCBB6
 ERAM Size  : 0x0000000000039000 -228 KB
 IRAM Size  : 0x0000000180000000 -6 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000001D1F000000 -116.484 GB
 eMMC CID   : 90014A684445615033030B83B28A667B - hDEaP3

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
  Display ID     : QP1A.190711.020 release-keys
  Security Patch : 2021-02-05
  StorageType    : mtp
  Userdata State : Not Encrypted

-------------------------------------
Operation : [COLOR="#008000"]Erase Userdata[/COLOR]
Processing...
[COLOR="#008000"]Formatting Userdata...
[/COLOR]Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:49
[/SIZE][/FONT][/B]

Backup All By Partitions Except Userdata


162703363865852.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM6)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0788MT6771 [6771]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E5
 SBC           : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)
 SWJTAG        : 04 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0788MT6771 [6771]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : FE 
 NORMAL BOOT

Preparing Download Agent..
 DA   :  [Not Exist]
Trying Default 6771.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing F11_PRO_preloader_oppo6771_18531.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : C651C02A9C511A582F855BE24E1FCBB6
 ERAM Size  : 0x0000000000039000 -228 KB
 IRAM Size  : 0x0000000180000000 -6 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000001D1F000000 -116.484 GB
 eMMC CID   : 90014A684445615033030B83B28A667B - hDEaP3

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
  Display ID     : QP1A.190711.020 release-keys
  Security Patch : 2021-02-05
  StorageType    : mtp
  Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_oppo6771.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0788__072321094555\MT6771_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x0DE88000]1024 KB ->frp.bin...Ok
-nvdata[0x0FF88000]64 MB ->nvdata.bin...Ok
-protect1[0x15F88000]8 MB ->protect1.bin...Ok
-protect2[0x16788000]8.469 MB ->protect2.bin...Ok
-persist[0x17800000]48 MB ->persist.bin...Ok
-nvram[0x26D00000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0788__072321094555
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : C651C02A9C511A582F855BE24E1FCBB6
 ERAM Size  : 0x0000000000039000 -228 KB
 IRAM Size  : 0x0000000180000000 -6 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000001D1F000000 -116.484 GB
 eMMC CID   : 90014A684445615033030B83B28A667B - hDEaP3

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
  Display ID     : QP1A.190711.020 release-keys
  Security Patch : 2021-02-05
  StorageType    : mtp
  Userdata State : Not Encrypted

-------------------------------------
Operation : Backup All By Partitions Except Userdata
Processing...

Reading Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_oppo6771.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Full\__0788--10(QP1A.190711.020 release-keys)_230721094617\MT6771_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-boot_para[0x00008000]1024 KB ->boot_para.bin...Ok
-recovery[0x00108000]64 MB ->recovery.bin...Ok
-para[0x04108000]512 KB ->para.bin...Ok
-opporeserve1[0x04188000]8 MB ->opporeserve1.bin...Ok
-opporeserve2[0x04988000]64 MB ->opporeserve2.bin...Ok
-opporeserve3[0x08988000]64 MB ->opporeserve3.bin...Ok
-oppo_custom[0x0C988000]1024 KB ->oppo_custom.bin...Ok
-expdb[0x0CA88000]20 MB ->expdb.bin...Ok
-frp[0x0DE88000]1024 KB ->frp.bin...Ok
-nvcfg[0x0DF88000]32 MB ->nvcfg.bin...Ok
-nvdata[0x0FF88000]64 MB ->nvdata.bin...Ok
-metadata[0x13F88000]32 MB ->metadata.bin...Ok
-protect1[0x15F88000]8 MB ->protect1.bin...Ok
-protect2[0x16788000]8.469 MB ->protect2.bin...Ok
-seccfg[0x17000000]8 MB ->seccfg.bin...Ok
-persist[0x17800000]48 MB ->persist.bin...Ok
-sec1[0x1A800000]2 MB ->sec1.bin...Ok
-proinfo[0x1AA00000]3 MB ->proinfo.bin...Ok
-md1img[0x1AD00000]100 MB ->md1img.bin...Ok
-spmfw[0x21100000]1024 KB ->spmfw.bin...Ok
-scp1[0x21200000]6 MB ->scp1.bin...Ok
-scp2[0x21800000]6 MB ->scp2.bin...Ok
-sspm_1[0x21E00000]1024 KB ->sspm_1.bin...Ok
-sspm_2[0x21F00000]1024 KB ->sspm_2.bin...Ok
-cam_vpu1[0x22000000]15 MB ->cam_vpu1.bin...Ok
-cam_vpu2[0x22F00000]15 MB ->cam_vpu2.bin...Ok
-cam_vpu3[0x23E00000]15 MB ->cam_vpu3.bin...Ok
-gz1[0x24D00000]16 MB ->gz1.bin...Ok
-gz2[0x25D00000]16 MB ->gz2.bin...Ok
-nvram[0x26D00000]64 MB ->nvram.bin...Ok
-lk[0x2AD00000]5 MB ->lk.bin...Ok
-lk2[0x2B200000]5 MB ->lk2.bin...Ok
-boot[0x2B700000]32 MB ->boot.bin...Ok
-logo[0x2D700000]16 MB ->logo.bin...Ok
-dtbo[0x2E700000]16 MB ->dtbo.bin...Ok
-tee1[0x2F700000]5 MB ->tee1.bin...Ok
-tee2[0x2FC00000]12 MB ->tee2.bin...Ok
-odm[0x30800000]256 MB ->odm.bin...Ok
-vendor[0x40800000]1.047 GB ->vendor.bin...Ok
-system[0x83800000]5.203 GB ->system.bin...Ok
-cache[0x1D0800000]432 MB ->cache.bin...Ok
-otp[0x1D1B4FBE00]43 MB ->otp.bin...Ok
-flashinfo[0x1D1DFFBE00]16 MB ->flashinfo.bin...Ok
Reading Done!!!
C:\Hydra Tool\\Backup\Full\__0788--10(QP1A.190711.020 release-keys)_230721094617
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:06:17
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor T9 (SP648) Remove FRP




