GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 11-20-2021, 11:52   #2746 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,186
Member: 1724862
Status: Offline
Thanks Meter: 375
Redmi Note 9 (merlin) Bootloader Unlock Done with by hydra


Redmi Note 9 (merlin) Bootloader Unlock Done with by hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : ?MediaTek USB Port_V1632 (COM4)?
Device : 5&32762a5a&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#5&32762a5a&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

C:Hydra ToolBackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 14BD4B7471F4EDC113200E1027916DBE
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : E3928CA898924DAF3EAB8B3C182EA846
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100335636434D4202CB72DC014759 - 3V6CMB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... C:Hydra ToolBackupAuto0707__112021111806MT6768_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05508000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x0C4A2000] 64 MB -> nvdata.bin...0 Ok
-persist [0x104A2000] 48 MB -> persist.bin...0 Ok
-protect1 [0x164A2000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x16CA2000] 11.367 MB -> protect2.bin...0 Ok
-nvram [0x19F80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0707__112021111806
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 E3928CA898924DAF3EAB8B3C182EA846
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100335636434D4202CB72DC014759 - 3V6CMB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:01:06
  Reply With Quote
Old 11-20-2021, 12:06   #2747 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,186
Member: 1724862
Status: Offline
Thanks Meter: 375
Redmi Y2 (ysl) Remove Frp With by Hydra

Redmi Y2 (ysl) Remove Frp With by Hydra



Quote:
Brand : XIAOMI Model : Redmi Y2 (ysl) Storage : Auto
Loader: 000460E100000000_57158eaf1814d78f_ffd16e82_QUALCOM M_XIAOMI_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :??USB#VID_05C6&PID_9008#5&39e6a57&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/10/2020,5.1.1.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1265685999
Firmware Version : 842018864
Product Name : hB8aP>
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi S2
ID : PKQ1.181203.001
SDK : 28
Release : 9
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Description : ysl-user 9 PKQ1.181203.001 V12.0.2.0.PEFMIXM release-keys
Miui Ver : V12
Device : ysl
Mod_device : ysl_global
Display ID : PKQ1.181203.001
Security Patch : 2020-09-01
Emmc_size : 16GB
Fingerprint : xiaomi/ysl/ysl:9/PKQ1.181203.001/V12.0.2.0.PEFMIXM:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00.00.04
  Reply With Quote
Old 11-20-2021, 12:12   #2748 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,186
Member: 1724862
Status: Offline
Thanks Meter: 375
Redmi 9T (lime) Edl Flashıng With by Hydra No Auth No Credit

Redmi 9T (lime) Edl Flashıng With by Hydra No Auth No Credit



Quote:
Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM29)
SymbolicName :??USB#VID_05C6&PID_9008#5&6e02f97&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0xC1DCDA57
HW_ID : 0014D0E100720000
MSM ID : 0x0014D0E1, SM_KAMORTA_H-
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4 358ec9d79cda46

Firehose Loader [0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI. fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0000000000720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4 358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : f2f760038334
IMAGE_VARIANT : KamortaPkgLAA
QC_VERSION : BOOT.XF.4.1-00187-KAMORTALAZ-2
--------------------------------------------------

SaharaBoot... Ok
Sending .................................b Okb0
Connecting to Firehose...
Ping ...................... Ok
Configuration........
Identifying Chip.... ....UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Nov 16 2020 - 01:25:39

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 300
Serial Number : 1129467726
Firmware Version : 605
Product Name : MT128GASAO4U21 0605
Physical titions : 6
Total Logical Blocks:
Drive [0] 30119936 [114.898 GB]
Drive [1] 2048 [8 MB]
Drive [2] 2048 [8 MB]
Drive [3] 32768 [128 MB]
Drive [4] 1048576 [4 GB]
Drive [5] 32768 [128 MB]

Protocol : Universal
Running : Ok

Failed to read information from phone.


