GSM Shop  
GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 04-25-2021, 09:24   #1756 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 847
Member: 2944109
Status: Offline
Thanks Meter: 713
Xiaomi Redmi note 8 Fastboot Format Userdata


Xiaomi Redmi note 8 Fastboot Format Userdata



Code:
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial     : 000000000000
Initialize : OKAY
Status     : Activated
Life       : 0 [0-0-0-0-0]

Searching Device By Fastboot
Device Found...
Fastboot Factory Reset...
Fastboot Format Userdata....
Processing... 
Action Result : Ok

Elapsed Time : 00:00:00
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 04-25-2021, 09:26   #1757 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 847
Member: 2944109
Status: Offline
Thanks Meter: 713
Xiaomi Redmi Note 8 Flash Fastboot Done

Xiaomi Redmi Note 8 Flash Fastboot Done




Code:
Searching Device By Fastboot
Device Found...

Reading Information...getvar:version FAILED (remote: GetVar Variable Not found)
Product    : ginkgo
version    : getvar:version FAILED (remote: GetVar Variable Not found)
Secure     : yes
Device Info: 
    Verity mode: true
    Device unlocked: true
    Device critical unlocked: true
    Charger screen enabled: true
--------------------------
Fastboot Flashing...
 -qupfw(qupv3fw.elf) Ok
 -qupfwbak(qupv3fw.elf) Ok
 -vbmeta(vbmeta.img) Ok
 -vbmetabak(vbmeta.img) Ok
 -xbl_config(xbl_config.elf) Ok
 -xbl_configbak(xbl_config.elf) Ok
 -devcfg(devcfg.mbn) Ok
 -devcfgbak(devcfg.mbn) Ok
 -storsec(storsec.mbn) Ok
 -rpm(rpm.mbn) Ok
 -rpmbak(rpm.mbn) Ok
 -hyp(hyp.mbn) Ok
 -hypbak(hyp.mbn) Ok
 -keymaster(km4.mbn) Ok
 -keymasterbak(km4.mbn) Ok
 -cmnlib(cmnlib.mbn) Ok
 -cmnlib64(cmnlib64.mbn) Ok
 -cmnlibbak(cmnlib.mbn) Ok
 -cmnlib64bak(cmnlib64.mbn) Ok
 -abl(abl.elf) Ok
 -ablbak(abl.elf) Ok
 -bluetooth(BTFM.bin) Ok
 -bluetoothbak(BTFM.bin) Ok
 -imagefv(imagefv.elf) Ok
 -imagefvbak(imagefv.elf) Ok
 -uefisecapp(uefi_sec.mbn) Ok
 -uefisecappbak(uefi_sec.mbn) Ok
 -xbl(xbl.elf) Ok
 -xblbak(xbl.elf) Ok
 -tz(tz.mbn) Ok
 -tzbak(tz.mbn) Ok
 -logfs(logfs_ufs_8mb.bin) Ok
 -metadata(metadata.img) Ok
 -dtbo(dtbo.img) Ok
 -dtbobak(dtbo.img) Ok
 -dsp(dspso.bin) Ok
 -dspbak(dspso.bin) Ok
 -persist(persist.img) Skipped
 -boot(boot.img) Ok
 -bootbak(boot.img) Ok
 -recovery(recovery.img) Ok
 -modem(NON-HLOS.bin) Ok
 -modembak(NON-HLOS.bin) Ok
 -cache(cache.img) Ok
 -cust(cust.img) Ok
 -vendor(vendor.img) Ok
 -system(system.img) Ok
 -userdata(userdata.img) Ok
All Done
--------------------------

Elapsed Time : 00:04:36
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 04-25-2021, 09:27   #1758 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 847
Member: 2944109
Status: Offline
Thanks Meter: 713
STREAM HT16 Ultra Power Option

STREAM HT16 Ultra Power Option




Code:
Brand : STREAM Model : HT16 Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM4]

