GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 07-31-2021, 02:07   #2296 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Hisilicon Huawei RNE-Al00 (Maimang 6) Remove Huawei ID successfully done by Hydra Too


Hisilicon Huawei RNE-Al00 (Maimang 6) Remove Huawei ID successfully done by Hydra Tool


1. Run Hydra Main Tool.
2. Choose "Hisilicon" Tab.
3. Choose "Module"
4. Tick "Auto Boot"
5. Choose "Service" Tab
6. Choose "Factory Reset Protection / Account" from drop down menu.
7. Choose "Huwaei ID"
8. Click on "Execute"
9. Connect the device to the compute with the help of Data Cable.
10. Wait until the operation is completed.
Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 07-31-2021, 02:12   #2297 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Hisilicon Huawei RNE-L22 (NOVA 2i) FRP successfully removed Hydra Main Tool

Hisilicon Huawei RNE-L22 (NOVA 2i) FRP successfully removed Hydra Main Tool


1. Run Hydra Main Tool.
2. Choose "Hisilicon" Tab.
3. Choose "Module"
4. Tick "Auto Boot"
5. Choose "Service" Tab
6. Choose "Factory Reset Protection / Account" from drop down menu.
7. Choose "Remove FRP"
8. Click on "Execute"
9. Connect the device to the compute with the help of Data Cable.
10. Wait until the operation is completed.
Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 08-01-2021, 02:28   #2298 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Huawei AMN-LX9 (Y5 2019) Both IMEI Repair Successfully done by Hydra Tool

Huawei AMN-LX9 (Y5 2019) Both IMEI Repair Successfully done by Hydra Tool

1. Run Hydra MTK module.
2. Choose Brand and Module
3. Tick "Auto Broom Exploit"
4. Go to "Service" -->""IMEI" Tab.
5. Tick "IMEI changing is illigal............................".
6. Choose "Huawei Flash Mode" from drop down menu
7. Tick two small box, if you want to repair two IMEI
8. Type the imei written back on your cellphone or battery housing.
9. Tick "Auto Reboot"
10. Click "Execute"
11. connect device to the computer with USB Data cable
12. Wait until the process is completed.

Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 08-01-2021, 02:36   #2299 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 9A (Dandelion) Mi Account Successfully removed by Hydra Tool

Xiaomi Redmi 9A (Dandelion) Mi Account Successfully removed by Hydra Tool

1. Run Hydra MTK Module and Sosc.
2. Choose Brand and Module.
3. Go to "Service"-->"Tool" Tab.
4. Choose "Xiaomi".
5. Click on "Remove Mi Account (Erased Method) + FRP" from drop down menu.
6. Click "Execute" button
7. connect device to the computer with USB Data cable
8. Wait until the process is completed.

Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 08-01-2021, 02:50   #2300 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Xiaomi Redmi 6 (Cereus) formatted selected partition from PM Tab by Hydra Tool

Xiaomi Redmi 6 (Cereus) formatted selected partition from PM Tab by Hydra Tool

1. Run Hydra MTK module.
2. Choose Brand and Module.
3. Choose "Auto Broom Exploit"
4. Go to "PM" Tab.
5. Choose "Flash Mode"
6. Click "Partition" and connect device to computer with data cable.
7. Wait until the software shows all partition of cellphone.
8. Choose the partition you want to read, or erase or write.
9. Click on "Erase" or "Write" or "Read" that you need.
10. Wait until the process is completed.

Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 08-01-2021, 03:34   #2301 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Oppo Realme C25 (RMX3191) remove FRP successfully done by Hydra Tool

Oppo Realme C25 (RMX3191) remove FRP successfully done by Hydra Tool

1. Run Hydra MTK module.
2. Choose Brand and Module
3. Tick "Auto Broom Exploit"
4. Go to "Service" -->"Tool" Tab.
5. Choose MANUAL BOOT
Note: If you do not have boot file, you can make it from Hydra "EXPLOIT" Tab using "BROOM (dump Preloader Flash init)"
6. Choose "Factory Reset Protection-FRP"
7. Tick "Format /Erase"
8. Tick "Auto Reboot"
9. Click "Execute"
10. connect device to the computer with USB Data cable
11. Wait until the process is completed.
Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 08-01-2021, 08:42   #2302 (permalink)
Product Manager
 