----------------------------
Flashing Selected titions....0
- vbmeta_system (0)b [vbmeta_system.img] b0 Ok0
- metadata (0)b [metadata.img] b0 Ok0
- persist (0)b [persist.img] b0 Ok0
- recovery (0)b [recovery.img] b0 Ok0
- super (0)b [super.img] b0 Ok0
- userdata (0)b [userdata.img] b0 Ok0
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok0
- xbl_config (1)b [xbl_config.elf] b0 Ok0
- xbl (1)b [xbl.elf] b0 Ok0
- PrimaryGPT (1)b [gpt_main1.bin] b0 Ok0
- xbl_configbak (2)b [xbl_config.elf] b0 Ok0
- xblbak (2)b [xbl.elf] b0 Ok0
- PrimaryGPT (2)b [gpt_main2.bin] b0 Ok0
- PrimaryGPT (3)b [gpt_main3.bin] b0 Ok0
- multiimgoem (4)b [multi_image.mbn] b0 Ok0
- vbmeta (4)b [vbmeta.img] b0 Ok0
- qupfw (4)b [qupv3fw.elf] b0 Ok0
- devcfg (4)b [devcfg.mbn] b0 Ok0
- storsec (4)b [storsec.mbn] b0 Ok0
- hyp (4)b [hyp.mbn] b0 Ok0
- hypbak (4)b [hyp.mbn] b0 Ok0
- cmnlib (4)b [cmnlib.mbn] b0 Ok0
- cmnlibbak (4)b [cmnlib.mbn] b0 Ok0
- cmnlib64 (4)b [cmnlib64.mbn] b0 Ok0
- cmnlib64bak (4)b [cmnlib64.mbn] b0 Ok0
- keymaster (4)b [km4.mbn] b0 Ok0
- keymasterbak (4)b [km4.mbn] b0 Ok0
- bluetooth (4)b [BTFM.bin] b0 Ok0
- abl (4)b [abl.elf] b0 Ok0
- ablbak (4)b [abl.elf] b0 Ok0
- imagefv (4)b [imagefv.elf] b0 Ok0
- imagefvbak (4)b [imagefv.elf] b0 Ok0
- uefisecapp (4)b [uefi_sec.mbn] b0 Ok0
- uefisecappbak (4)b [uefi_sec.mbn] b0 Ok0
- featenabler (4)b [featenabler.mbn] b0 Ok0
- featenablerbak (4)b [featenabler.mbn] b0 Ok0
- misc (4)b [misc.img] b0 Ok0
- rpm (4)b [rpm.mbn] b0 Ok0
- rpmbak (4)b [rpm.mbn] b0 Ok0
- tz (4)b [tz.mbn] b0 Ok0
- tzbak (4)b [tz.mbn] b0 Ok0
- logfs (4)b [logfs_ufs_8mb.bin] b0 Ok0
- dtbo (4)b [dtbo.img] b0 Ok0
- dsp (4)b [dspso.bin] b0 Ok0
- boot (4)b [boot.img] b0 Ok0
- modem (4)b [NON-HLOS.bin] b0 Ok0
- cache (4)b [cache.img] b0 Ok0
- cust (4)b [cust.img] b0 Ok0
- PrimaryGPT (4)b [gpt_main4.bin] b0 Ok0
- PrimaryGPT (5)b [gpt_main5.bin] b0 Ok
0
Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:06:03
  Reply With Quote
Old 11-20-2021, 14:27   #2749 (permalink)
No Life Poster
 
Join Date: Apr 2011
Posts: 2,293
Member: 1562854
Status: Offline
Sonork: 1245
Thanks Meter: 230
redmi 8a flash done