TPortConnection.Create...(COM4)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 6580 (0000)MT6580[6580]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 6580 (0000)MT6580[6580]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00001002
 FUSEID         : 00001002
 SECURE VERSION : 00 
 BL VERSION     : 00 
 BR Secured     : 00
NORMAL BOOT

Preparing Download Agent..
 DA   :  [Not Exist]
Trying Default 6580.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID   : 7001005432323730380116974AEDA5AF
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000001C8000000 -7,125 GB
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : BF170135A8CBA8691A29ACA5DF1A9C78
eMMC CID   : 540001703037323297160138AFA5ED4A
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM5]


Reading Partition Table
SIZE[0x00000948] 27 Items > Done

Reading System Info
  Brand          : STREAM
  Vendor         : STREAM
  Model          : HT16
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_k80_bsp-user 8.1.0 O11019 1545741812 release-keys
  Device         : HT16
  Security Patch : 2018-12-05
  Fingerprint    : STREAM/HT16/HT16:8.1.0/O11019/1545741812:user/release-keys
  StorageType    : mtp
  Userdata State : Not Encrypted

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_k80_bsp.bin
   Creating Scatter file... C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\STREAM_HT16_6580--8.1.0__210421160821\MT6580_Android_scatter.txt
 -nvram[0x00380000] 5 MB -> nvram.bin...Ok
 -frp[0x1F800000] 1024 KB -> frp.bin...Ok
 -nvdata[0x20300000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\STREAM_HT16_6580--8.1.0__210421160821
MTK Phone Loader is NOW RUNNING.


Reading System Info
  Brand          : STREAM
  Vendor         : STREAM
  Model          : HT16
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_k80_bsp-user 8.1.0 O11019 1545741812 release-keys
  Device         : HT16
  Security Patch : 2018-12-05
  Fingerprint    : STREAM/HT16/HT16:8.1.0/O11019/1545741812:user/release-keys
  StorageType    : mtp
  Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Formatting Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:09
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 04-25-2021, 09:28   #1759 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 847
Member: 2944109
Status: Offline
Thanks Meter: 713
Xiaomi Redmi 9 FRP Remove

Xiaomi Redmi 9 FRP Remove




Code:
=====================================
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM38)
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&944c330&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0707MT6768[6768]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 getMTKPayloadExploit : 0707
 #Executing Exploit..
 #SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 0707MT6768[6768]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 SECURE VERSION : 05 
 BL VERSION     : FE 
 BR Secured     : E0

Preparing Download Agent..
 DA   : MT6768_Xiaomi_New.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing preloader_lancelot.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 3C95DA307E901455A3BF665ED4939262
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29,121 GB
 eMMC CID   : 150100444436384D420991F9F4FA67D5 - DD68MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_lancelot.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__042421150927\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__042421150927
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 3C95DA307E901455A3BF665ED4939262
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29,121 GB
 eMMC CID   : 150100444436384D420991F9F4FA67D5 - DD68MB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:12
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 04-25-2021, 10:20   #1760 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 232
Donate money to this user
Arrow Jio Phone Flash Loader Error Problem Solved HYDRA TOOL

LOAD****************************/file/cd2iv6cnqno5ms7/prog_emmc_firehose_8909_ddr.rar/fileER LINK

https://i.postimg.cc/SKdyjHZR/Screen...021-144222.jpg
  Reply With Quote
The Following User Says Thank You to HASIM MOBILE For This Useful Post:
Old 04-25-2021, 10:27   #1761 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 847
Member: 2944109
Status: Offline
Thanks Meter: 713
Alcatel OT-5010U (Pixi 4-5) FRP Remove

Alcatel OT-5010U (Pixi 4-5) FRP Remove




Code:
Brand : ALCATEL [TCL] Model : OT-5010U (Pixi 4-5) Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Connect Phone...
 -Found...
 -PreLoader...[COM4]

TPortConnection.Create...(COM4)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
 BROM CPUID     : 6580 (0000)MT6580[6580]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 

Handshaking...