162729599273711.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi Note 8 Pro ZeroWipe FRP


162731677337741.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM6)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0813MT6785 [6785]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E7
 SBC           : 01 (True)
 SLA           : 02 (True)
 DAA           : 04 (True)
 SWJTAG        : 06 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0813MT6785 [6785]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)
 FUSEID         : 00000000
 SECURE VERSION : 00 
 BL VERSION     : FE 
 NORMAL BOOT

Preparing Download Agent..
 DA   : Xiaomi_RedmiNote8Pro_6785.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2019/12/14.17:56_491164
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing preloader_begonia.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 08F0FBCCE325C5E66991738D3EE78F29
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000180000000 -6 GB
 UFS LU0 Size: 0x0000000000400000 -4 MB
 UFS LU1 Size: 0x0000000000400000 -4 MB
 UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
 UFS CID     : ,MT128GASAO4U21  
 UFS UNIQID  : 18b01365444066122000000000000000

DA Speed : high-speed

Reading GPT-UFS [0x00008000] 130 Items

Reading System Info
  Brand          : Redmi
  Vendor         : Xiaomi
  Model          : Redmi Note 8 Pro
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : begonia-user 9 PPR1.180610.011 V11.0.7.0.PGGMIXM release-keys
  Miui Ver       : V11
  Device         : begonia
  Mod_device     : begonia_global
  Display ID     : PPR1.180610.011
  Security Patch : 2020-04-01
  Fingerprint    : Redmi/begonia/begonia:9/PPR1.180610.011/V11.0.7.0.PGGMIXM:user/release-keys
  StorageType    : mtp
  Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_begonia.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0813_Redmi_begonia_begonia_9_PPR1.180610.011_V11.0.7.0.PGGMIXM_072621171827\MT6785_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05888000]1024 KB ->frp.bin...Ok
-nvdata[0x08188000]64 MB ->nvdata.bin...Ok
-persist[0x0E188000]70.469 MB ->persist.bin...Ok
-protect1[0x12800000]8 MB ->protect1.bin...Ok
-protect2[0x13000000]8 MB ->protect2.bin...Ok
-nvram[0x17580000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0813_Redmi_begonia_begonia_9_PPR1.180610.011_V11.0.7.0.PGGMIXM_072621171827
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 08F0FBCCE325C5E66991738D3EE78F29
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000180000000 -6 GB
 UFS LU0 Size: 0x0000000000400000 -4 MB
 UFS LU1 Size: 0x0000000000400000 -4 MB
 UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
 UFS CID     : ,MT128GASAO4U21  
 UFS UNIQID  : 18b01365444066122000000000000000

Reading GPT-UFS [0x00008000] 130 Items


[COLOR="#008080"]Reading System Info
  Brand          : Redmi
  Vendor         : Xiaomi
  Model          : Redmi Note 8 Pro
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : begonia-user 9 PPR1.180610.011 V11.0.7.0.PGGMIXM release-keys
  Miui Ver       : V11
  Device         : begonia
  Mod_device     : begonia_global
  Display ID     : PPR1.180610.011
  Security Patch : 2020-04-01
  Fingerprint    : Redmi/begonia/begonia:9/PPR1.180610.011/V11.0.7.0.PGGMIXM:user/release-keys
  StorageType    : mtp
  Userdata State : Not Encrypted
[/COLOR]
-------------------------------------
Operation : [COLOR="#008000"]Auto[/COLOR]
Processing...
[COLOR="#008000"]ZeroWipe FRP Partition...
[/COLOR]Action Result :  Ok

