تجارب الاعضاء الناجحة على واجهة Pandora’s Box

DZ-Developer

:: الإدارة R&D ::
إنضم
28 أبريل 2012
المشاركات
6,607
مستوى التفاعل
30,658
النقاط
113
الإقامة
الجزائر الغالية
بسم الله الرحمن الرحيم

هنا توضع تجارب الاعضاء الناجحة على واجهة
Pandora’s Box
لغرض تبادل الخبرة واظهار بعض المراحل التي قد تخفى عن الأعضاء مثل عمليات تمرير
Firmware او فك قفل شبكة

ملاحظة:
اي موضوع لتجارب الأعضاء الناجحة في قسم البوكس ستحذف مباشرة دون سابق انذار ، هناك موضوع واحد مخصص لعرض التجارب الناجحة في هذا القسم
 

cheddihouse

:: Super User ::, ,
إنضم
26 يوليو 2013
المشاركات
851
مستوى التفاعل
5,450
النقاط
0
الإقامة
merouana batna
رد: تجارب الاعضاء الناجحة على واجهة Pandora’s Box

على بركة الله فك بوت note 8 pro

245961827_457617588975887_737786048169011454_n.png
 

cst_repair

:: عضو مميز ::
إنضم
2 يونيو 2013
المشاركات
280
مستوى التفاعل
370
النقاط
63
الإقامة
الجزائر الحبيبة
رد: تجارب الاعضاء الناجحة على واجهة Pandora’s Box

السلام عليكم و رحمة الله تعالى و بركاته

عملية ناجحة لتخطي قفل الشاشة لهاتف OPPO F9 PRO CPH1823 بدون فقدان للبيانات


كود:
Selected model: OPPO CPH1823 (Oppo F9)
Operation: Read Flash Info
Software version: 2.6

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM77 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM54 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0788
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6771]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID =  0x1574BC9B, 0xFDAE5C07, 0x0066B89F, 0x9A61F938
Get Chip ID... [MT6771]
Get SOC ID... [7135067F16D65A4F565E8209C59DC3A4182DA89A9C947B7A5E5560C54E6D4F5F]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [20]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E53304A394B39100525472575C7
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
   EMMC_ID   : 0x13014E53304A394B39100525472575C7
   EMMC_BOOT1: 0x0000400000 (4,00Mb)
   EMMC_BOOT2: 0x0000400000 (4,00Mb)
   EMMC_RPMB : 0x0001000000 (16,00Mb)
   EMMC_USER : 0x1D1F000000 (116,48Gb)
RAM INFO:
   INT_SRAM: 0x0000039000 (228,00Kb)
   EXT_RAM : 0x0100000000 (4,00Gb)
Read partitions info from phone... OK
Read product info... OK
[COLOR="#FF0000"]Product Manufacturer : OPPO
Board Platform       : MT6771
Product Board        : oppo6771_18311
Build ID             : O11019
Build Date           : Thu Nov 15 20:04:01 CST 2018
Security Patch       : 2018-10-05
Version SDK          : 27
Version Release      : 8.1.0
Version Codename     : REL[/COLOR]
Read Flash Info done!


p_213201r2m1.png
[/url][/IMG]
 

cst_repair

:: عضو مميز ::
إنضم
2 يونيو 2013
المشاركات
280
مستوى التفاعل
370
النقاط
63
الإقامة
الجزائر الحبيبة
رد: تجارب الاعضاء الناجحة على واجهة Pandora’s Box

فتح قفل الشاشة لهاتف OPPO A54 CPH2239
بدون فقدان للبيانات






كود:
Selected model: OPPO CPH2239 (Oppo A54)
Operation: Read Flash Info
Software version: 2.6

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM140 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM140 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID =  0x78801286, 0xFB82EEDD, 0x7DF49CAC, 0x2E43CE38
Get Chip ID... [MT6765]
Get SOC ID... [21F8FC8B499F70805316E1669EB33BD3A5353DF8E469CFE6835DE60061C51075]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [23]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E47314A3952381011DAD9AE381F
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
   EMMC_ID   : 0x13014E47314A3952381011DAD9AE381F
   EMMC_BOOT1: 0x0000400000 (4,00Mb)
   EMMC_BOOT2: 0x0000400000 (4,00Mb)
   EMMC_RPMB : 0x0001000000 (16,00Mb)
   EMMC_USER : 0x0E8F800000 (58,24Gb)
RAM INFO:
   INT_SRAM: 0x000003A000 (232,00Kb)
   EXT_RAM : 0x0100000000 (4,00Gb)
Read partitions info from phone... OK
Read product info... OK[COLOR=#FF0000]
Board Platform       : MT6765
Product Board        : oppo6765
Build ID             : QP1A.190711.020
Build Date           : Tue Jun  1 12:49:14 CST 2021
Display ID           : QP1A.190711.020 release-keys
Security Patch       : 2021-06-05
Version SDK          : 29
Version Release      : 10
Version Codename     : REL
Read Flash Info done[/COLOR]!
 

