GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 06-06-2021, 05:17   #1981 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,605
Huawei Y6 2018 (ATU-L22) zero wipe successfully removed by Hydra Tool


Huawei Y6 2018 (ATU-L22) zero wipe successfully removed by Hydra Tool

1. Run Qualcomm tool.
2. Choose Correct Module and Brand.
3. Go to "Service" -- > "Huawei"
4. Choose "Factory Reset" tool from drop down menu
5. choose "Remove FRP" from Flash Mode.
6. Click on "Execute" and connect device with computer using USB cable.
7. Wait until the process is completed

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : HUAWEI Model : ATU-L22 (Y6 2018) Storage : Auto
Loader: Huawei-ATU-Y6.mbn
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM65)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&3307f8a7&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xD1453693
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
PBL Ver : 00000000
PK HASH : 6BC369511DA9CADB3A7AF61574F89DB3
85003D6241BDD1FF573DBA61BF6AE119

Firehose Loader[Huawei-ATU-Y6.mbn]
SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1098440313
Firmware Version : 4
Product Name : QE63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Processing Remove FRP....
- Removing FRP [Zero Wipe] Ok
Action Result : Ok

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 06-06-2021, 06:32   #1982 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,605
Xiaomi Mi Play (Lotus) Mi Account successfully removed by Hydra Tool

Xiaomi Mi Play (Lotus) Mi Account successfully removed by Hydra Tool

1. Run Hydra MTK Module and Sosc.
2. Choose Brand and Module.
3. Go to "Service"-->"Tool" Tab.
4. Choose "Xiaomi".
5. Click on "Remove Mi Account (erased Method)" from drop down menu.
6. Click "Execute" button
7. connect device to the computer with USB Data cable
8. Wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM59)
Device :5&23059e32&0&4
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&23059e32&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : EBFD82537DABAFD11C1E17B3637A6C55
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010033483643414202E735C4BBA5BD - 3H6CAB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : MI PLAY
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Description : lotus-user 8.1.0 O11019 V11.0.8.0.OFICNXM release-keys
Miui Ver : V11
Device : lotus
Display ID : ZAL1722-lotus-build-20201119224807
Security Patch : 2020-11-01
Fingerprint : xiaomi/lotus/lotus:8.1.0/O11019/V11.0.8.0.OFICNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x0D000000]48 MB ->persist.bin...Ok
-frp.bin[0x03588000]1024 KB ->frp.bin...Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:12
BR
Dipendra Pathak

  Reply With Quote
Old 06-06-2021, 06:42   #1983 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,605
Cherrry Mobile Flare S7 FRP Partition successfully removed by Hydra Tool

Cherrry Mobile Flare S7 FRP Partition successfully removed by Hydra Tool

1. Run MTK tool.
2. Choose Correct Module and Brand as "Auto"
3. Go to "Service" -- > "Tooli"
4. Choose "Factory Reset protection FRP" from universal Operation
5. choose "Auto" from "Method / Option" drop down menu
6. Click on "Execute" and connect device with computer using USB cable.
7. Wait until the process is completed

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM22)
Device :6&15864707&0&4
SymbolicName :\??\USB#VID_0E8D&PID_2000#6&15864707&0&4#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0699MT6739 [6739]
hw subcode : 8A00
hw version : CB00
sw version : 0002
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : FF
BL VERSION : 03

Preparing Download Agent..
DA : 6739.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : preloader

