تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Plume P6 Pro LTE (PGN528) FRP Remove



161521247388821.png


كود:
[B][FONT=Arial Black][SIZE=2]=====================================
Searching for MTK Device...Found
 Port Identification :DA_HIGHSPEED_VCOM
 FriendlyName :MediaTek DA USB VCOM (Android) (COM16)
 SymbolicName :\??\USB#VID_0E8D&PID_2001#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0



Reading System Info

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [FAILED]
Erasing FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:01
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Alcatel Idol 4 LTE (OT-6055K) Safe Format - EMMC




161521383711691.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 Brand : ALCATEL [TCL] Model : OT-6055K (Idol 4 LTE) Storage : Auto
 Loader: 8952.mbn
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info.....
Serial No.: 0x00A48B2C
MSM ID    : 0x009720E1, MSM8609-Qualcomm Snapdragon 210
PBL Ver   : 00000000
PK HASH   : 598FB494403B71C36D1B0DFD0F9E2450
            0D767980EF04E5F0A3A94E28DF1FD901
 
Firehose Loader[8952.mbn]
SaharaBoot... Ok
Sending ..........Ok
Connecting to Firehose...
Ping... Ok 
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8952
 Version : 1


Protocol : Feature Phone
Running : Ok
 
Phone Information.....
  Brand          : TCL
  Vendor         : TCL
  Model          : 6055K
  ID             : MMB29M
  SDK            : 23
  Release        : 6.0.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Description    : idol4-user 6.0.1 MMB29M v1AKZ-0 release-keys
  Device         : idol4
  Board          : msm8952
  Display ID     : MMB29M release-keys
  Security Patch : 2017-12-05
  Platform       : msm8952
  FRPPST         : /dev/block/bootdevice/by-name/config
  Fingerprint    : TCL/6055K/idol4:6.0.1/MMB29M/v1AKZ-0:user/release-keys

Reading GPT[3]
          Drive [0] 52 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

Formatting Userdata...
Method : 
Safe Format - EMMC 
Processing... 
 - Formatting Userdata  [Safe method] OkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:07
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Pocophone F1 (beryllium) Remove MiAccount [Patch Method]





161536543280361.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration
Brand : XIAOMI Model : PocoPhone F1 (beryllium) Storage : Auto
Loader: Xiaomi_beryllium_PocoF1.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
 FriendlyName :
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7


Getting device info......
Serial No.: 0x59B874F2
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
PBL Ver : 00000000
PK HASH : C924A35F39CE1CDD1B8D5A9F3B8E3C51
317930431D7A9DD5A55028CF6965FE65

Firehose Loader[Xiaomi_beryllium_PocoF1.elf]
SaharaBoot... Ok
Sending ....................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[RaQHKfddvcrugmyz4Dx6Tz22w-F]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Oct 10 2018 - 22:42:48

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1288874930
Firmware Version : 500
Product Name : 
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30038016[114.586 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 1179648[4.5 GB]
Drive [5] 8192[32 MB]

Protocol : Universal
Running : Ok
Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


[COLOR="#008000"]Phone Information......
Vendor : Xiaomi
ID : QKQ1.190828.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : beryllium_global
Security Patch : 2020-12-01
[/COLOR]
Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

[COLOR="#FF0000"]Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 4
Successfully patched address..
Action Result : Ok
[/COLOR]
Elapsed Time : 00:00:24
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A31 (CPH2015) Format userdata successfully done by Hydra Tool


161547196840021.png


Logs

كود:
[B][FONT=Arial Black][SIZE=2]Brand : OPPO Model : A31 (CPH2015) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 8465745516364BA6842386A15303E039
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 14000EE21386134B3914A670014A44A2 - HCG8a4

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_19581-user 9 PPR1.180610.011 eng.root.20201007.225239 release-keys
Security Patch : 2020-06-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
[COLOR="#FF8C00"]Operation : Auto
Processing...
Formatting Userdata... Ok
[/COLOR]
TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:07
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

HUAWEI Y7 Prime 2019 (DUB-LX1) Format UD + FRP Remove by HYDRA


210311044615245878.png



161547702700041.png



كود:
PreOperation Configuration 
[B][FONT=Arial Black][SIZE=2] Brand : HUAWEI Model : DUB-LX1 (Y7 2019) Storage : Auto
 Loader: DUB-LX1_Loader_T-Tool-Team_1.mbn
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8953
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 1266123999
Firmware Version    : 0
Product Name        : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29,121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
          Drive [0] 60 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

