|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
| LinkBack | Thread Tools | Display Modes |
07-14-2021, 02:15 | #2206 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,624 | Xiaomi Redmi 6A (Cactus) remove Mi Account successfully done by Hydra Tool Xiaomi Redmi 6A (Cactus) remove Mi Account successfully done by Hydra Tool 1. Run Hydra MTK Module and choose "Sosc" 2. Select Brand and Model as "Auto" 3. Go to Service-->Tools 4. Chose "Xiaomi" from universal operation 5. Choose "Remove Mi Account (Erased Method) "Method / Option" drop down menu 6. Execute and connect the device to the computer with data cable 7. wait until the process is completed Screen Short: BR Dipendra Pathak |
07-14-2021, 11:04 | #2207 (permalink) |
No Life Poster Join Date: Feb 2012 Age: 39
Posts: 1,395
Member: 1724862 Status: Offline Thanks Meter: 450 | Redmi 8 olive IMEI Repair | No Unlock BL | No Root | No ENG ROM Xiaomi Redmi 8 olive IMEI Repair, All MIUI and Android versions are supported. Without Unlock Bootloader Without Root Without Flash ENG Rom Full Network with 4G
Note : Only 2nd imei supported this device. Erase Security by EDL Mode : Repair IMEI LOG : |
07-15-2021, 02:32 | #2208 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,624 | Xiaomi Redmi 6a (Cactus) safe format universal using Ultra power Option done by Hydra Xiaomi Redmi 6a (Cactus) safe format universal using Ultra power Option done by Hydra 1. Run Hydra MTK Module and choose "Sosc" 2. Select Brand and Model 3. Tick "Auto Broom Exploit" is for bypassing xiaomi auth. server. 4. Go to Service-->Tools 5. Choose "Ultra Power Option "Method / Option" drop down menu 6. Execute and connect the device to the computer with data cable 7. wait until the process is completed Screen Short: BR Dipendra Pathak |
07-15-2021, 02:44 | #2209 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,624 | Huawei ATU-L22 (Y6 2018) zero wipe FRP successfully removed by Hydra Tool Huawei ATU-L22 (Y6 2018) zero wipe FRP successfully removed by Hydra Tool - Run Hydra Qualcomm Module - Select Model of your device (cellphone / mobile) - Go to "Service"--> "Universal" - choose "Factory Reset protection" - Select "Auto" from "Flash mode" - Join the TP or Short the TP of Device (you need to disassemble the device). - Click "Execute" button - Connect USB data Cable between cellphone and computer. - Wait until the operation is completed. Screen Short: BR Dipendra Pathak |
07-15-2021, 02:52 | #2210 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,624 | Oppo A15 (CPH 2185) safe format Universal successfully remove by Hydra Tool Oppo A15 (CPH 2185) safe format Universal successfully remove by Hydra Tool 1. Run MTK tool. 2. Choose Correct Module and Brand. 3. Go to "Service" -- > Tool" 4. Choose "Ultra Power Option" 5. choose "Auto" from "Method / Option" drop down menu 6. Click on "Execute" 7. connect device with computer using USB data cable. 8. Wait until the process is completed. Screen Short: BR Dipendra Pathak |
07-15-2021, 03:02 | #2211 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,624 | Oppo F17 Pro (CPH2119) Formatting user data successfully done by Hydra Tool Oppo F17 Pro (CPH2119) Formatting user data successfully done by Hydra Tool 1. Run Hydra MTK Tool and choose "Sosc". Screen Short:2. Choose Brand and Module. 3. Tick "Auto loader" and "Auto BROM Exploit" 4. Go to "Service"--> "Tool" tab 5. Choose "Factory format / reset userdata" 6. Choose "Erase User Data" from "Method / Option" drop down menu. 7. Click "Execute" 8. Connect device to computer with the help of data cable. 9. Wait until the operation is complete BR Dipendra Pathak |
