GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 04-30-2021, 03:50   #1801 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
FRP Remove using EMMC direct by Hydra Tool


FRP Remove using EMMC direct by Hydra Tool

1. Run Hydra Main Tool.
2. Choose EMMC Direct.
3. Dissemble device, connect with EMMC pin out to the computer.
4. Choose the PORT
5. Choose "Serice"--> "Factory Reset Protection"
6. Choose "Auto" from Method and Option.
7. Click on "Execute"
8. Wait until the process is completed.

Note: You can use any supported devices with this method.


Screen Short:



Logs:

Quote:
Cylinders : 3801
Tracks Per Cylinder : 255
Sectors Per Track : 63
Bytes Per Sector : 512
DriveSize : 31264289280- 29.117 GB
Total Disk Size : 31268536320- 29.121 GB

Reading partitions...(64- Items)
FRP Remove.Ok

Elapsed Time : 00:00:06
BR
Dipendra Pathak

  Reply With Quote
Old 04-30-2021, 03:52   #1802 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Safe Format user Data using EMMC Direct by Hydra Tool

Safe Format user Data using EMMC Direct by Hydra Tool

1. Run Hydra Main Tool.
2. Choose EMMC Direct.
3. Dissemble device, connect with EMMC pin out to the computer.
4. Choose the PORT
5. Choose "Serice"--> "Factory Reset Protection"
6. Choose "Auto" from Method and Option.
7. Click on "Execute"
8. Wait until the process is completed.

Note: You can use any supported devices with this method.




Logs:

Quote:
Cylinders : 1915
Tracks Per Cylinder : 255
Sectors Per Track : 63
Bytes Per Sector : 512
DriveSize : 15751411200- 14.67 GB
Total Disk Size : 15758000128- 14.676 GB

Reading partitions...(65- Items)
SafeFormatUserData. Ok

Elapsed Time : 00:00:02
BR
Dipendra Pathak

  Reply With Quote
Old 04-30-2021, 03:52   #1803 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Samsung GT-I9192 FRP removed using Hydra Main Tool

Samsung GT-I9192 FRP removed using Hydra Main Tool

1. Run Hydra Main Tool.
2. Choose SAMSUNG.
3. Choose "Service"--> "Factory Reset Protection (FRP)"
4. Choose "Auto" from Method and Option.
5. Connect Device with computer using USB Data Cable.
6. Click on "Execute"
7. Wait until the process is completed.

Note: You can use any supported devices with this method.


Screen Short:



Logs:

Quote:
Scanning port....
TPortConnection.Create...(COM5)..Opening...Ok
Device Mode : Download Mode
CPU : QUALCOMM
Factory Reset Protection
Removing...
Total Binary Size is 0.25MB
Initialize Phone : Ok
Partition Information Table(PIT)
- Backup
Backup PIT (COM_TAR2MSM8937) Ok
- Reading.. Ok
- Mapping..Ok
Remove FRP Successfully!!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:09
BR
Dipendra Pathak

  Reply With Quote
Old 04-30-2021, 03:54   #1804 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi Note 8 Pro Begonia Second IMEI repair Done by Hydra Tool

Xiaomi Redmi Note 8 Pro Begonia Second IMEI repair Done by Hydra Tool

1. Run Hydra MTK Tool.
2. Choose Brand and Module and SOCs.
3. Go to "Service" --> "Repair IMEI"
4. Tick "IMEI Changing is illigal.................."
5. Choose "Flash Mode"
6. Type Correct IMEI written in Battery housing of your cellphone.
7. Click on "Repair IMEI" button.
8. Connect device to the compute using Data Cable.
9. Wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
***IMEI REPAIR FUNCTION****
Xiaomi Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM3)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&38676c5c&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0813MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0813
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0813MT6785[6785]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : Xiaomi_RedmiNote8Pro_6785.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2019/12/14.17:56_491164
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_begonia.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6A64CA3A43D0AEDC5B7361A1F073C73A
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : ,?MT128GASAO4U21
UFS UNIQID : 191f86606683ef122000000000000000