Processing Format UD+FRP Remove....
 - Formatting Userdata  [Zero Wipe] Ok
 - Removing FRP [Zero Wipe] Ok
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:05
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

DOOGEE X5max Ultra Power successfully done by Hydra Tool



161556114427641.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


Reading System Info
  Brand          : DOOGEE
  Vendor         : DOOGEE
  Model          : X5max
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_n370b-user 6.0 MRA58K 1473705397 release-keys
  Device         : X5max
  Display ID     : DOOGEE-X5max-Android6.0-20160913
  Security Patch : 2016-06-01
  Platform       : mt6737m
  FRPPST         : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
  Fingerprint    : DOOGEE/X5max/X5max:6.0/MRA58K/20160913.024333:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Plume H1 (SP620) Ultra Power Option


161607962784111.png



كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8953
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 934817224
Firmware Version    : 165
Product Name        : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  30777344[14,676 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
          Drive [0] 48 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

 
Phone Information.....
  Brand          : Condor
  Vendor         : SPA Condor Electronics
  Model          : Plume H1
  ID             : N2G47H
  SDK            : 25
  Release        : 7.1.2
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : msm8953_64-user 7.1.2 N2G47H 2578 release-keys
  Device         : SP620
  Board          : SP620
  Display ID     : N2G47H release-keys
  Security Patch : 2018-03-01
  Emmc_size      : 16GB
  Platform       : msm8953
  FRPPST         : /dev/block/bootdevice/by-name/config
  Fingerprint    : Condor/SP620/SP620:7.1.2/N2G47H/SP620_V11.0_20170925:user/release-keys

Processing Auto....
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOk
 - Formatting Userdata
Executing ...
 - Formatting Userdata  [Safe method] OkOk
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:07
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Ace Buzz 2 lite Ultra Power Option


16162421901851.png



كود:
[B][FONT=Arial Black][SIZE=2]Port : [Auto] Scanning...COM7
TPortConnection.Create...(COM7)..Opening...Ok
Reading IMEI...
Error : 84.
IMEI 1 : 35725XXXXXXX426
IMEI 2 : 35725XXXXXXX434

Reading System Info.
*** Flash Mode #Ultra Power  ***
Resetting FRP...Ok
Formatting userdata...Failed
Rebooting Phone..Failed

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:43
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Oppo A1k CPH1923 Pin Unlock MetaMode Done Hydra Tool



161625962468931.png



161625958401971.png


كود:
[B][FONT=Arial Black][SIZE=2]---------------------------------
Searching for MTK Device...Found
 Port Identification :METAMODE Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM11)
 SymbolicName :\??\USB#VID_22D9&PID_0006#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


META Phone Info . . .
MCUID: 8U  `    mt6765
ME_SO: 
DATE : Mon Dec 21 13:37:55 CST 2020
MODEL: CPH1923EX_11_A.38
ME_SWVER: CPH1923_11_A.38_201221_de900167
MANUFACTURER : OPPO
BOARD : oppo6762_18540
MODEL : CPH1923
NAME : unknown
BUILD.DISPLAY.ID : CPH1923EX_11_A.38
USB.MODEL : unknown
BUILD.VERSION.RELEASE : 9
BUILD.VERSION.SECURITY_PATCH : 2021-01-05
DEVICE : unknown
BRAND : OPPO
SERVICE CALL IPHONESUBINFO 1 : unknown
PERSIST.MTK.WCN.COMBO.CHIPID : unknown
SERIALNO : unknown
MEDIATEK.PLATFORM : unknown
MEDIATEK.CHIP_VER : unknown
HARDWARE : mt6765
MEDIATEK.VERSION.RELEASE : CPH1923_11_A.38_201221
OEM_UNLOCK_SUPPORTED : unknown
EXPECT.RECOVERY_ID : unknown
FRP.PST : /dev/block/platform/bootdevice/by-name/frp
BUILD.FINGERPRINT : unknown
GSM.VERSION.BASEBAND : unknown
SW.BUILDID : unknown
RIL.IMEI : unknown
SYS.USB.CONFIG : unknown

IMEI 1 : 
IMEI 2 : 


Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]


161625958416052.png


كود:
[B][FONT=Arial Black][SIZE=2]---------------------------------
Searching for MTK Device...Found
 Port Identification :METAMODE Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM11)
 SymbolicName :\??\USB#VID_22D9&PID_0006#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


META Phone Info . . .
MCUID: 8U  `    mt6765
ME_SO: 
DATE : Mon Dec 21 13:37:55 CST 2020
MODEL: CPH1923EX_11_A.38
ME_SWVER: CPH1923_11_A.38_201221_de900167


Reset to Factory Default Ok
Rebooting....
Done!!!