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 8EE2FD1D57F3B0D09102F541E8C0D839
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514531334D420D7CD0C655B347 - QE13MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare_S7
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : Flare_S7-user 8.1.0 O11019 1570865869 release-keys
Device : Flare_S7
Board : Flare_S7
Display ID : Cherry_Flare_S7_V22_10122019
Security Patch : 2019-09-05
Fingerprint : Cherry_Mobile/Flare_S7/Flare_S7:8.1.0/O11019/1570865869:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_c767_8111h_xxa1_39_o1.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0699_Cherry_Mobile_Flare_S7_Flar e_S7_8.1.0_O11019_1570865869_060621115420\MT6739_A ndroid_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x02D88000]1024 KB ->frp.bin...Ok
-nvdata[0x03688000]32 MB ->nvdata.bin...Ok
-protect1[0x07688000]8 MB ->protect1.bin...Ok
-protect2[0x07E88000]9.469 MB ->protect2.bin...Ok
-nvram[0x10700000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0699_Cherry_Mobile_Flare_S7_Flar e_S7_8.1.0_O11019_1570865869_060621115420
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 8EE2FD1D57F3B0D09102F541E8C0D839
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514531334D420D7CD0C655B347 - QE13MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : Cherry_Mobile
Vendor : Cherry_Mobile
Model : Flare_S7
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : Flare_S7-user 8.1.0 O11019 1570865869 release-keys
Device : Flare_S7
Board : Flare_S7
Display ID : Cherry_Flare_S7_V22_10122019
Security Patch : 2019-09-05
Fingerprint : Cherry_Mobile/Flare_S7/Flare_S7:8.1.0/O11019/1570865869:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... Ok

Elapsed Time : 00:00:36
BR
Dipendra Pathak

  Reply With Quote
Old 06-06-2021, 09:04   #1984 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 231
Donate money to this user
Arrow OPPO A5S (CPH1909) PATTERN REMOVED successfully by HYDRA MTK TOOL (Success)

  Reply With Quote
Old 06-06-2021, 09:09   #1985 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 231
Donate money to this user
Arrow OPPO A37F (OPPO) PATTERN REMOVED successfully by HYDRA MTK TOOL (Success)

  Reply With Quote
Old 06-06-2021, 09:11   #1986 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 231
Donate money to this user
Redmi NOTE 4 (REDMI)PATTERN UNLOCK DONE by HYDRA TOOL

  Reply With Quote
Old 06-06-2021, 10:23   #1987 (permalink)
Freak Poster
 
Join Date: Sep 2008
Location: bangladesh
Posts: 226
Member: 869889
Status: Offline
Thanks Meter: 107
redmi note 10 pro edl point

https://ibb.co/ftySbj6
  Reply With Quote
Old 06-07-2021, 01:42   #1988 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,605
Xiaomi Redmi Note 8 Pro (Begonia) Factory Reset or reset user data done Hydra Tool

Xiaomi Redmi Note 8 Pro (Begonia) Factory Reset or reset user data done Hydra Tool

1. Run Hydra MTK Module and Sosc.
2. Choose Brand and Module.
3. Go to "Service"-->"Tool" Tab.
4. Choose "Factory reset /Format user data" from universal Operation.
5. Click on "Auto" from "Method / Option" drop down menu.
6. Click "Execute" button
7. connect device to the computer with USB Data cable
8. Wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM12)
Device :5&25587c9f&0&1
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&25587c9f&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : AF944DFB882434D215D510D363A3E2CF
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000001DCB000000 -119.172 GB
UFS CID : Ī?KM2V8001CM-B707
UFS UNIQID : 00330038003700380031006600640030

Reading GPT-UFS [0x00008000] 130 Items


Reading System Info
Vendor : Xiaomi
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 10 QP1A.190711.020 V12.0.3.0.QGGMIXM release-keys
Miui Ver : V12
Mod_device : begonia_global
Display ID : QP1A.190711.020
Security Patch : 2020-08-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
Safeformat Universal... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 06-07-2021, 01:50   #1989 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,605
Huawei MRD-LX2 (Y6 2019) Factory Reset Protection (FRP) successfully removed by Hydra

Huawei MRD-LX2 (Y6 2019) Factory Reset Protection (FRP) successfully removed by Hydra

1. Run MTK tool.
2. Choose Correct Module and Brand.
3. Go to "Service" -- > Tool"
4. Choose "Factory Reset Protection" tool from universal option.
5. choose "Zero wipe" .
6. Click on "Execute" and connect device with computer using USB cable.
7. Wait until the process is completed.