DA Speed : high-speed

Reading GPT-UFS [0x00008000] 130 Items

Reading System Info
Brand : Redmi
Vendor : Xiaomi
Model : Redmi Note 8 Pro
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 9 PPR1.180610.011 V11.0.7.0.PGGMIXM release-keys
Miui Ver : V11
Device : begonia
Mod_device : begonia_global
Display ID : PPR1.180610.011
Security Patch : 2020-04-01
Fingerprint : Redmi/begonia/begonia:9/PPR1.180610.011/V11.0.7.0.PGGMIXM:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_begonia.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0813_Redmi_begonia_begonia_9_PPR 1.180610.011_V11.0.7.0.PGGMIXM_042821052445\MT6785 _Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05888000]1024 KB ->frp.bin...Ok
-nvdata[0x08188000]64 MB ->nvdata.bin...Ok
-persist[0x0E188000]70.469 MB ->persist.bin...Ok
-nvram[0x17580000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0813_Redmi_begonia_begonia_9_PPR 1.180610.011_V11.0.7.0.PGGMIXM_042821052445
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6A64CA3A43D0AEDC5B7361A1F073C73A
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : ,?MT128GASAO4U21
UFS UNIQID : 191f86606683ef122000000000000000

Reading GPT-UFS [0x00008000] 130 Items


Reading System Info
Brand : Redmi
Vendor : Xiaomi
Model : Redmi Note 8 Pro
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 9 PPR1.180610.011 V11.0.7.0.PGGMIXM release-keys
Miui Ver : V11
Device : begonia
Mod_device : begonia_global
Display ID : PPR1.180610.011
Security Patch : 2020-04-01
Fingerprint : Redmi/begonia/begonia:9/PPR1.180610.011/V11.0.7.0.PGGMIXM:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted
IMEI INFO..
IMEI1 : *************63
IMEI2 : *************71
ERROR : CMD=07000400, ACK : 0x00200000[]
IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : **************15

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:43
BR
Dipendra Pathak

  Reply With Quote
Old 04-30-2021, 04:10   #1805 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Mi Play Lotus Mi Account removed using Erase Method By Hydra Tool

Xiaomi Mi Play Lotus Mi Account removed using Erase Method By Hydra Tool

1. Run Hydra MTK Module, Select Brand and Model
2. Go to Service-->Tools-->Xiaoami
3. Choose "Remove Mi Account Erased Method" from Method / Option
4. Execute and connect the device to the computer with data cable
5. wait until the process is completed.

Note: Only in MTK devices, Android above 8, need to install VPN software before you connect wify. But, no need VPS software in Qualcomm module even highest miui vesion ie. 12.xx.xx. No need server! No need Credit! No need yearly activation! No need any extra cost .




Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM108)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&2651f059&0&7#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 78C4B026A6E606E40CE4771ABE820584
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 13014E53304A3942371006056015856F - S0J9B7

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cereus-user 9 PPR1.180610.011 V11.0.4.0.PCGCNXM release-keys
Miui Ver : V11
Device : cereus
Display ID : SW_S98507AE1_V009_M13_XM_C3D_USR
Security Patch : 2020-03-01
Fingerprint : xiaomi/cereus/cereus:9/PPR1.180610.011/V11.0.4.0.PCGCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:00:16
BR
Dipendra Pathak

  Reply With Quote
Old 04-30-2021, 04:15   #1806 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Poco M2 (Shiva) Mi Account removed using Patched Method by Hydra Tool

Xiaomi Poco M2 (Shiva) Mi Account removed using Patched Method by Hydra Tool

1. Run Hydra MTK Module, Select Brand and Model
2. Go to Service-->Tools-->Xiaoami
3. Choose "Remove Mi Account Patched Method" from Method / Option
4. Execute and connect the device to the computer with data cable
5. wait until the process is completed.

