GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 06-09-2021, 03:32   #1996 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 9C (angelica) Mi Accont remove with Erased Method by Hydra Tool


Xiaomi Redmi 9C (angelica) Mi Accont remove with Erased Method by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tools
4. Choose "Xiaomi" from universal option.
5. Choose "Remove Mi Account (Erased Mehod)" from "Method / Option" drop down menu
6. Execute and connect the device to the computer with data cable
7. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM10)
Device :5&2e91bbdc&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&2e91bbdc&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/03/2016,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SB : 01 (True)
SLA : 02 (True)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : 6765_Xiaomi_wb.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/03/17.上午10:04_497508
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k65v1_64_bsp.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FA3C6234C33CEF076E1DE952143ED1E0
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 45010044413430333201FABBA7416713 - DA4032

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k65v1_64_bsp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__060521212403\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x3BD88000]1024 KB ->frp.bin...Ok
-nvdata[0x3DE88000]64 MB ->nvdata.bin...Ok
-protect1[0x45522000]8 MB ->protect1.bin...Ok
-protect2[0x45D22000]10.867 MB ->protect2.bin...Ok
-persist[0x47000000]48 MB ->persist.bin...Ok
-nvram[0x52E80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__060521212403
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FA3C6234C33CEF076E1DE952143ED1E0
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 45010044413430333201FABBA7416713 - DA4032

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x47000000]48 MB ->persist.bin...Ok
-frp.bin[0x3BD88000]1024 KB ->frp.bin...Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:05
BR
Dipendra Pathak

  Reply With Quote
Old 06-09-2021, 03:32   #1997 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 9C (angelica) Mi Accont remove with Erased Method by Hydra Tool

Xiaomi Redmi 9C (angelica) Mi Accont remove with Erased Method by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tools
4. Choose "Xiaomi" from universal option.
5. Choose "Remove Mi Account (Erased Mehod)" from "Method / Option" drop down menu
6. Execute and connect the device to the computer with data cable
7. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM10)
Device :5&2e91bbdc&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&2e91bbdc&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/03/2016,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SB : 01 (True)
SLA : 02 (True)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : 6765_Xiaomi_wb.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/03/17.上午10:04_497508
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k65v1_64_bsp.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FA3C6234C33CEF076E1DE952143ED1E0
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 45010044413430333201FABBA7416713 - DA4032

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k65v1_64_bsp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__060521212403\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x3BD88000]1024 KB ->frp.bin...Ok
-nvdata[0x3DE88000]64 MB ->nvdata.bin...Ok
-protect1[0x45522000]8 MB ->protect1.bin...Ok
-protect2[0x45D22000]10.867 MB ->protect2.bin...Ok
-persist[0x47000000]48 MB ->persist.bin...Ok
-nvram[0x52E80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__060521212403
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FA3C6234C33CEF076E1DE952143ED1E0
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 45010044413430333201FABBA7416713 - DA4032

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x47000000]48 MB ->persist.bin...Ok
-frp.bin[0x3BD88000]1024 KB ->frp.bin...Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:05
BR
Dipendra Pathak

  Reply With Quote
Old 06-09-2021, 03:33   #1998 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 9C (angelica) Mi Accont remove with Erased Method by Hydra Tool

Xiaomi Redmi 9C (angelica) Mi Accont remove with Erased Method by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tools
4. Choose "Xiaomi" from universal option.
5. Choose "Remove Mi Account (Erased Mehod)" from "Method / Option" drop down menu
6. Execute and connect the device to the computer with data cable
7. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM10)
Device :5&2e91bbdc&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&2e91bbdc&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/03/2016,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SB : 01 (True)
SLA : 02 (True)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : 6765_Xiaomi_wb.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/03/17.上午10:04_497508
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k65v1_64_bsp.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FA3C6234C33CEF076E1DE952143ED1E0
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 45010044413430333201FABBA7416713 - DA4032

