![]() ![]() ![]() ![]() |
![]() |
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
![]() |
| LinkBack | Thread Tools | Display Modes |
![]() | #1756 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 713 | Xiaomi Redmi note 8 Fastboot Format Userdata ![]() Code: Windows Access Right Admin Software Run As Admnistrator ******* Dongle Info ******* Version : Hydra Tool v 1.2 Serial : 000000000000 Initialize : OKAY Status : Activated Life : 0 [0-0-0-0-0] Searching Device By Fastboot Device Found... Fastboot Factory Reset... Fastboot Format Userdata.... Processing... Action Result : Ok Elapsed Time : 00:00:00 |
![]() |
The Following User Says Thank You to Gsm-Ahmed For This Useful Post: |
![]() | #1757 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 713 | Xiaomi Redmi Note 8 Flash Fastboot Done Xiaomi Redmi Note 8 Flash Fastboot Done ![]() Code: Searching Device By Fastboot Device Found... Reading Information...getvar:version FAILED (remote: GetVar Variable Not found) Product : ginkgo version : getvar:version FAILED (remote: GetVar Variable Not found) Secure : yes Device Info: Verity mode: true Device unlocked: true Device critical unlocked: true Charger screen enabled: true -------------------------- Fastboot Flashing... -qupfw(qupv3fw.elf) Ok -qupfwbak(qupv3fw.elf) Ok -vbmeta(vbmeta.img) Ok -vbmetabak(vbmeta.img) Ok -xbl_config(xbl_config.elf) Ok -xbl_configbak(xbl_config.elf) Ok -devcfg(devcfg.mbn) Ok -devcfgbak(devcfg.mbn) Ok -storsec(storsec.mbn) Ok -rpm(rpm.mbn) Ok -rpmbak(rpm.mbn) Ok -hyp(hyp.mbn) Ok -hypbak(hyp.mbn) Ok -keymaster(km4.mbn) Ok -keymasterbak(km4.mbn) Ok -cmnlib(cmnlib.mbn) Ok -cmnlib64(cmnlib64.mbn) Ok -cmnlibbak(cmnlib.mbn) Ok -cmnlib64bak(cmnlib64.mbn) Ok -abl(abl.elf) Ok -ablbak(abl.elf) Ok -bluetooth(BTFM.bin) Ok -bluetoothbak(BTFM.bin) Ok -imagefv(imagefv.elf) Ok -imagefvbak(imagefv.elf) Ok -uefisecapp(uefi_sec.mbn) Ok -uefisecappbak(uefi_sec.mbn) Ok -xbl(xbl.elf) Ok -xblbak(xbl.elf) Ok -tz(tz.mbn) Ok -tzbak(tz.mbn) Ok -logfs(logfs_ufs_8mb.bin) Ok -metadata(metadata.img) Ok -dtbo(dtbo.img) Ok -dtbobak(dtbo.img) Ok -dsp(dspso.bin) Ok -dspbak(dspso.bin) Ok -persist(persist.img) Skipped -boot(boot.img) Ok -bootbak(boot.img) Ok -recovery(recovery.img) Ok -modem(NON-HLOS.bin) Ok -modembak(NON-HLOS.bin) Ok -cache(cache.img) Ok -cust(cust.img) Ok -vendor(vendor.img) Ok -system(system.img) Ok -userdata(userdata.img) Ok All Done -------------------------- Elapsed Time : 00:04:36 |
![]() |
The Following User Says Thank You to Gsm-Ahmed For This Useful Post: |
![]() | #1758 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 713 | STREAM HT16 Ultra Power Option STREAM HT16 Ultra Power Option ![]() Code: Brand : STREAM Model : HT16 Connection : Flash Mode ===================================== Connection -Please wait... -Connect Phone... -Found... -PreLoader...[COM4] TPortConnection.Create...(COM4)..Opening...Ok Handshaking...Ok Identifying Hardware ID..... BROM CPUID : 6580 (0000)MT6580[6580] BROM HW_SW_VER : 8A00 CA00 0000 0000 Handshaking... Identifying Hardware ID..... BROM CPUID : 6580 (0000)MT6580[6580] BROM HW_SW_VER : 8A00 CA00 0000 0000 FUSEID : 00001002 FUSEID : 00001002 SECURE VERSION : 00 BL VERSION : 00 BR Secured : 00 NORMAL BOOT Preparing Download Agent.. DA : [Not Exist] Trying Default 6580.bin Agent: MTK_DOWNLOAD_AGENT -HYDRA Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898 Init : Loader [1] Sending : Accepted Identifying Protocol... Protocol : Old - eMMC 0000000000000000000000000000 PRMMCCID : 7001005432323730380116974AEDA5AF Init Configuration Running DA 4.2 on BBID : 0x9C Ok Initializing Loader [2] Sending Loader [2] Accepted Reading Flashchip data.... eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000000400000 -4 MB eMMC USER : 0x00000001C8000000 -7,125 GB ERAM Size : 0x0000000040000000 -1024 MB IRAM Size : 0x0000000000020000 -128 KB UNICAL RID : BF170135A8CBA8691A29ACA5DF1A9C78 eMMC CID : 540001703037323297160138AFA5ED4A Change to HIGH SPEED... 