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM3)
Device :5&346af9c5&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&346af9c5&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 6516C48E37A3D045F277FBD3D51E7112
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D4202C90FD3F636EB - GD6BMB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Zero Wipe
Processing...
ZeroWipe FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 06-07-2021, 01:57   #1990 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,605
Oppo A15s (CPH 2179) Safe Format successfully done by Hydra Tool

Oppo A15s (CPH 2179) Safe Format successfully done by Hydra Tool

1. Run MTK tool.
2. Choose Correct Module and Brand.
3. Go to "Service" -- > Tool"
4. Choose "Factory Reset / Format user data" tool from universal option.
5. choose "Auto" from "Method / Option" drop down menu
6. Click on "Execute" and connect device with computer using USB cable.
7. Wait until the process is completed.


Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM5)
Device :5&4f9223b&0&1
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&4f9223b&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SB : 01 (True)
SLA : 00 (False)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/03/17.…IIÁ10:04_497508
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing A15s_preloader_oppo6765.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 55AA441C1CCEA517F5B6D1DCF9C39CA1
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E030067EBBD7707 - hB8aP>

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6765.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__060621094759\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x15088000]1024 KB ->frp.bin...Ok
-nvdata[0x17188000]64 MB ->nvdata.bin...Ok
-protect1[0x1E822000]8 MB ->protect1.bin...Ok
-protect2[0x1F022000]15.867 MB ->protect2.bin...Ok
-persist[0x20800000]48 MB ->persist.bin...Ok
-nvram[0x2C600000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__060621094759
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 55AA441C1CCEA517F5B6D1DCF9C39CA1
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E030067EBBD7707 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
Safeformat Universal... Ok

Elapsed Time : 00:01:04
BR
Dipendra Pathak

  Reply With Quote
Old 06-07-2021, 02:04   #1991 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,605
Oppo A15 (CPH 2185) fix from Dead from TP done by Hydra Tool

Oppo A15 (CPH 2185) fix from Dead from TP done by Hydra Tool

1. Run MTK tool.
2. Choose Correct Module and Brand.
3. Go to "Service" -- > Tool"
4. Choose "Oppo" tool from universal option.
5. choose "Fix dead from TP-1" from "Method / Option" drop down menu
6. Click on "Execute" and connect device with computer using USB cable.
7. Wait until the process is completed.

Screen Short:



Logs:

Quote:
Brand : OPPO Model : A15 (CPH2185) Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM18)
Device :6&27c7ce02&0&5
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&27c7ce02&0&5#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SB : 01 (True)
SLA : 00 (False)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/03/17.上午10:04_497508
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing A15s_preloader_oppo6765.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 53D2D77657DC23AA8A1ABE2A9A3A1D89
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E03002DDF14C72F - hB8aP>

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6765.bin
Creating Scatter file... D:\HydraTool_Fullpackage_05-16-2021\\Backup\Auto\0766__060521213859\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x15088000]1024 KB ->frp.bin...Ok
-nvdata[0x17188000]64 MB ->nvdata.bin...Ok
-protect1[0x1E822000]8 MB ->protect1.bin...Ok
-protect2[0x1F022000]15.867 MB ->protect2.bin...Ok
-persist[0x20800000]48 MB ->persist.bin...Ok
-nvram[0x2C600000]64 MB ->nvram.bin...Ok
Done!!!
D:\HydraTool_Fullpackage_05-16-2021\\Backup\Auto\0766__060521213859
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:00:35
BR
Dipendra Pathak

  Reply With Quote
Old 06-08-2021, 02:20   #1992 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,605
Vivo V17 (PD1945F) safe format user data and zero wipe successfully done by Hydra Too

Vivo V17 (PD1945F) safe format user data and zero wipe successfully done by Hydra Too

1. Run Hydra Qualcomm Tool.
2. Choose Brand and Module.
3. Go "Service"-->"Universal"
4. Choose "Ultra PowerP" from drop down menu.
5. Choose "Auto"
6. Click "Execute"
7. Connect cellphone to computer with the help of USB Data Cable.
8. Wait until the operation is completed.