Code:
{\rtf1\ansi\ansicpg1256\deff0\deflang1036{\fonttbl{\f0\fnil\fcharset0 Consolas;}}
{\colortbl ;\red204\green204\blue204;\red0\green156\blue193;\red58\green150\blue221;\red19\green161\blue14;\red255\green255\blue0;\red192\green192\blue192;\red51\green153\blue255;\red128\green128\blue128;\red72\green61\blue139;}
\viewkind4\uc1\pard\cf1\f0\fs20 Hydra Qualcomm  Tool  Ver 1.0.3 Build 7\par
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 64-bit Edition)\par
Pentium(R) Dual-Core  CPU      E5800  @ 3.20GHz\par
Intel(R) G41 Express Chipset\par
Ram Installed : \cf2 2 GB\cf1\par
Windows Access Right : \cf2 Admin\cf3\par
Software Run As Admnistrator\cf1\par
\cf4\par
******* Dongle Info *******\cf1\par
Version    : \cf2\b Hydra Tool v 1.2\cf1\b0\par
Serial     : \cf2\b 200700004667\cf1\b0\par
Initialize : \cf2 OKAY\cf1\par
Status     : \cf2 Activated\par
Life       : 0 [0-0-0-0-1]\cf1\par
\par
 Searching for Qualcomm 9008 Device...\cf4 Found\cf1\par
 FriendlyName :\cf4 Qualcomm HS-USB QDLoader 9008 (COM44)\cf1\par
 SymbolicName :\cf4\\??\\USB#VID_05C6&PID_9008#5&136f0554&0&1#\{a5dcbf10-6530-11d2-901f-00c04fb951ed\}\cf1\par
 Driver Ver   :\cf4 08/02/2017,2.1.2.7\cf1\par
\par
Getting device info\cf5 ..\cf4 .\cf5 ...\cf1\par
Serial No.: \cf2 0x4CCD5012\cf1\par
HW_ID     : \cf2 000BF0E100720000\cf1\par
MSM ID    : \cf2 0x000BF0E1, SDM439-Qualcomm Snapdragon 439\cf1\par
MODEL_ID  : \cf2 0x0000\cf1\par
OEM_ID    : \cf2 0x0072\cf4  - XIAOMI\cf1\par
PBL Ver   : \cf2 00000000\cf1\par
PK HASH   : \cf2 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a\cf4\par
 \cf1\par
Firehose Loader\cf2 [000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_auth_peek_8937.fhprg]\cf1\par
--------------------------------------------------\par
  Header Type    : OLD\par
  TargetMSM      : 8937\par
  Tag            : _auth_peek\par
  Version        : 3\par
  Code_size      : 320\par
  Signature_size : 256\par
  fhVendor       : XIAOMI\par
  HW_ID          : 000BF0E100720000\par
  Vendor         : XIAOMI\par
  OEM_ID         : 0072\par
  MODEL_ID       : 0000\par
  SW_ID          : 0000000100000003\par
  APP_ID         : \par
  pk_hash        : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a\par
  OEM_VERSION    : c4-miui-ota-bd104.bj\par
  IMAGE_VARIANT  : FAADANAZA\par
  QC_VERSION     : BOOT.BF.3.3.2-00073\par
--------------------------------------------------\par
\par
SaharaBoot... \cf3 Ok\cf1\par
Sending \cf6 .......................\cf4\b Ok\b0\par
Connecting to Firehose...\cf2\par
Ping\cf1 ...\cf4  Ok \cf1\par
Configuration.\cf4\par
Xiaomi Authentication needed...\cf7\par
Signature Request -> \cf1 bob[Hy\cf7\par