5A Connection -Please wait... -Found...[COM5] Reading Partition Table SIZE[0x00000948] 27 Items > Done Reading System Info Brand : STREAM Vendor : STREAM Model : HT16 ID : O11019 SDK : 27 Release : 8.1.0 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : fr-FR Description : full_k80_bsp-user 8.1.0 O11019 1545741812 release-keys Device : HT16 Security Patch : 2018-12-05 Fingerprint : STREAM/HT16/HT16:8.1.0/O11019/1545741812:user/release-keys StorageType : mtp Userdata State : Not Encrypted Autobackup Partitions -preloader[0x00000000] 512 KB -> preloader.bin...Ok -> Renaming Preloader.... preloader_k80_bsp.bin Creating Scatter file... C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\STREAM_HT16_6580--8.1.0__210421160821\MT6580_Android_scatter.txt -nvram[0x00380000] 5 MB -> nvram.bin...Ok -frp[0x1F800000] 1024 KB -> frp.bin...Ok -nvdata[0x20300000] 32 MB -> nvdata.bin...Ok Done!!! C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\STREAM_HT16_6580--8.1.0__210421160821 MTK Phone Loader is NOW RUNNING. Reading System Info Brand : STREAM Vendor : STREAM Model : HT16 ID : O11019 SDK : 27 Release : 8.1.0 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : fr-FR Description : full_k80_bsp-user 8.1.0 O11019 1545741812 release-keys Device : HT16 Security Patch : 2018-12-05 Fingerprint : STREAM/HT16/HT16:8.1.0/O11019/1545741812:user/release-keys StorageType : mtp Userdata State : Not Encrypted ------------------------------------- Operation : Auto Processing... ZeroWipe FRP Partition... [Ok] Formatting Userdata... Ok Rebooting Device [Reboot To Normal] Reboot Done!! TPortConnection.Destroy.....Closing...Ok.. Elapsed Time : 00:01:09 |
![]() |
The Following User Says Thank You to Gsm-Ahmed For This Useful Post: |
![]() | #1759 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 713 | Xiaomi Redmi 9 FRP Remove Xiaomi Redmi 9 FRP Remove ![]() Code: ===================================== Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port (COM38) SymbolicName :\??\USB#VID_0E8D&PID_0003#6&944c330&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Handshaking...Ok Identifying Hardware ID..... BROM CPUID : 0707MT6768[6768] BROM HW_SW_VER : 8A00 CA00 0000 0000 getMTKPayloadExploit : 0707 #Executing Exploit.. #SUCCESS.. Handshaking...Ok Identifying Hardware ID..... BROM CPUID : 0707MT6768[6768] BROM HW_SW_VER : 8A00 CA00 0000 0000 FUSEID : 00000000 SECURE VERSION : 05 BL VERSION : FE BR Secured : E0 Preparing Download Agent.. DA : MT6768_Xiaomi_New.bin Agent: MTK_DOWNLOAD_AGENT -HYDRA Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994 Init : Loader [1] Sending : Accepted Identifying Protocol... Protocol : New Synchronization...SYNC Mode : brom Preloader Initialization... Parsing preloader_lancelot.bin Init : Accepted Execute Secondary Loader Init : Loader [2] Executing : SYNC Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : 3C95DA307E901455A3BF665ED4939262 ERAM Size : 0x0000000000070000 -448 KB IRAM Size : 0x0000000100000000 -4 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000000400000 -4 MB eMMC USER : 0x0000000747C00000 -29,121 GB eMMC CID : 150100444436384D420991F9F4FA67D5 - DD68MB DA Speed : high-speed Reading GPT-EMMC [0x00008000] 130 Items Autobackup Partitions -preloader[0x00000000]512 KB ->preloader.bin...Ok -> Renaming Preloader.... preloader_lancelot.bin Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__042421150927\MT6768_Android_scatter.txt -pgpt[0x00000000]32 KB ->pgpt.bin...Ok -frp[0x05508000]1024 KB ->frp.bin...Ok -nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok -persist[0x104A2000]48 MB ->persist.bin...Ok -nvram[0x19F80000]64 MB ->nvram.bin...Ok Done!!! C:\Hydra Tool\\Backup\Auto\0707__042421150927 MTK Phone Loader is NOW RUNNING. Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : 3C95DA307E901455A3BF665ED4939262 ERAM Size : 0x0000000000070000 -448 KB IRAM Size : 0x0000000100000000 -4 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000000400000 -4 MB eMMC USER : 0x0000000747C00000 -29,121 GB eMMC CID : 150100444436384D420991F9F4FA67D5 - DD68MB Reading GPT-EMMC [0x00008000] 130 Items ------------------------------------- Operation : Auto Processing... ZeroWipe FRP Partition... Ok Rebooting Device [Reboot To Normal] Reboot Done!! Elapsed Time : 00:01:12 |
![]() |
The Following User Says Thank You to Gsm-Ahmed For This Useful Post: |
![]() | #1760 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Jun 2016 Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490 Status: Offline Sonork: live:.cid.32a2af136177ed3 Thanks Meter: 232 ![]() | ![]() LOAD****************************/file/cd2iv6cnqno5ms7/prog_emmc_firehose_8909_ddr.rar/fileER LINK ![]() https://i.postimg.cc/SKdyjHZR/Screen...021-144222.jpg |
![]() |
The Following User Says Thank You to HASIM MOBILE For This Useful Post: |
![]() | #1761 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Jan 2020 Location: Algeria
Posts: 847
Member: 2944109 Status: Offline Thanks Meter: 713 | Alcatel OT-5010U (Pixi 4-5) FRP Remove Alcatel OT-5010U (Pixi 4-5) FRP Remove ![]() Code: Brand : ALCATEL [TCL] Model : OT-5010U (Pixi 4-5) Connection : Flash Mode ===================================== Connection -Please wait... -Connect Phone... -Found... -PreLoader...[COM4] TPortConnection.Create...(COM4)..Opening...Ok Handshaking...Ok Identifying Hardware ID..... BROM CPUID : 6580 (0000)MT6580[6580] BROM HW_SW_VER : 8A00 CA00 0000 0000 Handshaking... Identifying Hardware ID..... BROM CPUID : 6580 (0000)MT6580[6580] BROM HW_SW_VER : 8A00 CA00 0000 0000 FUSEID : 00000000 FUSEID : 00000000 SECURE VERSION : FF BL VERSION : 01 BR Secured : 00 Preparing Download Agent.. DA : [Not Exist] Trying Default 6580.bin Agent: MTK_DOWNLOAD_AGENT -HYDRA Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898 Init : Loader [1] Sending : Accepted Identifying Protocol... Protocol : Old - eMMC 0000000000000000000000000000 PRMMCCID : 150100463732324D420044E190E053E1 Init Configuration Running DA 4.2 on BBID : 0x9C Ok Initializing Loader [2] Sending Loader [2] Accepted Reading Flashchip data.... eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000000080000 -512 KB eMMC USER : 0x00000001D2000000 -7,281 GB ERAM Size : 0x0000000040000000 -1024 MB IRAM Size : 0x0000000000020000 -128 KB UNICAL RID : 0CF6ED128C6A579F4D2A93BFB069503F eMMC CID : 460001154D323237E1440042E153E090 Change to HIGH SPEED... 5A Connection -Please wait... -Found...[COM5] Reading Partition Table SIZE[0x000007E8] 23 Items > Done Reading System Info Autobackup Partitions -preloader[0x00000000] 512 KB -> preloader.bin...Ok -> Renaming Preloader.... preloader_pixi4_5.bin Creating Scatter file... C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\__6580--__250421101114\MT6580_Android_scatter.txt -nvram[0x00E80000] 5 MB -> nvram.bin...Ok -frp[0x09000000] 8 MB -> frp.bin...Ok -nvdata[0x09800000] 32 MB -> nvdata.bin...Ok Done!!! C:\Hydra 1.0.2.60\Hydra Tool\\Backup\Auto\__6580--__250421101114 MTK Phone Loader is NOW RUNNING. Reading System Info ------------------------------------- Operation : Auto Processing... ZeroWipe FRP Partition... [Ok] Ok Rebooting Device [Reboot To Normal] Reboot Done!! TPortConnection.Destroy.....Closing...Ok.. Elapsed Time : 00:00:33 |
![]() |
The Following User Says Thank You to Gsm-Ahmed For This Useful Post: |
