GSM Shop  
GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 06-12-2021, 02:10   #2011 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,625
Vivo Y83 (PD1803BF) FRP partition successfully removed by Hydra Tool


Vivo Y83 (PD1803BF) FRP partition successfully removed by Hydra Tool

1. Run Hydra MTK Tool.
2. Choose Brand and Module.
3. Go "Service"-->"Tool"
4. Choose "Factory Reset Protection FRP" from universal operation menu.
5. Choose "Format / Erase" from drop down "Method / Option"
6. Click "Execute"
7. Connect cellphone to computer with the help of USB Data Cable.
8. Wait until the operation is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM (Android) (COM32)
Device :5&1d65b4dc&0&10
SymbolicName :\??\USB#VID_0E8D&PID_2000#5&1d65b4dc&0&10#{a5dcbf 10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 253F89D917B74C801AB77C413D072E7A
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100524436344D42017288CE18157D - RD64MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : vivo
Vendor : vivo
Model : vivo 1726
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 8.1.0 O11019 1545229721 release-keys
Device : PD1803F_EX
Display ID : O11019 release-keys
Security Patch : 2018-12-05
Platform : =MTK6765
Fingerprint : vivo/1726/1726:8.1.0/O11019/1545229721:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Format/Erase
Processing...
Erasing FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:05
BR
Dipendra Pathak

  Reply With Quote
Old 06-12-2021, 02:17   #2012 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,625
Xiaomi Redmi 6 (cereus) rebuilding user data successfully done by Hydra Tool

Xiaomi Redmi 6 (cereus) rebuilding user data successfully done by Hydra Tool

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tool
4. Choose "ultra power option" from universal menu.
5. Choose "Rebuilt user data" from "Option / Method" drop down menu
6. Execute and connect the device to the computer with data cable
7. Click on "Execute".
8. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM15)
Device :6&3760f4bb&0&3
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&3760f4bb&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SB : 01 (True)
SLA : 02 (True)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : 6765_Xiaomi_wb.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/03/17.ÉIIç10:04_497508
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cereus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0C597C9AC8CA4C12C612E6699B6FFB45
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203AF529688B54B - QE63MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 9 PPR1.180610.011 V11.0.5.0.PCBCNXM release-keys
Miui Ver : V11
Device : cactus
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-03-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.5.0.PCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_cactus.bin
Creating Scatter file... C:\Users\*****\Desktop\hydra tool\Hydra Tool\\Backup\Auto\0766_xiaomi_cactus_cactus_9_PPR1 .180610.011_V11.0.5.0.PCBCNXM_061121175512\MT6765_ Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-protect1[0x0D688000]8 MB ->protect1.bin...Ok
-protect2[0x0DE88000]9.469 MB ->protect2.bin...Ok
-persist[0x0F000000]64 MB ->persist.bin...Ok
-nvram[0x1BE80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Users\*****\Desktop\hydra tool\Hydra Tool\\Backup\Auto\0766_xiaomi_cactus_cactus_9_PPR1 .180610.011_V11.0.5.0.PCBCNXM_061121175512
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0C597C9AC8CA4C12C612E6699B6FFB45
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100514536334D4203AF529688B54B - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : zh-CN
Description : cactus-user 9 PPR1.180610.011 V11.0.5.0.PCBCNXM release-keys
Miui Ver : V11
Device : cactus
Display ID : SW_S98506AE1_V009_M13_XM_C3C_USR
Security Patch : 2020-03-01
Fingerprint : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.5.0.PCBCNXM:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Rebuild Userdata
Processing...
Erasing FRP Partition...
Rebuilding Userdata... Ok

Elapsed Time : 00:00:52
BR
Dipendra Pathak

  Reply With Quote
Old 06-12-2021, 02:24   #2013 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,625
Xiaomi Redmi 9A (dandelion) removed Mi Account Erased Method done by Hydra Tool

Xiaomi Redmi 9A (dandelion) removed Mi Account Erased Method done by Hydra Tool

1. Run Hydra MTK Module and Sosc.
2. Choose Brand and Module.
3. Go to "Service"-->"Tool" Tab.
4. Choose "Xiaomi".
5. Click on "Remove Mi Account (Erased Method)" from drop down menu.
6. Click "Execute" button
7. connect device to the computer with USB Data cable
8. Wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM94)
Device :5&8639f5&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&8639f5&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SB : 01 (True)
SLA : 02 (True)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : 6765_Xiaomi_wb.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/03/17.上午10:04_497508
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...[ERROR]- NOT SYNC
=============================================
Reasons why it fails due to the following"
1. Harware problem/issues
2. If you did Testpoint Kindly check the parts you Touch/TP
3. Powershortage, try to connect Battery
4. Check or replace usb cable and plug directly to your pc usb port.
=============================================
SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_redmi9a_Hydra_V2.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4A547BF8A471A595F9285A052F42AC82
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100424A54443452097CAF8C1A87FD - BJTD4R

