GSM Shop  
GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 11-02-2021, 09:32   #2686 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Oppo A5s Screen Lock Reset Only 1 Click With data loss by Hydra


Oppo A5s Screen Lock Reset Only 1 Click With data loss by hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM17)
Device : 6&df2ee03&0&5
SymbolicName :??USB#VID_0E8D&PID_0003#6&df2ee03&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : EC803817F290CF06ECA43399B7F0C55A
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E0366636D38662F - hB8aP>

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_18511-user 8.1.0 O11019 1616154336 release-keys
Security Patch : 2021-04-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP tition...
Safeformat Universal...
Action Result : Ok

Elapsed Time : 00:00:03
  Reply With Quote
Old 11-02-2021, 09:40   #2687 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Vivo Y21 Format Userdata done With by Hydra

Vivo Y21 Format Userdata done With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM6)
Device : 6&5d3d2bb&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&5d3d2bb&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 7784C0BF6B85325B3DB590619BAFD82D
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A684339615033018DEA6EB36783 - hC9aP3

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP tition...
Safeformat Universal...
Action Result : Ok

Elapsed Time : 00:00:02
  Reply With Quote
Old 11-03-2021, 09:14   #2688 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Vivo V11 Remove Screen Security With by Hydra

Vivo V11 Remove Screen Security With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM11)
Device : 6&2ec0df44&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&2ec0df44&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0788 MT6771 [6771]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

E:HydraTool_FullPackage_08-01-2021BackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0788 MT6771 [6771]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 2075364ECE598C4E15F882C78BB1ACE8
Stage 1.. [Size:229160]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5AC7E709BCA9EF4541B16F14A889A17C
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100445636444D42025885D66475D7 - DV6DMB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k71v1_64_bsp-user 10 QP1A.190711.020 compiler05271827 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-05-01
Platform : =MTK6771
Fingerprint : vivo/1806/1806:10/QP1A.190711.020/compiler05271827:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_k71v1_64_bsp.bin
Creating Scatter file... E:HydraTool_FullPackage_08-01-2021BackupAuto0788_vivo_1806_1806_10_QP1A.190711.0 20_compiler05271827_110321101212MT6771_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05588000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x07688000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x20088000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x20888000] 15.469 MB -> protect2.bin...0 Ok
-persist [0x22000000] 48 MB -> persist.bin...0 Ok
-nvram [0x31500000] 64 MB -> nvram.bin...0 Ok
Done!!!
E:HydraTool_FullPackage_08-01-2021BackupAuto0788_vivo_1806_1806_10_QP1A.190711.0 20_compiler05271827_110321101212
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 5AC7E709BCA9EF4541B16F14A889A17C
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100445636444D42025885D66475D7 - DV6DMB

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k71v1_64_bsp-user 10 QP1A.190711.020 compiler05271827 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-05-01
Platform : =MTK6771
Fingerprint : vivo/1806/1806:10/QP1A.190711.020/compiler05271827:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Safe Format Method 1
Processing...
Erasing FRP tition...
Safeformat Universal...
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:58
  Reply With Quote
Old 11-03-2021, 12:04   #2689 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi 4X (santoni) Brick Solution Flash Loaded From Edl With by Hydra

Redmi 4X (santoni) Brick Solution Flash Loaded From Edl With by Hydra



Quote:
Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM51)
SymbolicName :??USB#VID_05C6&PID_9008#5&376aba2d&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 02/05/2018,3.0.0.0

Getting device info .. . ...
Serial No.: 0xEEAF6
HW_ID : 0006B0E100000000
MSM ID : 0x0006B0E1, MSM8940-Qualcomm Snapdragon 435
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a9 25f3ff8403d39a

Firehose Loader [mi_1_9.mbn
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0006B0E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a9 25f3ff8403d39a
OEM_VERSION : modem-ci
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3-00214
--------------------------------------------------

SaharaBoot... Ok
Sending .....................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1139365395
Firmware Version : 165
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0 30777344 [14.676 GB
Drive [1 8192 [4 MB
Drive [2 8192 [4 MB

Protocol : Universal
Running : Ok

Phone Information .....
Brand : Xiaomi
Vendor : Xiaomi
Model : santoni
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : santoni-userdebug 6.0.1 MMB29M FACTORY16 test-keys
Device : santoni
Board : QC_Reference_Phone
Display ID : santoni-userdebug 6.0.1 MMB29M FACTORY16 test-keys
Security Patch : xxxx-xx-xx
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/santoni/santoni:6.0.1/MMB29M/FACTORY16:userdebug/test-keys

Reading GPT[3
Drive [0 52 Items
Drive [1 0 Items
Drive [2 0 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backupsantoni_QC_Reference_Phon e_6.0.1_Security_110321112431.sec
Backup Security Success....