cst_repair

:: عضو مميز ::
إنضم
2 يونيو 2013
المشاركات
280
مستوى التفاعل
370
النقاط
63
الإقامة
الجزائر الحبيبة
رد: تجارب الاعضاء الناجحة على واجهة Pandora’s Box

فتح قفل الشاشة لهاتف oppo A15 CPH2185 بدون فقدان للبيانات


 

cst_repair

:: عضو مميز ::
إنضم
2 يونيو 2013
المشاركات
280
مستوى التفاعل
370
النقاط
63
الإقامة
الجزائر الحبيبة
رد: تجارب الاعضاء الناجحة على واجهة Pandora’s Box

فتح قفل هاتف OPPO A83 CPH1827 مع الاحتفاض بالبيانات




كود:
Selected model: OPPO CPH1827 (Oppo A83)
Operation: Reset password
Software version: 2.6

This procedure will erase all downloaded apps and their data.
Photos, music, and other non-app will be retained. Continue? YES
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM140 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0690
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0001, HW SUB CODE: 8A00
Detect chip [MT6763]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0690
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0001, HW SUB CODE: 8A00
Detect chip [MT6763]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM140 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0690
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0001, HW SUB CODE: 8A00
Detect chip [MT6763]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID =  0x77DAD078, 0x40549DB7, 0x1C8EF2DE, 0x173B30A4
Get Chip ID... [MT6763]
Get SOC ID... [2DB3B0E705414FC91430AFFEF6F917885F1E9B39913D5F5F0E09D06BB5C6BC9A]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [18]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100474436424D4201BA486AF5C4EF
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
   EMMC_ID   : 0x150100474436424D4201BA486AF5C4EF
   EMMC_BOOT1: 0x0000400000 (4,00Mb)
   EMMC_BOOT2: 0x0000400000 (4,00Mb)
   EMMC_RPMB : 0x0000400000 (4,00Mb)
   EMMC_USER : 0x0747C00000 (29,12Gb)
RAM INFO:
   INT_SRAM: 0x0000040000 (256,00Kb)
   EXT_RAM : 0x00C0000000 (3,00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read product info... OK
Product Brand        : OPPO
Product Manufacturer : OPPO
Product Model        : OPPO A83js
Product Name         : A83js
Product Device       : M6763D
Board Platform       : MT6763
Product Board        : full_oppo6763_17101
Build ID             : N6F26Q
Build Date           : Fri Sep  4 00:52:36 CST 2020
Display ID           : A83jsEX_11_A.35_200903
Security Patch       : 2019-10-05
Version SDK          : 25
Version Release      : 7.1.1
Version Codename     : REL
Read info from phone... OK
Processing data #1... OK
Reset Password done!


 

cst_repair

:: عضو مميز ::
إنضم
2 يونيو 2013
المشاركات
280
مستوى التفاعل
370
النقاط
63
الإقامة
الجزائر الحبيبة
رد: تجارب الاعضاء الناجحة على واجهة Pandora’s Box

XIAOMI M2003J15SG REDMI NOTE 9 READ PARTITIONS DONNE






كود:
Selected model: Xiaomi M2003J15SG (Redmi Note 9)
Operation: Read PTT
Software version: 2.7

