GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 06-03-2021, 12:32   #1966 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi Redmi 9 Lancelot FRP successfully removed by Hydra Tool


Xiaomi Redmi 9 Lancelot FRP successfully removed by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tool
4. Choose "Factory reset protection FRP from universal menu.
5. Choose "Zero Wipe" from "Option / Method" drop down menu
6. Execute and connect the device to the computer with data cable
7. Click on "Execute".
8. wait until the process is completed.



Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM10)
Device :5&1b2db561&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&1b2db561&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AA5C42AA93C2ACD61A1F6C21D5A4F378
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 15010044503644414203B9179A4077AF - DP6DAB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Zero Wipe
Processing...
ZeroWipe FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 06-03-2021, 12:43   #1967 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
UMIDIGI A3 Factory Reset Protection (FRP) successfully removed by Hydra Tool

UMIDIGI A3 Factory Reset Protection (FRP) successfully removed by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tool
4. Choose "Factory reset protection FRP from universal menu.
5. Choose "Auto" from "Option / Method" drop down menu
6. Execute and connect the device to the computer with data cable
7. Click on "Execute".
8. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM (Android) (COM26)
Device :5&2f3fe3a6&0&2
SymbolicName :\??\USB#VID_0E8D&PID_2000#5&2f3fe3a6&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :09/11/2014,3.0.1437.1


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D602AF7DB6EDFC5E030CBD388B54B1C3
ERAM Size : 0x000000000003A000 -232 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100524531424D4207C3F8C2134341 - RE1BMB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Elapsed Time : 00:00:02
BR
Dipendra Pathak

  Reply With Quote
Old 06-03-2021, 12:50   #1968 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Cherry Mobile Flare S8 FRP successfully done by Hydra Tool

Cherry Mobile Flare S8 FRP successfully done by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tool
4. Choose "Factory reset protection FRP from universal menu.
5. Choose "Auto" from "Option / Method" drop down menu
6. Click on "Execute".
7. connect the device to the computer with data cable
8. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM6)
Device :5&1d73674e&0&2
SymbolicName :\??\USB#VID_0E8D&PID_2000#5&1d73674e&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 880AE1D27BC1F4EC0BA4E8830E362C5A
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E020F4C414D44C7 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare S8
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_g1860ps_v2_gh_fng_g33scr_p-user 9 PPR1.180610.011 1229230438 release-keys
Device : X930
Display ID : Cherry_X930_Flare_S8_01032021_v1
Security Patch : 2021-01-05
FRPPST : /dev/block/platform/bootdevice/by-name/frp
Fingerprint : Cherry_Mobile/Flare_S8/X930:9/PPR1.180610.011/1229230438:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Elapsed Time : 00:00:06
BR
Dipendra Pathak

  Reply With Quote
Old 06-03-2021, 13:10   #1969 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Huawei MED-L09 (Y6P) Remove Account is successfully done by Hydra Tool

Huawei MED-L09 (Y6P) Remove Account is successfully done by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tool
4. Choose "Huwei".
5. Choose "Remove Account" from "Option / Method" drop down menu
6. Click on "Execute".
7. connect the device to the computer with data cable
8. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM15)
Device :7&6f3d3a3&0&1
SymbolicName :\??\USB#VID_0E8D&PID_0003#7&6f3d3a3&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SB : 01 (True)
SLA : 00 (False)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : MT6765_Huawei_MED.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k62v1_64_mexico.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : A9FE549D9515A7F407D62A3A97C1AE6D
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433861503E01005A971567DF - hC8aP>

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_mex_a32.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__060321102850\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x00108000]1024 KB ->frp.bin...Ok
-nvdata[0x00A08000]16 MB ->nvdata.bin...Ok
-protect1[0x01A08000]8 MB ->protect1.bin...Ok
-protect2[0x02208000]13.969 MB ->protect2.bin...Ok
-persist[0x03800000]8 MB ->persist.bin...Ok
-nvram[0x04400000]5 MB ->nvram.bin...Ok
-oeminfo[0x04900000]32 MB ->oeminfo.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__060321102850
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : A9FE549D9515A7F407D62A3A97C1AE6D
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A68433861503E01005A971567DF - hC8aP>