![]() | #1762 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,626 | ]Huawei FRL-L22 (Y9A 2021) Restoring OEM infor successfully done by Hydra Tool Huawei FRL-L22 (Y9A 2021) Restoring OEM infor successfully done by Hydra Tool 1. Run MTK Module 2. Ch00se Brand and Module 3. Go to Services--> Huawei 4. Choose "Restore OEM Info" from Method / Option 5. Execute 6. Connect device to the computer with USB Data Cable 7. Wait until the operation is completed. Screen Short: ![]() Logs: Quote:
Dipendra Pathak | |
![]() |
![]() | #1763 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,626 | Cherry Flare S8 Factory Reset Protection Successfully removed by Hydra Tool Cherry Flare S8 Factory Reset Protection Successfully removed by Hydra Tool 1. Run MTK module 2. Go to "Service"--> "Factory Reset Protection (FRP)" 3. Choose "Auto" from Method / Option 4. Click "Execute" 5. Connect device with computer with USB data cable. 6. Wait until the operation is completed. Screen Short: ![]() Logs: Quote:
Dipendra Pathak | |
![]() |
![]() | #1764 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,626 | Oppo F3 (CPH 1609) Safe format universal done by Hydra Tool Oppo F3 (CPH 1609) Safe format universal done by Hydra Tool 1. Run MTK module 2. Go to "Service"--> "Factory Reset (FRP) / Format User Data" 3. Choose "Auto" from Method / Option 4. Click "Execute" 5. Connect device with computer with USB data cable. 6. Wait until the operation is completed. Screen Short: ![]() Logs: Quote:
Dipendra Pathak | |
![]() |
![]() | #1765 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,626 | Xiaomi Redmi 9C Angelica FRP and Mi account successfully removed by Hydra Tool Xiaomi Redmi 9C Angelica FRP and Mi account successfully removed by Hydra Tool 1. Run Hydra MTK Module, Select Brand and Model 2. Go to Service-->Tools-->Xiaoami 3. Choose "Remove Mi Account Plus FRP" from Method / Option 4. Execute and connect the device to the computer with data cable 5. wait until the process is completed. Note: Only in MTK devices, Android above 8, need to install VPN software before you connect wify. But, no need VPS software in Qualcomm module even highest miui vesion ie. 12.xx.xx. No need server! No need Credit! No need yearly activation! No need any extra cost ![]() Screen Short: ![]() Logs: Quote:
Dipendra Pathak | |
![]() |
![]() | #1766 (permalink) |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,626 | Huawei MED-LX9 (Y6P 2020) restoring OEM Info successfully done by Hydra Tool Huawei MED-LX9 (Y6P 2020) restoring OEM Info successfully done by Hydra Tool 1. Run MTK Module 2. Ch00se Brand and Module 3. Go to Services--> Huawei 4. Choose "Restore OEM Info" from Method / Option 5. Execute 6. Connect device to the computer with USB Data Cable 7. Wait until the operation is completed. Screen Short: ![]() Logs: [QUOTE]===================================== Searching for MTK Device...Found Port Identification :Flashmode BROM FriendlyName :MediaTek USB Port_V1633 (COM4) SymbolicName :\??\USB#VID_0E8D&PID_0003#5&27926011&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed} Driver Ver :01/22/2015,3.0.1504.0 Handshaking...Ok Identifying Hardware ID..... BROM CPUID : 0766MT6765[6765] BROM HW_SW_VER : 8A00 CA00 0000 0000 FUSEID : 00000000 SECURE VERSION : 05 BL VERSION : FE BR Secured : E5[SBC+SDA+SEL] Security Authorization.... Sending[Huawei_Y6P_auth_sv5.auth] Accepted Preparing Download Agent.. DA : MT6765_Huawei_MED.bin Agent: MTK_DOWNLOAD_AGENT -HYDRA Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898 Init : Loader [1] Sending : Accepted Identifying Protocol... Protocol : New Synchronization...