GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL


Reply
 
LinkBack Thread Tools Display Modes
Old 08-28-2021, 02:18   #2446 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 9T (Lime) successfully flashed by Hydra Tool


Xiaomi Redmi 9T (Lime) successfully flashed by Hydra Tool

1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module or leave it as "Auto"
3. Go to "Flash Tool" Tab.
4. Choose Flash file and its location.
5. Dissemble the device and find its test point (Google for its test point).
6. Click on "Flash"
7. Connect Test Points with Twiser or short them together.
8. connect device to the computer with USB Data cable
9. Wait until the process is completed.​


Screen Short:


BR
Dipenda Pathak
  Reply With Quote
Old 08-28-2021, 02:27   #2447 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Xiaomi Redmi 4X Find Device is successfully Disable by Hydra Tool

Xiaomi Redmi 4X Find Device is successfully Disable by Hydra Tool

1. Run Hydra Qualcomm Module and Sosc.
2. Choose Brand and Module or leave it as "Auto"
3. Go to "Service"--> "Xiaomi" Tab.
4. Choose "Mi Account" from drop down menu.
5. Choose "Find device disable" from Flash Mode.
6. Tick "include FRP"
7. Dissemble the device and find its test point (Google for its test point).
8. Click on "Execute"
9. Connect Test Points with Twiser or short them together.
10. connect device to the computer with USB Data cable
11. Wait until the process is completed.​

Screen Short:


BR
Dipenda Pathak
  Reply With Quote
Old 08-28-2021, 02:32   #2448 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Samsung SM-A107M (A10s) formatting Specific Partition to remover FRP done by Hydra

Samsung SM-A107M (A10s) formatting Specific Partition to remover FRP done by Hydra Tool

1. Run MTK tool of Hydra Dongle.
2. Choose Correct Module and Brand.
3. Choose "Auto Broom Exploit"
4. Click on "Boot / Info" and wait it reads all.
5. Go to "PM" Tab
6. Skip "preloader"
7. Click on "Partition" button.
8. Now connect device to computer with Data Cable.
9. Wait it shows the different partition.
10. Choose "Presistent"
11. Click on "Erase"
12. Wait until the process is completed

Screen Short:


BR
Dipenda Pathak
  Reply With Quote
Old 08-28-2021, 08:34   #2449 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
ACE BUZZ 1 Factory Reset + Removing FRP

ACE BUZZ 1 Factory Reset + Removing FRP


Factory Reset/Format Userdata



Code:
Port : [Auto] Scanning...COM35
Opening Port...(COM35)Ok
------------------------------------------
Factory Reset/Format Userdata...
------------------------------------------
Reading IMEI....
IMEI 1 : 3518XXXXXXXXX14
IMEI 2 : 3518XXXXXXXXX22
Executing... Factory Reset

Reading System Info..
  Vendor : ACE France
  Model : BUZZ 1
  Android Ver : 8.1.0
  Device : AS0218
  Display ID : AS0218_V08_20181214
  Security Patch : 2018-12-05
  FRPPST : /dev/block/platform/soc/soc:ap-ahb/20600000.sdio/by-name/persist
  Fingerprint : ACE/AS0218/AS0218:8.1.0/OPM2.171019.012/90:user/release-keys
  ro_product_hardware : sp9832e_1h10_go

Action Result..Ok

Elapsed Time : 00:00:39
Service_FRP_Flashmode



Code:
Port : [Auto] Scanning...COM35
Opening Port...(COM35)Ok
------------------------------------------
Service_FRP_Flashmode...
------------------------------------------
Reading IMEI....
IMEI 1 : 3518XXXXXXXXX14
IMEI 2 : 3518XXXXXXXXX22

Reading System Info..
  Vendor : ACE France
  Model : BUZZ 1
  Android Ver : 8.1.0
  Device : AS0218
  Display ID : AS0218_V08_20181214
  Security Patch : 2018-12-05
  FRPPST : /dev/block/platform/soc/soc:ap-ahb/20600000.sdio/by-name/persist
  Fingerprint : ACE/AS0218/AS0218:8.1.0/OPM2.171019.012/90:user/release-keys
  ro_product_hardware : sp9832e_1h10_go

Removing FRP...Ok

Elapsed Time : 00:00:01
  Reply With Quote
Old 08-28-2021, 08:35   #2450 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
IRIS TAB G7060 ZeroWipe FRP

IRIS TAB G7060 ZeroWipe FRP




Code:
Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..