Identifying Hardware ID.....
 BROM CPUID     : 6580 (0000)MT6580[6580]
 BROM HW_SW_VER : 8A00 CA00 0000 0000 
 FUSEID         : 00000000
 FUSEID         : 00000000
 SECURE VERSION : FF 
 BL VERSION     : 01 
 BR Secured     : 00

Preparing Download Agent..
 DA   : [Not Exist]
Trying Default 6580.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : Old - eMMC
0000000000000000000000000000
PRMMCCID   : 150100463732324D420044E190E053E1
Init Configuration
Running DA 4.2 on BBID : 0x9C Ok

Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000080000 -512 KB
eMMC USER  : 0x00000001D2000000 -7,281 GB
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 0CF6ED128C6A579F4D2A93BFB069503F
eMMC CID   : 460001154D323237E1440042E153E090
Change to HIGH SPEED...
5A
Connection
 -Please wait...
 -Found...[COM5]


Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info

Autobackup Partitions
 -preloader[0x00000000] 512 KB -> preloader.bin...Ok
   -> Renaming Preloader....  preloader_pixi4_5.bin
   Creating Scatter file... C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\__6580--__250421101114\MT6580_Android_scatter.txt
 -nvram[0x00E80000] 5 MB -> nvram.bin...Ok
 -frp[0x09000000] 8 MB -> frp.bin...Ok
 -nvdata[0x09800000] 32 MB -> nvdata.bin...Ok
Done!!!
C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\__6580--__250421101114
MTK Phone Loader is NOW RUNNING.


Reading System Info

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok] Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:33
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 04-26-2021, 03:41   #1762 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,626
]Huawei FRL-L22 (Y9A 2021) Restoring OEM infor successfully done by Hydra Tool

Huawei FRL-L22 (Y9A 2021) Restoring OEM infor successfully done by Hydra Tool

1. Run MTK Module
2. Ch00se Brand and Module
3. Go to Services--> Huawei
4. Choose "Restore OEM Info" from Method / Option
5. Execute
6. Connect device to the computer with USB Data Cable
7. Wait until the operation is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM9)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&215197d9&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 85405691F6B7A8B71DEEA2C4F8CA73D3
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 90014A684445615033011020A903778D - hDEaP3

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Restore OEM Info
Processing... Ok

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 04-26-2021, 03:48   #1763 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,626
Cherry Flare S8 Factory Reset Protection Successfully removed by Hydra Tool

Cherry Flare S8 Factory Reset Protection Successfully removed by Hydra Tool

1. Run MTK module
2. Go to "Service"--> "Factory Reset Protection (FRP)"
3. Choose "Auto" from Method / Option
4. Click "Execute"
5. Connect device with computer with USB data cable.
6. Wait until the operation is completed.

Screen Short:



Logs:

Quote:
Brand : CHERRY MOBILE Model : Flare S8 Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM (Android) (COM10)
SymbolicName :\??\USB#VID_0E8D&PID_2000#7&b3fd7d9&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0690MT6763T[6763]
BROM HW_SW_VER : 8A00 CA01 0001 0000
SECURE VERSION : 00
BL VERSION : 03
BR Secured : 00

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6763.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 3D4A31AB4931DBC1B706C8B1286C7837
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E020F4C414D44C7 - hB8aP>

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare S8
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_g1860ps_v2_gh_fng_g33scr_p-user 9 PPR1.180610.011 0710141239 release-keys
Device : X930
Display ID : Cherry_X930_Flare_S8_07102020_v1
Security Patch : 2020-07-05
FRPPST : /dev/block/platform/bootdevice/by-name/frp
Fingerprint : Cherry_Mobile/Flare_S8/X930:9/PPR1.180610.011/0710141239:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_g1860ps_v2_gh_fng_g33scr_p.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0690_Cherry_Mobile_Flare_S8_X930 _9_PPR1.180610.011_0710141239_042521143040\MT6763T _Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03588000]1024 KB ->frp.bin...Ok
-nvdata[0x05688000]64 MB ->nvdata.bin...Ok
-persist[0x0D000000]48 MB ->persist.bin...Ok
-nvram[0x17800000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0690_Cherry_Mobile_Flare_S8_X930 _9_PPR1.180610.011_0710141239_042521143040
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:44
BR
Dipendra Pathak