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k65v1_64_bsp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__060521212403\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x3BD88000]1024 KB ->frp.bin...Ok
-nvdata[0x3DE88000]64 MB ->nvdata.bin...Ok
-protect1[0x45522000]8 MB ->protect1.bin...Ok
-protect2[0x45D22000]10.867 MB ->protect2.bin...Ok
-persist[0x47000000]48 MB ->persist.bin...Ok
-nvram[0x52E80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__060521212403
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FA3C6234C33CEF076E1DE952143ED1E0
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 45010044413430333201FABBA7416713 - DA4032

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x47000000]48 MB ->persist.bin...Ok
-frp.bin[0x3BD88000]1024 KB ->frp.bin...Ok Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:05
BR
Dipendra Pathak

  Reply With Quote
Old 06-09-2021, 04:13   #1999 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Hsilicon Huawei (RNE-L22 (Nova 2i) remove FRP successfully by Hydra Tool

Hsilicon Huawei (RNE-L22 (Nova 2i) remove FRP successfully by Hydra Tool

1. Run Main Tool of Hydra.
2. Choose "HiSilicon" Tab.
3. Choose Module
4. Go to "Service" and choose "Factory reset protection" from drop down menu.
5. Choose "Remove FRP"
6. Keep (Put) the device into Fastboot mode.
7. Connect device to the computer with USB Data Cable.
8. Click on "Execute"
9. Wait until the operation is complete.

Note: Auto boot and manual boot is optional. If you want auto boot, then, just tick it.



Screen Short:



Logs:

Quote:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len :
#C_version :
#D_version :
#PLMN :
#BoardID :
#DeviceName :
Build number : RNE-L22 8.0.0.361(C636)
Product Model : RNE-L22
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : hi6250
system_update_state :
vendorcountry : hw/spcseas
id : 0.5
build_fingerprint : 0.5
build_version_full : 0.5
build_version_qcom : 0.5
psid.........
#SN : **************24
#IMEI1 : *************10
#IMEI2 : *************61

Security Info....
#Dongle_info : 0.5
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing.... Ok

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 06-09-2021, 05:20   #2000 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
HiSilicon Huawei FIG LX1 (P Smart 2020) successfully flashed by Hydra Tool

HiSilicon Huawei FIG LX1 (P Smart 2020) successfully flashed by Hydra Tool

1. Run Main Tool of Hydra.
2. Choose "HiSilicon" Tab.
3. Choose Module
4. Go to "Flash" and choose "Fastboot".
5. Choose "File" and its location and click on okay.
6. Keep (Put) the device into Fastboot mode.
7. Connect device to the computer with USB Data Cable.
8. Click on "Execute"
9. Wait until the operation is complete.




Logs:

Quote:
Searching Device By Fastboot
Device Found...
- [flash] huawei_crc_check... Ok
- [flash] xloader... Ok
- [flash] huawei_crc_check... Ok
- [flash] ptable... Ok
- [flash] huawei_crc_check... Ok
- [flash] fastboot... Ok
- [flash] huawei_crc_check... Ok
- [flash] dts... Ok
- [flash] huawei_crc_check... Ok
- [flash] fw_lpm3... Ok
- [flash] huawei_crc_check... Ok
- [flash] sensorhub... Ok
- [flash] huawei_crc_check... Ok
- [flash] fw_hifi... Ok
- [flash] huawei_crc_check... Ok
- [flash] teeos... Ok
- [flash] huawei_crc_check... Ok
- [flash] recovery_vbmeta... Ok
- [flash] huawei_crc_check... Ok
- [flash] cache... Ok
- [flash] huawei_crc_check... Ok
- [flash] nvme... Ok
- [flash] huawei_crc_check... Ok
- [flash] trustfirmware... Ok
- [flash] huawei_crc_check... Ok
- [flash] modem_fw... Ok
- [flash] huawei_crc_check... Ok
- [flash] modemnvm_update... Ok
- [flash] huawei_crc_check... Ok
- [flash] modem_om... Ok
- [flash] huawei_crc_check... Ok
- [flash] modemnvm_img... Ok
- [flash] huawei_crc_check... Ok
- [flash] userdata... Ok
- [flash] huawei_crc_check... Ok
- [flash] system... Ok
- [flash] huawei_crc_check... Ok
- [flash] vendor... Ok
- [flash] huawei_crc_check... Ok
- [flash] product... Ok
- [flash] huawei_crc_check... Ok
- [flash] version... Ok
- [flash] huawei_crc_check... Ok
- [flash] splash2... Ok
- [flash] huawei_crc_check... Ok
- [flash] frp... Ok
- [flash] huawei_crc_check... Ok
- [flash] oeminfo... Ok
- [flash] huawei_crc_check... Ok
- [flash] secure_storage... Ok
- [flash] huawei_crc_check... Ok
- [flash] modem_secure... Ok
- [flash] huawei_crc_check... Ok
- [flash] kernel... Ok
- [flash] huawei_crc_check... Ok
- [flash] ramdisk... Ok
- [flash] huawei_crc_check... Ok
- [flash] recovery_ramdisk... Ok
- [flash] huawei_crc_check... Ok
- [flash] recovery_vendor... Ok
- [flash] huawei_crc_check... Ok
- [flash] vbmeta... Ok
- [flash] huawei_crc_check... Ok
- [flash] odm... Ok
- [flash] huawei_crc_check... Ok
- [flash] efuse... Ok
Done!!!!

Elapsed Time : 00:02:07
BR
Dipendra Pathak

  Reply With Quote
Old 06-10-2021, 04:06   #2001 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
HiSilicon Huawei BLN-L22 (Honor 6X) Factory Reset Protection successfully done by Hyd

HiSilicon Huawei BLN-L22 (Honor 6X) Factory Reset Protection successfully done by Hyd

1. Run Main Tool of Hydra.
2. Choose "HiSilicon" Tab.
3. Choose Module
4. Go to "Service" and choose "Factory reset protection" from drop down menu.
5. Choose "Remove FRP"
6. Keep (Put) the device into Fastboot mode.
7. Connect device to the computer with USB Data Cable.
8. Click on "Execute"
9. Wait until the operation is complete.
Note: Auto boot and manual boot is optional. If you want auto boot, then, just tick it.

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len :
#C_version :
#D_version :
#PLMN :
#BoardID :
#DeviceName :
Build number : BLN-L22C675B369
Product Model : BLN-L22
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : hi6250
system_update_state : 0.5
vendorcountry : channel/in
soc_id : 0.5\
ro_build_fingerprint : 0.5
ro_build_version_full : 0.5
ro_build_version_qcom : 0.5
psid.........\par
#SN : ***************55
#IMEI1 : *************45
#IMEI2 : *************40

Security Info....
#Dongle_info : 0.5
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing.... Ok

Elapsed Time : 00:00:04
BR
Dipendra Pathak

  Reply With Quote
Old 06-10-2021, 04:15   #2002 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
HSilicon Huawei MAR-L01A (P30 Lite) Removing FRP using fastboot mode done by Hydra

HSilicon Huawei MAR-L01A (P30 Lite) Removing FRP using fastboot mode done by Hydra

1. Run Main Tool of Hydra.
2. Choose "HiSilicon" Tab.
3. Choose Module
4. Go to "Service" and choose "Factory reset protection" from drop down menu.
5. Choose "Remove FRP"
6. Keep (Put) the device into Fastboot mode.
7. Connect device to the computer with USB Data Cable.
8. Click on "Execute"
9. Wait until the operation is complete.
Note: Auto boot and manual boot is optional. If you want auto boot, then, just tick it.