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k62v1_64_bsp.bin
Creating Scatter file... D:\Hydra Tool\\Backup\Auto\0766__061121162757\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x3BD88000]1024 KB ->frp.bin...Ok
-nvdata[0x3DE88000]64 MB ->nvdata.bin...Ok
-protect1[0x45522000]8 MB ->protect1.bin...Ok
-protect2[0x45D22000]10,867 MB ->protect2.bin...Ok
-persist[0x47000000]48 MB ->persist.bin...Ok
-nvram[0x52E80000]64 MB ->nvram.bin...Ok
Done!!!
D:\Hydra Tool\\Backup\Auto\0766__061121162757
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4A547BF8A471A595F9285A052F42AC82
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100424A54443452097CAF8C1A87FD - BJTD4R

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method]
Processing...
-persist.bin[0x47000000]48 MB ->persist.bin...Ok
-frp.bin[0x3BD88000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:00:52
BR
Dipendra Pathak

  Reply With Quote
Old 06-12-2021, 02:31   #2014 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,625
Oppo F1s Plus Screen Pattern Lock successfully read by Hydra Tool

Oppo F1s Plus Screen Pattern Lock successfully read by Hydra Tool

1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module as "Auto"
3. Go to "Service"--> "Tool" from Universal Option
4. Choose "Screen Lock Security"
5. Choose "Read Pattern" from "Method / Option" drop down menu.
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification A_HIGHSPEED_VCOM
FriendlyName :MediaTek DA USB VCOM (Android) (COM34)
Device :6&1c75b1dc&0&1
SymbolicName :\??\USB#VID_0E8D&PID_2001#6&1c75b1dc&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 89F6306A74E3B79A750527015D74D79C
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A40A73092E8387 - HBG4a2

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : A1601
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15331-user 5.1 LMY47I 1577332894 release-keys
Device : A1601
Board : full_oppo6750_15331
Display ID : A1601EX_11_A.41_191226
Security Patch : 2018-01-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : . Found
Gesture Data : 3AA0F787F855CB2C64CEAB5AAA2F83482FE2C31D
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 98623
1 2 3
4 5 6
7 8 9

Ok

Elapsed Time : 00:00:09
BR
Dipendra Pathak

  Reply With Quote
Old 06-12-2021, 02:35   #2015 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,625
Huawei FRL-L22 (Y9a- 2021) TWO imei successfully repaired by Hydra Tool

Huawei FRL-L22 (Y9a- 2021) TWO imei successfully repaired by Hydra Tool

1. Run Hydra MTK Module and choose Sosc.
2. Choose Brand and Module.
3. Go to "Service"-->"Repair IMEI" Tab.
4. Tick "IMEI changing........................."
5. Choose "Huawei FlashMode" from drop down menu.
6. Type Both IMEI written as in battery housing and tick both of box
7. Click on "Repair IMEI"
8. connect device to the computer with USB Data cable
9. Wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
***IMEI REPAIR FUNCTION****
Huawei Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM15)
Device :6&28ee2e2f&0&3
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&28ee2e2f&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SB : 01 (True)
SLA : 00 (False)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : MT6768_Xiaomi_New.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/07/07.10:10_513994
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k69v1_64.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : EAD40E3FC4C8CE0D66BEDEF3D344D774
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100445554423432027B71FA6277D3 - DUTB42

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k69v1_64.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__061121145550\MT6768_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x01A08000]1024 KB ->frp.bin...Ok
-nvdata[0x03B08000]32 MB ->nvdata.bin...Ok
-protect1[0x05B08000]8 MB ->protect1.bin...Ok
-protect2[0x06308000]8 MB ->protect2.bin...Ok
-persist[0x07800000]8 MB ->persist.bin...Ok
-nvram[0x08100000]21 MB ->nvram.bin...Ok
-oeminfo[0x09600000]32 MB ->oeminfo.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__061121145550
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : EAD40E3FC4C8CE0D66BEDEF3D344D774
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100445554423432027B71FA6277D3 - DUTB42

Reading GPT-EMMC [0x00008000] 130 Items
IMEI INFO..
IMEI1 : 863992051384687
IMEI2 : 863992051404691
Repairing HUWEI IMEI....

OLD IMEI..
IMEI1 : *************87
IMEI2 : *************91

NEW IMEI..
IMEI1 : *************70
IMEI2 : *************88
Done!!!!

