GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 06-23-2021, 02:00   #2086 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiomi Redmi 9A (Dendelion) Mi Account successfully removed by Hydra Tool


Xiomi Redmi 9A (Dendelion) Mi Account successfully removed by Hydra Tool

1. Run Hydra MTK Module and Sosc.
2. Choose Brand and Module.
3. Go to "Service"-->"Tool" Tab.
4. Choose "Xiaomi".
5. Click on "Remove Mi Account (Erased Method) + FRP" from drop down menu.
6. Click "Execute" button
7. connect device to the computer with USB Data cable
8. Wait until the process is completed.


Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-23-2021, 02:05   #2087 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 9 (Lancelot) FRP successfully removed by Hydra Tool

Xiaomi Redmi 9 (Lancelot) FRP successfully removed by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tool
4. Choose "Factory reset protection FRP from universal menu.
5. Choose "Zero Wipe" from "Option / Method" drop down menu
6. Execute and connect the device to the computer with data cable
7. Click on "Execute".
8. wait until the process is completed.

Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-23-2021, 02:19   #2088 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 8 (Ginkgo) restoring QCN to enabling IME done by Hydra Tool

Xiaomi Redmi Note 8 (Ginkgo) restoring QCN to enabling IME done by Hydra Tool

1. Run Hydra Qualcomm Module.
2. Choose Brand and Module.
3. Go to "Repair and calibration" Tab.
4. Choose "EQCNFile" from folder and load it on Hydra Tool.
5. Tick "Enable IMEI 1.
6. Click "Restore QCN" button
7. connect device to the computer with USB Data cable
8. Wait until the process is completed.
Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-23-2021, 02:27   #2089 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Hisilicon Huawei Kirin 710 Factory Reset Protection removed Hydra Main Tool

Hisilicon Huawei Kirin 710 Factory Reset Protection removed Hydra Main Tool

1. Run Main Tool of Hydra.
2. Choose "HiSilicon" Tab.
3. Choose Module
4. Go to "Service" and choose "Factory reset protection / Account" from drop down menu.
5. Choose "Remove FRP"
6. Keep (Put) the device into Fastboot mode.
7. Connect device to the computer with USB Data Cable.
8. Click on "Execute"
9. Wait until the operation is complete.
Note: Auto boot and manual boot is optional. If you want auto boot, then, just tick it.

Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-23-2021, 15:15   #2090 (permalink)
No Life Poster
 
malka4u's Avatar
 
Join Date: Aug 2011
Location: bagmati pradesh
Posts: 3,294
Member: 1626780
Status: Offline
Thanks Meter: 1,275
M017F m01s scatter firmware read done

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM12)
Device :5&147efee4&0&1
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&147efee4&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : C83E66865CD2957C72E2B56454F008C0
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100475836424D4200E8189B67871B - GX6BMB

Reading GPT-EMMC [0x00008000] 46 Items


Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : a10sins-user 10 QP1A.190711.020 M017FXXU1BTI6 release-keys
Display ID : QP1A.190711.020.M017FXXU1BTI6
Security Patch : 2020-09-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Backup All By Partitions Except Userdata
Processing...