Note: Only in MTK devices, Android above 8, need to install VPN software before you connect wify. But, no need VPS software in Qualcomm module even highest miui vesion ie. 12.xx.xx. No need server! No need Credit! No need yearly activation! No need any extra cost .


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM45)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_shiva.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D837F65333A085FEBFB3D76CB8CC5301
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100335036434D42031BFCE40B6709 - 3P6CMB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_shiva.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__042821081937\MT6768_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__042821081937
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D837F65333A085FEBFB3D76CB8CC5301
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100335036434D42031BFCE40B6709 - 3P6CMB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Patch Method]
Processing...
-persist.bin[0x104A2000]48 MB ->persist.bin...Ok
-frp.bin[0x05508000]1024 KB ->frp.bin...Ok

Scanning Patching address...Please wait...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
Total Items patched : 2
Successfully patched address..
C:\Hydra Tool\Backup\Xiaomi_Account\_042821082013\persist.b in.patch Ok

Elapsed Time : 00:01:43
BR
Dipendra Pathak

  Reply With Quote
Old 04-30-2021, 04:23   #1807 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 6A Cactus erasing FRP Partition successfully done by Hydra Tool

Xiaomi Redmi 6A Cactus erasing FRP Partition successfully done by Hydra Tool

1. Run Hydra MTK Module, Select Brand and Model
2. Go to Service-->Service-->Tools
3. Choose "Factory Reset Protection (FRP)"
4. Choose "Format / Erase" from Method / Option
5. Execute and connect the device to the computer with data cable
6. wait until the process is completed.


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM52)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&201b4142&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 181AF14853847B1669D17AA6820F27E9
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203B30D9A54B59B - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 8.1.0 O11019 V9.6.11.0.OCBCNFD release-keys
Miui Ver : V9
Device : cactus
Display ID : O11019
Security Patch : 2018-07-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V9.6.11.0.OCBCNFD:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Format/Erase
Processing...
Erasing FRP Partition... Ok

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 04-30-2021, 18:23   #1808 (permalink)
No Life Poster
 
malka4u's Avatar
 
Join Date: Aug 2011
Location: bagmati pradesh
Posts: 3,306
Member: 1626780
Status: Offline
Thanks Meter: 1,281
Quote:
Originally Posted by Dipendra Pathak View Post
Samsung GT-I9192 FRP removed using Hydra Main Tool

1. Run Hydra Main Tool.
2. Choose SAMSUNG.
3. Choose "Service"--> "Factory Reset Protection (FRP)"
4. Choose "Auto" from Method and Option.
5. Connect Device with computer using USB Data Cable.
6. Click on "Execute"
7. Wait until the process is completed.

Note: You can use any supported devices with this method.


Screen Short:



Logs:

BR
Dipendra Pathak

s4 mini i9192 never have frp . frp in samsung start from android 5.1 not below 5.1 have frp . and this phone not get 5.1 update never
  Reply With Quote
Old 05-01-2021, 01:41   #1809 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 6 Cereus Mi Account successfully removed by Hydra Tool

Xiaomi Redmi 6 Cereus Mi Account successfully removed by Hydra Tool

1. Run Hydra MTK Module, Select Brand and Model
2. Go to Service-->Tools-->Xiaoami
3. Choose "Remove Mi Account Erased Method" from Method / Option
4. Execute and connect the device to the computer with data cable
5. wait until the process is completed.

Note: Only in MTK devices, Android above 8, need to install VPN software before you connect wify. But, no need VPS software in Qualcomm module even highest miui vesion ie. 12.xx.xx. No need server! No need Credit! No need yearly activation! No need any extra cost .