----------------------------
Flashing Selected titions....
- modem (0)b [NON-HLOS.bin b0 Ok
- sbl1 (0)b [sbl1.mbn b0 Ok
- sbl1bak (0)b [sbl1.mbn b0 Ok
- rpm (0)b [rpm.mbn b0 Ok
- rpmbak (0)b [rpm.mbn b0 Ok
- tz (0)b [tz.mbn b0 Ok
- tzbak (0)b [tz.mbn b0 Ok
- devcfg (0)b [devcfg.mbn b0 Ok
- devcfgbak (0)b [devcfg.mbn b0 Ok
- dsp (0)b [adspso.bin b0 Ok
- splash (0)b [splash.img b0 Ok
- aboot (0)b [emmc_appsboot.mbn b0 Ok
- abootbak (0)b [emmc_appsboot.mbn b0 Ok
- boot (0)b [boot.img b0 Ok
- recovery (0)b [recovery.img b0 Ok
- system (0)b [system.img b0 Ok
- cache (0)b [cache.img b0 Ok
- persist (0)b [persist.img b0 Ok
- misc (0)b [misc.img b0 Ok
- mdtp (0)b [mdtp.img b0 Ok
- lksecapp (0)b [lksecapp.mbn b0 Ok
- lksecappbak (0)b [lksecapp.mbn b0 Ok
- cmnlib (0)b [cmnlib.mbn b0 Ok
- cmnlibbak (0)b [cmnlib.mbn b0 Ok
- cmnlib64 (0)b [cmnlib64.mbn b0 Ok
- cmnlib64bak (0)b [cmnlib64.mbn b0 Ok
- keymaster (0)b [keymaster.mbn b0 Ok
- keymasterbak (0)b [keymaster.mbn b0 Ok
- cust (0)b [cust.img b0 Ok
- userdata (0)b [userdata.img b0 Ok
- PrimaryGPT (0)b [gpt_main0.bin b0 Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34. OK
0 [NUM_DISK_SECTORS-34. OK
0 [NUM_DISK_SECTORS-34. OK
0 [NUM_DISK_SECTORS-34. OK
0 [NUM_DISK_SECTORS-1. OK
0 [NUM_DISK_SECTORS-1. OK
0 [NUM_DISK_SECTORS-33. OK
0 [CRC32(2,6656) OK
0 [CRC32(NUM_DISK_SECTORS-33.,6656) OK
0 [0 OK
0 [CRC32(1,92) OK
0 [0 OK
0 [CRC32(NUM_DISK_SECTORS-1.,92) OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:05:56
  Reply With Quote
Old 11-04-2021, 09:26   #2690 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi Note 5 Pro (Whyred) EDL Frp Remove With by Hydra

Redmi Note 5 Pro (Whyred) EDL Frp Remove With by Hydra



Quote:
Brand : XIAOMI Model : Redmi Note 5 Pro (Whyred) Storage : Auto
Loader: mi_2_9.elf
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM14)
SymbolicName :??USB#VID_05C6&PID_9008#5&36612900&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 10/21/2014,2.0.9.6

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping ...... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2089602139
Firmware Version : 2
Product Name : DH6DAB
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 5
ID : PKQ1.180904.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : whyred-user 9 PKQ1.180904.001 V10.3.1.0.PEIMIXM release-keys
Miui Ver : V10
Device : whyred
Mod_device : whyred_global
Display ID : PKQ1.180904.001
Security Patch : 2019-05-05
Fingerprint : xiaomi/whyred/whyred:9/PKQ1.180904.001/V10.3.1.0.PEIMIXM:user/release-keys

Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:07
  Reply With Quote
Old 11-04-2021, 09:39   #2691 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
ONEPLUS 7 Format Userdata With by Hydra

ONEPLUS 7 Format Userdata With by Hydra



Quote:
Brand : ONEPLUS Model : 7 Pro Storage : Auto
Loader: OnePlus_7_pro.elf
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :??USB#VID_05C6&PID_9008#5&2956bf20&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/31/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0x7A605C10
HW_ID : 000A50E100514985
MSM ID : 0x000A50E1, SDM855-Qualcomm Snapdragon 855
MODEL_ID : 0x4985
OEM_ID : 0x0051 - OPPO/ONEPLUS
PBL Ver : 00000000
PK HASH : 2aa85fde334e2e28d64cbc416b2474e0e95cad4698f143e274 79d67e92d99