Signature @256bytes Authentication....\cf4  Accepted\cf1 ......\cf8\par
Identifying Chip....\cf1\par
\cf4 Ok\cf7\par
Chip Configuration :\cf4\par
 MemoryName : \cf3 eMMC\cf4\par
 MaxPayloadSizeToTargetInBytes : \cf3 1048576\cf4\par
 MaxPayloadSizeToTargetInBytesSupported : \cf3 1048576\cf4\par
 MaxPayloadSizeFromTargetInBytes : \cf3 4096\cf4\par
 MaxXMLSizeInBytes : \cf3 4096\cf4\par
 TargetName : \cf3 8937\cf4\par
 Version : \cf3 1\cf1\par
\par
*** STORAGE DEVICE INFO ***\par
Memory Type         : \cf3 eMMC\cf1\par
Block Size in Bytes : \cf3 512\cf1\par
Page Size           : \cf3 512\cf1\par
Manufacturer ID     : \cf3 19\cf1\par
Serial Number       : \cf3 536564921\cf1\par
Firmware Version    : \cf3 4\cf1\par
Product Name        : \cf3 S0J9N8\cf1\par
Physical Partitions : \cf3 3\cf1\par
Total Logical Blocks:\cf8\par
          Drive [0]  \cf3 122142720\cf1 [58,242 GB]\cf8\par
          Drive [1]  \cf3 8192\cf1 [4 MB]\cf8\par
          Drive [2]  \cf3 8192\cf1 [4 MB]\par
\par
Protocol : \cf3 Universal\par
Running : Ok\cf4\par
 \par
Phone Information\cf8 ......\cf1\par
  Vendor         : \cf2 Xiaomi\cf1\par
  ID             : \cf2 QKQ1.191014.001\cf1\par
  SDK            : \cf2 29\cf1\par
  Release        : \cf2 10\cf1\par
  ABI            : \cf2 armeabi-v7a\cf1\par
  CPU abilist    : \cf2 armeabi-v7a,armeabi\cf1\par
  Locale         : \cf2 en-GB\cf1\par
  Miui Ver       : \cf2 V125\cf1\par
  Mod_device     : \cf2 olivelite_global\cf1\par
  Security Patch : \cf2 2021-07-01\cf1\par
  Emmc_size      : \cf2 16GB\cf1\par
\par
Reading GPT[3]\cf8\par
          Drive [0] \cf3 64 Items\cf8\par
          Drive [1] \cf3 0 Items\cf8\par
          Drive [2] \cf3 0 Items\cf1\par
\par
\par
Backup Security partitions...\par
Reading Security Items....\cf7\par
 > modemst1\par
 > modemst2\par
 > fsg\par
 > fsc\cf4\par
C:\\Hydra Tool\\Backup\\Security_Backup\\__10_Security_112021151311.sec\cf1\par
Backup Security Success....\par
\cf4\par
----------------------------\par
Flashing Selected Partitions....\cf9\par
 - \cf3 sec\cf4 (0)\cf1\b [sec.dat] \cf4\b0  Skipped\cf9\par
 - \cf3 config\cf4 (0)\cf1\b [config.bin] \cf3\b0  Ok\cf9\par
 - \cf3 vbmeta\cf4 (0)\cf1\b [vbmeta.img] \cf3\b0  Ok\cf9\par
 - \cf3 vbmetabak\cf4 (0)\cf1\b [vbmeta.img] \cf3\b0  Ok\cf9\par
 - \cf3 devcfg\cf4 (0)\cf1\b [devcfg.mbn] \cf3\b0  Ok\cf9\par
 - \cf3 devcfgbak\cf4 (0)\cf1\b [devcfg.mbn] \cf3\b0  Ok\cf9\par
 - \cf3 apdp\cf4 (0)\cf1\b [dummy.img] \cf3\b0  Ok\cf9\par
 - \cf3 msadp\cf4 (0)\cf1\b [dummy.img] \cf3\b0  Ok\cf9\par
 - \cf3 sbl1\cf4 (0)\cf1\b [sbl1.mbn] \cf3\b0  Ok\cf9\par
 - \cf3 sbl1bak\cf4 (0)\cf1\b [sbl1.mbn] \cf3\b0  Ok\cf9\par
 - \cf3 rpm\cf4 (0)\cf1\b [rpm.mbn] \cf3\b0  Ok\cf9\par