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : V17 (PD1948F) Storage : Auto
Loader: Vivo_V17_Pro_SDM675.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :\??\USB#VID_05C6&PID_9008#6&e3e7252&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :05/29/2019,2.1.3.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping..................... Ok
Configuration........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 2 2020 - 22:00:29

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 900
Product Name : KM8V7001JA-B813
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30119936[114.898 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 32768[128 MB]
Drive [4] 1048576[4 GB]
Drive [5] 32768[128 MB]

Protocol : Universal
Running : Ok
Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Phone Information......
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2021-04-01
Platform : =SM6150

Processing Auto....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOk
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:06
BR
Dipendra Pathak

  Reply With Quote
Old 06-08-2021, 02:28   #1993 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,605
Oppo A1601 Screen Lock Security Successfully Removed by Hydra Tool

Oppo A1601 Screen Lock Security Successfully Removed by Hydra Tool

1. Run MTK tool.
2. Choose Correct Module and Brand or keep it as "Auto"
3. Go to "Service" -- > Tool"
4. Choose "Screen Lock Security" tool from universal option.
5. choose "Reset Pattern" from "Method / Option" drop down menu
6. Click on "Execute" and connect device with computer using USB cable.
7. Wait until the process is completed.


Screen Short:



Logs:

Quote:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
* BROM Mode : Press VOL + or Press VOL -+
* Preloader Mode : Just Insert cable

Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM6)
Device :5&1600c3aa&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&1600c3aa&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 01
SB : 01 (True)
SLA : 00 (False)
DAA : 00 (False)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 42040000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : 6755_SWSEC_2B23567CB4.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.00.00
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6750_16059.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 276F409664BD4B2007F7FD6145FB292F
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A416B348D163FF - HBG4a2

DA Speed :
Change to HIGH SPEED...
Searching for MTK Device...Found
Port Identification A_HIGHSPEED_VCOM
FriendlyName :MediaTek DA USB VCOM (Android) (COM3)
Device :5&1600c3aa&0&2
SymbolicName :\??\USB#VID_0E8D&PID_2001#5&1600c3aa&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : A1601
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15331-user 5.1 LMY47I 1502723706 release-keys
Device : A1601
Board : full_oppo6750_15331
Display ID : A1601EX_11_A.33_170814
Security Patch : 2017-08-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6750_15131.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0326__060621100705\MT6750T_Andro id_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03F88000]1024 KB ->frp.bin...Ok
-nvdata[0x04088000]32 MB ->nvdata.bin...Ok
-protect1[0x08088000]8 MB ->protect1.bin...Ok
-protect2[0x08888000]15.469 MB ->protect2.bin...Ok
-nvram[0x0CF00000]5 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0326__060621100705
MTK Phone Loader is NOW RUNNING.
=====================================

Elapsed Time : 00:01:18
BR
Dipendra Pathak

  Reply With Quote
Old 06-08-2021, 02:34   #1994 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,605
Xiaomi Note 9 Pro (Joyeuse) successfully flashed by Hydra Tool

Xiaomi Note 9 Pro (Joyeuse) successfully flashed by Hydra Tool

1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module or leave it as "Auto"
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Click on "Flash"
6. connect device to the computer with USB Data cable
7. Wait until the process is completed.