Rebooting Device [Reboot To Normal]
[COLOR="#FF8C00"]Reboot Done!!
[/COLOR]
Elapsed Time : 00:00:45
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi Note 8 Pro (begonia) Ultra Power Option
(Safeformat + Remove FRP) Done
By HYDRA TOOL



162737084342791.png




162737084363262.png




162737084374723.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi Note 8 Pro (begonia) Bypass Mi Account By Flash File


أولا فتح البوتلودر و هو مدعوم على HYDRA UBL

ثانيا تفليش الهاتف بالفلاشة المعدلة لتخطي حساب Mi بدون الحاجة لتطبيق VPN او اي وسيط

16276380229691.png


ملاحظات :

الحساب يعود بعود بعد الفورمات
خاصية التحديثات ستكون متوقفه تلقائيا بعد التفليش بالفلاشة المعدلة فلا خوف لانه لن يستقبل التحديثات
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Starlight M09 Read Code/Passwords



162766277397431.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor C6+ (PGN-508) Read Pattern


162766786085111.png



كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0



Reading System Info
  Brand          : condor
  Vendor         : SPA_CONDOR_ELECTORNICS
  Model          : PGN-508
  ID             : KOT49H
  SDK            : 19
  Release        : 4.4.2
  ABI            : armeabi-v7a
  Description    : gionee82_cwet_kk-user 4.4.2 KOT49H eng.znsj.1433745252 release-keys
  Device         : condor
  Board          : PGN-508_cwet_kk
  Display ID     : PGN-508
  Fingerprint    : condor/PGN_508/PGN_508:4.4.2/KOT49H/1431327360:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : [COLOR="#008000"]Read Pattern[/COLOR]
Processing...
[COLOR="#008000"]Searching PatternKey : . [/COLOR]Found
[COLOR="#008000"]Gesture Data : 8E9D7E8E6BC4E77529D93115D84F65D6C7008261
[/COLOR][COLOR="#0000FF"]Bruteforcing pattern hash..Please wait for few seconds[/COLOR]
[COLOR="#008080"]Pattern Code[/COLOR] : [COLOR="#DAA520"]1258[/COLOR]
[COLOR="#008000"]1 2 3
4 5 6
7 8 9
[/COLOR]Action Result :  Ok

Rebooting Device [Reboot To Normal]
[COLOR="#FF8C00"]Reboot Done!!
[/COLOR]
Elapsed Time : 00:00:02
[/SIZE][/FONT][/B]
 

hassan GSM

:: عضو محترف ::
إنضم
27 فبراير 2016
المشاركات
1,876
مستوى التفاعل
1,741
النقاط
113
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi Go Remove FRP

 

hassan GSM

:: عضو محترف ::
إنضم
27 فبراير 2016
المشاركات
1,876
مستوى التفاعل
1,741
النقاط
113
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

redmi note 8 flashing

 

hassan GSM

:: عضو محترف ::
إنضم
27 فبراير 2016
المشاركات
1,876
مستوى التفاعل
1,741
النقاط
113
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

samsung G532F flashing

 

hassan GSM

:: عضو محترف ::
إنضم
27 فبراير 2016
المشاركات
1,876
مستوى التفاعل
1,741
النقاط
113
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Stream B1s Remove FRP

 

hassan GSM

:: عضو محترف ::
إنضم
27 فبراير 2016
المشاركات
1,876
مستوى التفاعل
1,741
النقاط
113
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

condor Plume H1 Remove FRP

 

hassan GSM

:: عضو محترف ::
إنضم
27 فبراير 2016
المشاركات
1,876
مستوى التفاعل
1,741
النقاط
113
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

redmi note 8 IMEI REPAIR

 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Samsung Galaxy Grand Prime Pro (SM-J250F) Removing FRP




162783208821291.png


كود:
[B][FONT=Arial Black][SIZE=2]Starting ADB Server....
Searching Device By ADB
Device Found...
   Model : SM-J250F
   Brand : samsung
   Android Ver : 7.1.1
   CPU abi : armeabi-v7a
   Software Version : J250FXXU2ASK1
   CSC Version : J250FOJV2ASK1
   Bootloader : J250FXXS2ATI1
   Board : msm8937
   Bootloader : NMF26X.J250FXXS2ATI1
   Display ID : 2019-10-01
   Security Patch : 16GB
   Emmc_size : msm8937
   Platform : 2019-10-01
   SYS USB CONFIG : persist.mtp,adb
   FRPPST : /dev/block/persistent
   FingerPrint : samsung/j2y18ltejx/j2y18lte:7.1.1/NMF26X/J250FXXS2ATI1:user/release-keys