  Reply With Quote
Old 04-26-2021, 03:57   #1764 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,626
Oppo F3 (CPH 1609) Safe format universal done by Hydra Tool

Oppo F3 (CPH 1609) Safe format universal done by Hydra Tool

1. Run MTK module
2. Go to "Service"--> "Factory Reset (FRP) / Format User Data"
3. Choose "Auto" from Method / Option
4. Click "Execute"
5. Connect device with computer with USB data cable.
6. Wait until the operation is completed.


Screen Short:



Logs:

Quote:
==============================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM11)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&868c983&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0326MT6750T[6755]
BROM HW_SW_VER : 8A00 CB00 0001 0000
getMTKPayloadExploit : 0326
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0326MT6750T[6755]
BROM HW_SW_VER : 8A00 CB00 0001 0000
FUSEID : 41140000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : 00
NORMAL BOOT

Preparing Download Agent..
DA : 6755_SWSEC_D36514C0DE.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6750_16391.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 585E24139EAF4E8B44E099215AFDE024
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100524836344D4205AE1FC6513449 - RH64MB

DA Speed :
Change to HIGH SPEED...
Searching for MTK Device...Found
Port Identification A_HIGHSPEED_VCOM
FriendlyName :MediaTek DA USB VCOM (Android) (COM10)
SymbolicName :\??\USB#VID_0E8D&PID_2001#6&868c983&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : CPH1609
ID : MRA58K
SDK : 23
Release : 6.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6750_16391-user 6.0 MRA58K 1551111655 release-keys
Device : CPH1609
Board : full_oppo6750_16391
Display ID : CPH1609EX_11_A.25_190225
Security Patch : 2018-06-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6750_16391.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0326__042521164936\MT6750T_Andro id_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x06F88000]1024 KB ->frp.bin...Ok
-persist[0x07088000]48 MB ->persist.bin...Ok
-nvdata[0x0A088000]32 MB ->nvdata.bin...Ok
-nvram[0x12F00000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0326__042521164936
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 585E24139EAF4E8B44E099215AFDE024
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100524836344D4205AE1FC6513449 - RH64MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : CPH1609
ID : MRA58K
SDK : 23
Release : 6.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6750_16391-user 6.0 MRA58K 1551111655 release-keys
Device : CPH1609
Board : full_oppo6750_16391
Display ID : CPH1609EX_11_A.25_190225
Security Patch : 2018-06-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal... Ok

Elapsed Time : 00:00:44
BR
Dipendra Pathak

  Reply With Quote
Old 04-26-2021, 04:18   #1765 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,626
Xiaomi Redmi 9C Angelica FRP and Mi account successfully removed by Hydra Tool

Xiaomi Redmi 9C Angelica FRP and Mi account successfully removed by Hydra Tool

1. Run Hydra MTK Module, Select Brand and Model
2. Go to Service-->Tools-->Xiaoami
3. Choose "Remove Mi Account Plus FRP" from Method / Option
4. Execute and connect the device to the computer with data cable
5. wait until the process is completed.

Note: Only in MTK devices, Android above 8, need to install VPN software before you connect wify. But, no need VPS software in Qualcomm module even highest miui vesion ie. 12.xx.xx. No need server! No need Credit! No need yearly activation! No need any extra cost .