Reading System Info
  Brand          : IRIS
  Vendor         : IRIS
  Model          : G7060
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : fr-FR
  Description    : full_tb8735ba1_bsp-user 8.1.0 O11019 1562753373 release-keys
  Device         : G7060
  Board          : G7060
  Display ID     : G7060-IRIS-V1-20190711
  Security Patch : 2019-07-05
  Fingerprint    : IRIS/G7060/G7060:8.1.0/O11019/1562753373:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:02
  Reply With Quote
Old 08-28-2021, 08:36   #2451 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
Starlight Star Plus Plus ZeroWipe FRP

Starlight Star Plus Plus ZeroWipe FRP



Code:
Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM_V1632 (Android) (COM4)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : B26F2A486683C16A49CA20EA44F39298
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000040000000 -1024 MB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x00000001D2000000 -7.281 GB
 eMMC CID   : 90014A48384731650507F0A1721F923B - H8G1e

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : starlight
  Vendor         : starlight
  Model          : star_plus_plus
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_bird6739tv1_bsp_1g-user 8.1.0 O11019 1547111980 release-keys
  Device         : star_plus_plus
  Board          : star_plus_plus
  Display ID     : 8140TQF_GA02E.MV88.P1.V00.A1.AD81.1.132.HD.20190110.TST.EN
  Security Patch : 2018-12-05
  Fingerprint    : starlight/star_plus_plus/star_plus_plus:8.1.0/O11019/1547111980:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:02
  Reply With Quote
Old 08-28-2021, 08:37   #2452 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
HUAWEI Y9 2019 (JKM-AL00A) Remove FRP TP Done

HUAWEI Y9 2019 (JKM-AL00A) Remove FRP TP Done



  Reply With Quote
Old 08-28-2021, 08:39   #2453 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
Alcatel One Touch 1050D Read Code/Passwords

Alcatel One Touch 1050D Read Code/Passwords



  Reply With Quote
Old 08-28-2021, 08:43   #2454 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 814
Member: 2944109
Status: Offline
Thanks Meter: 656
Xiaomi Poco M3 (citrus) DEAD Flashing + Removing FRP

Xiaomi Poco M3 (citrus) DEAD Flashing + Removing FRP

Done By Hydra Tool


Flashing Done




Code:
 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xE4880CC3
HW_ID     : 0014D0E100720000
MSM ID    : 0x0014D0E1, SM_KAMORTA_H- 
MODEL_ID  : 0x0000
OEM_ID    : 0x0072 - XIAOMI
PBL Ver   : 00000001
PK HASH   : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46
 
Firehose Loader[0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg]
--------------------------------------------------
  Header Type    : New
  TargetMSM      : 
  Tag            : 
  Version        : 6
  Code_size      : 816
  Signature_size : 256
  fhVendor       : XIAOMI
  HW_ID          : 0000000000720000
  Vendor         : XIAOMI
  OEM_ID         : 0072
  MODEL_ID       : 0000
  SW_ID          : 00000003
  APP_ID         : 00000000
  pk_hash        : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
  OEM_VERSION    : f2f760038334
  IMAGE_VARIANT  : KamortaPkgLAA
  QC_VERSION     : BOOT.XF.4.1-00187-KAMORTALAZ-2
--------------------------------------------------

SaharaBoot... Ok
Sending .................................Ok
Connecting to Firehose...
Ping...................... Ok 
Configuration........
Identifying Chip........UFS 
Ok
Chip Configuration :
 MemoryName : UFS
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 
 MaxXMLSizeInBytes : 4096
 TargetName : 
 Version : 1
 DateTime : Nov 16 2020 - 01:25:39

*** STORAGE DEVICE INFO ***
Memory Type         : UFS
Block Size in Bytes : 4096
Page Size           : 4096
Manufacturer ID     : 429
Serial Number       : 2037279096
Firmware Version    : 002
Product Name        : H9HQ15ACPMBDAR
Physical Partitions : 6
Total Logical Blocks:
          Drive [0]  30119936[114.898 GB]
          Drive [1]  2048[8 MB]
          Drive [2]  2048[8 MB]
          Drive [3]  32768[128 MB]
          Drive [4]  1048576[4 GB]
          Drive [5]  32768[128 MB]

Protocol : Universal
Running : Ok
 
Failed to read information from phone.

Reading GPT[6]
          Drive [0] 32 Items
          Drive [1] 32 Items
          Drive [2] 32 Items
          Drive [3] 32 Items
          Drive [4] 64 Items
          Drive [5] 32 Items


Backup Security partitions...
Reading Security Items....
 > modemst1
 > modemst2
 > fsg
 > fsc
C:\Hydra Tool\Backup\Security_Backup\___Security_082721140440.sec
Backup Security Success....