 - \cf3 rpmbak\cf4 (0)\cf1\b [rpm.mbn] \cf3\b0  Ok\cf9\par
 - \cf3 cmnlib\cf4 (0)\cf1\b [cmnlib_30.mbn] \cf3\b0  Ok\cf9\par
 - \cf3 cmnlibbak\cf4 (0)\cf1\b [cmnlib_30.mbn] \cf3\b0  Ok\cf9\par
 - \cf3 cmnlib64\cf4 (0)\cf1\b [cmnlib64_30.mbn] \cf3\b0  Ok\cf9\par
 - \cf3 cmnlib64bak\cf4 (0)\cf1\b [cmnlib64_30.mbn] \cf3\b0  Ok\cf9\par
 - \cf3 keymaster\cf4 (0)\cf1\b [km4.mbn] \cf3\b0  Ok\cf9\par
 - \cf3 keymasterbak\cf4 (0)\cf1\b [km4.mbn] \cf3\b0  Ok\cf9\par
 - \cf3 misc\cf4 (0)\cf1\b [misc.img] \cf3\b0  Ok\cf9\par
 - \cf3 aboot\cf4 (0)\cf1\b [emmc_appsboot.mbn] \cf3\b0  Ok\cf9\par
 - \cf3 abootbak\cf4 (0)\cf1\b [emmc_appsboot.mbn] \cf3\b0  Ok\cf9\par
 - \cf3 tz\cf4 (0)\cf1\b [tz.mbn] \cf3\b0  Ok\cf9\par
 - \cf3 tzbak\cf4 (0)\cf1\b [tz.mbn] \cf3\b0  Ok\cf9\par
 - \cf3 dtbo\cf4 (0)\cf1\b [dtbo.img] \cf3\b0  Ok\cf9\par
 - \cf3 dtbobak\cf4 (0)\cf1\b [dtbo.img] \cf3\b0  Ok\cf9\par
 - \cf3 splash\cf4 (0)\cf1\b [splash.img] \cf3\b0  Ok\cf9\par
 - \cf3 dsp\cf4 (0)\cf1\b [adspso.bin] \cf3\b0  Ok\cf9\par
 - \cf3 dspbak\cf4 (0)\cf1\b [adspso.bin] \cf3\b0  Ok\cf9\par
 - \cf3 persist\cf4 (0)\cf1\b [persist.img] \cf3\b0  Ok\cf9\par
 - \cf3 mdtp\cf4 (0)\cf1\b [mdtp.img] \cf3\b0  Ok\cf9\par
 - \cf3 mdtpbak\cf4 (0)\cf1\b [mdtp.img] \cf3\b0  Ok\cf9\par
 - \cf3 boot\cf4 (0)\cf1\b [boot.img] \cf3\b0  Ok\cf9\par
 - \cf3 recovery\cf4 (0)\cf1\b [recovery.img] \cf3\b0  Ok\cf9\par
 - \cf3 cache\cf4 (0)\cf1\b [cache.img] \cf3\b0  Ok\cf9\par
 - \cf3 modem\cf4 (0)\cf1\b [NON-HLOS.bin] \cf3\b0  Ok\cf9\par
 - \cf3 system\cf4 (0)\cf1\b [system.img] \cf3\b0  Ok\cf9\par
 - \cf3 vendor\cf4 (0)\cf1\b [vendor.img] \cf3\b0  Ok\cf9\par
 - \cf3 cust\cf4 (0)\cf1\b [cust.img] \cf3\b0  Ok\cf9\par
 - \cf3 userdata\cf4 (0)\cf1\b [userdata.img] \cf3\b0  Ok\cf9\par
 - \cf3 PrimaryGPT\cf4 (0)\cf1\b [gpt_main0.bin] \cf3\b0  Ok\cf1\par
\cf9\par
Flashing Patch Configuration.. \cf1\par
0 [NUM_DISK_SECTORS-34.]  \cf3  OK\cf1\par
0 [NUM_DISK_SECTORS-34.]  \cf3  OK\cf1\par
0 [NUM_DISK_SECTORS-34.]  \cf3  OK\cf1\par
0 [NUM_DISK_SECTORS-34.]  \cf3  OK\cf1\par
0 [NUM_DISK_SECTORS-1.]  \cf3  OK\cf1\par
0 [NUM_DISK_SECTORS-1.]  \cf3  OK\cf1\par
0 [NUM_DISK_SECTORS-33.]  \cf3  OK\cf1\par
0 [CRC32(2,8192)]  \cf3  OK\cf1\par
0 [CRC32(NUM_DISK_SECTORS-33.,8192)]  \cf3  OK\cf1\par
0 [0]  \cf3  OK\cf1\par
0 [CRC32(1,92)]  \cf3  OK\cf1\par
0 [0]  \cf3  OK\cf1\par
0 [CRC32(NUM_DISK_SECTORS-1.,92)]  \cf3  OK\cf4\par
----------------------------\par
Done!\par
Operation : Setbootablestoragedrive: Drive 0\cf1\par
Set bootable storage drive 0\cf3  Ok\cf1\par
\cf4\par
Rebooting Phone....\cf3  Ok\cf1\par
\cf3\par
Elapsed Time : 00:04:41\cf1\par
\par
}
  Reply With Quote
Old 11-21-2021, 13:00   #2750 (permalink)
Product Manager
 