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM22)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&212ac8fc&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : A0ECCBD4778F20546CBD9D83D9C2EC6F
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 45010044413430363401ACD46A415745 - DA4064

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x47000000]48 MB ->persist.bin...Ok
-frp.bin[0x3BD88000]1024 KB ->frp.bin...Ok
__042521123254
Backing up Partition for safety...
-__042521123254[0x47000000]48 MB ->persist.img...OkOk
Saved to :
C:\Hydra Tool\Backup\Persist\__042521123254.bin
Erasing FRP Partition...
-persist.bin[0x47000000]48 MB ->persist.bin...Ok
-frp.bin[0x3BD88000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:00:30
BR
Dipendra Pathak

  Reply With Quote
Old 04-26-2021, 04:24   #1766 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,626
Huawei MED-LX9 (Y6P 2020) restoring OEM Info successfully done by Hydra Tool

Huawei MED-LX9 (Y6P 2020) restoring OEM Info successfully done by Hydra Tool

1. Run MTK Module
2. Ch00se Brand and Module
3. Go to Services--> Huawei
4. Choose "Restore OEM Info" from Method / Option
5. Execute
6. Connect device to the computer with USB Data Cable
7. Wait until the operation is completed.


Screen Short:



Logs:

[QUOTE]=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM4)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&27926011&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]

Security Authorization....
Sending[Huawei_Y6P_auth_sv5.auth] Accepted

Preparing Download Agent..
DA : MT6765_Huawei_MED.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k62v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 718407BD0C9399FDEA46AFC851DCEC72
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433961503301001E562B974D - hC9aP3

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_mex_a32.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__042521161917\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x00108000]1024 KB ->frp.bin...Ok
-nvdata[0x00A08000]16 MB ->nvdata.bin...Ok
-persist[0x03800000]8 MB ->persist.bin...Ok
-nvram[0x04400000]5 MB ->nvram.bin...Ok
-oeminfo[0x04900000]32 MB ->oeminfo.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__042521161917
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 718407BD0C9399FDEA46AFC851DCEC72
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433961503301001E562B974D - hC9aP3

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Restore OEM Info
Processing... Ok

Elapsed Time : 00:01:45/QUOTE]BR
Dipendra Pathak

  Reply With Quote
Old 04-26-2021, 04:31   #1767 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,626
Huawei DRA-LX5 (Y5 Lite 2018) Zero wipe FRP partitiion removed by Hydra Tool

Huawei DRA-LX5 (Y5 Lite 2018) Zero wipe FRP partitiion removed by Hydra Tool

1. Run MTK Module
2. Ch00se Brand and Module
3. Go to Services--> Factory Reset Protection
4. Choose "Auto" from Method / Option
5. Execute
6. Connect device to the computer with USB Data Cable
7. Wait until the operation is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM3)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&51239d9&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0699MT6739[6739]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0699
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0699MT6739[6739]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6739.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_Dura.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4BB9FC4B5F66E02711622581EC792A6D
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000040000000 -1024 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100464536324D42065A2B68F475F7 - FE62MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : HUAWEI
Vendor : HUAWEI
Model : DRA-LX5
ID : HUAWEIDRA-LX5
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : "DRA-LX5-user 8.1.0 HUAWEIDRA-LX5 1.0.0.121(C636) release-keys"
Device : HWDRA-MG
Board : DRA-LX5
Display ID : DRA-LX5 1.0.0.121(C636)
Security Patch : 2018-12-05
Fingerprint : HUAWEI/DRA-LX5/HWDRA-MG:8.1.0/HUAWEIDRA-LX5/1.0.0.121(C636):user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_dura.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0699_HUAWEI_DRA-LX5_HWDRA-MG_8.1.0_HUAWEIDRA-LX5_1.0.0.121(C636)_042521155909\MT6739_Android_sc atter.txt
-pgpt[0x00000000]512 KB ->pgpt.bin...Ok
-frp[0x01600000]1024 KB ->frp.bin...Ok
-nvdata[0x01F00000]32 MB ->nvdata.bin...Ok
-nvram[0x0F700000]5 MB ->nvram.bin...Ok
-oeminfo[0x10DE0000]8 MB ->oeminfo.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0699_HUAWEI_DRA-LX5_HWDRA-MG_8.1.0_HUAWEIDRA-LX5_1.0.0.121(C636)_042521155909
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4BB9FC4B5F66E02711622581EC792A6D
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000040000000 -1024 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100464536324D42065A2B68F475F7 - FE62MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : HUAWEI
Vendor : HUAWEI
Model : DRA-LX5
ID : HUAWEIDRA-LX5
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : "DRA-LX5-user 8.1.0 HUAWEIDRA-LX5 1.0.0.121(C636) release-keys"
Device : HWDRA-MG
Board : DRA-LX5
Display ID : DRA-LX5 1.0.0.121(C636)
Security Patch : 2018-12-05
Fingerprint : HUAWEI/DRA-LX5/HWDRA-MG:8.1.0/HUAWEIDRA-LX5/1.0.0.121(C636):user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Elapsed Time : 00:00:46
BR
Dipendra Pathak