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len : 0x0000005E
#C_version : C636
#D_version : D000
#PLMN : 51503
#BoardID : 7836
#DeviceName : MAR-L22B
Build number : MAR-L22B 10.0.0.446(C636E5R2P1)
Product Model : MAR-LX2
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : kirin710
system_update_state : \par
vendorcountry : hw/spcseas
soc_id :
build_fingerprint :
build_version_full :
build_version_qcom :
psid.........
#SN : **************02
#IMEI1 :*************85
#IMEI2 : ************90

Security Info....
#Dongle_info : RSA-2048,0x9001,0x7000,0x6000,0x5100,0x5000
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED\

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing.... Ok

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 06-10-2021, 04:21   #2003 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
HiSilicon Huawei Midiapad T5 (AGS2-L03) successfully flashing using Fastboot by Hydra

HiSilicon Huawei Midiapad T5 (AGS2-L03) successfully flashing using Fastboot by Hydra

1. Run Main Tool of Hydra.
2. Choose "HiSilicon" Tab.
3. Choose Module
4. Go to "Flash" and choose "Fastboot".
5. Choose "File" and its location and click on okay.
6. Keep (Put) the device into Fastboot mode.
7. Connect device to the computer with USB Data Cable.
8. Click on "Execute"
9. Wait until the operation is complete.


Screen Short:



Logs:

Quote:
Searching Device By Fastboot\cf6\par
Device Found...
- [flash] ... Ok
- [flash] huawei_crc_check... Ok
- [flash] preloader... Ok
- [flash] huawei_crc_check... Ok
- [flash] spmfw... Ok
- [flash] huawei_crc_check... Okr
- [flash] scp1... Ok
- [flash] huawei_crc_check... Ok
- [flash] sspm_1... Ok
- [flash] huawei_crc_check... Ok
- [flash] lk... Ok
- [flash] huawei_crc_check... Ok
- [flash] tee1... Ok
- [flash] huawei_crc_check... Ok
- [flash] oeminfo... Ok
- [flash] huawei_crc_check... Ok
- [flash] md1img... Ok
- [flash] huawei_crc_check... Ok
- [flash] vbmeta... Ok
- [flash] huawei_crc_check... Ok
- [flash] recovery_vbmeta... Ok
- [flash] huawei_crc_check... Ok
- [flash] erecovery_vbmeta... Ok\
- [flash] huawei_crc_check... Ok
- [flash] erecovery_kernel... Ok
- [flash] huawei_crc_check... Ok
- [flash] erecovery_ramdisk... Ok
- [flash] huawei_crc_check... Ok
- [flash] erecovery_vendor... Ok
- [flash] huawei_crc_check... Ok
- [flash] eng_vendor... Ok
- [flash] huawei_crc_check... Ok
- [flash] eng_system... Ok
- [flash] huawei_crc_check... Ok
- [flash] recovery_ramdisk... Ok
- [flash] huawei_crc_check... Ok
- [flash] recovery_vendor... Ok
- [flash] huawei_crc_check... Ok
- [flash] dtbo... Ok
- [flash] huawei_crc_check... Ok
- [flash] version... Ok
- [flash] huawei_crc_check... Ok
- [flash] cache... Ok
- [flash] huawei_crc_check... Ok
- [flash] product... Ok\cf7\par
- [flash] huawei_crc_check... Ok
- [flash] vendor... Ok
- [flash] huawei_crc_check... Ok
- [flash] system... Ok
- [flash] huawei_crc_check... Ok
- [flash] boot... Ok
- [flash] huawei_crc_check... Ok
- [flash] userdata... Ok
- [flash] huawei_crc_check... Ok
- [flash] preload... Ok
- [flash] huawei_crc_check... Ok
- [flash] log... Ok
- [flash] huawei_crc_check... Ok
- [flash] odm... Ok
- [flash] huawei_crc_check... Ok
- [flash] efuse... Ok
- [flash] huawei_crc_check... Ok
-[flash] frp... Ok
Done!!!!