Screen Short:


Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM11)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&2762f09&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0766
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765_56EC405E9E.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/04/19.10:40_426269
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cereus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 00C57C25F21F4A19045A09126079DB2D
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010052483634414205EC7090AD85E1 - RH64AB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cereus-user 9 PPR1.180610.011 V11.0.4.0.PCGMIXM release-keys
Miui Ver : V11
Device : cereus
Mod_device : cereus_global
Display ID : SW_S98507AE1_V009_M13_XM_C3D_USR
Security Patch : 2020-05-01
Fingerprint : xiaomi/cereus/cereus:9/PPR1.180610.011/V11.0.4.0.PCGMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_cereus.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cereus_cereus_9_PPR1 .180610.011_V11.0.4.0.PCGMIXM_042821141353\MT6765_ Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-persist[0x0F000000]64 MB ->persist.bin...Ok
-nvram[0x1BE80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cereus_cereus_9_PPR1 .180610.011_V11.0.4.0.PCGMIXM_042821141353
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 00C57C25F21F4A19045A09126079DB2D
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010052483634414205EC7090AD85E1 - RH64AB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cereus-user 9 PPR1.180610.011 V11.0.4.0.PCGMIXM release-keys
Miui Ver : V11
Device : cereus
Mod_device : cereus_global
Display ID : SW_S98507AE1_V009_M13_XM_C3D_USR
Security Patch : 2020-05-01
Fingerprint : xiaomi/cereus/cereus:9/PPR1.180610.011/V11.0.4.0.PCGMIXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:01:29
BR
Dipendra Pathak

  Reply With Quote
Old 05-01-2021, 01:53   #1810 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
REdmi Note 9 Merlin Second IMEI repaired by Hydra Tool

REdmi Note 9 Merlin Second IMEI repaired by Hydra Tool

1. Run Hydra MTK Module, Select Brand and Model
2. Go to Service-->Repair IMEI
3. Choose "Xiaomi Flash Mode" from drop down menu
4. Type correct IMEI as written in battery housing
5. Execute and connect the device to the computer
6. wait until the process is completed.


Screen Short:



Logs:

Quote:
=====================================
***IMEI REPAIR FUNCTION****
Xiaomi Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM52)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&1e7d8db7&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
getMTKPayloadExploit : 0707
#Executing Exploit..
#SUCCESS..
Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0707MT6768[6768]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_merlin.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2720CE2D85AC7DB587D66B37421B191B
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E47314A3953391006E9F4F76751 - G1J9S9

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__042821112240\MT6768_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x0C4A2000]64 MB ->nvdata.bin...Ok
-persist[0x104A2000]48 MB ->persist.bin...Ok
-nvram[0x19F80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__042821112240
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2720CE2D85AC7DB587D66B37421B191B
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E47314A3953391006E9F4F76751 - G1J9S9

Reading GPT-EMMC [0x00008000] 130 Items

IMEI INFO..
IMEI1 : *************80
IMEI2 : *************80
IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : ***************84

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:42
BR
Dipendra Pathak

  Reply With Quote
Old 05-01-2021, 02:01   #1811 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Vivo Y91i (1820) formatted user data successfully done by Hydra Tool

Vivo Y91i (1820) formatted user data successfully done by Hydra Tool

1. Run Hydra MTK Tool.
2. Choose Brand and Module.
3. Go to "Service"--> "Tool".
4. Choose "Ultra Power Option".
5. Choose "Erase User Data" from Method / Option.
6. Click on "Execute".
7. Connect Device to Computer using USB Data Cable.
8. Wait until the process is completed.


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM3)
SymbolicName :\??\USB#VID_0E8D&PID_2000#5&167c16fb&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : A7C86CC5617F5C0F207E56381B065417
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000020000000 -512 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E034373AD21B621 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : vivo
Vendor : vivo
Model : vivo 1820
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 8.1.0 O11019 1610956190 release-keys
Device : PD1818HF_EX
Display ID : O11019 release-keys
Security Patch : 2021-01-01
Platform : =MTK6765
Fingerprint : vivo/1820/1820:8.1.0/O11019/1610956190:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Erase Userdata
Processing...
Erasing FRP Partition...
Formatting Userdata... Ok

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 05-01-2021, 02:08   #1812 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Huawei MED-LX9 (Y6P 2020) Restore OEM Info successfully done by Hydra Tool

Huawei MED-LX9 (Y6P 2020) Restore OEM Info successfully done by Hydra Tool

1. Run MTK Hydra Tool.
2. Choose "Brand" and "Module".
3. Go to "Service"--> "Tool"
4. Choose "Huawei"
5. Chose "Restore OEM Info" from "Method/ Option" drop down option.
6. Click "Execute".
7. Connect Device to computer using USB Data Cable.
8. Wait until the operation is completed.