07-15-2021, 15:05 | #2212 (permalink) |
No Life Poster Join Date: Jan 2013 Location: gsmhosting Age: 29
Posts: 1,148
Member: 1876736 Status: Offline Thanks Meter: 740 | nokia 2720 remove user lock by format with hydra tool Code: PreOperation Configuration Brand : NOKIA Model : 2720 Flip Storage : Auto Loader: Nokia2720.mbn Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM3) SymbolicName :\??\USB#VID_05C6&PID_9008#5&15c311e1&0&10#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :05/29/2019,2.1.3.7 Getting device info..... Serial No.: 0x1CEC3969 HW_ID : 000940E100420050 MSM ID : 0x000940E1, MSM8905-Qualcomm Snapdragon 205 MODEL_ID : 0x0050 OEM_ID : 0x0042 - ALCATEL PBL Ver : 00000000 PK HASH : 77101cea7db8958552addeb45de9e325904e89fb0cbee284399e54fc9c96aac5 Firehose Loader[Nokia2720.mbn] -------------------------------------------------- Header Type : OLD TargetMSM : 8909 Tag : Version : 3 Code_size : 320 Signature_size : 256 fhVendor : HMD HW_ID : 000940E100420050 Vendor : ALCATEL OEM_ID : 0042 MODEL_ID : 0050 SW_ID : 0000000000000003 APP_ID : pk_hash : 77101cea7db8958552addeb45de9e325904e89fb0cbee284399e54fc9c96aac5 OEM_VERSION : bjfih028 IMAGE_VARIANT : DAADANAZA QC_VERSION : BOOT.BF.3.1.2.C2.2-00016 -------------------------------------------------- SaharaBoot... Ok Sending ...............Ok Connecting to Firehose... Ping... Ok Configuration...... Identifying Chip..........eMMC Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8909 Version : 1 Protocol : Feature Phone Running : Ok Phone Information..... Brand : Nokia Vendor : HMD Global Model : Nokia 2720 Flip ID : MMB29M SDK : 23 Release : 6.0.1 ABI : armeabi-v7a CPU abilist : armeabi-v7a,armeabi Locale : en-US Description : Nokia 2720 Flip-user 6.0.1 MMB29M 21.00.17.01 dev-keys Device : Nokia 2720 Flip Board : msm8909 Display ID : MMB29M dev-keys Security Patch : xxxx-xx-xx Platform : msm8909 FRPPST : /dev/block/bootdevice/by-name/config Fingerprint : Nokia/Nokia_2720_Flip/Nokia_2720_Flip:6.0.1/MMB29M/21.00.17.01:user/dev-keys Reading GPT[1] Drive [0] 36 Items Formatting Userdata... Method : Auto Processing... - Formatting Userdata Executing ... - Formatting Userdata [Safe Format - eMMc] Failed - Formatting Userdata [Zero Wipe] OkOkOk Elapsed Time : 00:00:05 |
07-16-2021, 00:48 | #2213 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,624 | Xiaomi Redmi Noe 7 (lavender) bypass Mi account successfully done by Hydra Tool Xiaomi Redmi Noe 7 (lavender) bypass Mi account successfully done by Hydra Tool 1. Run Hydra Qualcomm Tool. 2.Choose "Module" and "Brand" 3. Go to "Service"--> "Xiaomi" tab 4. Choose "Mi Account" from drop down menu. 5. Choose "Bypass Anti-Relock Method 1" 6. Tick “Include FRP" if you want to remove FRP. 7 Click on "Execute" 8. Short TEST POINT using tuiser or join two point with any tool Note: You need disassemble device (cellphone) for this. Use google search, to find the Test Point Picture. 9. Connect Device with Computer using USB Data Cable 10. Wait until the flashing process is complete. 11. Done Screen Short: BR Dipendra Pathak |
07-16-2021, 00:54 | #2214 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,624 | Vivo Y11 (1906) removing user data successfully removed by Hydra Tool Vivo Y11 (1906) removing user data successfully removed by Hydra Tool 1. Run Qualcomm Tool and choose "Sosc" 2. Choose Brand and Module. 3. Go to "Service"--> "Vivo" 4. Choose "Factory Reset" from drop down menu 5. Choose "Forced Erased" from Flash Mode 6. Click on "Execute" 7. Connect device to computer using USB Data Cable. 8. Wait until the operation is completed. Screen Short: BR Dipendra Pathak |