Hydra Tool's Avatar
 
Join Date: Aug 2018
Location: Ukraine / Harkov
Posts: 1,986
Member: 2857401
Status: Offline
Thanks Meter: 6,861
Vivo Y15 1901 IMEI Repair by Flash Mode

Vivo Y15 1901 IMEI Repair by Flash Mode
Vivo MTK Repair IMEI in BROM Mode | Without Root | Without Credit | Without Auth

http://www.youtube.com/watch?v=NDDsd8mTWuw
  Reply With Quote
The Following User Says Thank You to Hydra Tool For This Useful Post:
Old 08-01-2021, 16:04   #2303 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
vivo Y12 1901 repair imei successfully done by Hydra Tool

vivo Y12 1901 repair imei successfully done by Hydra Tool

1. Run MTK module
2. Choose Module and Brand "Auto"
3. Go to "Configuration" Tab
4. Untick "Auto Backup" and "Read IMEI"
5. Go to "Service"--> "Tool"
6. Choose "Read System INFO"
7. Click on "BOOT / INFO"
8. Connect Device to the computer using Data Cable.
9. Wait until the Hydra Tool reads all system information.
10. Now, go to "IMEI Repair" Tab
11. Tick "IMEI Changing is illigal........................................"
12. Choose "Vivo FlashMode" from drop down menu.
13. Untick "Auto Reboot"
14. Tick BOTH IMEI boxes
15. Type the correct IMEI from your cellphone or from battery housing.
16. Click on "Repair IMEI"
17. Wait until the process is completed.
18. Now, Tick "Auto Reboot"
19. Click on "Repair IMEI" button.
20. Wait until the process is completed.
21. Done.


Video Proof:


BR
Dipendra Pathak


Last edited by Hydra Tool; 08-02-2021 at 11:27.
  Reply With Quote
Old 08-01-2021, 16:23   #2304 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Oppo Reno 3 5G (PDCM00) Unlock Bootloader by Hydra Tool

Oppo Reno 3 5G (PDCM00) Unlock Bootloader by Hydra Tool




BR
Dipendra Pathak


Last edited by Hydra Tool; 08-02-2021 at 11:27.
  Reply With Quote
Old 08-01-2021, 16:29   #2305 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Vivo Y15 1901 IMEI Repair by Flash Mode with Manual and Video

Vivo Y15 1901 IMEI Repair by Flash Mode with Manual and Video


1. Run MTK module
2. Choose Module and Brand "Auto"
3. Go to "Configuration" Tab
4. Untick "Auto Backup" and "Read IMEI"
5. Go to "Service"--> "Tool"
6. Choose "Read System INFO"
7. Click on "BOOT / INFO"
8. Connect Device to the computer using Data Cable.
9. Wait until the Hydra Tool reads all system information.
10. Now, go to "IMEI Repair" Tab
11. Tick "IMEI Changing is illigal........................................"
12. Choose "Vivo FlashMode" from drop down menu.
13. Untick "Auto Reboot"
14. Tick BOTH IMEI boxes
15. Type the correct IMEI from your cellphone or from battery housing.
16. Click on "Repair IMEI"
17. Wait until the process is completed.
18. Now, Tick "Auto Reboot"
19. Click on "Repair IMEI" button.
20. Wait until the process is completed.
21. Done.


BR
Dipendra Pathak


Last edited by Hydra Tool; 08-02-2021 at 11:27.
  Reply With Quote
Old 08-02-2021, 10:05   #2306 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
Starlight M09 Read Code/Passwords

Starlight M09 Read Code/Passwords


  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 08-02-2021, 10:07   #2307 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
Condor C6+ (PGN-508) Read Pattern