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM3)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&388db30c&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F8A029C5A019CA15C02E4896E8D29DD6
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A6843396150330100C2FB0C4753 - hC9aP3

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Restore OEM Info
Processing... Ok

Elapsed Time : 00:00:31
BR
Dipendra Pathak

  Reply With Quote
Old 05-01-2021, 02:17   #1813 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Huawei MRD-LX2 (Y6 2019) FRP successfully removed by Hydra Tool

Huawei MRD-LX2 (Y6 2019) FRP successfully removed by Hydra Tool

1. Run MTK tool of Hydra Dongle.
2. Choose Correct Module and Brand.
3. Go to "Service" -- > "Tool"
4. choose "Factory Reset Protection (FRP)".
5. Choose "Auto" from "Method / Option" drop down menu.
6. Click on "Execute" and connect device with computer using USB cable.
7. Wait until the process is completed.


Screen Short:



Logs:

Quote:
Brand : HUAWEI Model : MRD-LX2 (Y6 2019) Connection : Flash Mode

=====================================
How To Boot : Remove Batt if possible
* TP Ground Must be near cpu..
* Remove ground upon popup of the message dialog.

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM8)
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&3a33fe6e&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0717MT6761[6761]
BROM HW_SW_VER : 8A00 CA01 0200 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]

Security Authorization....
Sending[Huawei_y9pro_auth_sv5.auth] Accepted

Preparing Download Agent..
DA : Huawei_Y9Pro_6761_DA.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k61v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : E36F75BAC991DB7204FBCA401BA6A465
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E01099A424DB62B - hB8aP>

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k61v1_64_mexico.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0717__042821163559\MT6761_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x00108000]1024 KB ->frp.bin...Ok
-nvdata[0x00A08000]16 MB ->nvdata.bin...Ok
-persist[0x03800000]8 MB ->persist.bin...Ok
-nvram[0x04400000]5 MB ->nvram.bin...Ok
-oeminfo[0x04900000]32 MB ->oeminfo.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0717__042821163559
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:49
BR
Dipendra Pathak

  Reply With Quote
Old 05-01-2021, 06:45   #1814 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 232
Donate money to this user
Arrow VIVO Y12,Y15 (1904) PATTERN FRP REMOVED successfully by HYDRA TOOL (Success)


DA LINK
****************************/file/agpch...+auth.rar/file
  Reply With Quote
Old 05-02-2021, 04:09   #1815 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Vovo Y19 (PD1934F) Rebuilding User Data successfully Done by Hydra Tool

Vovo Y19 (PD1934F) Rebuilding User Data successfully Done by Hydra Tool

1. Run MTK Tool.
2. Choose Brand and Module.
3. Go to "Service"--> "Tool"
4. Choose "Ultra Power Option"
5. Choose "Rebuild user Data" from "Method / Option" drop down menu.
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed.


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM8)
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&e3e7252&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 11B32108737FB87EA14D59F3A13CF625
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100445636444D4202B20C683E66D9 - DV6DMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k68v1_64-user 11 RP1A.200720.012 eng.compil.20210401.124231 release-keys
Display ID : RP1A.200720.012 release-keys
Security Patch : 2021-03-01
Platform : =MTK6768
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Rebuild Userdata
Processing...
Erasing FRP Partition...
Rebuilding Userdata... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 22:22.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.40452 seconds with 9 queries

SEO by vBSEO