Elapsed Time : 00:00:01
[/SIZE][/FONT][/B]

161625992408321.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Wiko Tommy 3 FRP Remove by hydra Tool



161626244766961.png


كود:
[B][FONT=Arial Black][SIZE=2]=====================================
Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM (Android) (COM4)
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : F67CAE3861FF9F9B8CB719C4559E0C8B
 ERAM Size  : 0x0000000000040000 -256 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x00000003A3E00000 -14,561 GB
 eMMC CID   : 150100464536324D42038B57D3A23541 - FE62MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : WIKO
  Vendor         : WIKO
  Model          : Tommy3
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_c201-user 8.1.0 O11019 1539335613 release-keys
  Device         : W_C201
  Display ID     : O11019 release-keys
  Security Patch : 2018-10-05
  Fingerprint    : WIKO/W_C201/W_C201:8.1.0/O11019/1540972848:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:05
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Condor Griffe T8 PLUS (SP641) Ultra Power Option


16164023808181.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM (Android) (COM4)
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0699MT6739[6739]
 BROM HW_SW_VER : 8A00 CB00 0002 0000 
 FUSEID         : 00000000
 SECURE VERSION : FF 
 BL VERSION     : 03 
 BR Secured     : 00

Preparing Download Agent..
 DA   : 6739.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : preloader

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : FC053B5959B2B1241D5B171D80804D09
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x00000003AB400000 -14,676 GB
 eMMC CID   : 13014E53304A39483610037AF62755CB - S0J9H6

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
  Brand          : Condor
  Vendor         : SPA Condor Electronics
  Model          : Griffe T8 Plus
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k602-user 8.1.0 O11019 1560328254 release-keys
  Device         : SP641
  Display ID     : O11019 release-keys
  Security Patch : 2019-06-05
  Fingerprint    : Condor/SP641/SP641:8.1.0/O11019/1560328254:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_k602.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0699_Condor_SP641_SP641_8.1.0_O11019_1560328254_032221093049\MT6739_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x02D88000]1024 KB ->frp.bin...Ok
-nvdata[0x03688000]32 MB ->nvdata.bin...Ok
-nvram[0x10700000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0699_Condor_SP641_SP641_8.1.0_O11019_1560328254_032221093049
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:32
[/SIZE][/FONT][/B]


161640238111882.png


كود:
[B][FONT=Arial Black][SIZE=2]=====================================
Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM (Android) (COM4)
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : FC053B5959B2B1241D5B171D80804D09
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x00000003AB400000 -14,676 GB
 eMMC CID   : 13014E53304A39483610037AF62755CB - S0J9H6

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : Condor
  Vendor         : SPA Condor Electronics
  Model          : Griffe T8 Plus
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k602-user 8.1.0 O11019 1560328254 release-keys
  Device         : SP641
  Display ID     : O11019 release-keys
  Security Patch : 2019-06-05
  Fingerprint    : Condor/SP641/SP641:8.1.0/O11019/1560328254:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:05
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

OPPO A3S Password Remove ISP Hydra EMMC Tool



161641811927121.png



كود:
[B][FONT=Arial Black][SIZE=2]Cylinders : 1900
Tracks Per Cylinder : 255
Sectors Per Track : 63
Bytes Per Sector : 512
DriveSize : 15651560000- 14.555 GB
Total Disk Size : 15668440288- 14.562 GB

Reading partitions...(65- Items)
[COLOR="#FF0000"]SafeFormatUserData. Ok
[/COLOR]
Elapsed Time : 00:00:01
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Hisense Infinity E6 (F16) Erasing FRP successfully done by Hydra Tool


161642072486152.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL + or Press VOL -+
 * Preloader Mode : Just Insert cable

Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM10)
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0699MT6739[6739]
 BROM HW_SW_VER : 8A00 CB00 0002 0000 
 FUSEID         : 00000000
 SECURE VERSION : 05 
 BL VERSION     : FE 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   : [Not Exist]
Trying Default 6739.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing preloader_Hisense_6739_yk737_lwg_bsp1g.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 26B2F7A4CEA064E632B9889184E6CEA0
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000080000 -512 KB
 eMMC USER  : 0x00000001D2000000 -7,281 GB
 eMMC CID   : 150100464E36324D420335739A22C51B - FN62MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
  Brand          : Hisense
  Vendor         : Hisense
  Model          : Hisense Infinity E6
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_yk736_lwg_bsp1g-user 8.1.0 O11019 Hisense_F16_02_S02 release-keys
  Device         : HS6739MT_EEA
  Board          : Hisense
  Display ID     : Hisense_F16_02_S02_20190316
  Security Patch : 2019-01-05
  Fingerprint    : Hisense/F16_EEA/HS6739MT_EEA:8.1.0/O11019/Hisense_F16_02_S02:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_yk736_lwg_bsp1g.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0699_Hisense_F16_EEA_HS6739MT_EEA_8.1.0_O11019_Hisense_F16_02_S02_032221141455\MT6739_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x02D88000]1024 KB ->frp.bin...Ok
-nvdata[0x03688000]32 MB ->nvdata.bin...Ok
-nvram[0x10700000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0699_Hisense_F16_EEA_HS6739MT_EEA_8.1.0_O11019_Hisense_F16_02_S02_032221141455
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:31
[/SIZE][/FONT][/B]

161642072467821.png


كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM10)
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 26B2F7A4CEA064E632B9889184E6CEA0
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000080000 -512 KB
 eMMC USER  : 0x00000001D2000000 -7,281 GB
 eMMC CID   : 150100464E36324D420335739A22C51B - FN62MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : Hisense
  Vendor         : Hisense
  Model          : Hisense Infinity E6
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_yk736_lwg_bsp1g-user 8.1.0 O11019 Hisense_F16_02_S02 release-keys
  Device         : HS6739MT_EEA
  Board          : Hisense
  Display ID     : Hisense_F16_02_S02_20190316
  Security Patch : 2019-01-05
  Fingerprint    : Hisense/F16_EEA/HS6739MT_EEA:8.1.0/O11019/Hisense_F16_02_S02:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:05
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi note 5 Pro (whyred)

Remove FRP + Remove MiAccount[Patch Method] + Disabled MiAccount ADB Mode

successfully done by Hydra Tool

161649094211531.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) Storage : Auto
 Loader: mi_2_9.elf
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :05/18/2016,1.0.26.0

Getting device info......
Serial No.: 0xF18FB804
MSM ID    : 0x000CC0E1, 
PBL Ver   : 00000000
PK HASH   : A7B8B82545A98ECA23D6E9105FB46456
            8D1B5828264903441BDEF0CD57E3C370
 
Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : MSM8996
 Version : 1
 DateTime : Aug  2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 2676665404
Firmware Version    : 2
Product Name        : DD68MB
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  61071360[29,121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Phone Information.....
  Brand          : xiaomi
  Vendor         : Xiaomi
  Model          : Redmi Note 5
  ID             : OPM1.171019.011
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : whyred-user 8.1.0 OPM1.171019.011 V10.0.6.0.OEIMIFH release-keys
  Miui Ver       : V10
  Device         : whyred
  Mod_device     : whyred_global
  Display ID     : OPM1.171019.011
  Security Patch : 2018-11-01
  Fingerprint    : xiaomi/whyred/whyred:8.1.0/OPM1.171019.011/V10.0.6.0.OEIMIFH:user/release-keys

Reading GPT[4]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 

[COLOR="#FF0000"]Removing FRPta...
Method : 
Auto 
Processing... 
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOkOk
[/COLOR]
Elapsed Time : 00:00:09
[/SIZE][/FONT][/B]

161649094241042.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) Storage : Auto
 Loader: mi_2_9.elf
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :05/18/2016,1.0.26.0

Getting device info......
Serial No.: 0xF18FB804
MSM ID    : 0x000CC0E1, 
PBL Ver   : 00000000
PK HASH   : A7B8B82545A98ECA23D6E9105FB46456
            8D1B5828264903441BDEF0CD57E3C370
 
Firehose Loader[mi_2_9.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok 
Configuration......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : MSM8996
 Version : 1
 DateTime : Aug  2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 2676665404
Firmware Version    : 2
Product Name        : DD68MB
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  61071360[29,121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
          Drive [3]  8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items
          Drive [3] 