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Account
Processing...
Backing up Partition for safety...
-oeminfo_060321102913.bin[0x04900000]32 MB ->oeminfo_060321102913.bin...Ok Ok

Elapsed Time : 00:01:58
BR
Dipendra Pathak

  Reply With Quote
Old 06-04-2021, 05:13   #1970 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Hisilicon Huawei HMA-L29 (Mate 20) Flashing with Fastboot done by Hydra Main Tool

Huawei HMA-L29 (Mate 20) Flashing successfully done with Hydra Main Tool

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...
[flash] xloader... Ok
[flash] ptable... Ok
[flash] fastboot... Ok
[flash] vector... Ok
[flash] dts... Ok
[flash] fw_lpm3... Ok
[flash] sensorhub... Ok
[flash] fw_hifi... Ok
[flash] teeos... Ok
[flash] recovery... Ok
[flash] cache... Ok
[flash] boot... Ok
[flash] nvme... Ok
[flash] trustfirmware... Ok
[flash] modem_fw... Ok
[flash] modemnvm_update... Ok
[flash] modem_om... Ok
[flash] modemnvm_img... Ok
[flash] isp_firmware... Ok
[flash] userdata... Ok
[flash] system... Ok
[flash] vendor... Ok
[flash] splash2... Ok
[flash] frp... Ok
[flash] oeminfo... Ok
[flash] cust... Ok
[flash] secure_storage... Ok
[flash] modem_secure... Ok
[flash] hisee_img... Ok
[flash] hisee_fs... Ok
[flash] efuse... Ok
[flash] ufs_fw... Ok
Done!!!!
Elapsed Time : 00:02:03
BR
Dipendra Pathak

  Reply With Quote
Old 06-04-2021, 05:39   #1971 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Huawei AGS2-L03 (Media Pad T5) Hisilicon removing FRP successfully done by Hydra Tool

Huawei AGS2-L03 (Media Pad T5) Hisilicon removing FRP successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo...... \par
#hotainfo_len :
#C_version :
#D_version :
#PLMN :
#BoardID :
#DeviceName :
Build number : BLL-L21C185B386
Product Model : BLL-L21
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : hi6250\
system_update_state : 0.5
vendorcountry : hw/meafnaf
soc_id : 0.5
build_fingerprint : 0.5
build_version_full : 0.5
build_version_qcom : 0.5
psid.........
#SN : 2W************92
#IMEI1 : *************11
#IMEI2 : *************27

Security Info....
#Dongle_info : 0.5
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing.... Ok

Elapsed Time : 00:00:02
BR
Dipendra Pathak

  Reply With Quote
Old 06-04-2021, 08:43   #1972 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Hi Siicon Huwei VOG-TL00 (P30 Pro) Hisilicon Removing frp Fastboot mode done by Hydra

Hi Siicon Huwei VOG-TL00 (P30 Pro) Hisilicon Removing frp Fastboot mode done by Hydra

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len : 0x0000005D
#C_version : C00
#D_version : D000
#PLMN : 51503
#BoardID : 8557
#DeviceName : VOG-AL00
Build number : VOG-AL00 10.1.0.162(C00E160R2P8)\par
Product Model : VOG-AL00
hwnff_ver : Ver2.3\par
key_version : huawei_key_v1
product : kirin980\par
system_update_state :
vendorcountry : all
soc_id : undefine
build_fingerprint : undefine
build_version_full : undefine
build_version_qcom : undefined
psid.........
#SN : ***************30
#IMEI1 : ************06
#IMEI2 : ************34

Security Info....
#Dongle_info : RSA-2048,0x9001,0x7000,0x6000,0x5100,0x5000
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing.... Ok

Elapsed Time : 00:00:02
BR
Dipendra Pathak

  Reply With Quote
Old 06-04-2021, 10:17   #1973 (permalink)
Product Manager
 
Hydra Tool's Avatar
 
Join Date: Aug 2018
Location: Ukraine / Harkov
Posts: 1,915
Member: 2857401
Status: Offline
Thanks Meter: 6,423
OPPO A12 Sim Unlock (Direct Unlock) by Hydra Dongle