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM140 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Get sec config... OK [000000E7]
Active sec flags: [SBC SLA DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM140 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID =  0x19A851F2, 0xC7BF7296, 0x6C222DAE, 0x41D80178
Get Chip ID... [MT6768]
Get SOC ID... [21166FCB41FA4BC6D59C217457D6A0A0CDE357E41FD30F6866DBA2987AD7EFB4]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [25]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E53304A394A38102037C1B19737
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
   EMMC_ID   : 0x13014E53304A394A38102037C1B19737
   EMMC_BOOT1: 0x0000400000 (4,00Mb)
   EMMC_BOOT2: 0x0000400000 (4,00Mb)
   EMMC_RPMB : 0x0001000000 (16,00Mb)
   EMMC_USER : 0x0E8F800000 (58,24Gb)
RAM INFO:
   INT_SRAM: 0x0000070000 (448,00Kb)
   EXT_RAM : 0x0100000000 (4,00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Read product info... OK
Product Brand        : Redmi
Product Manufacturer : Xiaomi
Product Model        : M2003J15SC
Product Name         : merlin_global
Product Device       : merlin
Product Board        : merlin
Board Platform       : MT6768
Build ID             : QP1A.190711.020
Build Date           : Mon May 17 14:19:36 CST 2021
Display ID           : AL2522-Merlin-V101-Q-0517
Security Patch       : 2021-05-01
Version SDK          : 29
Version Release      : 10
Version Codename     : REL
Firmware Version     : V12.0.8.0.QJOMIXM
Read partition "preloader"... OK
Read partition "pgpt"... OK
Read partition "recovery"... OK
Read partition "misc"... OK
Read partition "para"... OK
Read partition "expdb"... OK
Read partition "frp"... OK
Read partition "vbmeta"... OK
Read partition "vbmeta_system"... OK
Read partition "vbmeta_vendor"... OK
Read partition "md_udc"... OK
Read partition "metadata"... OK
Read partition "nvcfg"... OK
Read partition "nvdata"... OK
Read partition "persist"... OK
Read partition "persistbak"... OK
Read partition "protect1"... OK
Read partition "protect2"... OK
Read partition "seccfg"... OK
Read partition "sec1"... OK
Read partition "proinfo"... OK
Read partition "efuse"... OK
Read partition "boot_para"... OK
Read partition "nvram"... OK
Read partition "logo"... OK
Read partition "md1img"... OK
Read partition "spmfw"... OK
Read partition "scp1"... OK
Read partition "scp2"... OK
Read partition "sspm_1"... OK
Read partition "sspm_2"... OK
Read partition "gz1"... OK
Read partition "gz2"... OK
Read partition "lk"... OK
Read partition "lk2"... OK
Read partition "boot"... OK
Read partition "dtbo"... OK
Read partition "tee1"... OK
Read partition "tee2"... OK
Read partition "gsort"... OK
Read partition "minidump"... OK
Read partition "exaid"... OK
Read partition "cust"... OK
Read partition "devinfo"... OK
Read partition "ffu"... OK
Read partition "super"... OK
Read partition "cache"... OK
Read partition "userdata"... OK
Read partition "otp"... OK
Read partition "flashinfo"... OK
Read partition "sgpt"... OK
Saved to PND_LINK_0043 "file:///F:/9T/DUMP_PARTITIONS_(2021-11-24_12-38-1)/"backup_directory
Dumping Partitions done!
 

cst_repair

:: عضو مميز ::
إنضم
2 يونيو 2013
المشاركات
280
مستوى التفاعل
370
النقاط
63
الإقامة
الجزائر الحبيبة
بسم الله الرحمان الرحيم

REDMI 9 LANCELOT M2004J19C REBUILD IMEI _ PATCH CERT DONE

IMEI REPAIR:



PATCH CERT:

 

المرفقات

  • NV DATA_REDMI 9 _M2004J19C.rar
    614.1 KB · المشاهدات: 19

mounirblidaa

عضو أساسي
إنضم
5 أبريل 2016
المشاركات
784
مستوى التفاعل
520
النقاط
93
الإقامة
BLIDA BLIDA
رد: تجارب الاعضاء الناجحة على واجهة Pandora’s Box

احياء هاتف oppo f11 بفلاشة رسمية (ofp)وحل جميع مشاكل السوفت

p_2329takua1.png
 

driss_dz

:: Super User::, ,
إنضم
15 مارس 2012
المشاركات
1,204
مستوى التفاعل
2,773
النقاط
0
الإقامة
ilizi
رد: تجارب الاعضاء الناجحة على واجهة Pandora’s Box

تفليشش كوندور m2

كود:
[FONT=Almarai]Selected model: Mediatek Mediatek[/FONT]
[FONT=Almarai]Operation: Flash (Format all + download)[/FONT]
[FONT=Almarai]Software version: 3.9[/FONT]