----------------------------
Flashing Selected Partitions....
 - vbmeta_system(0)[vbmeta_system.img]  Ok
 - metadata(0)[metadata.img]  Ok
 - persist(0)[persist.img]  Ok
 - recovery(0)[recovery.img]  Ok
 - super(0)[super.img]  Ok
 - userdata(0)[userdata.img]  Ok
 - PrimaryGPT(0)[gpt_main0.bin]  Ok
 - xbl_config(1)[xbl_config.elf]  Ok
 - xbl(1)[xbl.elf]  Ok
 - PrimaryGPT(1)[gpt_main1.bin]  Ok
 - xbl_configbak(2)[xbl_config.elf]  Ok
 - xblbak(2)[xbl.elf]  Ok
 - PrimaryGPT(2)[gpt_main2.bin]  Ok
 - PrimaryGPT(3)[gpt_main3.bin]  Ok
 - multiimgoem(4)[multi_image.mbn]  Ok
 - vbmeta(4)[vbmeta.img]  Ok
 - qupfw(4)[qupv3fw.elf]  Ok
 - devcfg(4)[devcfg.mbn]  Ok
 - storsec(4)[storsec.mbn]  Ok
 - hyp(4)[hyp.mbn]  Ok
 - hypbak(4)[hyp.mbn]  Ok
 - cmnlib(4)[cmnlib.mbn]  Ok
 - cmnlibbak(4)[cmnlib.mbn]  Ok
 - cmnlib64(4)[cmnlib64.mbn]  Ok
 - cmnlib64bak(4)[cmnlib64.mbn]  Ok
 - keymaster(4)[km4.mbn]  Ok
 - keymasterbak(4)[km4.mbn]  Ok
 - bluetooth(4)[BTFM.bin]  Ok
 - abl(4)[abl.elf]  Ok
 - ablbak(4)[abl.elf]  Ok
 - imagefv(4)[imagefv.elf]  Ok
 - imagefvbak(4)[imagefv.elf]  Ok
 - uefisecapp(4)[uefi_sec.mbn]  Ok
 - uefisecappbak(4)[uefi_sec.mbn]  Ok
 - featenabler(4)[featenabler.mbn]  Ok
 - featenablerbak(4)[featenabler.mbn]  Ok
 - misc(4)[misc.img]  Ok
 - rpm(4)[rpm.mbn]  Ok
 - rpmbak(4)[rpm.mbn]  Ok
 - tz(4)[tz.mbn]  Ok
 - tzbak(4)[tz.mbn]  Ok
 - logfs(4)[logfs_ufs_8mb.bin]  Ok
 - dtbo(4)[dtbo.img]  Ok
 - dsp(4)[dspso.bin]  Ok
 - boot(4)[boot.img]  Ok
 - modem(4)[NON-HLOS.bin]  Ok
 - cache(4)[cache.img]  Ok
 - cust(4)[cust.img]  Ok
 - PrimaryGPT(4)[gpt_main4.bin]  Ok
 - PrimaryGPT(5)[gpt_main5.bin]  Ok