Hydra Tool's Avatar
 
Join Date: Aug 2018
Location: Ukraine / Harkov
Posts: 1,849
Member: 2857401
Status: Offline
Thanks Meter: 6,098
Realme C21Y FRP and Format done by Hydra Dongle

Realme C21Y FRP and Format done by Hydra Dongle

http://www.youtube.com/watch?v=CZdMu7iTk_0
  Reply With Quote
Old 11-22-2021, 09:11   #2751 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,186
Member: 1724862
Status: Offline
Thanks Meter: 375
Redmi Note 6 Pro (tulip) Edl Frp Remove with by Hydra

Redmi Note 6 Pro (tulip) Edl Frp Remove with by Hydra



Quote:
Brand : XIAOMI Model : Redmi Note 6 Pro (tulip) Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC _XIAOMI_auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :??USB#VID_05C6&PID_9008#6&22dec234&1&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 05/29/2019,2.1.3.7

Getting device info .. . ...
Serial No.: 0xAD400B6B
HW_ID : 000CC0E100000000
MSM ID : 0x000CC0E1,
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441b def0cd57e3c370

Firehose Loader [0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC _XIAOMI_auth.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM :
Tag : _auth
Version : 5
Code_size : 416
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 3006000000010000
Vendor : GENERIC
OEM_ID : 0001
MODEL_ID : 0000
SW_ID : 000000000000000B
APP_ID :
pk_hash : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441b def0cd57e3c370
OEM_VERSION : c3-bsp-builder-job001.bj
IMAGE_VARIANT : Sdm660LA
QC_VERSION : BOOT.XF.1.4-00255-S660LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ...............................b Okb0
Connecting to Firehose...
Ping ......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3689466904
Firmware Version : 2
Product Name : 3H6CAB
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 6 Pro
ID : PKQ1.180904.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : tulip-user 9 PKQ1.180904.001 V12.0.1.0.PEKMIXM release-keys
Miui Ver : V12
Device : tulip
Mod_device : tulip_global
Display ID : PKQ1.180904.001
Security Patch : 2020-11-05
Fingerprint : xiaomi/tulip/tulip:9/PKQ1.180904.001/V12.0.1.0.PEKMIXM:user/release-keys

Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:04
  Reply With Quote
Old 11-22-2021, 09:20   #2752 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,186
Member: 1724862
Status: Offline
Thanks Meter: 375
Tecno A6 Format Userdata & Remove Frp one click With by Hydra

Tecno A6 Format Userdata & Remove Frp one click With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM30)
Device : 5&11976120&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#5&11976120&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 573356C4CE45431717575EF43982682B
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044503644414202183CDC1557A5 - DP6DAB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Safe Format Master Clear 1
Processing...
Safeformat Master Clear 1...
Action Result : Ok

Elapsed Time : 00:00:02
  Reply With Quote
Old 11-22-2021, 09:28   #2753 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 37
Posts: 1,186
Member: 1724862
Status: Offline
Thanks Meter: 375
Oppo F1s Plus Read Screen Security With by Hydra

Oppo F1s Plus Read Screen Security With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM14)
Device : 6&4346150&0&8
SymbolicName :??USB#VID_0E8D&PID_0003#6&4346150&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326 MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 01
SBC : 01 (True)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326 MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : D8135C47F8157DEAD4D7E20E52DC726C
Stage 1.. [Size:219288]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : D4E6C40B62B9D26F1A9196F85F0078CA
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A5281AA8B4749D - HBG4a2
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO F1s
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15131-user 5.1 LMY47I 1482847378 dev-keys
Device : A59
Board : full_oppo6750_15131
Display ID : A1601_11_A.16_161227
Security Patch : 2016-09-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : OPPO/A59/A59:5.1/LMY47I/1474447292:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_oppo6750_15131.bin
Creating Scatter file... C:Hydra ToolBackupAuto0326_OPPO_A59_A59_5.1_LMY47I_1474447 292_112221144102MT6750T_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x03F88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x04088000] 32 MB -> nvdata.bin...0 Ok
-protect1 [0x08088000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x08888000] 15.469 MB -> protect2.bin...0 Ok
-nvram [0x0CF00000] 5 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0326_OPPO_A59_A59_5.1_LMY47I_1474447 292_112221144102
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 D4E6C40B62B9D26F1A9196F85F0078CA
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A5281AA8B4749D - HBG4a2