[FONT=Almarai]Parse scatter file... OK[/FONT]
[FONT=Almarai]Load Rom Images... OK[/FONT]
[FONT=Almarai]Host Power Off... OK[/FONT]
[FONT=Almarai]Switch virtual port to USB... OK[/FONT]
[FONT=Almarai]Connect Type-C to BOX... OK[/FONT]
[FONT=Almarai]Host Power On... OK[/FONT]
[FONT=Almarai]Connect phone to BOX in BROM mode[/FONT]
[FONT=Almarai]Wait for device... OK[/FONT]
[FONT=Almarai]Read usbhost speed... FULL[/FONT]
[FONT=Almarai]Read Device Descriptor...[/FONT]
[FONT=Almarai]Get VID/PID...0E8D/0003[/FONT]
[FONT=Almarai]Send start cmd... OK[/FONT]
[FONT=Almarai]Get HW code from device... 0551[/FONT]
[FONT=Almarai]Get HW & SW version from device... OK[/FONT]
[FONT=Almarai]HW VER: CB00, SW VER: 0001, HW SUB CODE: 8A00[/FONT]
[FONT=Almarai]Detect chip [MT6757][/FONT]
[FONT=Almarai]Get sec config... OK [000000E5][/FONT]
[FONT=Almarai]Active sec flags: [SBC DAA][/FONT]
[FONT=Almarai]Advanced Bypass Security... OK[/FONT]
[FONT=Almarai]Disconnect virtual port... OK[/FONT]
[FONT=Almarai]Connect Type-C to HUB... OK[/FONT]
[FONT=Almarai]Wait for device connecting... OK[/FONT]
[FONT=Almarai]Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0][/FONT]
[FONT=Almarai]Device found at COM46 [BROM][/FONT]
[FONT=Almarai]Open port... OK[/FONT]
[FONT=Almarai]Send start cmd... OK[/FONT]
[FONT=Almarai]Get HW code from device... 0551[/FONT]
[FONT=Almarai]Get HW & SW version from device... OK[/FONT]
[FONT=Almarai]HW VER: CB00, SW VER: 0001, HW SUB CODE: 8A00[/FONT]
[FONT=Almarai]Detect chip [MT6757][/FONT]
[FONT=Almarai]Library Version [2][/FONT]
[FONT=Almarai]Select platform... OK[/FONT]
[FONT=Almarai]Init BROM... OK[/FONT]
[FONT=Almarai]Force Charge... OK[/FONT]
[FONT=Almarai]Disable WatchDog Timer... OK[/FONT]
[FONT=Almarai]Reopen port for libver2... OK[/FONT]
[FONT=Almarai]Get ME ID... OK[/FONT]
[FONT=Almarai]ME_ID = 0x06E2502F, 0xB94F8C0E, 0x1F4CD963, 0x445DFDC3[/FONT]
[FONT=Almarai]Get Chip ID... [MT6757][/FONT]
[FONT=Almarai]Get sec config... OK [000000E0][/FONT]
[FONT=Almarai]Load DownloadAgent... OK[/FONT]
[FONT=Almarai]Search DA... OK [3][/FONT]
[FONT=Almarai]Send preloader... OK[/FONT]
[FONT=Almarai]Start preloader... OK[/FONT]
[FONT=Almarai]Check preloader answer... OK[/FONT]
[FONT=Almarai]Send bootloader... OK[/FONT]
[FONT=Almarai]Start bootloader... OK[/FONT]
[FONT=Almarai]Wait for answer from bootloader... OK[/FONT]
[FONT=Almarai]Send SYNC signal... OK[/FONT]
[FONT=Almarai]Setup device enviroment... OK[/FONT]
[FONT=Almarai]Setup device parametres... OK[/FONT]
[FONT=Almarai]Receive DA SYNC signal... OK[/FONT]
[FONT=Almarai]Set DA parametres... OK[/FONT]
[FONT=Almarai]Get device connection agent... [BROM][/FONT]
[FONT=Almarai]Get device info... OK[/FONT]
[FONT=Almarai]EMMC_ID: 0x150100444836444D4205ECE86ABFC4C3[/FONT]
[FONT=Almarai]Load EMI config from preloader... OK[/FONT]
[FONT=Almarai]Init EXT RAM... OK[/FONT]
[FONT=Almarai]Send 2nd DA... OK[/FONT]
[FONT=Almarai]Get device info... OK[/FONT]