Elapsed Time : 00:03:00
BR
Dipendra Pathak

  Reply With Quote
Old 06-10-2021, 13:01   #2004 (permalink)
Product Manager
 
Hydra Tool's Avatar
 
Join Date: Aug 2018
Location: Ukraine / Harkov
Posts: 2,005
Member: 2857401
Status: Offline
Thanks Meter: 6,907
Xiaomi Redmi 5 (rosy) Mi Account Remove by Hydra Dongle

Xiaomi Redmi 5 (rosy) Mi Account Remove by Hydra Dongle with Testpoint

http://www.youtube.com/watch?v=GVWfYV8b1P0
  Reply With Quote
Old 06-10-2021, 13:02   #2005 (permalink)
Product Manager
 
Hydra Tool's Avatar
 
Join Date: Aug 2018
Location: Ukraine / Harkov
Posts: 2,005
Member: 2857401
Status: Offline
Thanks Meter: 6,907
OnePlus 6T FRP Remove by Hydra dongle

OnePlus 6T FRP (Factory Reset Protection) Remove by Hydra dongle

http://www.youtube.com/watch?v=wv3OwdzdCrg
  Reply With Quote
Old 06-10-2021, 13:03   #2006 (permalink)
Product Manager
 
Hydra Tool's Avatar
 
Join Date: Aug 2018
Location: Ukraine / Harkov
Posts: 2,005
Member: 2857401
Status: Offline
Thanks Meter: 6,907
Xiaomi Redmi 8 (olive ) Mi Account Remove | Without Relock by Hydra Dongle

Xiaomi Redmi 8 olive Qualcomm Model Mi Account Fully Reset Without Relock, Without Unlock Bootloader, Without Credit, Just one Click.

http://www.youtube.com/watch?v=Uzu1_gBk328
  Reply With Quote
Old 06-10-2021, 13:03   #2007 (permalink)
Product Manager
 
Hydra Tool's Avatar
 
Join Date: Aug 2018
Location: Ukraine / Harkov
Posts: 2,005
Member: 2857401
Status: Offline
Thanks Meter: 6,907
Redmi Note 6 Pro (tulip) Mi Account and FRP by Hydra Tool

Xiaomi Redmi Note 6 Pro (tulip) Mi Account and FRP by Hydra Tool with Testpoint

http://www.youtube.com/watch?v=je_XBC5GgcE
  Reply With Quote
Old 06-11-2021, 02:03   #2008 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
HiSilicon Huawei STK-L22 (Y9 Prime 2019) FRP removed using Fastboot by Hydra Tool

HiSilicon Huawei STK-L22 (Y9 Prime 2019) FRP removed using Fastboot by Hydra Tool

1. Run Main Tool of Hydra.
2. Choose "HiSilicon" Tab.
3. Choose Module
4. Go to "Service" and choose "Factory reset protection" from drop down menu.
5. Choose "Remove FRP"
6. Keep (Put) the device into Fastboot mode.
7. Connect device to the computer with USB Data Cable.
8. Click on "Execute"
9. Wait until the operation is complete.
Note: Auto boot and manual boot is optional. If you want auto boot, then, just tick it.

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len : 0x0000005D
#C_version : C636
#D_version : D000
#PLMN : 51502
#BoardID : 7551
#DeviceName : STK-L22
Build number : STK-L22 10.0.0.382(C636E6R2P2)
Product Model : STK-L22
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : kirin710
system_update_state :
vendorcountry : hw/spcseas
soc_id :
build_fingerprint :
build_version_full :
build_version_qcom : \par
psid.........
#SN :
#IMEI1 :
#IMEI2 :

Security Info....
#Dongle_info : RSA-2048,0x9001,0x7000,0x6000,0x5100,0x5000
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing.... Ok

Elapsed Time : 00:00:01
BR
Dipendra Pathak

  Reply With Quote
Old 06-11-2021, 02:09   #2009 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Hisilicon Huawei P9 lite (VNS-L21) manual selected boot FRP removed by Hydra Tool

Hisilicon Huawei P9 lite (VNS-L21) manual selected boot FRP removed by Hydra Tool

1. Run Main Tool of Hydra.
2. Choose "HiSilicon" Tab.
3. Choose Module
4. Go to "Service" and choose "Factory reset protection" from drop down menu.
5. Choose "Remove FRP"
6. Keep (Put) the device into Fastboot mode.
7. Connect device to the computer with USB Data Cable.
8. Click on "Execute"
9. Wait until the operation is complete.
Note: Auto boot and manual boot is optional. If you want auto boot, then, just tick it.