Flashing Patch Configuration.. 
0 [NUM_DISK_SECTORS-6.]   OK
0 [NUM_DISK_SECTORS-6.]   OK
0 [NUM_DISK_SECTORS-6.]   OK
0 [NUM_DISK_SECTORS-6.]   OK
0 [NUM_DISK_SECTORS-1.]   OK
0 [NUM_DISK_SECTORS-1.]   OK
0 [NUM_DISK_SECTORS-5.]   OK
0 [CRC32(2,4096)]   OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)]   OK
0 [0]   OK
0 [CRC32(1,92)]   OK
0 [0]   OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
1 [NUM_DISK_SECTORS-6.]   OK
1 [NUM_DISK_SECTORS-6.]   OK
1 [NUM_DISK_SECTORS-6.]   OK
1 [NUM_DISK_SECTORS-6.]   OK
1 [NUM_DISK_SECTORS-1.]   OK
1 [NUM_DISK_SECTORS-1.]   OK
1 [NUM_DISK_SECTORS-5.]   OK
1 [CRC32(2,4096)]   OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)]   OK
1 [0]   OK
1 [CRC32(1,92)]   OK
1 [0]   OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
2 [NUM_DISK_SECTORS-6.]   OK
2 [NUM_DISK_SECTORS-6.]   OK
2 [NUM_DISK_SECTORS-6.]   OK
2 [NUM_DISK_SECTORS-6.]   OK
2 [NUM_DISK_SECTORS-1.]   OK
2 [NUM_DISK_SECTORS-1.]   OK
2 [NUM_DISK_SECTORS-5.]   OK
2 [CRC32(2,4096)]   OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)]   OK
2 [0]   OK
2 [CRC32(1,92)]   OK
2 [0]   OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
3 [NUM_DISK_SECTORS-6.]   OK
3 [NUM_DISK_SECTORS-6.]   OK
3 [NUM_DISK_SECTORS-6.]   OK
3 [NUM_DISK_SECTORS-6.]   OK
3 [NUM_DISK_SECTORS-1.]   OK
3 [NUM_DISK_SECTORS-1.]   OK
3 [NUM_DISK_SECTORS-5.]   OK
3 [CRC32(2,4096)]   OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)]   OK
3 [0]   OK
3 [CRC32(1,92)]   OK
3 [0]   OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
4 [NUM_DISK_SECTORS-6.]   OK
4 [NUM_DISK_SECTORS-6.]   OK
4 [NUM_DISK_SECTORS-6.]   OK
4 [NUM_DISK_SECTORS-6.]   OK
4 [NUM_DISK_SECTORS-1.]   OK
4 [NUM_DISK_SECTORS-1.]   OK
4 [NUM_DISK_SECTORS-5.]   OK
4 [CRC32(2,8192)]   OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)]   OK
4 [0]   OK
4 [CRC32(1,92)]   OK
4 [0]   OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
5 [NUM_DISK_SECTORS-6.]   OK
5 [NUM_DISK_SECTORS-6.]   OK
5 [NUM_DISK_SECTORS-6.]   OK
5 [NUM_DISK_SECTORS-6.]   OK
5 [NUM_DISK_SECTORS-1.]   OK
5 [NUM_DISK_SECTORS-1.]   OK
5 [NUM_DISK_SECTORS-5.]   OK
5 [CRC32(2,4096)]   OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)]   OK
5 [0]   OK
5 [CRC32(1,92)]   OK
5 [0]   OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)]   OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:08:14

Removing FRP Done




Code:
PreOperation Configuration 
 Brand : XIAOMI Model : Poco M3 (citrus) Storage : Auto
 Loader: 0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM5)
 SymbolicName :\??\USB#VID_05C6&PID_9008#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :03/25/2016,2.1.2.2

Getting device info......
Serial No.: 0xE4880CC3
HW_ID     : 0014D0E100720000
MSM ID    : 0x0014D0E1, SM_KAMORTA_H- 
MODEL_ID  : 0x0000
OEM_ID    : 0x0072 - XIAOMI
PBL Ver   : 00000001
PK HASH   : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46
 
Firehose Loader[0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg]
--------------------------------------------------
  Header Type    : New
  TargetMSM      : 
  Tag            : 
  Version        : 6
  Code_size      : 816
  Signature_size : 256
  fhVendor       : XIAOMI
  HW_ID          : 0000000000720000
  Vendor         : XIAOMI
  OEM_ID         : 0072
  MODEL_ID       : 0000
  SW_ID          : 00000003
  APP_ID         : 00000000
  pk_hash        : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
  OEM_VERSION    : f2f760038334
  IMAGE_VARIANT  : KamortaPkgLAA
  QC_VERSION     : BOOT.XF.4.1-00187-KAMORTALAZ-2
--------------------------------------------------

SaharaBoot... Ok
Sending .................................Ok
Connecting to Firehose...
Ping...................... Ok 
Configuration........
Identifying Chip........UFS 
Ok
Chip Configuration :
 MemoryName : UFS
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 
 MaxXMLSizeInBytes : 4096
 TargetName : 
 Version : 1
 DateTime : Nov 16 2020 - 01:25:39

*** STORAGE DEVICE INFO ***
Memory Type         : UFS
Block Size in Bytes : 4096
Page Size           : 4096
Manufacturer ID     : 429
Serial Number       : 2037279096
Firmware Version    : 002
Product Name        : H9HQ15ACPMBDAR
Physical Partitions : 6
Total Logical Blocks:
          Drive [0]  30119936[114.898 GB]
          Drive [1]  2048[8 MB]
          Drive [2]  2048[8 MB]
          Drive [3]  32768[128 MB]
          Drive [4]  1048576[4 GB]
          Drive [5]  32768[128 MB]

Protocol : Universal
Running : Ok
 
Failed to read information from phone.