Checking Root Status.... 
Root Status : Not Rooted

Removing FRP...Ok
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

TECNO Spark 6 (KE7) Ultra Power Option



162789319143281.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM6)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0707MT6768 [6768]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E5
 SBC           : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)
 SWJTAG        : 04 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0707MT6768 [6768]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)
 FUSEID         : 00000000
 SECURE VERSION : 05 
 BL VERSION     : FE 
 NORMAL BOOT

Preparing Download Agent..
 DA   :  [Not Exist]
Trying Default 6768.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020/03/17.ÉÏÎç10:04_497508
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing preloader_ke7_spark_6.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 7F674788BE30415BD38A4E8EC57EB520
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58.242 GB
 eMMC CID   : 150100445036444142030DEF9065B76D - DP6DAB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_ke7_h693.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__080221090330\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03188000]1024 KB ->frp.bin...Ok
-nvdata[0x08922000]64 MB ->nvdata.bin...Ok
-persist[0x0C922000]48 MB ->persist.bin...Ok
-protect1[0x0F922000]8 MB ->protect1.bin...Ok
-protect2[0x10122000]8 MB ->protect2.bin...Ok
-nvram[0x1E900000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__080221090330
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 7F674788BE30415BD38A4E8EC57EB520
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58.242 GB
 eMMC CID   : 150100445036444142030DEF9065B76D - DP6DAB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal...
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:08
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A51 Ultra Power



162800415522231.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM42)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/31/2015,2.1.2.0

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8916
 Version : 1


Protocol : Universal
Running : Ok
Reading GPT[3]
          Drive [0] 40 Items
          Drive [1] 0 Items
          Drive [2] 4 Items

 
[COLOR="#008000"]Phone Information.....
  Brand          : OPPO
  Vendor         : OPPO
  Model          : A51
  ID             : LMY47V
  SDK            : 22
  Release        : 5.1.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Description    : msm8916_64-user 5.1.1 LMY47V eng.root.20151205.123211 dev-keys
  Device         : A51
  Board          : msm8916
  Display ID     : A51_11_151205
  Platform       : msm8916
  FRPPST         : /dev/block/bootdevice/by-name/config
  Fingerprint    : OPPO/A51/A51:5.1.1/LMY47V/1434708000:user/release-keys
[/COLOR]
Processing Auto....
[COLOR="#FF0000"] - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOk
 - Formatting Userdata
Executing ...
 - Formatting Userdata  [Safe Format - eMMc] OkOk
[/COLOR]Action Result : Ok
Rebooting Phone.... Ok

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Tecno Spark 6 Go (KE5) Ultra Power Option




162806999959241.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM6)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0717MT6761 [6761]
 hw subcode    : 8A00
 hw version    : CA01
 sw version    : 0200
 Target config : E5
 SBC           : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)
 SWJTAG        : 04 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)

Exploiting BROM...
Exploit Sent..
Successfully Exploited..
Reading Flash Init...
Flash init Size 0x0610

Security Authorization....
Sending Accepted
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0717MT6761 [6761]
 hw subcode    : 8A00
 hw version    : CA01
 sw version    : 0200
 Target config : 05
 SBC           : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)
 SWJTAG        : 04 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)

MEID : 0F7679D442A30905251FC2FA88B6F17C
Stage 1..[Size:232216]
 Sending :  Please wait.. Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Preloader Initialization...
 Parsing preloader_ke5_h6123go.bin
 Init : Accepted
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 82B5775F0D9AD0BE08AC63DE49C61974
 ERAM Size  : 0x0000000000039000 -228 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 15010051583633414203B9EBBC60C7D1 - QX63AB
 Executing : ACCEPTED...

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_ke5_h6123go.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0717__080421102627\MT6761_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x01888000]1024 KB ->frp.bin...Ok
-nvdata[0x07022000]71.867 MB ->nvdata.bin...Ok
-persist[0x0B800000]48 MB ->persist.bin...Ok
-protect1[0x0E800000]8 MB ->protect1.bin...Ok
-protect2[0x0F000000]8 MB ->protect2.bin...Ok
-nvram[0x1B300000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0717__080421102627
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 82B5775F0D9AD0BE08AC63DE49C61974
 ERAM Size  : 0x0000000000039000 -228 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 15010051583633414203B9EBBC60C7D1 - QX63AB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal...
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:02
[/SIZE][/FONT][/B]
 

دراجي سوفت

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
28 فبراير 2016
المشاركات
1,458
مستوى التفاعل
4,143
النقاط
113
الإقامة
تيارت
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

السلام عليكم و رحمة الله تعالى و بركاته






عملية الفورمات تعطي خطأ و لكن ناجحة





 
أعلى