OPPO A12 Sim Unlock (Direct Unlock) by Hydra Dongle

OPPO Simlock Remove of MTK OPPO A12 by Flash mode with Hydra by USB only

http://www.youtube.com/watch?v=DIbOLg5r3qM
  Reply With Quote
Old 06-05-2021, 05:16   #1974 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi Redmi Note 5A SE (Ugglite) successfully flashed by Hydra Tool

Xiaomi Redmi Note 5A SE (Ugglite) successfully flashed by Hydra Too

1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module.
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Click on "Flash"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM21)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&182a12da&0&6#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1325553342
Firmware Version : 165
Product Name : HAG4a2
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30777344[14,676 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 5A
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : ugg-user 7.1.2 N2G47H V8.5.8.0.NDKCNED release-keys
Miui Ver : V8
Device : ugg
Board : QC_Reference_Phone
Display ID : N2G47H
Security Patch : 2017-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/ugg/ugg:7.1.2/N2G47H/V8.5.8.0.NDKCNED:user/release-keys

Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security partitions...
Reading Security Items....
> modemst1
> modemst2
> fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi Note 5A_QC_Reference_Phone_7.1.2_Security_060421155023. sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
- modem(0)[NON-HLOS.bin] Ok
- sbl1(0)[sbl1.mbn] Ok
- sbl1bak(0)[sbl1.mbn] Ok
- rpm(0)[rpm.mbn] Ok
- rpmbak(0)[rpm.mbn] Ok
- tz(0)[tz.mbn] Ok
- tzbak(0)[tz.mbn] Ok
- devcfg(0)[devcfg.mbn] Ok
- devcfgbak(0)[devcfg.mbn] Ok
- dsp(0)[adspso.bin] Ok
- splash(0)[splash.img] Ok
- aboot(0)[emmc_appsboot.mbn] Ok
- abootbak(0)[emmc_appsboot.mbn] Ok
- boot(0)[boot.img] Ok
- recovery(0)[recovery.img] Ok
- system(0)[system.img] Ok
- cache(0)[cache.img] Ok
- persist(0)[persist.img] Skipped
- misc(0)[misc.img] Ok
- config(0)[config.bin] Skipped
- mdtp(0)[mdtp.img] Ok
- cmnlib(0)[cmnlib.mbn] Ok
- cmnlibbak(0)[cmnlib.mbn] Ok
- cmnlib64(0)[cmnlib64.mbn] Ok
- cmnlib64bak(0)[cmnlib64.mbn] Ok
- keymaster(0)[keymaster.mbn] Ok
- keymasterbak(0)[keymaster.mbn] Ok
- cust(0)[cust.img] Ok
- userdata(0)[userdata.img] Ok
- PrimaryGPT(0)[gpt_main0.bin] Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,6144)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,6144)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:05:28
BR
Dipendra Pathak

  Reply With Quote
Old 06-05-2021, 05:25   #1975 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Lenevo Tab 10 (TB-X103F) Zero Wipe FRP successfully removed by Hydra Tool

Lenevo Tab 10 (TB-X103F) Zero Wipe FRP successfully removed by Hydra Tool

1. Run Hydra Qualcomm Module.
2. Select Brand and Model as "Auto"
3. Go to Service-->Universal
4. Choose "Factory reset protection" from drop down menu.
5. Choose "Zero wipe" from "Flash Mode".
6. Click on "Execute".
7. connect the device to the computer with data cable
8. wait until the process is completed.