Reading GPT[6]
          Drive [0] 32 Items
          Drive [1] 32 Items
          Drive [2] 32 Items
          Drive [3] 32 Items
          Drive [4] 64 Items
          Drive [5] 32 Items

Removing FRPta...
Method : 
Auto 
Processing... 
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOkOk

Elapsed Time : 00:00:07
  Reply With Quote
Old 08-29-2021, 02:16   #2455 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei Hisilicon RNE-Aloo (Maimang 6) Huawei Account successfully removed by Hydra Tool

1. Run Hydra Main Tool.
2. Choose "Hisilicon" Tab.
3. Choose "Module"
4. Tick "Auto Boot"
5. Choose "Service" Tab
6. Choose "Factory Reset Protection / Account" from drop down menu.
7. Choose "Remove Huawei ID"
8. Click on "Execute"
9. Connect the device to the compute with the help of Data Cable.
10. Wait until the operation is completed.

Screen Short:


BR
Dipenda Pathak
  Reply With Quote
Old 08-29-2021, 02:17   #2456 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei Hisilicon RNE-Aloo (Maiming 6) Huawei Account successfully removed by Hydra To

Huawei Hisilicon RNE-Aloo (Maimang 6) Huawei Account successfully removed by Hydra Tool

1. Run Hydra Main Tool.
2. Choose "Hisilicon" Tab.
3. Choose "Module"
4. Tick "Auto Boot"
5. Choose "Service" Tab
6. Choose "Factory Reset Protection / Account" from drop down menu.
7. Choose "Remove Huawei ID"
8. Click on "Execute"
9. Connect the device to the compute with the help of Data Cable.
10. Wait until the operation is completed.

Screen Short:


BR
Dipenda Pathak
  Reply With Quote
Old 08-29-2021, 02:21   #2457 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei Hisilicon RNE-L22-(Nova 2i) FRP successfully removed by Hydra Tool

Huawei Hisilicon RNE-L22-(Nova 2i) FRP successfully removed by Hydra Tool

1. Run Hydra Main Tool.
2. Choose "Hisilicon" Tab.
3. Choose "Module"
4. Tick "Auto Boot"
5. Choose "Service" Tab
6. Choose "Factory Reset Protection / Account" from drop down menu.
7. Choose "Remove FRP"
8. Click on "Execute"
9. Connect the device to the compute with the help of Data Cable.
10. Wait until the operation is completed.

Screen Short:


BR
Dipenda Pathak
  Reply With Quote
Old 08-29-2021, 02:32   #2458 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei Hisilicon PRA-LX2 (Y7A) FRP successsfully removed by Hydra Tool

Huawei Hisilicon PRA-LX2 (Y7A) FRP successsfully removed by Hydra Tooll

This operation goes from FasbBoot Mode:

1. Run Main Tool"
2. Choose Brand and Module or leave as "Auto"
3. Go to "HiSilicon"
4. Choose "Module"
5. Untick "Auto Boot"
Choose: CPUID "kirin 655"
Loader: LODER "kirin655.fb"
6. Go to "Service"
7. Choose "Factory Reset Protection / Account"
8. Choose "Remove FRP" from Fastboot.
9. Click "Execute"
10. Connect device to computer using USB Data Cable.
11. Wait until the operation is completed.

Screen Short:


BR
Dipenda Pathak
  Reply With Quote
Old 08-29-2021, 02:37   #2459 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,621
Huawei L23 ( Y9A 2021) Restore OEM info successfully done by Hydra Tool

Huawei L23 ( Y9A 2021) Restore OEM info successfully done by Hydra Tool

1. Run MTK Hydra Tool.
2. Choose "Brand" and "Module".
3. Go to "Service"--> "Tool"
4. Choose "Huawei"
5. Chose "Restore OEM Info" from "Method/ Option" drop down option.
6. Click "Execute".
7. Connect Device to computer using USB Data Cable.
8. Wait until the operation is completed.

Screen Short:


BR
Dipenda Pathak
  Reply With Quote
Old 08-29-2021, 14:43   #2460 (permalink)
No Life Poster
 
sky73's Avatar
 
Join Date: Jan 2013
Location: gsmhosting
Age: 29
Posts: 1,148
Member: 1876736
Status: Offline
Thanks Meter: 735
redmi note 9 unlock bootloader done

Code:
=====================================
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM3)
 Device       :5&15c311e1&0&9
 SymbolicName :\??\USB#VID_0E8D&PID_0003#5&15c311e1&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2016,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : B7983B4E0F329B353D27BEEB38FD6E71
 ERAM Size  : 0x0000000000070000 -448 KB
 IRAM Size  : 0x0000000100000000 -4 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000001D1F000000 -116.484 GB
 eMMC CID   : 90014A68444561503303108B0CFA8721 - hDEaP3

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:03
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 21:25.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.39550 seconds with 9 queries

SEO by vBSEO