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len :
#C_version :
#D_version :
#PLMN :
#BoardID :
#DeviceName :
Build number : VNS-L21C185B380
Product Model : HUAWEI VNS-L21
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : hi6250
system_update_state :
vendorcountry : hw/meafnaf
soc_id : 0.5
build_fingerprint : 0.5
build_version_full : 0.5
build_version_qcom : 0.5
psid.........
#SN : ****************66
#IMEI1 : *************27
#IMEI2 : *************06

Security Info....
#Dongle_info : 0.5
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing....Ok
Elapsed Time : 00:00:02
BR
Dipendra Pathak

  Reply With Quote
Old 06-11-2021, 02:15   #2010 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Another Hisilicon Huwei AGS2-L03 (MeadiaPad T5) flashed using Fastboot by Hydra

Another Hisilicon Huwei AGS2-L03 (MeadiaPad T5) flashed using Fastboot by Hydra

1. Run Main Tool of Hydra.
2. Choose "HiSilicon" Tab.
3. Choose Module
4. Go to "Flash" and choose "Fastboot".
5. Choose "File" and its location and click on okay.
6. Keep (Put) the device into Fastboot mode.
7. Connect device to the computer with USB Data Cable.
8. Click on "Execute"
9. Wait until the operation is complete.

Screen Short:



Logs:

Quote:
Searching Device By Fastboot
Device Found...
Flashing....
- base_verlist , 502 Bytes... Ok
- base_ver , 23 Bytes... Ok
- hisiufs_gpt, 196 KB... Ok
- xloader , 180 KB... Ok
- fastboot , 3.683 MB... Ok
- hhee , 68.063 KB... Ok
- dts , 90 KB... Ok
- trustfirmware , 175.5 KB... Ok
- fw_lpm3 , 204.125 KB... Ok
- dto , 14.233 MB... Ok
- kernel, 24 MB... Ok
- teeos , 3.204 MB... Ok
- isp_firmware , 10.127 MB... Ok
- vector , 1.162 MB... Ok
- sensorhub , 2.01 MB... Ok
- fw_hifi , 5.106 MB... Ok
- vbmeta , 16 KB... Ok
- modemnvm_update , 5.232 MB... Ok
- modemnvm_cust , 1.294 MB... Ok
- recovery_ramdisk , 32 MB... Ok
- recovery_vendor , 16 MB... Ok
- recovery_vbmeta , 6.938 KB... Ok
- preas, 726.27 MB... Ok
- preavs , 4.359 MB... Ok
- erecovery_kernel , 24 MB... Ok
- erecovery_ramdisk , 32 MB... Ok
- erecovery_vendor , 16 MB... Ok
- erecovery_vbmeta\ , 6.938 KB... Ok
- eng_vendor , 12 MB... Ok
- eng_system , 12 MB... Ok
- cache , 72.121 KB... Ok
- system , 1.344 GB... Ok
- cust , 54.16 MB... Ok
- modem_fw , 56 MB... Ok
- hisee_img , 516 KB... Ok
- hisee_fs , 56.145 KB... Ok
- vendor , 411.925 MB... Ok
- odm\cf3 , 58.086 MB... Ok
- product , 803.366 MB... Ok
- patch , 5.067 MB... Ok
- userdata , 308.379 KB... Ok

Rebooting phone to Normal...
Done!!!!

Elapsed Time : 00:04:11
BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 09:25.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.41856 seconds with 9 queries

SEO by vBSEO