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :HS-USB Diagnostics 9008 (COM34)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&2301df1d&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/20/2017,2.1.2.2

Getting device info.....
Serial No.: 0x11F68F8C
MSM ID : 0x009680E1, APQ8009-Qualcomm Snapdragon 212
PBL Ver : 00000000
PK HASH : CC3153A80293939B90D02D3BF8B23E02
92E452FEF662C74998421ADAD42A380F

Firehose Loader[8909.mbn]
SaharaBoot... Ok
Sending ..............Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1


Protocol : Universal
Running : Ok

Phone Information.....
Brand : Lenovo
Vendor : LENOVO
Model : Lenovo TB-X103F
ID : LenovoTB-X103F
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : msm8909-user 6.0.1 LenovoTB-X103F TB-X103F_S000034_171011_ROW release-keys
Device : TB-X103F
Board : TB-X103F
Display ID : TB-X103F_S000034_171011_ROW
Security Patch : 2017-09-01
Emmc_size : 8GB
Platform : msm8909
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Lenovo/TB-X103F/TB-X103F:6.0.1/LenovoTB-X103F/TB-X103F_S000034_171011_ROW:user/release-keys

Reading GPT[3]
Drive [0] 32 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Zero Wipe
Processing...
- Removing FRP [Zero Wipe] OkOk

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 06-05-2021, 05:30   #1976 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Huawei NEMo-L22 (Honor 5C) Hisilicon device Remove FRP successfully done by Hydra To

Huawei NEMo-L22 (Honor 5C) Hisilicon device Remove FRP successfully done by Hydra To

Screen Short:



Logs:

Quote:
Searching Device By Fastboot\
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len : 0x00000017
#C_version :
#D_version :
#PLMN :
#BoardID :
#DeviceName :
Build number : NMO-L31C185B356
Product Model : HUAWEI NMO-L31
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : hi6250
system_update_state :
vendorcountry : hw/meafnaf
soc_id : 0.5
build_fingerprint : 0.5
build_version_full : 0.5
build_version_qcom : 0.5
psid.........
#SN : **************05
#IMEI1 : ************51
#IMEI2 : ************97

Security Info....
#Dongle_info : 0.5\par
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing.... Ok

Elapsed Time : 00:00:02
BR
Dipendra Pathak

  Reply With Quote
Old 06-05-2021, 05:36   #1977 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Vivo Y53 zero wipe successfully removed by Hydra Tool

Vivo Y53 zero wipe successfully removed by Hydra Tool

1. Run Qualcomm Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"--> "Vivo"
4. Choose "Factory Reset" from drop down menu
5. Choose "Safa formet EMMC" from Flash Mode
6. Click on "Execute"
7. Connect device to computer using USB Data Cable.
8. Wait until the operation is completed.

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : Y53 Storage : Auto
Loader: 8917.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM13)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&167c16fb&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0xF1080AFD
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 60BA997FEF6DA9F05885FA11F1DD6D2A
90D052A257A09C2075D7246CC73C0D43

Firehose Loader[8917.mbn]
SaharaBoot... Ok
Sending .................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1003645666
Firmware Version : 13
Product Name : RE1BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : vivo
Vendor : vivo
Model : vivo 1610
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20190227.121058 release-keys
Device : PD1613BF_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/1610/1610:6.0.1/MMB29M/compiler02271214:user/release-keys

Processing Safe Erase....
- Formatting Userdata [Erase Safety Tag]
- Formatting Userdata [Zero Wipe] OkOk
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:14
BR
Dipendra Pathak

  Reply With Quote
Old 06-05-2021, 05:46   #1978 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Huawei ATU-L22 (Y6 2018) Remove FRP successfully done by Hydra Tool

Huawei ATU-L22 (Y6 2018) Remove FRP successfully done by Hydra Tool

1. Run Qualcomm tool.
2. Choose Correct Module and Brand.
3. Go to "Service" -- > "Huawei"
4. Choose "Factory Reset" tool from drop down menu
5. choose "Remove FRP" from Flash Mode.
6. Click on "Execute" and connect device with computer using USB cable.
7. Wait until the process is completed.