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : OPPO F1s
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15131-user 5.1 LMY47I 1482847378 dev-keys
Device : A59
Board : full_oppo6750_15131
Display ID : A1601_11_A.16_161227
Security Patch : 2016-09-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : OPPO/A59/A59:5.1/LMY47I/1474447292:user/release-keys
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : .0 Found
Gesture Data : E31BC75265FBBBBB3330323611520B980C89F361
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 47869
1 2 3
4 5 6
7 8 9
Action Result : Ok

Elapsed Time : 00:03:24
  Reply With Quote
Old 11-23-2021, 08:33   #2754 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 652
Member: 2944109
Status: Offline
Thanks Meter: 453
Donate money to this user
Condor A8 (PGN611) Ultra Power Option

Condor A8 (PGN611) Ultra Power Option


Hydra MTK Tool



Code:
Searching for MTK Device...Found
 Port Identification :DA_HIGHSPEED_VCOM
 FriendlyName :MediaTek DA USB VCOM (Android) (COM4)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2001#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..


Reading System Info

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition... [Ok]
Safeformat Universal...(tmp.bin)512 Bytes Ok
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:01
  Reply With Quote
Old 11-23-2021, 08:34   #2755 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 652
Member: 2944109
Status: Offline
Thanks Meter: 453
Donate money to this user
Redmi 9A (dandelion) Unlock Bootloader Done

Redmi 9A (dandelion) Unlock Bootloader Done

Hydra MTK Tool




Code:
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM7)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 39576C356EB3A3DDDA6A35EA76FA6989
 ERAM Size  : 0x0000000000038000 -224 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000001000000 -16 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 4501004441343033320198B15F1E68F3 - DA4032

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
Action Result :  Ok

Elapsed Time : 00:00:02
  Reply With Quote
Old 11-23-2021, 08:38   #2756 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 652
Member: 2944109
Status: Offline
Thanks Meter: 453
Donate money to this user
Xiaomi Redmi 9A (dandelion) Remove FRP Done

Xiaomi Redmi 9A (dandelion) Remove FRP Done



Code:
Searching for MTK Device...Found
 Port Identification :Flashmode BROM 
 FriendlyName :MediaTek USB Port (COM7)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..
Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : E7
 SBC           : 01 (True)
 SLA           : 02 (True)
 DAA           : 04 (True)
 SWJTAG        : 06 (True)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 20 (True)
 MEMWRITE      : 40 (True)
 CMD_C8        : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking...Ok

C:\Hydra Tool\Backup\Preloader_dump\prel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
 hw code       : 0766MT6765 [6765]
 hw subcode    : 8A00
 hw version    : CA00
 sw version    : 0000
 Target config : 00
 SBC           : 00 (False)
 SLA           : 00 (False)
 DAA           : 00 (False)
 SWJTAG        : 00 (False)
 EPP           : 00 (False)
 CERT          : 00 (False)
 MEMREAD       : 00 (False)
 MEMWRITE      : 00 (False)
 CMD_C8        : 00 (False)

MEID : 7B5728614B55819EC0180EC7340EE5E9
Stage 1..[Size:216440]
 Sending :  Please wait.. Accepted

Identifying Protocol...
 Protocol : New
 Synchronization...SYNC
 Preloader Initialization...
 Parsing prel.tmp
 Init : Accepted
 Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 059506388D3389B22BE1DFC44C3293EA
 ERAM Size  : 0x0000000000038000 -224 KB
 IRAM Size  : 0x00000000C0000000 -3 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 150100424A54443452097ED45E5C97F1 - BJTD4R
 Executing : ACCEPTED...