 
Phone Information.....
  Brand          : xiaomi
  Vendor         : Xiaomi
  Model          : Redmi Note 5
  ID             : OPM1.171019.011
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : whyred-user 8.1.0 OPM1.171019.011 V10.0.6.0.OEIMIFH release-keys
  Miui Ver       : V10
  Device         : whyred
  Mod_device     : whyred_global
  Display ID     : OPM1.171019.011
  Security Patch : 2018-11-01
  Fingerprint    : xiaomi/whyred/whyred:8.1.0/OPM1.171019.011/V10.0.6.0.OEIMIFH:user/release-keys

Processing Remove MiAccount[Patch Method]....
Backing up Partition for safety...Ok

[COLOR="#FF0000"]Scanning Patching address...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]Done!!
Total Items patched : 2
Successfully patched address..
Action Result : Ok
[/COLOR]
Rebooting Phone.... Ok

Elapsed Time : 00:00:16
[/SIZE][/FONT][/B]

161649094249993.png


كود:
[B][FONT=Arial Black][SIZE=2]Starting ADB Server....
Searching Device By ADB
Device Found...
Model       	: Redmi Note 5
Brand       	: Xiaomi
Android Ver 	: 8.1.0
CPU abi     	: arm64-v8a
Software Version 	: 
CSC Version 	: 
Bootloader  	: 
Board       	: sdm636
Display ID  	: OPM1.171019.011
Security Patch  	: 2018-11-01
Emmc_size   	: 
Platform    	: sdm660
Kernel ID    	: 2018-11-01
Marketname   	: 
OTA Version Name	: 
SYS USB CONFIG  	: persist.adb
FRPPST          	: /dev/block/bootdevice/by-name/frp
FingerPrint     	: xiaomi/whyred/whyred:8.1.0/OPM1.171019.011/V10.0.6.0.OEIMIFH:user/release-keys

Checking Root Status.... 
Root Status : Not Rooted

ADB MiAccount...
 
Processing... 
[COLOR="#FF0000"]Disbaling MI Account
Please wait...
Disabled Mi Account Success
Action Result : Ok
[/COLOR]
Elapsed Time : 00:00:11
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Redmi 8a dual (olivewood) Removing FRP



161651196325092.png



161651140386613.png


كود:
[B][FONT=Arial Black][SIZE=2]PreOperation Configuration 
 Brand : XIAOMI Model : Redmi 8A Dual (olivewood) Storage : Auto
 Loader: Xiaomi_Redmi_8_Olive.mbn
 Port  : Auto
 Connection  : 

Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :05/18/2016,1.0.26.0

Getting device info......
Serial No.: 0x76F6119E
MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver   : 00000000
PK HASH   : 57158EAF1814D78FD2B3105ECE4DB18A
            817A08AC664A5782A925F3FF8403D39A
 
Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok 
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[2pZlJyfebKmsgf81C38Ya1cm4bR]
Checking Internet connection....
 - Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 13288262
Firmware Version    : 875573296
Product Name        : hC8aP>
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
 
Phone Information......
  Vendor         : Xiaomi
  ID             : QKQ1.191014.001
  SDK            : 29
  Release        : 10
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Miui Ver       : V12
  Mod_device     : olivewood_in_global
  Security Patch : 2021-01-01
  Emmc_size      : 16GB

Reading GPT[3]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

[COLOR="#FF0000"]Removing FRPta...
Method : 
Auto 
Processing... 
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOkOk
[/COLOR]
Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:21
[/SIZE][/FONT][/B]

1616511963151.png
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Benzo G-PADLITE K708 Remove Pattren Without Data Loss
حذف النمط بدون فقدان البيانات


161660243092561.png


كود:
[B][FONT=Arial Black][SIZE=2]Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM5]

TPortConnection.Create...(COM5)..Opening...Ok


Reading System Info
  Brand          : K708
  Vendor         : Benzo
  Model          : G-PADLITE
  ID             : MRA58K
  SDK            : 23
  Release        : 6.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_mt8321_tb_m-user 6.0 MRA58K 1557899887 dev-keys
  Device         : K708
  Board          : K708
  Display ID     : G-PADLITE-16G-2019-05-15
  Security Patch : 2017-11-05
  Platform       : mt6580
  FRPPST         : /dev/block/platform/mtk-msdc.0/11120000.msdc0/by-name/frp
  Fingerprint    : alps/full_mt8321_tb_m/mt8321_tb_m:6.0/MRA58K/1557899887:user/dev-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
[COLOR="#FF0000"]Operation : Remove Lock Without Data Loss
Processing...
Searching patching address.. [Ok].. [Ok].. [Ok].. [Ok].. [Ok] Ok
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:03
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Xiaomi Redmi Note 7 Pro (Violet) Flash Done
by Hyra Tool
مشكل لا تصله التحديثات و 4G ضعيف جدا
تم الحل بفلاش اخر اصدار


violet_images_V11.0.1.0.QFHCNXM_20200603.0000.00_10.0_cn_32a5958a03


161668194192621.png


161668194218352.png



كود:
[B][FONT=Arial Black][SIZE=2]Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :05/18/2016,1.0.26.0

