|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
12-27-2023, 19:14 | #1 (permalink) |
Product Manager Join Date: Oct 2000 Location: future
Posts: 22,431
Member: 2368 Status: Offline Sonork: 100.111111 Thanks Meter: 186,558 | Pandora PRO 6.3 Released. Lot of new phones added. - Added support new Vivo security in Preloader mode for MT6781, MT6853, MT6891, MT6893 - Added Reset FRP in Download Mode (ODIN) for Samsung MTK phones - Added support Samsung phones: SM-A136B, SM-A136M - Galaxy A13 5G, SM-A137F - Galaxy A13, SM-A145P, SM-A145R Galaxy A14, SM-A146P, SM-A146U, SM-A146U1, SM-A146W - Galaxy A14 5G, SM-A3460, SM-A346B, SM-A346E, SM-A346M, SM-A346N - Galaxy A34 5G, SM-M136B - Galaxy M13 5G - Fixed some bugs DO NOT POST ANY LOGS OF JOB HERE in this thread, if you have any error - open own thread and supporters will answer there!!! List of resellers with stock: HERE Last edited by blang; 12-27-2023 at 19:32. |
The Following 19 Users Say Thank You to blang For This Useful Post: |
12-27-2023, 20:29 | #2 (permalink) |
Crazy Poster Join Date: Sep 2012 Location: nigeria
Posts: 59
Member: 1806657 Status: Offline Sonork: Bolatito86 Thanks Meter: 6 | Thanks for the support but we still need more from you, like mdm remove for both mtk and spd, if possible try add support for Qualcomm CPU. |
12-28-2023, 01:08 | #3 (permalink) |
Freak Poster Join Date: Apr 2015
Posts: 332
Member: 2383501 Status: Offline Sonork: 100.1660513 Thanks Meter: 211 | Best Team Ever - Added Reset FRP in Download Mode (ODIN) for Samsung MTK phones - Added support Samsung phones: SM-A136B, SM-A136M - Galaxy A13 5G, SM-A137F - Galaxy A13, SM-A145P, SM-A145R Galaxy A14, SM-A146P, SM-A146U, SM-A146U1, SM-A146W - Galaxy A14 5G, SM-A3460, SM-A346B, SM-A346E, SM-A346M, SM-A346N - Galaxy A34 5G, SM-M136B - Galaxy M13 5G |
12-28-2023, 01:22 | #4 (permalink) |
No Life Poster Join Date: Jun 2009 Location: SouthAmericaUnlockers Age: 52
Posts: 2,638
Member: 1057178 Status: Offline Sonork: Kfe~Labs Co.- Thanks Meter: 568 | please add sprd autodetect cpu in Speadtrun device.- br polaco |
The Following User Says Thank You to el-polaco For This Useful Post: |
12-29-2023, 16:24 | #10 (permalink) |
Freak Poster Join Date: Mar 2020 Location: bolivia
Posts: 263
Member: 2951556 Status: Offline Thanks Meter: 243 | Selected model: Infinix X678B (Infinix Note 30 Pro) Operation: Eliminar FRP Software version: 6.3 Host Power Off... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Host Power On... OK Connect phone to [BOX or PC] in PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0] Device found at COM9 [PRELOADER] Open port... OK Send start cmd... OK Get HW code from device... 1208 Get sec config... OK [00000005] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6789] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Preloader exist. Skip connection verification. Get ME ID... OK ME_ID = 0xC6D7BC03, 0xFE80868E, 0xDD69E320, 0x33767778 Load DownloadAgent... OK Search DA... OK [1] Send bootloader... OK Start bootloader... OK Setup device enviroment... OK Setup device parametres... OK Get device info... OK UFS CID (FW VER): eUFS2.2_256 () Send preloader... OK Load DownloadAgent... OK Search DA... OK [0] Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : eUFS2.2_256 UFS_FWVER : BLOCK_SIZE: 0x0000001000 (4,00Kb) UFS_LU0 : 0x0000400000 (4,00Mb) UFS_LU1 : 0x0000400000 (4,00Mb) UFS_LU2 : 0x3BAD800000 (238,71Gb) [EFUSE INFO]: BROM not disabled Read partitions info from phone... OK Checking A/B state... OK [B] Read product info... [EROFS] ... OK Product Brand : alps Product Manufacturer : alps Product Model : mgvi_64_nfc_armv82 Product Name : hal_mgvi_64_nfc_armv82 Product Device : mgvi_64_nfc_armv82 Product Board : mgvi_64_nfc_armv82 Board Platform : common Build ID : SP1A.210812.016 Build Date : Tue Oct 31 18:07:41 CST 2023 Firmware Version : 467049 Userdata FS Type : F2FS Read partition "frp"... OK Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Infinix_X678B%20(Infinix%20Note%2030%20Pro)/FRP_BACKUP_(2023-12-29_11-15-31)/ Writting FRP data... OK Erase FRP done! |
12-29-2023, 16:31 | #11 (permalink) |
Freak Poster Join Date: Mar 2020 Location: bolivia
Posts: 263