Firehose Loader [OnePlus_7_pro.elf]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 960
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 000A50E100514985
Vendor : OPPO/ONEPLUS
OEM_ID : 0051
MODEL_ID : 4985
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 2aa85fde334e2e28d64cbc416b2474e0e95cad4698f143e274 79d67e92d995a20da04e40395b61a140f3db7c32720
OEM_VERSION : ubuntu-212
IMAGE_VARIANT : SDM855LA
QC_VERSION : BOOT.XF.3.0-00444-SM8150LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ....................................b Okb0
Connecting to Firehose...
Ping ........................... Ok
Configuration... Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 524288
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : May 12 2019 - 05:26:00

Storage Info

Protocol : OnePlus
Running : Ok

Phone Information ......
ID : RKQ1.201022.002
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2021-03-01

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 96 Items
Drive [5] 32 Items

Formatting Userdata...
Method : 0
Safe Format New - UFS
Processing...
- Formatting Userdata [Safe Format - UFS] Ok Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:05
  Reply With Quote
Old 11-04-2021, 09:48   #2692 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
A325F (A32 4G) Bootloader Unlock With by Hydra

A325F (A32 4G) Bootloader Unlock With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM15)
Device : 5&23b8d6f1&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#5&23b8d6f1&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : A336C845D1A86A36EB8DB1E9801BD834
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 150100445636444142005190DC8458D5 - DV6DAB

Reading GPT -EMMC [0x00008000] 56 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:03
  Reply With Quote
Old 11-05-2021, 09:58   #2693 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Mi 8 (dipper) Edl Flash No Auth With by Hydra

Mi 8 (dipper) Edl Flash No Auth With by Hydra



Quote:
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM17)
SymbolicName :??USB#VID_05C6&PID_9008#6&3258358f&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0x74E553C0
HW_ID : 0008B0E100720000
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : c924a35f39ce1cdd1b8d5a9f3b8e3c51317930431d7a9dd5a5 5028965fe65

Firehose Loader [Xiaomi_ufs_firehose_sdm845_ddr.elf]
--------------------------------------------------
Header Type : OLD
TargetMSM :
Tag : _auth
Version : 5
Code_size : 608
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 6000000000010000
Vendor : GENERIC
OEM_ID : 0001
MODEL_ID : 0000
SW_ID : 000000000000000B
APP_ID :
pk_hash : c924a35f39ce1cdd1b8d5a9f3b8e3c51317930431d7a9dd5a5 5028965fe65
OEM_VERSION : c3-bsp-builder-job004.bj
IMAGE_VARIANT : SDM845LA
QC_VERSION : BOOT.XF.2.0-00353-SDM845LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ....................................b Okb0
Connecting to Firehose...
Ping ..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[WQYBWgWuu0SoztYXUbGNmAPcoep]
Signature @256bytes Authentication.... Accepted ........
Identifying Chip.... ....UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 17 2018 - 13:21:01

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 500
Product Name : KLUDG4U1EA-B0C1
Physical titions : 6
Total Logical Blocks:
Drive [0] 30038016 [114.586 GB]
Drive [1] 2048 [8 MB]
Drive [2] 2048 [8 MB]
Drive [3] 8192 [32 MB]
Drive [4] 1179648 [4.5 GB]
Drive [5] 8192 [32 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.190828.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V11
Mod_device : dipper_global
Security Patch : 2020-06-01

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backup__10_Security_11052115584 3.sec
Backup Security Success....