  Reply With Quote
Old 04-26-2021, 04:39   #1768 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,626
Oppo A12 CH 2083 formatting user data successfully done by Hydra Tool

Oppo A12 CH 2083 formatting user data successfully done by Hydra Tool

1. Run MTK module
2. Go to "Service"--> "Factory Reset/ Format User Data"
3. Choose "Erase User Data" from Method / Option
4. Click "Execute"
5. Connect device with computer with USB data cable.
6. Wait until the operation is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM7)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&521a615&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6765_19451.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : C22860ED72C18704A8B6F5297E1A0F15
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E0342BB4E6C17CB - hB8aP>

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_19451-user 9 PPR1.180610.011 eng.root.20210118.235914 release-keys
Security Patch : 2021-01-05
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6765_19451.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__042521110011\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x0DE88000]1024 KB ->frp.bin...Ok
-nvdata[0x0FF88000]64 MB ->nvdata.bin...Ok
-persist[0x17800000]48 MB ->persist.bin...Ok
-nvram[0x23600000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__042521110011
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : C22860ED72C18704A8B6F5297E1A0F15
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E0342BB4E6C17CB - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_19451-user 9 PPR1.180610.011 eng.root.20210118.235914 release-keys
Security Patch : 2021-01-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Erase Userdata
Processing...
Formatting Userdata... Ok

Elapsed Time : 00:01:02
BR
Dipendra Pathak

  Reply With Quote
Old 04-26-2021, 04:46   #1769 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,626
Oppo A37m (Neo 9) Reading Pattern Code successfully read by Hydra Tool

Oppo A37m (Neo 9) Reading Pattern Code successfully read by Hydra Tool

1. Run MTK module
2. Go to "Service"--> "Screen Lock Security"
3. Choose "Read Pattern" from Method / Option
4. Click "Execute"
5. Connect device with computer with USB data cable.
6. Wait until the operation is completed.


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification A_HIGHSPEED_VCOM
FriendlyName :MediaTek DA USB VCOM (Android) (COM50)
SymbolicName :\??\USB#VID_0E8D&PID_2001#5&262ed807&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/03/2016,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B58455513AC932376B49CCCDC4E52789
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003AB400000 -14.676 GB
eMMC CID : 90014A484147346132A51664610464ED - HAG4a2

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A37m
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15127-user 5.1 LMY47I 1569840626 dev-keys
Device : A37
Board : full_oppo6750_15127
Display ID : A37m_11_A.31_190930
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : OPPO/A37m/A37:5.1/LMY47I/1520330081:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : . Found
Gesture Data : 4F49BACD2B760D8C07B704E2F6249B455606C8DE
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 124578
1 2 3
4 5 6
7 8 9

Ok

Elapsed Time : 00:00:06
BR
Dipendra Pathak

  Reply With Quote
Old 04-26-2021, 06:49   #1770 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 232
Donate money to this user
Arrow Redmi Go (Xiaomi) PATERN FRP successfully Removed by Hydra Tool


Redmi Go (Xiaomi) PATERN FRP successfully Removed by Hydra Tool
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 07:19.



Powered by Searchlight © 2025 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.44650 seconds with 9 queries

SEO by vBSEO