Condor C6+ (PGN-508) Read Pattern



Code:
Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0



Reading System Info
  Brand          : condor
  Vendor         : SPA_CONDOR_ELECTORNICS
  Model          : PGN-508
  ID             : KOT49H
  SDK            : 19
  Release        : 4.4.2
  ABI            : armeabi-v7a
  Description    : gionee82_cwet_kk-user 4.4.2 KOT49H eng.znsj.1433745252 release-keys
  Device         : condor
  Board          : PGN-508_cwet_kk
  Display ID     : PGN-508
  Fingerprint    : condor/PGN_508/PGN_508:4.4.2/KOT49H/1431327360:user/release-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : . Found
Gesture Data : 8E9D7E8E6BC4E77529D93115D84F65D6C7008261
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 1258
1 2 3
4 5 6
7 8 9
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:02
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 08-02-2021, 10:08   #2308 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
Samsung Galaxy Grand Prime Pro (SM-J250F) Removing FRP

Samsung Galaxy Grand Prime Pro (SM-J250F) Removing FRP




Code:
Starting ADB Server....
Searching Device By ADB
Device Found...
   Model : SM-J250F
   Brand : samsung
   Android Ver : 7.1.1
   CPU abi : armeabi-v7a
   Software Version : J250FXXU2ASK1
   CSC Version : J250FOJV2ASK1
   Bootloader : J250FXXS2ATI1
   Board : msm8937
   Bootloader : NMF26X.J250FXXS2ATI1
   Display ID : 2019-10-01
   Security Patch : 16GB
   Emmc_size : msm8937
   Platform : 2019-10-01
   SYS USB CONFIG : persist.mtp,adb
   FRPPST : /dev/block/persistent
   FingerPrint : samsung/j2y18ltejx/j2y18lte:7.1.1/NMF26X/J250FXXS2ATI1:user/release-keys

Checking Root Status.... 
Root Status : Not Rooted

Removing FRP...Ok
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 08-02-2021, 10:09   #2309 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
TECNO Spark 6 (KE7) Ultra Power Option

TECNO Spark 6 (KE7) Ultra Power Option




Code:
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port_V1632 (COM6)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0707MT6768 [6768]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E5
 SBC           : 01 (True)
 SLA           : 00 (False)
 DAA           : 04 (True)
 SWJTAG        : 04 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0707MT6768 [6768]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)
 FUSEID         : 00000000
 SECURE VERSION : 05 
 BL VERSION     : FE 
 NORMAL BOOT

Preparing Download Agent..
 DA   :  [Not Exist]
Trying Default 6768.bin
 Agent: MTK_DOWNLOAD_AGENT -HYDRA
 Ver  : MTK_AllInOne_DA_v3.3001.2020/03/17.ÉÏÎç10:04_497508
 Init : Loader [1]
 Sending : Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Mode : brom
 Preloader Initialization...
 Parsing preloader_ke7_spark_6.bin
 Init : Accepted

Execute Secondary Loader
 Init : Loader [2]
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 7F674788BE30415BD38A4E8EC57EB520
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58.242 GB
 eMMC CID   : 150100445036444142030DEF9065B76D - DP6DAB

DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_ke7_h693.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0707__080221090330\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x03188000]1024 KB ->frp.bin...Ok
-nvdata[0x08922000]64 MB ->nvdata.bin...Ok
-persist[0x0C922000]48 MB ->persist.bin...Ok
-protect1[0x0F922000]8 MB ->protect1.bin...Ok
-protect2[0x10122000]8 MB ->protect2.bin...Ok
-nvram[0x1E900000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0707__080221090330
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 7F674788BE30415BD38A4E8EC57EB520
 ERAM Size  : 0x0000000000080000 -512 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000E8F800000 -58.242 GB
 eMMC CID   : 150100445036444142030DEF9065B76D - DP6DAB

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal...
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:01:08
  Reply With Quote
The Following User Says Thank You to Gsm-Ahmed For This Useful Post:
Old 08-03-2021, 01:49   #2310 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,623
Vivo S9 (PD2072E) Unlock Bootloader successfully done by Hydra Dongle

Vivo S9 (PD2072E) Unlock Bootloader successfully done by Hydra Dongle

VIDEO PROOF:

http://www.youtube.com/watch?v=oztqQJ5I8fQ

BR
Dipendra Pathak

  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 18:55.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.34371 seconds with 9 queries

SEO by vBSEO