[FONT=Almarai]EMMC INFO:[/FONT]
[FONT=Almarai]EMMC_ID : 0x150100444836444D4205ECE86ABFC4C3[/FONT]
[FONT=Almarai]EMMC_BOOT1: 0x0000400000 (4,00Mb)[/FONT]
[FONT=Almarai]EMMC_BOOT2: 0x0000400000 (4,00Mb)[/FONT]
[FONT=Almarai]EMMC_RPMB : 0x0000400000 (4,00Mb)[/FONT]
[FONT=Almarai]EMMC_USER : 0x0E8F800000 (58,24Gb)[/FONT]
[FONT=Almarai]RAM INFO:[/FONT]
[FONT=Almarai]INT_SRAM: 0x000003A000 (232,00Kb)[/FONT]
[FONT=Almarai]EXT_RAM : 0x0200000000 (8,00Gb)[/FONT]
[FONT=Almarai]Get scatter info... OK[/FONT]
[FONT=Almarai]Check USB status... USB_FULL_SPEED[/FONT]
[FONT=Almarai]Read partitions info from phone... OK[/FONT]
[FONT=Almarai]Check A/B state... OK[/FONT]
[FONT=Almarai]Read product info... OK[/FONT]
[FONT=Almarai]Product Brand : Condor[/FONT]
[FONT=Almarai]Product Manufacturer : SPA Condor Electronics[/FONT]
[FONT=Almarai]Product Model : Allure M2[/FONT]
[FONT=Almarai]Product Name : Allure_M2[/FONT]
[FONT=Almarai]Product Device : Allure_M2[/FONT]
[FONT=Almarai]Product Board : Allure_M2[/FONT]
[FONT=Almarai]Board Platform : MT6757[/FONT]
[FONT=Almarai]Build ID : NRD90M[/FONT]
[FONT=Almarai]Build Date : Tue Nov 28 15:53:45 CST 2017[/FONT]
[FONT=Almarai]Display ID : Allure_M2[/FONT]
[FONT=Almarai]Security Patch : 2017-09-05[/FONT]
[FONT=Almarai]Version SDK : 24[/FONT]
[FONT=Almarai]Version Release : 7.0[/FONT]
[FONT=Almarai]Version Codename : REL[/FONT]
[FONT=Almarai]Firmware Version : 1509028059[/FONT]
[FONT=Almarai]Create autoformat settings... OK[/FONT]
[FONT=Almarai]Format EMMC_BOOT_1 partition( 0x00000000..0x003FFFFF )... OK[/FONT]
[FONT=Almarai]Format EMMC_BOOT_2 partition( 0x00000000..0x003FFFFF )... OK[/FONT]
[FONT=Almarai]Format EMMC_USER partition( 0x00000000..0xE8F7FFFFF )... OK[/FONT]
[FONT=Almarai]Get scatter info... OK[/FONT]
[FONT=Almarai]Verify scatter file... OK[/FONT]
[FONT=Almarai]Do NAND BMT remark... OK[/FONT]
[FONT=Almarai]Setup download info... OK[/FONT]
[FONT=Almarai]Get partition table catagory... OK [GPT][/FONT]
[FONT=Almarai]Read mirror partition table... OK[/FONT]
[FONT=Almarai]Generate mirror partition table... OK[/FONT]
[FONT=Almarai]Download mirror partition table... OK[/FONT]
[FONT=Almarai]Read major partition table... OK[/FONT]
[FONT=Almarai]Generate major partition table... OK[/FONT]
[FONT=Almarai]Download major partition table... OK[/FONT]
[FONT=Almarai]Download "preloader"... OK[/FONT]
[FONT=Almarai]Download "recovery"... OK[/FONT]
[FONT=Almarai]Download "md1img"... OK[/FONT]
[FONT=Almarai]Download "md1dsp"... OK[/FONT]
[FONT=Almarai]Download "md1arm7"... OK[/FONT]
[FONT=Almarai]Download "lk"... OK[/FONT]
[FONT=Almarai]Download "lk2"... OK[/FONT]
[FONT=Almarai]Download "boot"... OK[/FONT]
[FONT=Almarai]Download "logo"... OK[/FONT]
[FONT=Almarai]Download "tee1"... OK[/FONT]
[FONT=Almarai]Download "tee2"... OK[/FONT]
[FONT=Almarai]Download "system"... OK[/FONT]
[FONT=Almarai]Download "cache"... OK[/FONT]
[FONT=Almarai]Download "userdata"... OK[/FONT]
[FONT=Almarai]Flashing done![/FONT]
 

