GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 06-25-2021, 02:23   #2101 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Huawei FRL-L23 (Y9A 2021) removed Account successfully done by Hydra Tool


Huawei FRL-L23 (Y9A 2021) removed Account successfully done by Hydra Tool

1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"> "Tool"
4. Choose "Huawei"
5. Choose "Remove account " from "Method / Option" drop down menu.
6. Click on "Execute"
7. Connect device to computer using USB Data Cable.
8. Wait until the operation is completed.

Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-25-2021, 02:43   #2102 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 9A (Dandelion) removed Mi Account successfully done by Hydra Tool

Xiaomi Redmi 9A (Dandelion) removed Mi Account successfully done by Hydra Tool

1. Run Hydra MTK Module and Sosc.
2. Choose Brand and Module.
3. Go to "Service"-->"Tool" Tab.
4. Choose "Xiaomi".
5. Click on "Remove Mi Account (Erased Method) + FRP" from drop down menu.
6. Click "Execute" button
7. connect device to the computer with USB Data cable
8. Wait until the process is completed.

Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-26-2021, 02:08   #2103 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Hisilicon Huawei BND-AL10 (Honor 7X) Huawei Account removed using Fastboot by Hydra

Hisilicon Huawei BND-AL10 (Honor 7X) Huawei Account removed using Fastboot by Hydra

1. Run Main Tool of Hydra.
2. Choose "HiSilicon" Tab.
3. Choose Module or auto
4. Go to "Service" and choose "Factory reset protection / Account" from drop down menu.
5. Choose "Remove Huawei ID"
6. Keep (Put) the device into Fastboot mode.
7. Connect device to the computer with USB Data Cable.
8. Click on "Execute"
9. Wait until the operation is complete.
Note: Auto boot and manual boot is optional. If you want auto boot, then, just tick it.


Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-26-2021, 02:18   #2104 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Samsung J200H successfully flashed by Hydra Tool

Samsung J200H successfully flashed by Hydra Tool

1. Run Hydra Main Tool
2. Go to "Samsung" Tab
3. Put the device into "Download Mode" manually
4. Connect Device with Computer using USB Data Cable
5. Choose "Module"
6. Go got "Flashing" Tab
7. Choose Flash file from "Image Path"
8. Tick "Reboot after flash" if you want it reboot after flashing it.
9. Click on "Flash"
10. Wait until the flashing process is completed.
11. Done

Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-26-2021, 02:22   #2105 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Oppo A5s (CPH1909) Formatting user data successfully done by Hydra Tool

Oppo A5s (CPH1909) Formatting user data successfully done by Hydra Tool

1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"–> "Tool"
4. Choose "Ultra Option"
5. Choose "Auto " from "Method / Option" drop down menu.
6. Click on "Execute"
7. Connect device to computer using USB Data Cable.
8. Wait until the operation is completed.
Screen Short:



Logs:

Quote:
Brand : OPPO Model : A5s (CPH1909) Connection : Flash Mode

=====================================
Connection
-Please wait...
-Found...[COM36]

TPortConnection.Create...(COM36)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5C765407D4E0FF3EE0BE59C7668BEB71
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D4201B11906171605 - GD6BMB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_18511-user 8.1.0 O11019 1616154336 release-keys
Security Patch : 2021-04-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...[C002002A-STATUS_SEC_IMG_TYPE_MISMATCH]
Erasing FRP Partition...
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:11
BR
Dipendra Pathak

  Reply With Quote
Old 06-26-2021, 02:33   #2106 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 6A (Cactus) Mi Account Successfully Removed by Hydra Tool

Xiaomi Redmi 6A (Cactus) Mi Account Successfully Removed by Hydra Tool

1. Run Hydra MTK Module and Sosc.
2. Choose Brand and Module.
3. Go to "Service"-->"Tool" Tab.
4. Choose "Xiaomi".
5. Click on "Remove Mi Account (Erased Method)" from drop down menu.
6. Click "Execute" button
7. connect device to the computer with USB Data cable
8. Wait until the process is completed.
Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM13)
Device :6&564bb55&0&5
SymbolicName :\??\USB#VID_0E8D&PID_0003#6&564bb55&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2016,3.2