Member: 2951556 Status: Offline Thanks Meter: 243 | Selected model: Xiaomi Mediatek Operation: Eliminar FRP Software version: 6.3 Host Power Off... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Host Power On... OK Connect phone to [BOX] in BROM/PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM51 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0959 Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Force switch to BROM... OK Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Waiting for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0959 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Release testpoint Advanced Bypass Security... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM51 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0959 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6877] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x56451E17, 0x6D78AFED, 0xFE8D3697, 0x07183A75 Get Chip ID... [MT6877] Get SOC ID... [97EDC7360BBD60B5939CC4FFBF7DA211BEDB34DE60AA76A681 1DC37ED96CA598] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [17] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): H9HQ21AFAMADAR (A043) Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : H9HQ21AFAMADAR UFS_FWVER : A043 BLOCK_SIZE: 0x0000001000 (4,00Kb) UFS_LU0 : 0x0000400000 (4,00Mb) UFS_LU1 : 0x0000400000 (4,00Mb) UFS_LU2 : 0x3B96000000 (238,34Gb) RAM INFO: INT_SRAM: 0x0000070000 (448,00Kb) EXT_RAM : 0x0200000000 (8,00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [A] Read product info... [EXT4] ... OK Product Brand : redmi Product Manufacturer : xiaomi Product Model : missi Product Name : missi Product Device : missi Build ID : SP1A.210812.016 Build Date : Thu Dec 1 21:06:30 CST 2022 Display ID : SP1A.210812.016 Security Patch : 2022-11-01 Version SDK : 31 Version Release : 12 Version Codename : REL Firmware Version : V13.0.7.0.SKTMIXM Read partition "frp"... OK Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Xiaomi_MT6877/FRP_BACKUP_(2023-12-29_11-18-38)/ Writting FRP data... OK Erase FRP done! |
12-31-2023, 10:44 | #14 (permalink) |
No Life Poster Join Date: Dec 2012 Location: SRI LANKA
Posts: 570
Member: 1857049 Status: Offline Sonork: 100.1627774 Thanks Meter: 208 | Samsung a13 5g frp done smoothly a136u u5 Selected model: Samsung SM-A136U (Samsung Galaxy A13 5G) Operation: Erase FRP Software version: 6.3 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Connect phone to [BOX] in BROM mode Waiting for device... timeout Selected model: Samsung SM-A136U (Samsung Galaxy A13 5G) Operation: Erase FRP Software version: 6.3 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Connect phone to [BOX] in BROM mode Waiting for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0989 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6833] Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Release testpoint Advanced Bypass Security... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM19 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0989 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6833] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xE720C4E5, 0xCED82002, 0x2554C5EE, 0x47818CF6 Get Chip ID... [MT6833] Get SOC ID... [2BAA06F24C3649CFBC84C1F555C6029BE700667003E465EA94 F73F9DE4477CD8] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [14] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x150100444336444D4200AAD4DC1279BF Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: DC6DMB EMMC_ID : 0x150100444336444D4200AAD4DC1279BF EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0001000000 (16.00Mb) EMMC_USER : 0x0E8F800000 (58.24Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : samsung Product Manufacturer : samsung Product Model : SM-A136U Product Name : a13xsq Product Device : a13x Product Board : a13x Board Platform : mt6833 Build ID : SP1A.210812.016 Build Date : Fri Nov 17 13:58:38 KST 2023 Display ID : TP1A.220624.014.A136USQS7DWK2 Security Patch : 2023-11-01 Version SDK : 33 Version Release : 13 Version Codename : REL Firmware Version : A136USQS7DWK2 Userdata FS Type : F2FS Read partition "frp"... OK Read partition "persistent"... OK Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/Samsung_SM-A136U%20(Samsung%20Galaxy%20A13%205G)/FRP_BACKUP_(2023-12-31_12-29-28)/ Writting FRP data... OK Erase FRP done! |
Bookmarks |
| |
|