DZ-Developer

:: الإدارة R&D ::
إنضم
28 أبريل 2012
المشاركات
6,607
مستوى التفاعل
30,658
النقاط
113
الإقامة
الجزائر الغالية
رد: تجارب الاعضاء الناجحة على واجهة Pandora’s Box

Repair GSM Network Redmi 9A

oaN2g9a.png


كود:
Selected model: Xiaomi Redmi 9A (Dandelion)Operation: Patch CERT
Software version: 3.10


Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to BOX in BROM mode
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [00000000]
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM13 [BROM]
Open port... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID =  0xA547539E, 0xF34B2208, 0x05A4F8EF, 0x27FB729B
Get Chip ID... [MT6765]
Get SOC ID... [B51F1EC8DDCDEFE06F14319C5D0BBA4380669F0A5608052FC55D5CE8C3679ACA]
Get sec config... OK [00000000]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100424A54443452002C10CC225613
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
   EMMC_ID   : 0x150100424A54443452002C10CC225613
   EMMC_BOOT1: 0x0000400000 (4.00Mb)
   EMMC_BOOT2: 0x0000400000 (4.00Mb)
   EMMC_RPMB : 0x0001000000 (16.00Mb)
   EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
   INT_SRAM: 0x000003A000 (232.00Kb)
   EXT_RAM : 0x0080000000 (2.00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand        : Redmi
Product Manufacturer : Xiaomi
Product Model        : M2006C3LG
Product Name         : dandelion_global
Product Device       : dandelion
Product Board        : dandelion
Board Platform       : MT6765
Build ID             : QP1A.190711.020
Build Date           : Sat May 14 13:15:44 CST 2022
Display ID           : QP1A.190711.020
Security Patch       : 2022-05-01
Version SDK          : 29
Version Release      : 10
Version Codename     : REL
Firmware Version     : V12.0.20.0.QCDMIXM
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Load partiton for patching... OK
Check boot patch possiblity... POSSIBLE WITH BOOT UNLOCK
Patching CERT... OK
Save patched partiton... OK
Read partitions info from phone... OK
Check A/B state... OK
Read security partition from phone... OK
Decrypt security data... OK
Encrypt security data... OK
Write security partition to phone... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
 

DZ-Developer

:: الإدارة R&D ::
إنضم
28 أبريل 2012
المشاركات
6,607
مستوى التفاعل
30,658
النقاط
113
الإقامة
الجزائر الغالية
رد: تجارب الاعضاء الناجحة على واجهة Pandora’s Box

[CPH2251] OPPO Reno 6 5G
Reset
Password+FRP with TP

cAi2fNL.png


كود:
Selected model: OPPO CPH2251 (Oppo Reno 6 5G)
Operation: Erase FRP
Software version: 4.4

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM13 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0959
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM13 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID =  0xD5931A86, 0x62DD348F, 0xD5A28424, 0x4FC72A73
Get Chip ID... [MT6877]
Get SOC ID... [0E0FE34F7C36B206617833680435E75F212A03B002D5D8CDEBD9B61E68879A22]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [17]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A043)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
   UFS_CID   : H9HQ15AFAMBDAR
   UFS_FWVER : A043
   BLOCK_SIZE: 0x0000001000 (4.00Kb)
   UFS_LU0   : 0x0000400000 (4.00Mb)
   UFS_LU1   : 0x0000400000 (4.00Mb)
   UFS_LU2   : 0x1DCB000000 (119.17Gb)
RAM INFO:
   INT_SRAM: 0x0000070000 (448.00Kb)
   EXT_RAM : 0x0200000000 (8.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... error(3)
Read partition "frp"... OK
Backup saved to "directory
Writting FRP data... OK
Erase FRP done!
 

cst_repair

:: عضو مميز ::
إنضم
2 يونيو 2013
المشاركات
280
مستوى التفاعل
370
النقاط
63
الإقامة
الجزائر الحبيبة
رد: تجارب الاعضاء الناجحة على واجهة Pandora’s Box

OPPO A17 CPH2477
FRP DONE READ PARTITION DONE



كود:
Selected model: OPPO CPH2077 (Oppo A12)
Operation: Read PTT
Software version: 4.6