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SB : 01 (True)
SLA : 02 (True)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 00
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : 6765_Xiaomi_wb.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/03/17.上午10:04_497508
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_cactus.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0780C373129534784F5DFFC767CDEE08
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14,561 GB
eMMC CID : 150100514536334D420385E46ABE65B3 - QE63MB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 8.1.0 O11019 V10.3.8.0.OCBMIXM release-keys
Miui Ver : V10
Device : cactus
Mod_device : cactus_global
Display ID : O11019
Security Patch : 2019-12-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.3.8.0.OCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_cactus.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cactus_cactus_8.1.0_ O11019_V10.3.8.0.OCBMIXM_062521124312\MT6765_Andro id_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05588000]1024 KB ->frp.bin...Ok
-nvdata[0x07688000]64 MB ->nvdata.bin...Ok
-protect1[0x0D688000]8 MB ->protect1.bin...Ok
-protect2[0x0DE88000]9,469 MB ->protect2.bin...Ok
-persist[0x0F000000]64 MB ->persist.bin...Ok
-nvram[0x1BE80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766_xiaomi_cactus_cactus_8.1.0_ O11019_V10.3.8.0.OCBMIXM_062521124312
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0780C373129534784F5DFFC767CDEE08
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x00000003A3E00000 -14,561 GB
eMMC CID : 150100514536334D420385E46ABE65B3 - QE63MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6A
ID : O11019
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : cactus-user 8.1.0 O11019 V10.3.8.0.OCBMIXM release-keys
Miui Ver : V10
Device : cactus
Mod_device : cactus_global
Display ID : O11019
Security Patch : 2019-12-01
Fingerprint : xiaomi/cactus/cactus:8.1.0/O11019/V10.3.8.0.OCBMIXM:user/release-keys
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok
Redmi 6A_8.1.0_062521124354
Backing up Partition for safety...
-Redmi 6A_8.1.0_062521124354[0x0F000000]64 MB ->persist.img...OkOk
Saved to :
C:\Hydra Tool\Backup\Persist\Redmi 6A_8.1.0_062521124354.bin
Erasing FRP Partition...
-persist.bin[0x0F000000]64 MB ->persist.bin...Ok
-frp.bin[0x05588000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:01:14
BR
Dipendra Pathak

  Reply With Quote
Old 06-26-2021, 02:40   #2107 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Oppo A37m (Neo 9) Read Pattern code successfully done by Hydra Tool

Oppo A37m (Neo 9) Read Pattern code successfully done by Hydra Tool

1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module.
3. Go to "Service"> "Tool"
4. Choose "Screen Lock Security"
5. Choose "Read Pattern " from "Method / Option" drop down menu.
6. Click on "Execute"
7. Connect device to computer using USB Data Cable.
8. Wait until the operation is completed.

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification A_HIGHSPEED_VCOM
FriendlyName :MediaTek DA USB VCOM (Android) (COM106)
Device :5&356b5377&0&14
SymbolicName :\??\USB#VID_0E8D&PID_2001#5&356b5377&0&14#{a5dcbf 10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0


Reading Device UniqueID, RAM and Flash Chip Info...
ERROR : ACK : 0x00010009[]

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO A37m
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15127-user 5.1 LMY47I 1488448383 dev-keys
Device : A37
Board : full_oppo6750_15127
Display ID : A37m_11_A.18_170302
Security Patch : 2016-09-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : OPPO/A37m/A37:5.1/LMY47I/1474447292:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : . Found
Gesture Data : 8E390861D6F37FCC9C0B745B4C24446EB3841E56
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 5326
1 2 3
4 5 6
7 8 9

Ok

Elapsed Time : 00:00:03
BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 06-26-2021, 11:40   #2108 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 232
Donate money to this user
Arrow MICROMAX HS 2 (HS2) PATTERN REMOVED successfully by HYDRA QUALCOMM TOOL