07-16-2021, 01:01 | #2215 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,624 | Xiaomi Redmi S2 (ysl) successfully flashed using Fastboot mode by Hydra Too Xiaomi Redmi S2 (ysl) successfully flashed using Fastboot mode by Hydra Too 1. Run Hydra Qualcomm Tool. 2.Choose "Module" and "Brand" 3. Go to "Flash" tab 4. Choose "File Type" and its location. 5. Choose "Flash Mode" 6. Tick “Autoback EFS, “Skip write security partitions”, “SetBootableStorage”, “Skip with security partition”, “Faxtory Reset After Flash” or one or two you like to do. 7 Click on "Execute" 8. Short TEST POINT using tuiser or join two point with any tool Note: You need disassemble device (cellphone) for this. Use google search, to find the Test Point Picture. 9. Connect Device with Computer using USB Data Cable 10. Wait until the flashing process is complete. 11. Done Screen Short: BR Dipendra Pathak |
07-16-2021, 01:08 | #2216 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,624 | Xiaomi Mi CC9e (Laurus) successfully flashed using EDL mode by Hydra Tool Xiaomi Mi CC9e (laurus) successfully flashed using EDL mode by Hydra Tool 1. Run Hydra Qualcomm Tool. 2.Choose "Module" and "Brand" 3. Go to "Flash" tab 4. Choose "File Type" and its location. 5. Choose "Flash Mode" 6. Tick “Autoback EFS, “Skip write security partitions”, “SetBootableStorage”, “Skip with security partition”, “Faxtory Reset After Flash” or one or two you like to do. 7 Click on "Execute" 8. Short TEST POINT using tuiser or join two point with any tool Note: You need disassemble device (cellphone) for this. Use google search, to find the Test Point Picture. 9. Connect Device with Computer using USB Data Cable 10. Wait until the flashing process is complete. 11. Done Screen Short: BR Dipendra Pathak |
07-16-2021, 01:15 | #2217 (permalink) |
Product Manager Join Date: Apr 2008 Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989 Status: Offline Sonork: 100.1593052 Thanks Meter: 8,624 | Xiaomi Redmi Note 9 (merlin) erased user data successfully done by Hydra Tool Xiaomi Redmi Note 9 (merlin) erased user data successfully done by Hydra Tool 1. Run Hydra MTK module and SOSc. 2. Choose Brand and Module as auto. 3. Go to "Service"--> "Tool" Tab. 4. Tick "Ultra power option" 5. Choose "Erase User Data" from "Method / Option" drop down menu 6. click "Execute" button 7. connect device to the computer with USB Data cable 8. Wait until the process is completed Screen Short: BR Dipendra Pathak |
07-16-2021, 07:24 | #2218 (permalink) |
No Life Poster Join Date: Aug 2011 Location: bagmati pradesh
Posts: 3,341
Member: 1626780 Status: Offline Thanks Meter: 1,309 | Hydra Unisoc Tool Ver 1.0.1 Build 4 Windows 8.1 (Version 6.3, Build 9600, 32-bit Edition) Intel(R)Core(TM) i3-2330M CPU @ 2.20GHz NVIDIA GeForce 410M Ram Installed : 3 GB Windows Access Right : Admin Software Run As Admnistrator Port : [Auto] Scanning...COM6 Opening Port...(COM6)Ok ------------------------------------------ Service_FRP_Flashmode... ------------------------------------------ Reading IMEI.... IMEI 1 : xxx IMEI 2 : xxx Reading System Info.. Vendor : LAVA Model : LAVA LH9940 Android Ver : 8.1.0 Device : LH9940 Display ID : LAVA_iris_43_1_16_S105_INT_19F27 Security Patch : 2019-06-05 FRPPST : /dev/block/platform/soc/soc:ap-ahb/20600000.sdio/by-name/persist Fingerprint : LAVA/LH9940/LH9940:8.1.0/OPM2.171019.012/25419:user/release-keys ro_product_hardware : sc7731e_1h10_v1.1.0 sys_hardware_version : SC7731e_2_IRD_K_V1.1.0 Removing FRP...Ok Elapsed Time : 00:00:04 |
The Following User Says Thank You to malka4u For This Useful Post: |
07-16-2021, 09:18 | #2219 (permalink) |