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:51
BR
Dipendra Pathak

  Reply With Quote
Old 06-12-2021, 11:38   #2016 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 232
Donate money to this user
Arrow Redmi 7A (REDMI)MI ACCOUNT REMOVE DONE BY HYDRA TOOL

  Reply With Quote
Old 06-12-2021, 11:41   #2017 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 232
Donate money to this user
Arrow Redmi 4X (REDMI)PATTERN FRP UNLOCK DONE BY HYDRA TOOL

  Reply With Quote
Old 06-12-2021, 11:45   #2018 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 232
Donate money to this user
Arrow Redmi 7A (REDMI) PIN FRP REMOVE DONE BY HYDRA TOOL

  Reply With Quote
Old 06-12-2021, 13:45   #2019 (permalink)
Freak Poster
 
Join Date: Jun 2014
Location: Turkiye-Konya
Posts: 316
Member: 2199727
Status: Offline
Thanks Meter: 217
huawei mrd-lx1 y6 2019 imei repair ok via test point

  Reply With Quote
Old 06-13-2021, 02:43   #2020 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,625
Xiaomi Redmi Note 9 (merlin) wiping presist and super successfully done by Hydra

Xiaomi Redmi Note 9 (merlin) wiping presist and super successfully done by Hydra

1. Run Hydra MTK Module and Sosc.
2. Choose Brand and Module.
3. Go to "PM" Tab.
4. Choose "Flash Mode" radio button.
5. choose "presist, presistbak, protect1 protect2 and suer" from partition.
6. Click on "Erase"
7. connect device to the computer with USB Data cable
8. Wait until the process is completed.

Screen Short:



Logs:

Quote:
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM (Android) (COM12)
Device :5&b015658&0&7
SymbolicName :\??\USB#VID_0E8D&PID_2000#5&b015658&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5BCC3A1C6B7008C420027113A4DBAD65
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 13014E47314A395339100338810E4751 - G1J9S9

Reading GPT-EMMC [0x00008000] 130 Items

Format Selected Partition
Wiping... [persist] Ok!
Wiping... [persistbak] Ok!
Wiping... [protect1] Ok!
Wiping... [protect2] Ok!
Wiping... [super] Ok!
=====================================

Elapsed Time : 00:08:22
BR
Dipendra Pathak

  Reply With Quote
Old 06-13-2021, 03:01   #2021 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,625
Xiaomi Redmi Note 9 (merlin) repair second IMEI successfully done by Hydra Tool

Xiaomi Redmi Note 9 (merlin) repair second IMEI successfully done by Hydra Tool

1. Run Hydra Tool MTK Module.
2. Choose Brand and Module.
3. Go to "Servic"--> "IMEI Repair"
4. Tick on "IMEI changing...........is illigal......"
5. Choose "Xiaomi Flash Mode" from drop down menu
6. Type IMEI from the Device Battery Housing (Original IMEI)
7. Tick "Auto Reboot"
8. Click on "Repair IMEI"
9. Connect cellphone to computer using USB Data Cable.
10. Wait until the operation is completed.

Screen Short:



Logs:

Quote:
=====================================
***IMEI REPAIR FUNCTION****
Xiaomi Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM12)
Device :5&29e2f72&0&9
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&29e2f72&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2DEBFB60B9F8802F4DD6A661E709BCBA
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 90014A6844456150330310337ECEB7B3 - hDEaP3

Reading GPT-EMMC [0x00008000] 130 Items

IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : ***************92
IMEI INFO..
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : ***************43

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:06
BR
Dipendra Pathak

  Reply With Quote
Old 06-13-2021, 04:09   #2022 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,625
Nokia TA1118 (Nokia 3.1 Plus LTD DS ROO) Frp protection successfully removed by Hydra

Nokia TA1118 (Nokia 3.1 Plus LTD DS ROO) Frp protection successfully removed by Hydra

1. Run Hydra MTK Module and choose "Sosc"
2. Select Brand and Model
3. Go to Service-->Tool
4. Choose "Factory reset protection FRP" from universal menu.
5. Choose "Zero Wipe" from "Option / Method" drop down menu
6. Execute and connect the device to the computer with data cable
7. Click on "Execute".
8. wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM11)
Device :6&27b37423&0&3
SymbolicName :\??\COM11
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : BEC15A93C07DE715B467FE9AAFCBDF19
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D42014279D25D95CF - GD6BMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : FIH_GSI
Vendor : FIH
Model : GSI-00WW
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : Rooster_00WW-user 9 PPR1.180610.011 00WW_2_25J release-keys
Device : ROO_sprout
Display ID : 00WW_2_25J
Security Patch : 2019-03-05
Fingerprint : Nokia/Rooster_00WW/ROO_sprout:9/PPR1.180610.011/00WW_2_25J:user/release-keys
Userdata State : Encrypted

-------------------------------------
Operation : Zero Wipe
Processing...
ZeroWipe FRP Partition... Ok