  Reply With Quote
The Following User Says Thank You to HASIM MOBILE For This Useful Post:
Old 06-26-2021, 11:51   #2109 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 232
Donate money to this user
Arrow OPPO F1S (CPH1601) PATTERN REMOVED successfully by UAT MTK TOOL (Success)

  Reply With Quote
The Following User Says Thank You to HASIM MOBILE For This Useful Post:
Old 06-26-2021, 11:56   #2110 (permalink)
Freak Poster
 
Join Date: Jun 2016
Location: INDIA (BIHAR,MOTIHARI)
Posts: 305
Member: 2589490
Status: Offline
Sonork: live:.cid.32a2af136177ed3
Thanks Meter: 232
Donate money to this user
Arrow REALME 7 (RMX2151) PATTERN REMOVED successfully by UAT MTK TOOL (Success)

  Reply With Quote
The Following User Says Thank You to HASIM MOBILE For This Useful Post:
Old 06-26-2021, 12:45   #2111 (permalink)
No Life Poster
 
sky73's Avatar
 
Join Date: Jan 2013
Location: gsmhosting
Age: 29
Posts: 1,148
Member: 1876736
Status: Offline
Thanks Meter: 739
redmi 8 remove mi account done full auto
without relock
no need select any model just one click

Code:
PreOperation Configuration 
 Brand : AUTO Model : AUTO Storage : Auto
 Loader: Auto
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM14)
 SymbolicName :\??\USB#VID_05C6&PID_9008#5&15c311e1&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :03/19/2014,2.1.1.2

Getting device info......
Serial No.: 0xE8861FB6
HW_ID     : 000BF0E100720000
MSM ID    : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
MODEL_ID  : 0x0000
OEM_ID    : 0x0072 - XIAOMI
PBL Ver   : 00000001
PK HASH   : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Hydra Enable Auto search Firehose..
 #Please wait...
 #Search by filename filter.....
 #Found 3 Compatible Files..Found match Firehose...
 
Firehose Loader[000bf0e100720000_57158eaf1814d78f_2644f460_xiaomi_auth_peek_8937.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8937
  Tag            : _auth_peek
  Version        : 3
  Code_size      : 320
  Signature_size : 256
  fhVendor       : XIAOMI
  HW_ID          : 000BF0E100720000
  Vendor         : XIAOMI
  OEM_ID         : 0072
  MODEL_ID       : 0000
  SW_ID          : 0000000100000003
  APP_ID         : 
  pk_hash        : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
  OEM_VERSION    : c4-miui-ota-bd28.bj
  IMAGE_VARIANT  : FAADANAZA
  QC_VERSION     : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok 
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[DuylGG1dhh1CbzktNcZa1UYdfhD]
Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8937
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 515294342
Firmware Version    : 842018864
Product Name        : hC9aP3
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  122142720[58.242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[3]
          Drive [0] 64 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

 
Phone Information......
  Brand          : Xiaomi
  Vendor         : Xiaomi
  Model          : Redmi 8
  ID             : PKQ1.190319.001
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : olive-user 9 PKQ1.190319.001 V11.0.7.0.PCNEUXM release-keys
  Miui Ver       : V11
  Device         : olive
  Mod_device     : olive_eea_global
  Display ID     : ZQL2115-olive-build-20200521004425
  Security Patch : 2020-05-01
  Emmc_size      : 16GB
  Fingerprint    : Xiaomi/olive_eea/olive:9/PKQ1.190319.001/V11.0.7.0.PCNEUXM:user/release-keys

Processing Remove MiAccount[New Method]....
Backing up Partition for safety...Ok

Scanning Patching address...
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]
  > Patching address detected [PATCHED]Done!!
Total Items patched : 153
Successfully patched address..
Action Result : Ok

Elapsed Time : 00:00:43
  Reply With Quote
The Following User Says Thank You to sky73 For This Useful Post:
Old 06-27-2021, 05:36   #2112 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Huawei Honor DUA-AL00 (Honor 7 Play) Remove Account done by Hydra Tool