Reading GPT-EMMC [0x00008000] 130 Items

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
   -> Renaming Preloader....  preloader_k62v1_64_bsp.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Auto\0766__111321161313\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x3BD88000]1024 KB ->frp.bin...Ok
-nvdata[0x3DE88000]64 MB ->nvdata.bin...Ok
-protect1[0x45522000]8 MB ->protect1.bin...Ok
-protect2[0x45D22000]10.867 MB ->protect2.bin...Ok
-persist[0x47000000]48 MB ->persist.bin...Ok
-nvram[0x52E80000]64 MB ->nvram.bin...Ok
Done!!!
C:\Hydra Tool\\Backup\Auto\0766__111321161313
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : 059506388D3389B22BE1DFC44C3293EA
 ERAM Size  : 0x0000000000038000 -224 KB
 IRAM Size  : 0x00000000C0000000 -3 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x0000000747C00000 -29.121 GB
 eMMC CID   : 150100424A54443452097ED45E5C97F1 - BJTD4R

Reading GPT-EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:39
  Reply With Quote
Old 11-23-2021, 08:40   #2757 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 652
Member: 2944109
Status: Offline
Thanks Meter: 453
Donate money to this user
Brandt BSTAR + Ultra Power Option

Brandt BSTAR + Ultra Power Option
Safeformat Universal + ZeroWipe FRP
Hydra MTK Tool





Code:
Searching for MTK Device...Found
 Port Identification :Flashmode Preloader
 FriendlyName :MediaTek PreLoader USB VCOM (Android) (COM3)
 Device       :6&12e3c9ed&0&1
 SymbolicName :\??\USB#VID_0E8D&PID_2000#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
 UNIQUE ID  : BFF3CCDC818AE99246C9D727DE032435
 ERAM Size  : 0x0000000000020000 -128 KB
 IRAM Size  : 0x0000000080000000 -2 GB
 eMMC BOOT1 : 0x0000000000400000 -4 MB
 eMMC BOOT2 : 0x0000000000400000 -4 MB
 eMMC RPMB  : 0x0000000000400000 -4 MB
 eMMC USER  : 0x00000003A3E00000 -14.561 GB
 eMMC CID   : 150100523832314D42002777D4467255 - R821MB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
  Brand          : Brandt
  Vendor         : Vanzo
  Model          : BSTAR+
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : fr-DZ
  Description    : full_fd3903o-user 8.1.0 O11019 20180817 release-keys
  Device         : BSTAR_PLUS
  Display ID     : BTA55H8S17082018
  Security Patch : 2018-08-05
  Fingerprint    : Brandt/BSTAR_PLUS/BSTAR_PLUS:8.1.0/O11019/20180817:user/release-keys
  StorageType    : mtp
  Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP Partition...
Safeformat Universal...
Action Result :  Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:03
  Reply With Quote
Old 11-23-2021, 08:42   #2758 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 652
Member: 2944109
Status: Offline
Thanks Meter: 453
Donate money to this user
OPPO A1K (CPH1923) Remove Password Without Data loss

OPPO A1K (CPH1923) Remove Password Without Data loss


  Reply With Quote
Old 11-23-2021, 08:44   #2759 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 652
Member: 2944109
Status: Offline
Thanks Meter: 453
Donate money to this user
Huawei Y7 2019 (DUB-LX3) Remove FRP Done

Huawei Y7 2019 (DUB-LX3) Remove FRP Done

Hydra Qualcomm Tool


  Reply With Quote
Old 11-23-2021, 08:46   #2760 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 652
Member: 2944109
Status: Offline
Thanks Meter: 453
Donate money to this user
Xiaomi Redmi Note 8 (ginkgo) Remove FRP Done

Xiaomi Redmi Note 8 (ginkgo) Remove FRP Done

Hydra Qualcomm Tool




B.R
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 03:04.



Powered by Searchlight © 2022 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2022 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2017 -
Page generated in 0.39122 seconds with 8 queries

SEO by vBSEO