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

Reading Information...getvar:version FAILED (remote: GetVar Variable Not found)
Product : joyeuse
version : getvar:version FAILED (remote: GetVar Variable Not found)
Secure : yes
Device Info:
Verity mode: true
Device unlocked: false
Device critical unlocked: false
Charger screen enabled: false
--------------------------
Fastboot Flashing...
-persist(persist.img) Ok
-misc(misc.img) Ok
-recovery(recovery.img) Ok
-recoverybak(recovery.img) Ok
-vbmeta_system(vbmeta_system.img) Ok
-vbmeta_systembak(vbmeta_system.img) Ok
-metadata(metadata.img) Ok
-ffu(ffu.img) Ok
-super(super.img) Ok
-userdata(userdata.img) Ok
-xbl(xbl.elf) Ok
-xbl_config(xbl_config.elf) Ok
-xblbak(xbl.elf) Ok
-xbl_configbak(xbl_config.elf) Ok
-aop(aop.mbn) Ok
-tz(tz.mbn) Ok
-hyp(hyp.mbn) Ok
-modem(NON-HLOS.bin) Ok
-bluetooth(BTFM.bin) Ok
-abl(abl.elf) Ok
-dsp(dspso.bin) Ok
-keymaster(km4.mbn) Ok
-cmnlib(cmnlib.mbn) Ok
-cmnlib64(cmnlib64.mbn) Ok
-devcfg(devcfg.mbn) Ok
-qupfw(qupv3fw.elf) Ok
-imagefv(imagefv.elf) Ok
-uefisecapp(uefi_sec.mbn) Ok
-aopbak(aop.mbn) Ok
-tzbak(tz.mbn) Ok
-hypbak(hyp.mbn) Ok
-modembak(NON-HLOS.bin) Ok
-bluetoothbak(BTFM.bin) Ok
-ablbak(abl.elf) Ok
-dspbak(dspso.bin) Ok
-keymasterbak(km4.mbn) Ok
-cmnlibbak(cmnlib.mbn) Ok
-cmnlib64bak(cmnlib64.mbn) Ok
-devcfgbak(devcfg.mbn) Ok
-qupfwbak(qupv3fw.elf) Ok
-imagefvbak(imagefv.elf) Ok
-uefisecappbak(uefi_sec.mbn) Ok
-devinfo(devinfo.img) Ok
-logfs(logfs_ufs_8mb.bin) Ok
-storsec(storsec.mbn) Ok
-secdata(sec.elf) Ok
-vbmeta(vbmeta.img) Ok
-boot(boot.img) Ok
-dtbo(dtbo.img) Ok
-vbmetabak(vbmeta.img) Ok
-dtbobak(dtbo.img) Ok
-bootbak(boot.img) Ok
-modemst1(dummy.bin) Ok
-modemst2(dummy.bin) Ok
-fsg(fs_image.tar.gz.mbn.img) Ok
All Done
--------------------------

Elapsed Time : 00:02:09
BR
Dipendra Pathak

  Reply With Quote
Old 06-08-2021, 02:44   #1995 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,605
Xiaomi Redmi 9A (Dendelion) Mi account and FRP successfully removed by Hydra Too

Xiaomi Redmi 9A (Dendelion) Mi account and FRP successfully removed by Hydra Too

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tools
4. Choose "Xiaomi" from universal option.
5. Choose "Remove Mi Account + FRP" from "Method / Option" drop down menu
6. Execute and connect the device to the computer with data cable
7. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM156)
Device :7&39134af&0&4
SymbolicName :\??\USB#VID_0E8D&PID_0003#7&39134af&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
***Skipped, Not secured..
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : 6765_Xiaomi_wb.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/03/17.上午10:04_497508
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_redmi9a_Hydra_V2.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 72E500AB7887ED3DBEA02A0F057195FC
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100424A5444345209F4B24DDAA7DF - BJTD4R

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_bsp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__060521231206\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x3BD88000]1024 KB ->frp.bin...Ok
-nvdata[0x3DE88000]64 MB ->nvdata.bin...Ok
-protect1[0x45522000]8 MB ->protect1.bin...Ok
-protect2[0x45D22000]10,867 MB ->protect2.bin...Ok
-persist[0x47000000]48 MB ->persist.bin...Ok
-nvram[0x52E80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__060521231206
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 72E500AB7887ED3DBEA02A0F057195FC
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100424A5444345209F4B24DDAA7DF - BJTD4R

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x47000000]48 MB ->persist.bin...Ok
-frp.bin[0x3BD88000]1024 KB ->frp.bin...Ok
__060521231240
Backing up Partition for safety...
-__060521231240[0x47000000]48 MB ->persist.img...OkOk
Saved to :
C:\Hydra Tool\Backup\Persist\__060521231240.bin
Erasing FRP Partition...
-persist.bin[0x47000000]48 MB ->persist.bin...Ok
-frp.bin[0x3BD88000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:00:55
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 15:48.



Powered by Searchlight © 2023 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2023 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2022 -
Page generated in 0.37880 seconds with 9 queries

SEO by vBSEO