Huawei Honor DUA-AL00 (Honor 7 Play) Remove Account done by Hydra Tool

1. Run MTK Tool and choose "Sosc"
2. Choose Brand and Module or leave as "Auto"
3. Go to "Service"> "Tool"
4. Choose "Huawei"
5. Choose "Remove Account " from "Method / Option" drop down menu.
6. Click on "Execute"
7. Connect device to computer using USB Data Cable.
8. Wait until the operation is completed.
Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 06-27-2021, 05:53   #2113 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 9C (Angelica) Mi Account successfully removed by Hydra Tool

Xiaomi Redmi 9C (Angelica) Mi Account and FRP successfully removed by Hydra Tool

1. Run Hydra MTK Module and Sosc.
2. Choose Brand and Module.
3. Go to "Service"-->"Tool" Tab.
4. Choose "Xiaomi".
5. Click on "Remove Mi Account (Erase Method) + FRP" from drop down menu.
6. Click "Execute" button
7. connect device to the computer with USB Data cable
8. Wait until the process is completed

Screen Short:



Logs:

Quote:
=====================================
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM18)
Device :5&16901fd6&0&3
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&16901fd6&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/03/2016,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SB : 01 (True)
SLA : 02 (True)
DAA : 04 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SB : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
NORMAL BOOT

Preparing Download Agent..
DA : 6765_Xiaomi_wb.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020/03/17.上午10:04_497508
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_k65v1_64_bsp.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 35243E32816D95D5D4359540CA3702A9
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 450100444134303332013607B518A7B5 - DA4032

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k65v1_64_bsp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__062721064433\MT6765_Androi d_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x3BD88000]1024 KB ->frp.bin...Ok
-nvdata[0x3DE88000]64 MB ->nvdata.bin...Ok
-protect1[0x45522000]8 MB ->protect1.bin...Ok
-protect2[0x45D22000]10,867 MB ->protect2.bin...Ok
-persist[0x47000000]48 MB ->persist.bin...Ok
-nvram[0x52E80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__062721064433
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 35243E32816D95D5D4359540CA3702A9
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 450100444134303332013607B518A7B5 - DA4032

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove MiAccount[Erase Method] + FRP
Processing...
-persist.bin[0x47000000]48 MB ->persist.bin...Ok
-frp.bin[0x3BD88000]1024 KB ->frp.bin...Ok
__062721064506
Backing up Partition for safety...
-__062721064506[0x47000000]48 MB ->persist.img...OkOk
Saved to :
C:\Hydra Tool\Backup\Persist\__062721064506.bin
Erasing FRP Partition...
-persist.bin[0x47000000]48 MB ->persist.bin...Ok
-frp.bin[0x3BD88000]1024 KB ->frp.bin...Ok Ok

Elapsed Time : 00:01:11
BR
Dipendra Pathak

  Reply With Quote
Old 06-27-2021, 06:09   #2114 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi Note 8 (Ginkgo) FRP successfully removed by Hyudra Tool

Xiaomi Redmi Note 8 (Ginkgo) FRP successfully removed by Hyudra Tool

1. Run Hydra Qualcomm Module.
2. Choose Brand and Module.
3. Go to "Service"-->"Univesal" Tab.
4. Choose "Factory Reset Protection" from Drop down menu.
5. Choose "Auto" from flash mode.
6. Click "Execute" button
7. connect device to the computer with USB Data cable
8. Wait until the process is completed

Screen Short:




BR
Dipendra Pathak

  Reply With Quote
Old 06-27-2021, 06:19   #2115 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi REdmi 6A (Cactus) formatted selected partition successfully done by Hydra Tool

Xiaomi Redmi 6A (Cactus) formatted selected partition successfully done by Hydra Tool

1. Run Hydra MTK Module, Select Brand and Model
2. Go to Service-->"PM" Tab
3. Choose "Flash Mode"
4. Choose "Read Partition"
5.Click on "Read" button
6. Connect the device to the computer using data cable and wait.
7. Now, choose the selected partition to format like here nvdata etc.
8. Click on "Erase"
9. wait until the process is completed.

Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 06:34.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.36182 seconds with 9 queries

SEO by vBSEO