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM0 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM7 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID =  0xD5E9E73E, 0x832ED2C1, 0x53E8DB85, 0xF7E7190F
Get Chip ID... [MT6765]
Get SOC ID... [4587EE25991E5CB1EE10DC28E0A7D7833F7D311DEBAC80F9462728AD5A392099]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x9B010059325030363400A9AC4065A93F
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
   EMMC_CNAME: Y2P064
   EMMC_ID   : 0x9B010059325030363400A9AC4065A93F
   EMMC_BOOT1: 0x0000400000 (4.00Mb)
   EMMC_BOOT2: 0x0000400000 (4.00Mb)
   EMMC_RPMB : 0x0001000000 (16.00Mb)
   EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
   INT_SRAM: 0x000003A000 (232.00Kb)
   EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [B]
Read product info... error(3)
Read partitions info from phone... OK
Read partition "preloader"... OK
Read partition "pgpt"... OK
Read partition "boot_para"... OK
Read partition "para"... OK
Read partition "oplusreserve1"... OK
Read partition "oplusreserve2"... OK
Read partition "oplusreserve3"... OK
Read partition "oplus_custom"... OK
Read partition "expdb"... OK
Read partition "frp"... OK
Read partition "nvcfg"... OK
Read partition "nvdata"... OK
Read partition "md_udc"... OK
Read partition "metadata"... OK
Read partition "protect1"... OK
Read partition "protect2"... OK
Read partition "seccfg"... OK
Read partition "persist"... OK
Read partition "sec1"... OK
Read partition "proinfo"... OK
Read partition "nvram"... OK
Read partition "ocdt"... OK
Read partition "oplusreserve5"... OK
Read partition "oplusreserve6"... OK
Read partition "logo"... OK
Read partition "md1img_a"... OK
Read partition "spmfw_a"... OK
Read partition "scp_a"... OK
Read partition "sspm_a"... OK
Read partition "gz_a"... OK
Read partition "lk_a"... OK
Read partition "boot_a"... OK
Read partition "vendor_boot_a"... OK
Read partition "dtbo_a"... OK
Read partition "tee_a"... OK
Read partition "vbmeta_a"... OK
Read partition "vbmeta_system_a"... OK
Read partition "vbmeta_vendor_a"... OK
Read partition "cdt_engineering_a"... OK
Read partition "md1img_b"... OK
Read partition "spmfw_b"... OK
Read partition "scp_b"... OK
Read partition "sspm_b"... OK
Read partition "gz_b"... OK
Read partition "lk_b"... OK
Read partition "boot_b"... OK
Read partition "vendor_boot_b"... OK
Read partition "dtbo_b"... OK
Read partition "tee_b"... OK
Read partition "cdt_engineering_b"... OK
Read partition "vbmeta_b"... OK
Read partition "vbmeta_system_b"... OK
Read partition "vbmeta_vendor_b"... OK
Read partition "otp"... OK
Read partition "flashinfo"... OK
Read partition "sgpt"... OK
Saved to HYPERLINK D:/BY_BRAND/OPPO/cph2477/DUMP_PARTITIONS_(2023-3-6_15-0-7)/
Dumping Partitions done!

كود:
Selected model: OPPO CPH2077 (Oppo A12)
Operation: Erase FRP
Software version: 4.6

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM0 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM0 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID =  0xD5E9E73E, 0x832ED2C1, 0x53E8DB85, 0xF7E7190F
Get Chip ID... [MT6765]
Get SOC ID... [4587EE25991E5CB1EE10DC28E0A7D7833F7D311DEBAC80F9462728AD5A392099]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x9B010059325030363400A9AC4065A93F
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
   EMMC_CNAME: Y2P064
   EMMC_ID   : 0x9B010059325030363400A9AC4065A93F
   EMMC_BOOT1: 0x0000400000 (4.00Mb)
   EMMC_BOOT2: 0x0000400000 (4.00Mb)
   EMMC_RPMB : 0x0001000000 (16.00Mb)
   EMMC_USER : 0x0E8F800000 (58.24Gb)
RAM INFO:
   INT_SRAM: 0x000003A000 (232.00Kb)
   EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [B]
Read product info... error(3)
Read partition "frp"... OK
Backup saved to HYPERLINK C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/OPPO_CPH2077%20(Oppo%20A12)/FRP_BACKUP_(2023-3-6_15-3-1)/"directory
Writting FRP data... OK
Erase FRP done!
 

phonix_19

عضو أساسي
إنضم
28 فبراير 2013
المشاركات
225
مستوى التفاعل
317
النقاط
63
رد: تجارب الاعضاء الناجحة على واجهة Pandora’s Box

NOKIA G11 لا يدخل وضع الريكوفري به كود


read info
Selected model: Nokia TA-1401 (Nokia G11)
Operation: Read Flash Info
Software version: 5.0

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC]
Waiting for device... OK
Device found at COM4
Port: USB\VID_1782&PID_4D00\7&DD655A3&0&2
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Connecting to device... OK
Selected processor: Tiger_T616_64
Load files... OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: Pxxxxxxxxxxx
Flash Type: EMMC
Read partitions info... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : Nokia
Product Manufacturer : HMD Global
Product Model : Nokia G11
Product Name : Shadowcat_00WW
Product Device : SCT_sprout
Product Board : Shadowcat
Board Platform : ums9230
Build ID : RP1A.201005.001
Build Date : Tue Sep 20 09:14:00 UTC 2022
Display ID : 00WW_1_380
Security Patch : 2022-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 00WW_1_380
Userdata FS Type : F2FS
Done!


frp wipe data

Selected model: Nokia TA-1401 (Nokia G11)
Operation: Erase FRP And Wipe
Software version: 5.0