Reading Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_s96116ca1.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Full\__0766--10(QP1A.190711.020.M017FXXU1BTI6)_230621195140\MT6 765_Android_scatter.txt
-pgpt[0x00000000]4 MB ->pgpt.bin...Ok
-boot_para[0x00400000]1024 KB ->boot_para.bin...Ok
-para[0x00500000]512 KB ->para.bin...Ok
-efuse[0x00580000]512 KB ->efuse.bin...Ok
-nvram[0x00600000]64 MB ->nvram.bin...Ok
-efs[0x04600000]8 MB ->efs.bin...Ok
-sec_efs[0x04E00000]8 MB ->sec_efs.bin...Ok
-bota[0x05600000]21 MB ->bota.bin...Ok
-param[0x06B00000]4 MB ->param.bin...Ok
-up_param[0x06F00000]4 MB ->up_param.bin...Ok
-expdb[0x07300000]20 MB ->expdb.bin...Ok
-frp[0x08700000]1024 KB ->frp.bin...Ok
-nvcfg[0x08800000]32 MB ->nvcfg.bin...Ok
-nvdata[0x0A800000]64 MB ->nvdata.bin...Ok
-metadata[0x0E800000]32 MB ->metadata.bin...Ok
-protect1[0x10800000]8 MB ->protect1.bin...Ok
-protect2[0x11000000]8 MB ->protect2.bin...Ok
-seccfg[0x11800000]8 MB ->seccfg.bin...Ok
-persist[0x12000000]48 MB ->persist.bin...Ok
-persistent[0x15000000]512 KB ->persistent.bin...Ok
-misc[0x15080000]7.5 MB ->misc.bin...Ok
-sec1[0x15800000]2 MB ->sec1.bin...Ok
-proinfo[0x15A00000]3 MB ->proinfo.bin...Ok
-md1img[0x15D00000]100 MB ->md1img.bin...Ok
-spmfw[0x1C100000]1024 KB ->spmfw.bin...Ok
-scp1[0x1C200000]1024 KB ->scp1.bin...Ok
-sspm_1[0x1C300000]1024 KB ->sspm_1.bin...Ok
-lk[0x1C400000]2 MB ->lk.bin...Ok
-steady[0x1C600000]4 MB ->steady.bin...Ok
-boot[0x1CA00000]32 MB ->boot.bin...Ok
-recovery[0x1EA00000]32 MB ->recovery.bin...Ok
-dtbo[0x20A00000]8 MB ->dtbo.bin...Ok
-tee1[0x21200000]6 MB ->tee1.bin...Ok
-vendor[0x21800000]448 MB ->vendor.bin...Ok
-product[0x3D800000]432 MB ->product.bin...Ok
-system[0x58800000]3.422 GB ->system.bin...Ok
-vbmeta[0x133800000]8 MB ->vbmeta.bin...Ok
-cache[0x134000000]400 MB ->cache.bin...Ok
-omr[0x14D000000]48 MB ->omr.bin...Ok
Reading Done!!!
C:\Hydra Tool\\Backup\Full\__0766--10(QP1A.190711.020.M017FXXU1BTI6)_230621195140 Ok

Elapsed Time : 00:07:06
  Reply With Quote
Old 06-24-2021, 01:34   #2091 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Mi Play (Lotus) Written NVRAM successfully done by Hydra Tool

Xiaomi Redmi Mi Play (Lotus) Written NVRAM successfully done by Hydra Tool

1. Run Hydra MTK Module and Sosc.
2. Choose Brand and Module.
3. Go to "Service"--> "" Tool" Tab.
4. Choose "Non-Volatile Random Access Memory (NVRAM)".
5. Choose "NVRAM" from "Method / Option" drop down menu.
6 Click on "Execute"
7. connect device to the computer with USB Data cable
8. Wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM7)
Device :6&308c21b8&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&308c21b8&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SB : 01 (True)
SLA : 02 (True)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : 6765_Xiaomi_wb.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/03/17.ÉIIç10:04_497508
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_lotus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 052740D176ABC54444190FCC99109673
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433861503E036086A90916CD - hC8aP>

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : MI PLAY
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lotus-user 8.1.0 O11019 V10.2.5.0.OFIMIXM release-keys
Miui Ver : V10
Device : lotus
Mod_device : lotus_global
Display ID : ZAL1722-lotus-build-20190612172629
Security Patch : 2019-05-01
Fingerprint : xiaomi/lotus/lotus:8.1.0/O11019/V10.2.5.0.OFIMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_lotus.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766_xiaomi_lotus_lotus_8.1.0_O1 1019_V10.2.5.0.OFIMIXM_062321115622\MT6765_Android _scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03588000]1024 KB ->frp.bin...Ok
-nvdata[0x05688000]64 MB ->nvdata.bin...Ok
-protect1[0x0B688000]8 MB ->protect1.bin...Ok
-protect2[0x0BE88000]9.469 MB ->protect2.bin...Ok
-persist[0x0D000000]48 MB ->persist.bin...Ok
-nvram[0x18E80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766_xiaomi_lotus_lotus_8.1.0_O1 1019_V10.2.5.0.OFIMIXM_062321115622
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 052740D176ABC54444190FCC99109673
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433861503E036086A90916CD - hC8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : MI PLAY
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : lotus-user 8.1.0 O11019 V10.2.5.0.OFIMIXM release-keys
Miui Ver : V10
Device : lotus
Mod_device : lotus_global
Display ID : ZAL1722-lotus-build-20190612172629
Security Patch : 2019-05-01
Fingerprint : xiaomi/lotus/lotus:8.1.0/O11019/V10.2.5.0.OFIMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Write NVMRAM
Processing...
Writing nvram file [nvram.bin] Ok