No Life Poster Join Date: Jan 2020 Location: Algeria
Posts: 825
Member: 2944109 Status: Offline Thanks Meter: 670 | Condor Plume H1 (SP620) Ultra Power Option Condor Plume H1 (SP620) Ultra Power Option Code: PreOperation Configuration Brand : CONDOR Model : Plume H1 Storage : Auto Loader: Mi_8953.mbn Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM42) SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :08/31/2015,2.1.2.0 Getting device info..Ok Device MODE : Firehose Connecting to Firehose... Ping.. Ok Configuration...... Identifying Chip.... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 1048576 MaxPayloadSizeToTargetInBytesSupported : 1048576 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8953 Version : 1 *** STORAGE DEVICE INFO *** Memory Type : eMMC Block Size in Bytes : 512 Page Size : 512 Manufacturer ID : 144 Serial Number : 934817224 Firmware Version : 165 Product Name : HAG4a2 Physical Partitions : 3 Total Logical Blocks: Drive [0] 30777344[14.676 GB] Drive [1] 8192[4 MB] Drive [2] 8192[4 MB] Protocol : Universal Running : Ok Reading GPT[3] Drive [0] 48 Items Drive [1] 0 Items Drive [2] 0 Items Phone Information..... Brand : Condor Vendor : SPA Condor Electronics Model : Plume H1 ID : N2G47H SDK : 25 Release : 7.1.2 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Locale : en-US Description : msm8953_64-user 7.1.2 N2G47H 2578 release-keys Device : SP620 Board : SP620 Display ID : N2G47H release-keys Security Patch : 2018-03-01 Emmc_size : 16GB Platform : msm8953 FRPPST : /dev/block/bootdevice/by-name/config Fingerprint : Condor/SP620/SP620:7.1.2/N2G47H/SP620_V11.0_20170925:user/release-keys Processing Auto.... - Removing FRP Executing ... - Removing FRP [Zero Wipe] OkOk - Formatting Userdata Executing ... - Formatting Userdata [Safe Format - eMMc] OkOk Action Result : Ok Rebooting Phone.... Ok Elapsed Time : 00:00:03 |
07-16-2021, 09:20 | #2220 (permalink) |
No Life Poster Join Date: Jan 2020 Location: Algeria
Posts: 825
Member: 2944109 Status: Offline Thanks Meter: 670 | OPPO A37f Read Pattern OPPO A37F Read Pattern Code: PreOperation Configuration Brand : AUTO Model : AUTO Storage : Auto Loader: Auto Port : Auto Searching for Qualcomm 9008 Device...Found FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM42) SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Driver Ver :08/31/2015,2.1.2.0 Getting device info..Ok Device MODE : Firehose Connecting to Firehose... Ping.. Ok Configuration....... Identifying Chip.... Ok Chip Configuration : MemoryName : eMMC MaxPayloadSizeToTargetInBytes : 16384 MaxPayloadSizeToTargetInBytesSupported : 16384 MaxPayloadSizeFromTargetInBytes : 4096 MaxXMLSizeInBytes : 4096 TargetName : 8916 Version : 1 Protocol : Universal Running : Ok Phone Information..... Brand : OPPO Vendor : OPPO Model : A37f ID : LMY47V SDK : 22 Release : 5.1.1 ABI : arm64-v8a CPU abilist : arm64-v8a,armeabi-v7a,armeabi Description : msm8916_64-user 5.1.1 LMY47V eng.root.20190711.032745 release-keys Board : msm8916 Display ID : A37fEX_11_190711 Security Patch : 2018-03-01 Platform : msm8916 FRPPST : /dev/block/bootdevice/by-name/config Reading GPT[3] Drive [0] 40 Items Drive [1] 0 Items Drive [2] 4 Items Operation : ScreenLock Security Read Pattern Processing... Trying to search : gatekeeper.pattern.key Trying to search : personalpattern.key Trying to search : cm_gesture.key Trying to search : gesture.key FOUND Gesture Data : 71890FAED57A325C08EB04BE0F4FD8C05845C972 Bruteforcing pattern hash..Please wait for few seconds Pattern Code : 95487 1 2 3 4 5 6 7 8 9 Ok Elapsed Time : 00:00:04 |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|