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : HUAWEI Model : ATU-L22 (Y6 2018) Storage : Auto
Loader: Huawei-ATU-Y6.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM12)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&32300a61&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/19/2014,2.1.1.2

Getting device info......
Serial No.: 0xCADDFAF0
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 6BC369511DA9CADB3A7AF61574F89DB3
85003D6241BDD1FF573DBA61BF6AE119

Firehose Loader[Huawei-ATU-Y6.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 936702696
Firmware Version : 4
Product Name : QE63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Processing Remove FRP....
- Removing FRP [Zero Wipe] Ok
Action Result : Ok

Elapsed Time : 00:00:13
BR
Dipendra Pathak

  Reply With Quote
Old 06-06-2021, 05:03   #1979 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Xiaomi Mi A1 (Tissot) successfully flashed by Hydra Tool

Xiaomi Mi A1 (Tissot) successfully flashed by Hydra Tool

1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module.
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Click on "Flash"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

Reading Information...version: 0.5
Product : tissot
version : 0.5
Secure : yes
Device Info:
Device tampered: false
Device unlocked: true
Device critical unlocked: true
Charger screen enabled: false
Display panel:
--------------------------
Fastboot Flashing...
-modem_a(modem.img) Ok
-modem_b(modem.img) Ok
-sbl1(sbl1.img) Ok
-sbl1bak(sbl1.img) Ok
-rpm(rpm.img) Ok
-rpmbak(rpm.img) Ok
-tz(tz.img) Ok
-tzbak(tz.img) Ok
-devcfg(devcfg.img) Ok
-devcfgbak(devcfg.img) Ok
-dsp(dsp.img) Ok
-DDR(zeros_1sector.bin) Ok
-fsg(fs_image.tar.gz.mbn.img) Skipped
-sec(sec.dat) Skipped
-splash(splash.img) Ok
-aboot(emmc_appsboot.mbn) Ok
-abootbak(emmc_appsboot.mbn) Ok
-boot_a(boot.img) Ok
-boot_b(boot.img) Ok
-system_a(system.img) Ok
-system_b(system.img) Ok
-persist(persist.img) Skipped
-misc(misc.img) Ok
-config(zeros_1sector.bin) Skipped
-lksecapp(lksecapp.img) Ok
-lksecappbak(lksecapp.img) Ok
-cmnlib(cmnlib.img) Ok
-cmnlibbak(cmnlib.img) Ok
-cmnlib64(cmnlib64.img) Ok
-cmnlib64bak(cmnlib64.img) Ok
-keymaster(keymaster.img) Ok
-keymasterbak(keymaster.img) Ok
-userdata(userdata.img) Ok
All Done
--------------------------

Elapsed Time : 00:03:25
BR
Dipendra Pathak

  Reply With Quote
Old 06-06-2021, 05:10   #1980 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,599
Vivo V9 Youth (PD1730BF) forced erased to remove FRP successfully done by Hydra Tool

Vivo V9 Youth (PD1730BF) forced erased to remove FRP successfully done by Hydra Tool

1. Run Qualcomm Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"--> "Vivo"
4. Choose "Factory Reset" from drop down menu
5. Choose "Forced Erased" from Flash Mode
6. Click on "Execute"
7. Connect device to computer using USB Data Cable.
8. Wait until the operation is completed.
Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : V9 Youth (PD1730BF) Storage : Auto
Loader: Vivo_V9Youth-1727_PD1730BF_8953_ddr.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM22)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&fbd74a4&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping.. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 4013939962
Firmware Version : 1
Product Name : RD64MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information......
Brand : vivo
Vendor : vivo
Model : vivo 1727
ID : PKQ1.190118.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : msm8953_64-user 9 PKQ1.190118.001 compiler03131127 release-keys
Device : PD1730BF_EX
Display ID : PKQ1.190118.001 release-keys
Security Patch : 2021-03-01
Emmc_size : 16GB
Platform : =QCOM8953
Fingerprint : vivo/1727/1727:9/PKQ1.190118.001/compiler03131127:user/release-keys

Processing Forced Erase....
- Removing FRP [Auto] Ok
- Forced Erase Userdata
Action Result : Ok

Elapsed Time : 00:00:17
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 09:53.



Powered by Searchlight © 2023 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2023 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2022 -
Page generated in 0.47013 seconds with 8 queries

SEO by vBSEO