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX or PC]
Waiting for device... OK
Device found at COM4
Port: USB\VID_1782&PID_4D00\7&DD655A3&0&2
Driver: [UNISOC Communications Inc.,sprdvcom,SPRD U2S Diag,sprdvcom.sys,4.19.38.134]
Connecting to device... OK
Selected processor: Tiger_T616_64
Load files... OK
Connect preloader 1... OK
Connect preloader 2... OK
Connect loader 1... OK
Connect loader 2... OK
Serial Number: P220827071004618
Flash Type: EMMC
Read partitions info... OK
Checking A/B state... OK [A]
Read product info... [EXT4] ... OK
Product Brand : Nokia
Product Manufacturer : HMD Global
Product Model : Nokia G11
Product Name : Shadowcat_00WW
Product Device : SCT_sprout
Product Board : Shadowcat
Board Platform : ums9230
Build ID : RP1A.201005.001
Build Date : Tue Sep 20 09:14:00 UTC 2022
Display ID : 00WW_1_380
Security Patch : 2022-09-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 00WW_1_380
Userdata FS Type : F2FS
Backup partitions... OK
Formatting "persist" partition... OK
Formatting "userdata" partition... OK
Formatting "cache" partition... OK
Formatting "metadata" partition... OK
Creating default filesystems... [CACHE: EXT4] ... [USERDATA: F2FS] ... OK
Done!
 

DZ-Developer

:: الإدارة R&D ::
إنضم
28 أبريل 2012
المشاركات
6,607
مستوى التفاعل
30,658
النقاط
113
الإقامة
الجزائر الغالية
رد: تجارب الاعضاء الناجحة على واجهة Pandora’s Box

Oppo A5s CPH1909
Reset Password


L6naI5W.png


بيانات العملية:
كود:
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Connect phone to [BOX] in BROM mode
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0766
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1511.0]
Device found at COM9 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID =  0x6E87946B, 0x868D6993, 0xC00AFBE0, 0x88313ED5
Get Chip ID... [MT6765]
Get SOC ID... [AB8FC690B01A721B51AF61884C46FE65BE4CFE08405822C132188C225C51D3A5]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x90014A68423861503E03625665C6C62F
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
   EMMC_CNAME: hB8aP>
   EMMC_ID   : 0x90014A68423861503E03625665C6C62F
   EMMC_BOOT1: 0x0000400000 (4.00Mb)
   EMMC_BOOT2: 0x0000400000 (4.00Mb)
   EMMC_RPMB : 0x0001000000 (16.00Mb)
   EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
   INT_SRAM: 0x000003A000 (232.00Kb)
   EXT_RAM : 0x00C0000000 (3.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand        : OPPO
Product Manufacturer : OPPO
Product Model        : CPH1909
Product Name         : CPH1909
Product Device       : CPH1909
Board Platform       : MT6765
Build ID             : O11019
Build Date           : Fri Mar 19 19:50:27 CST 2021
Display ID           : CPH1909EX_11_A.46
Security Patch       : 2021-04-05
Version SDK          : 27
Version Release      : 8.1.0
Version Codename     : REL
Firmware Version     : 1616154627
Userdata FS Type     : EXT4
Read info from phone... OK
Processing data #1... OK
Reset Password done!

Selected model: OPPO CPH1909 (OPPO A5s)
Operation: Reset password
Software version: 5.1
 

cst_repair

:: عضو مميز ::
إنضم
2 يونيو 2013
المشاركات
280
مستوى التفاعل
370
النقاط
63
الإقامة
الجزائر الحبيبة
رد: تجارب الاعضاء الناجحة على واجهة Pandora’s Box

REALME C55 RMX3710 UNLOCK NETWORK


Selected model: Realme RMX3710 (Realme C55)
Operation: Read Flash Info
Software version: 5.7

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM0 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Read Efuse error
Force switch to BROM... OK
Waiting for device... OK
Driver: [Sony Mobile Communications,usbser,MTK USB Port,usbser.sys,5.1.2600.2180]
Device found at COM115 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [Sony Mobile Communications,usbser,MTK USB Port,usbser.sys,5.1.2600.2180]
Device found at COM115 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xFA234218, 0x258AC75D, 0xF5E5705F, 0x943E74C5
Get Chip ID... [MT6768]
Get SOC ID... [E14249E6433116E375A8DBB41580F1824A65E85289D00014AD7FD4054A2E6C87]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100445554423432022D63F4674A2D
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DUTB42
EMMC_ID : 0x150100445554423432022D63F4674A2D
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : oplus
Product Manufacturer : oplus
Product Model : ossi
Product Name : ossi
Product Device : ossi
Product Board : k69v1_64_k419
Board Platform : connac1x
Build ID : TP1A.220905.001
Build Date : Tue Apr 11 09:22:56 CST 2023
Security Patch : 2023-03-05
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : 1681176176064
Userdata FS Type : F2FS
Read Flash Info done!


169338706801651.png
[/url][/IMG]
 
أعلى