----------------------------
Flashing Selected titions....
- switch (0)b [dummy.img] b0 Ok
- misc (0)b [misc.img] b0 Ok
- logfs (0)b [logfs_ufs_8mb.bin] b0 Ok
- persist (0)b [persist.img] b0 Ok
- cust (0)b [cust.img] b0 Ok
- recovery (0)b [recovery.img] b0 Ok
- cache (0)b [cache.img] b0 Ok
- userdata (0)b [userdata.img] b0 Ok
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok
- xbl_config_a (1)b [xbl_config.img] b0 Ok
- xbl_a (1)b [xbl.img] b0 Ok
- PrimaryGPT (1)b [gpt_main1.bin] b0 Ok
- xbl_config_b (2)b [xbl_config.img] b0 Ok
- xbl_b (2)b [xbl.img] b0 Ok
- PrimaryGPT (2)b [gpt_main2.bin] b0 Ok
- PrimaryGPT (3)b [gpt_main3.bin] b0 Ok
- limits (4)b [dummy.img] b0 Ok
- qupfw_a (4)b [qupfw.img] b0 Ok
- qupfw_b (4)b [qupfw.img] b0 Ok
- storsec_a (4)b [storsec.img] b0 Ok
- storsec_b (4)b [storsec.img] b0 Ok
- devcfg_a (4)b [devcfg.img] b0 Ok
- devcfg_b (4)b [devcfg.img] b0 Ok
- aop_a (4)b [aop.img] b0 Ok
- aop_b (4)b [aop.img] b0 Ok
- cmnlib_a (4)b [cmnlib.img] b0 Ok
- cmnlib_b (4)b [cmnlib.img] b0 Ok
- cmnlib64_a (4)b [cmnlib64.img] b0 Ok
- cmnlib64_b (4)b [cmnlib64.img] b0 Ok
- keymaster_a (4)b [keymaster.img] b0 Ok
- keymaster_b (4)b [keymaster.img] b0 Ok
- bluetooth (4)b [bluetooth.img] b0 Ok
- hyp_a (4)b [hyp.img] b0 Ok
- hyp_b (4)b [hyp.img] b0 Ok
- abl_a (4)b [abl.img] b0 Ok
- abl_b (4)b [abl.img] b0 Ok
- tz_a (4)b [tz.img] b0 Ok
- tz_b (4)b [tz.img] b0 Ok
- logo (4)b [logo.img] b0 Ok
- dsp (4)b [dsp.img] b0 Ok
- boot (4)b [boot.img] b0 Ok
- modem (4)b [modem.img] b0 Ok
- vendor (4)b [vendor.img] b0 Ok
- system (4)b [system.img] b0 Ok
- PrimaryGPT (4)b [gpt_main4.bin] b0 Ok
- ImageFv (5)b [imagefv.elf] b0 Ok
- PrimaryGPT (5)b [gpt_main5.bin] b0 Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:03:06
  Reply With Quote
Old 11-05-2021, 10:08   #2694 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Oppo A15 (CPH2185) Factory Reset Without Recovery Lock With by Hydra

Oppo A15 (CPH2185) Factory Reset Without Recovery Lock With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM6)
Device : 6&944c330&0&5
SymbolicName :??USB#VID_0E8D&PID_0003#6&944c330&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

H:mobileboxHydraTool_FullPackage_08-01-2021BackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : CE3D3036A4A0A4F8DBC99799DBA09C7A
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 184AA57BAF48C6BAAA462805137E02E1
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E030080AED9C73B - hB8aP>
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_oppo6765.bin
Creating Scatter file... H:mobileboxHydraTool_FullPackage_08-01-2021BackupAuto0766__110521005632MT6765_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x15088000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x17188000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x1E822000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x1F022000] 15.867 MB -> protect2.bin...0 Ok
-persist [0x20800000] 48 MB -> persist.bin...0 Ok
-nvram [0x2C600000] 64 MB -> nvram.bin...0 Ok
Done!!!
H:mobileboxHydraTool_FullPackage_08-01-2021BackupAuto0766__110521005632
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 184AA57BAF48C6BAAA462805137E02E1
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E030080AED9C73B - hB8aP>

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP tition...
Safeformat Universal...
Action Result : Ok

Elapsed Time : 00:01:00
  Reply With Quote
Old 11-05-2021, 10:28   #2695 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi 9 İndia (cattial) Bootloader Unlock With by Hydra

Redmi 9 İndia (cattial) Bootloader Unlock With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM127)
Device : 6&1923b7cb&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#6&1923b7cb&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

C:Hydra ToolBackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 0C0E253151EA5820C492252D6068CE4E
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : F596A3468EE264C05716B66B3560531D
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 150100434A544434520480C34ED0B72F - CJTD4R
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_k65v1_64_bsp.bin
Creating Scatter file... C:Hydra ToolBackupAuto0766__110521075453MT6765_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x3BD88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x3DE88000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x45522000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x45D22000] 10,867 MB -> protect2.bin...0 Ok
-persist [0x47000000] 48 MB -> persist.bin...0 Ok
-nvram [0x52E80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0766__110521075453
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 F596A3468EE264C05716B66B3560531D
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 150100434A544434520480C34ED0B72F - CJTD4R

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:01:19
  Reply With Quote
Old 11-06-2021, 08:28   #2696 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Redmi Note 8 (ginkgo) EDL Frp Remove With by Hydra