Getting device info......
Serial No.: 0xDB43600C
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_Redmi Note 7 Pro_Sdm6150_ddr.elf]
SaharaBoot... Ok
Sending ...................................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[obi
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 19 2019 - 01:44:32

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1588004687
Firmware Version : 2
Product Name : 
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 244277248[116.48 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 7 Pro
ID : PKQ1.181203.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : violet-user 9 PKQ1.181203.001 9.8.9 release-keys
Miui Ver : V10
Device : violet
Display ID : PKQ1.181203.001
Security Patch : 2019-08-01
Fingerprint : xiaomi/violet/violet:9/PKQ1.181203.001/9.8.9:user/release-keys
keys

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi Note 7 Pro__9_Security_022042220640.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- multiimgoem(0)[multi_image.mbn] Ok
- vbmeta(0)[vbmeta.img] Ok
- qupfw(0)[qupv3fw.elf] Ok
- xbl_config(0)[xbl_config.elf] Ok
- storsec(0)[storsec.mbn] Ok
- storsecbak(0)[storsec.mbn] Ok
- aop(0)[aop.mbn] Ok
- aopbak(0)[aop.mbn] Ok
- hyp(0)[hyp.mbn] Ok
- hypbak(0)[hyp.mbn] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[km4.mbn] Ok
- keymasterbak(0)[km4.mbn] Ok
- bluetooth(0)[BTFM.bin] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- abl(0)[abl.elf] Ok
- ablbak(0)[abl.elf] Ok
- imagefv(0)[imagefv.elf] Ok
- uefisecapp(0)[uefi_sec.mbn] Ok
- uefisecappbak(0)[uefi_sec.mbn] Ok
- misc(0)[misc.img] Ok
- xbl(0)[xbl.elf] Ok
- xblbak(0)[xbl.elf] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- logfs(0)[logfs_ufs_8mb.bin] Ok
- dtbo(0)[dtbo.img] Ok
- dsp(0)[dspso.bin] Ok
- splash(0)[splash.img] Ok
- persist(0)[persist.img] Skipped
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- modem(0)[NON-HLOS.bin] Ok
- cache(0)[cache.img] Ok
- cust(0)[cust.img] Ok
- system(0)[system.img] Ok
- vendor(0)[vendor.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,11264)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,11264)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:34
[/SIZE][/FONT][/B]
 

دراجي سوفت

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
28 فبراير 2016
المشاركات
1,458
مستوى التفاعل
4,141
النقاط
113
الإقامة
تيارت
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle


 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

ENIE EH3 Ultra Power Option



161685013444341.png



كود:
[B][FONT=Arial Black][SIZE=2]Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM (Android) (COM4)
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 21A636728628527F05B465B7CE108BE2
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x000000039D000000 -14,453 GB
 eMMC CID   : 8801034D384231364728D900792F75ED - M8B16G

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : ENIE
  Vendor         : teksun
  Model          : EH3
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_t939ha_v1_au_dd_f05_e3_go-user 8.1.0 O11019 1535536793 release-keys
  Device         : EH3
  Display ID     : ENIE-EH3-V1_20180829
  Security Patch : 2018-08-05
  Fingerprint    : ENIE/EH3/EH3:8.1.0/O11019/1535536793:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
[COLOR="#FF0000"]Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal... Ok
[/COLOR]
Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:04
[/SIZE][/FONT][/B]
 

Ahmed-GsM

:: مراقب قسم السوفت ويير والبرمجة ::
إنضم
11 نوفمبر 2019
المشاركات
2,599
مستوى التفاعل
1,796
النقاط
113
الإقامة
BARIKA
رد: تجارب الأعضاء الناجحة فى تصليح و تفليش و فك شفرات الأجهزة على Hydra Dongle

Oppo F11 Pro (CPH1969) Format Userdata Done



161701231741781.png
 
أعلى