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 06-13-2021, 04:15   #2023 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,625
Huawei DRA-LX5 (Y5 Lite 2018) FRP partition successfully removed by Hydra Tool

Huawei DRA-LX5 (Y5 Lite 2018) FRP partition successfully removed by Hydra Tool

1. Run MTK tool.
2. Choose Correct Module and Brand.
3. Go to "Service" -- > Tool"
4. Choose "Factory Reset Protection FRP" tool from universal option.
5. choose "Format / Erase" .
6. Click on "Execute" and connect device with computer using USB cable.
7. Wait until the process is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM11)
Device :5&df74106&0&2
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&df74106&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0699MT6739 [6739]
hw subcode : 8A00
hw version : CB00
sw version : 0002
Target config : E3
SB : 01 (True)
SLA : 02 (True)
DAA : 00 (False)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0699MT6739 [6739]
hw subcode : 8A00
hw version : CB00
sw version : 0002
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : [Not Exist]
Trying Default 6739.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.22:07_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_Dura.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 17ED2A1AA0DC47168E5C6C56BE67FFC7
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000040000000 -1024 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100464536324D4206697707A976E9 - FE62MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : HUAWEI
Vendor : HUAWEI
Model : DRA-LX5
ID : HUAWEIDRA-LX5
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : "DRA-LX5-user 8.1.0 HUAWEIDRA-LX5 1.0.0.134(C636) release-keys"
Device : HWDRA-MG
Board : DRA-LX5
Display ID : DRA-LX5 1.0.0.134(C636)
Security Patch : 2019-09-05
Fingerprint : HUAWEI/DRA-LX5/HWDRA-MG:8.1.0/HUAWEIDRA-LX5/1.0.0.134(C636):user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_dura.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0699_HUAWEI_DRA-LX5_HWDRA-MG_8.1.0_HUAWEIDRA-LX5_1.0.0.134(C636)_061221140614\MT6739_Android_sc atter.txt
-pgpt[0x00000000]512 KB ->pgpt.bin...Ok
-frp[0x01600000]1024 KB ->frp.bin...Ok
-nvdata[0x01F00000]32 MB ->nvdata.bin...Ok
-protect1[0x05F10000]8 MB ->protect1.bin...Ok
-protect2[0x06710000]16.938 MB ->protect2.bin...Ok
-nvram[0x0F700000]5 MB ->nvram.bin...Ok
-oeminfo[0x10DE0000]8 MB ->oeminfo.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0699_HUAWEI_DRA-LX5_HWDRA-MG_8.1.0_HUAWEIDRA-LX5_1.0.0.134(C636)_061221140614
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 17ED2A1AA0DC47168E5C6C56BE67FFC7
ERAM Size : 0x0000000000020000 -128 KB
IRAM Size : 0x0000000040000000 -1024 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14.561 GB
eMMC CID : 150100464536324D4206697707A976E9 - FE62MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : HUAWEI
Vendor : HUAWEI
Model : DRA-LX5
ID : HUAWEIDRA-LX5
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : "DRA-LX5-user 8.1.0 HUAWEIDRA-LX5 1.0.0.134(C636) release-keys"
Device : HWDRA-MG
Board : DRA-LX5
Display ID : DRA-LX5 1.0.0.134(C636)
Security Patch : 2019-09-05
Fingerprint : HUAWEI/DRA-LX5/HWDRA-MG:8.1.0/HUAWEIDRA-LX5/1.0.0.134(C636):user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Format/Erase
Processing...
Erasing FRP Partition... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:50
BR
Dipendra Pathak

  Reply With Quote
Old 06-13-2021, 04:24   #2024 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,625
Oppo A12 (CPH2083) Factory Reset and format User Data successfully done by Hydra Tool

Oppo A12 (CPH2083) Factory Reset and format User Data successfully done by Hydra Tool

1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"--> "Tool" from Universal Option
4. Choose "Factory Reset / Format user data"
5. Choose "Safe Format Master Clear 1" drop down menu.
6. Connect device to computer using USB Data Cable.
7. Wait until the operation is completed

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1633 (COM7)
Device :5&10dc9a0c&0&3
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&10dc9a0c&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F3146643216612E9E31F598A9249C862
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E0333A5E0BB1713 - hB8aP>

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_19451-user 9 PPR1.180610.011 eng.root.20210403.000938 release-keys
Security Patch : 2021-04-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Safe Format Master Clear 1
Processing...
Safeformat Master Clear 1... Ok

Elapsed Time : 00:00:03
BR
Dipendra Pathak

  Reply With Quote
Old 06-13-2021, 11:52   #2025 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 232
Donate money to this user
Arrow Nokia 2 | TA-1011 FRP Remove By HYDRA TOOL

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 11:01.



Powered by Searchlight © 2025 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.39630 seconds with 9 queries

SEO by vBSEO