Redmi Note 8 (ginkgo) EDL Frp Remove With by Hydra



Quote:
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: Xiaomi_redminote8_loader.elf
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM47)
SymbolicName :??USB#VID_05C6&PID_9008#7&1bb086bd&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping ..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 354807678
Firmware Version : 4
Product Name : S0J9K8
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58,242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 8
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V10.3.5.0.PCOMIXM release-keys
Miui Ver : V10
Device : ginkgo
Mod_device : ginkgo_global
Display ID : PKQ1.190616.001
Security Patch : 2019-09-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V10.3.5.0.PCOMIXM:user/release-keys

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:03
  Reply With Quote
Old 11-06-2021, 08:37   #2697 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Vivo y83 Remove Screen Security With by Hydra Tool

Vivo y83 Remove Screen Security With by Hydra Tool



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode Preloader
FriendlyName : MediaTek PreLoader USB VCOM_V1632 (Android) (COM24)
Device : 5&1e7d8db7&0&8
SymbolicName :??USB#VID_0E8D&PID_2000#5&1e7d8db7&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 33DDC8EB0C272F1D9D4183B77A68107E
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100474436424D42018F0C06035565 - GD6BMB

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : vivo
Vendor : vivo
Model : vivo 1808
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k62v1_64_bsp-user 8.1.0 O11019 1618561140 release-keys
Device : PD1732F_EX
Display ID : O11019 release-keys
Security Patch : 2021-03-01
Platform : =MTK6765
Fingerprint : vivo/1808/1808:8.1.0/O11019/1618561140:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Safe Format Method 1
Processing...
Erasing FRP tition...
Safeformat Universal...
ERROR : ACK : 0xC002002A[STATUS_SEC_IMG_TYPE_MISMATCH]
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:03
  Reply With Quote
Old 11-06-2021, 08:59   #2698 (permalink)
No Life Poster
 
Join Date: May 2011
Posts: 1,322
Member: 1576733
Status: Offline
Thanks Meter: 622
Myphone my28s Format Factory With by Hydra

Myphone my28s Format Factory With by Hydra



Quote:
Port : [Auto] Scanning... COM3
Opening Port... (COM3) Ok
------------------------------------------
Factory Reset/Format Userdata...
------------------------------------------
Reading IMEI... .
IMEI 1 : 000000000000000
IMEI 2 : 000000000000000
Executing... Factory Reset

Reading System Info ..
Vendor : MyPhone
Model : MyPhone my28S
Android Ver : 6.0
Device : MyPhone_my28S
Board : sp7731ceb
Display ID : S4020_MY28S_20160920_v1.15
Security Patch : 2016-09-06
Platform : sc8830
FRPPST : /dev/block/platform/sdio_emmc/by-name/persist
Fingerprint : MyPhone/My28S/MyPhone_my28S:6.0/MRA58K/974:user/release-keys
ro_product_hardware : SP7731C

Action Result.. Ok

Elapsed Time : 00:00:09
  Reply With Quote
Old 11-07-2021, 15:53   #2699 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 847
Member: 2944109
Status: Offline
Thanks Meter: 713
Samsung Galaxy M11 (SM-M115F) Removing FRP ADB Mode Hydra Tool

Samsung Galaxy M11 (SM-M115F) Removing FRP ADB Mode

Hydra Main Tool




Code:
Starting ADB Server....
Searching Device By ADB
Device Found...
   Model : SM-M115F
   Brand : samsung
   Android Ver : 10
   CPU abi : armeabi-v7a
   Software Version : M115FXXU2AUA2
   CSC Version : M115FOXM2AUA3
   Bootloader : M115FXXU2AUA3
   Board : QC_Reference_Phone
   Bootloader : QP1A.190711.020.M115FXXU2AUA3
   Display ID : 2021-02-01
   Security Patch : 16GB
   Emmc_size : msm8953
   Platform : 2021-02-01
   SYS USB CONFIG : persist.mtp,adb
   FRPPST : /dev/block/persistent
   FingerPrint : samsung/m11qnnxx/m11q:10/QP1A.190711.020/M115FXXU2AUA3:user/release-keys

Checking Root Status.... 
Root Status : Rooted
Root Version : /system/bin/sh: su: inaccessible or not found


Removing FRP...Ok
  Reply With Quote
Old 11-07-2021, 15:55   #2700 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 847
Member: 2944109
Status: Offline
Thanks Meter: 713
OPPO A15 (CPH2185) Ultra Power Option

OPPO A15 (CPH2185) Ultra Power Option
Safe Format Method 1 + Zirowipe FRP

Hydra MTK Tool - ONE CLICK



  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 06:01.



Powered by Searchlight © 2025 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.51177 seconds with 9 queries

SEO by vBSEO