Elapsed Time : 00:01:18
BR
Dipendra Pathak

  Reply With Quote
Old 06-24-2021, 01:40   #2092 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo F3 (CPH 1609) Flash file successfully written by Hydra Tool

Oppo F3 (CPH 1609) Flash file successfully written by Hydra Tool

1. Run Hydra MTK Module and Sosc.
2. Choose Brand and Module or leave it as "Auto"
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Tick "Auto Reboot" just above "Execute" button.
6. Click on "Flash"
7. connect device to the computer with USB Data cable
8. Wait until the process is completed.

Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-24-2021, 01:47   #2093 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 6 (Cereus) Factory reset or format user data remove dy Hydra Tool

Xiaomi Redmi 6 (Cereus) Factory reset or format user data remove dy Hydra Tool

1. Run Hydra MTK module.
2. Choose Brand and Module.
3. Go to "Service"-->"Tool" Tab.
4. Choose "Factory Reset / Format user data"
5. Choose "Auto" from "Method / Option" drop down menu..
6. Click "Execute" button
7. connect device to the computer with USB Data cable
8. Wait until the process is completed.
Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM83)
Device :5&28e4b4e4&0&3
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&28e4b4e4&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SB : 01 (True)
SLA : 02 (True)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : 6765_Xiaomi_wb.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/03/17.ÉIIç10:04_497508
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cereus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 140F3E7EAD1F98AC088B7DB84C108472
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D42018FD19ABC55E3 - GD6BMB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cereus-user 8.1.0 O11019 V10.3.6.0.OCGMIXM release-keys
Miui Ver : V10
Device : cereus
Mod_device : cereus_global
Display ID : O11019
Security Patch : 2019-08-01
Fingerprint : xiaomi/cereus/cereus:8.1.0/O11019/V10.3.6.0.OCGMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_cereus.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cereus_cereus_8.1.0_ O11019_V10.3.6.0.OCGMIXM_062321120810\MT6765_Andro id_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-protect1[0x0D688000]8 MB ->protect1.bin...Ok
-protect2[0x0DE88000]9.469 MB ->protect2.bin...Ok
-persist[0x0F000000]64 MB ->persist.bin...Ok
-nvram[0x1BE80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cereus_cereus_8.1.0_ O11019_V10.3.6.0.OCGMIXM_062321120810
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 140F3E7EAD1F98AC088B7DB84C108472
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D42018FD19ABC55E3 - GD6BMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cereus-user 8.1.0 O11019 V10.3.6.0.OCGMIXM release-keys
Miui Ver : V10
Device : cereus
Mod_device : cereus_global
Display ID : O11019
Security Patch : 2019-08-01
Fingerprint : xiaomi/cereus/cereus:8.1.0/O11019/V10.3.6.0.OCGMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal... Ok

Elapsed Time : 00:01:15
BR
Dipendra Pathak

  Reply With Quote
Old 06-24-2021, 01:55   #2094 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Oppo F1S Plus read screen lock security successfully done by Hydra Tool

Oppo F1S Plus read screen lock security successfully done by Hydra Tool

1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module as "Auto"
3. Go to "Service"--> "Tool" from Universal Option
4. Choose "Screen Lock Security"
5. Choose "Read Pattern" from "Method / Option" drop down menu.
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed
Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-24-2021, 02:03   #2095 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Vivo Y12S (PD2036F) zero wipe FRP partition successfully removed by Hydra Tool

Vivo Y12S (PD2036F) zero wipe FRP partition successfully removed by Hydra Tool

1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module as "Auto"
3. Go to "Service"--> "Tool" from Universal Option
4. Choose "Ultra Power Option" from universal operation.
5. Choose "Auto" from "Method / Option" drop down menu.
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed
Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-24-2021, 16:02   #2096 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 448
Xiaomi Redmi Note 9 (merlin) Mi Account + FRP Remove by Hydra

Xiaomi Redmi Note 9 (merlin) Mi Account + FRP Remove by Hydra

Remove Google Account and Xiaomi Account ID by USB Cable only in 8 secs only.



Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM19)
Device :7&1ee38e0d&0&1
SymbolicName :\??\USB#VID_0E8D&PID_0003#7&1ee38e0d&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : EC489DA522BFE383FEADA27C0880FBA1
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E47314A39533910032D261547B3 - G1J9S9

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:08
  Reply With Quote
Old 06-24-2021, 16:14   #2097 (permalink)
No Life Poster
 
ceza031's Avatar
 
Join Date: Feb 2012
Age: 39
Posts: 1,395
Member: 1724862
Status: Offline
Thanks Meter: 448
Xiaomi Redmi Note 8 Pro (begonia) IMEI Repair by Flash Mode

Xiaomi Redmi Note 8 Pro (begonia) IMEI Repair by Flash Mode
The Bootloader is Locked, No need Root, No need Flash ENG ROM
Just 1 Click with Hydra Dongle




Quote:
=====================================
***IMEI REPAIR FUNCTION****
Xiaomi Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MTK USB Port (COM19)
Device :7&1ee38e0d&0&1
SymbolicName :\??\USB#VID_0E8D&PID_0003#7&1ee38e0d&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/05/2012, 2.0000.0.1

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0813MT6785 [6785]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SB : 01 (True)
SLA : 02 (True)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0813MT6785 [6785]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : Xiaomi_RedmiNote8Pro_6785.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2019/12/14.17:56_491164
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_begonia.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5A05C710337FBD520D9D932B03A28634
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000000EE5800000 -59,586 GB
UFS CID : *OH9HQ53AECMMDAR
UFS UNIQID : 0d9829a6bb89000000000000

DA Speed : high-speed

Reading GPT-UFS [0x00008000] 130 Items

Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 10 QP1A.190711.020 V12.0.8.0.QGGMIXM release-keys
Miui Ver : V12
Mod_device : begonia_global
Display ID : QP1A.190711.020
Security Patch : 2021-04-01
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_begonia.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0813__060521174004\MT6785_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05888000]1024 KB ->frp.bin...Ok
-nvdata[0x08188000]64 MB ->nvdata.bin...Ok
-persist[0x0E188000]70,469 MB ->persist.bin...Ok
-protect1[0x12800000]8 MB ->protect1.bin...Ok
-protect2[0x13000000]8 MB ->protect2.bin...Ok
-nvram[0x17580000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0813__060521174004
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5A05C710337FBD520D9D932B03A28634
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000000EE5800000 -59,586 GB
UFS CID : *OH9HQ53AECMMDAR
UFS UNIQID : 0d9829a6bb89000000000000

Reading GPT-UFS [0x00008000] 130 Items


Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 10 QP1A.190711.020 V12.0.8.0.QGGMIXM release-keys
Miui Ver : V12
Mod_device : begonia_global
Display ID : QP1A.190711.020
Security Patch : 2021-04-01
StorageType : mtp
Userdata State : Not Encrypted
IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : 3515xxxxxxxxxxx
IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : 3581xxxxxxxxxxx

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:41
  Reply With Quote
Old 06-25-2021, 01:55   #2098 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Vivo Y11 (1906) removing FRP successfully done by Hydra Tool

Vivo Y11 (1906) removing FRP successfully done by Hydra Tool

1. Run Qualcomm Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"--> "Vivo"
4. Choose "Factory Reset" from drop down menu
5. Choose "Forced Erased" from Flash Mode
6. Click on "Execute"
7. Connect device to computer using USB Data Cable.
8. Wait until the operation is completed.

Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-25-2021, 02:00   #2099 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Restoring Huawei OEM info is easy with Hydra Tool

Restoring Huawei OEM info is easy with Hydra Tool

1. Run Hydra MTK Module,
2. Select Brand and Model
3. Go to Service-->Tools-->Huawei
4. Choose "Restore OEM Info" from Method / Option
5. Execute and connect the device to the computer
6. wait until the process is completed.

Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-25-2021, 02:11   #2100 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi Note 8 (Ginkgo) successfully flashed by Hydra Tool

Xiaomi Redmi Note 8 (Ginkgo) successfully flashed by Hydra Tool

1. Run Hydra Qualcomm Tool
2. Go to "Flash" Tab
3. Choose Flash file from "Image Path"
4. choose "Flash Mode"
5. Untick "Skip write security partition" if you do not want to write it.
6. Click on "Execute"
7. Connect Device with Computer using USB Data Cable
8. Wait until the flashing process is completed.
9. Done

Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 22:53.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.36253 seconds with 9 queries

SEO by vBSEO