[ERROR]- NOT SYNC ============================================= Reasons why it fails due to the following" 1. Harware problem/issues 2. If you did Testpoint Kindly check the parts you Touch/TP 3. Powershortage, try to connect Battery 4. Check or replace usb cable and plug directly to your pc usb port. ============================================= SYNC Mode : brom Preloader Initialization... Parsing preloader_k62v1_64_mexico.bin Init : Accepted Execute Secondary Loader Init : Loader [2] Executing : SYNC Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : 718407BD0C9399FDEA46AFC851DCEC72 ERAM Size : 0x0000000000080000 -512 KB IRAM Size : 0x0000000100000000 -4 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000001000000 -16 MB eMMC USER : 0x0000000E8F800000 -58.242 GB eMMC CID : 90014A68433961503301001E562B974D - hC9aP3 DA Speed : high-speed Reading GPT-EMMC [0x00008000] 130 Items Autobackup Partitions -preloader[0x00000000]512 KB ->preloader.bin...Ok -> Renaming Preloader.... preloader_k62v1_64_mex_a32.bin Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__042521161917\MT6765_Androi d_scatter.txt -pgpt[0x00000000]32 KB ->pgpt.bin...Ok -frp[0x00108000]1024 KB ->frp.bin...Ok -nvdata[0x00A08000]16 MB ->nvdata.bin...Ok -persist[0x03800000]8 MB ->persist.bin...Ok -nvram[0x04400000]5 MB ->nvram.bin...Ok -oeminfo[0x04900000]32 MB ->oeminfo.bin...Ok Done!!! C:\Hydra Tool\\Backup\Auto\0766__042521161917 MTK Phone Loader is NOW RUNNING. Reading Device UniqueID, RAM and Flash Chip Info... UNIQUE ID : 718407BD0C9399FDEA46AFC851DCEC72 ERAM Size : 0x0000000000080000 -512 KB IRAM Size : 0x0000000100000000 -4 GB eMMC BOOT1 : 0x0000000000400000 -4 MB eMMC BOOT2 : 0x0000000000400000 -4 MB eMMC RPMB : 0x0000000001000000 -16 MB eMMC USER : 0x0000000E8F800000 -58.242 GB eMMC CID : 90014A68433961503301001E562B974D - hC9aP3 Reading GPT-EMMC [0x00008000] 130 Items ------------------------------------- Operation : Restore OEM Info Processing... Ok Elapsed Time : 00:01:45/QUOTE]BR Dipendra Pathak |
![]() |
![]() | #1767 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,626 | Huawei DRA-LX5 (Y5 Lite 2018) Zero wipe FRP partitiion removed by Hydra Tool Huawei DRA-LX5 (Y5 Lite 2018) Zero wipe FRP partitiion removed by Hydra Tool 1. Run MTK Module 2. Ch00se Brand and Module 3. Go to Services--> Factory Reset Protection 4. Choose "Auto" from Method / Option 5. Execute 6. Connect device to the computer with USB Data Cable 7. Wait until the operation is completed. Screen Short: ![]() Logs: Quote:
Dipendra Pathak | |
![]() |
![]() | #1768 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,626 | Oppo A12 CH 2083 formatting user data successfully done by Hydra Tool Oppo A12 CH 2083 formatting user data successfully done by Hydra Tool 1. Run MTK module 2. Go to "Service"--> "Factory Reset/ Format User Data" 3. Choose "Erase User Data" from Method / Option 4. Click "Execute" 5. Connect device with computer with USB data cable. 6. Wait until the operation is completed. Screen Short: ![]() Logs: Quote:
Dipendra Pathak | |
![]() |
![]() | #1769 (permalink) | |
Product Manager ![]() ![]() ![]() ![]() ![]() Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,626 | Oppo A37m (Neo 9) Reading Pattern Code successfully read by Hydra Tool Oppo A37m (Neo 9) Reading Pattern Code successfully read by Hydra Tool 1. Run MTK module 2. Go to "Service"--> "Screen Lock Security" 3. Choose "Read Pattern" from Method / Option 4. Click "Execute" 5. Connect device with computer with USB data cable. 6. Wait until the operation is completed. Screen Short: ![]() Logs: Quote:
Dipendra Pathak | |
![]() |
![]() | #1770 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Jun 2016 Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490 Status: Offline Sonork: live:.cid.32a2af136177ed3 Thanks Meter: 232 ![]() | ![]() ![]() Redmi Go (Xiaomi) PATERN FRP successfully Removed by Hydra Tool |
![]() |
![]() |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|