GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 11-27-2021, 09:36   #2776 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 36
Posts: 1,032
Member: 1724862
Status: Offline
Thanks Meter: 355
Redmi 9C (angelica) Bootloader Unlock With by hydra


Redmi 9C (angelica) Bootloader Unlock With by hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM12)
Device : 5&2f3fe3a6&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#5&2f3fe3a6&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 434B6A9D8A5C697AEEDE32E408A9E0DA
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : C6DB7D51E4D45B8BF024922E39D6C106
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 4501004441343033320138C42B43C78B - DA4032
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 0 C6DB7D51E4D45B8BF024922E39D6C106
ERAM Size : 0 0x0000000000038000 -224 KB
IRAM Size : 0 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 4501004441343033320138C42B43C78B - DA4032

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:33

  Reply With Quote
Old 11-27-2021, 09:42   #2777 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 36
Posts: 1,032
Member: 1724862
Status: Offline
Thanks Meter: 355
Mi A1 (Tissot) Edl Frp Remove done by Hydra



Quote:
Brand : XIAOMI Model : Mi A1 (Tissot) Storage : Auto
Loader: 000460E100000000_57158eaf1814d78f_3b318c1d_QUALCOM M_XIAOMI_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :??USB#VID_05C6&PID_9008#5&1f03ab54&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 05/29/2019,2.1.3.7

Getting device info .. . ...
Serial No.: 0x3D2556FB
HW_ID : 000460E100000000
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a9 25f3ff8403d39a

Firehose Loader [000460E100000000_57158eaf1814d78f_3b318c1d_QUALCOM M_XIAOMI_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000460E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a9 25f3ff8403d39a
OEM_VERSION : modem-ci
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3-00214
--------------------------------------------------

SaharaBoot... Ok
Sending ..................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3152321234
Firmware Version : 5
Product Name : RH64MB
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Mi A1
ID : N2G47H
SDK : 25
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : tissot-user 7.1.2 N2G47H 7.8.23 release-keys
Device : tissot_sprout
Board : msm8953
Display ID : N2G47H.7.8.23
Security Patch : 2018-01-01
Emmc_size : 16GB
Platform : msm8953
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : xiaomi/tissot/tissot_sprout:7.1.2/N2G47H/7.8.23:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:03
  Reply With Quote
Old 11-28-2021, 10:57   #2778 (permalink)
Freak Poster
 
pakistan786's Avatar
 
Join Date: Dec 2010
Posts: 348
Member: 1462894
Status: Online
Sonork: 100.1609879
Thanks Meter: 37
General mobile gm8 d repair on andriod 9

the device, first of all, back up your information, then you need to crack the boot lock of the device, for this, put the device in fastboot mode and enter the
fastboot oem unlock-go for unlock bootloader
then download twrp and copy to minimal adb folder
https://www.mediafire.com/file/f9avc...rpfeb.img/file
after flash twrp with this command fastboot flash boot twrp.img
know go to twrp by volum up and power formate data yes
install magasik and reboot
u r rooted
know enable diag with command or box
repair and reboot
don
  Reply With Quote
Old 11-29-2021, 09:37   #2779 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 36
Posts: 1,032
Member: 1724862
Status: Offline
Thanks Meter: 355
Huawei Y7 2019 (DUB-LX1) Fix Sound Problem done With by Hydra Edl FLashıng

Huawei Y7 2019 (DUB-LX1) Fix Sound Problem done With by Hydra Edl FLashıng



Quote:
Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM80)
SymbolicName :??USB#VID_05C6&PID_9008#5&1e6bc522&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 02/05/2018,3.0.0.0

Getting device info .. . ...
Serial No.: 0x4156FC6C
HW_ID : 0009A0E100150065
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID : 0x0065
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff57 3dba61bf6ae119

Firehose Loader [0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_ QUALCOMM_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 0009A0E100150065
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 0065
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff57 3dba61bf6ae119
OEM_VERSION : SIA1000073848
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00019
--------------------------------------------------

SaharaBoot... Ok
Sending .............b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 286953654
Firmware Version : 0
Product Name : GD6BMB
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ....
Unable To find Build.prop

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backup___Security_112921114951. sec
Backup Security Success....

----------------------------
Flashing Selected titions....
- gpt (0)b [gpt] b0 Ok
- sbl1 (0)b [sbl1] b0 Ok
- rpm (0)b [rpm] b0 Ok
- tz (0)b [tz] b0 Ok
- devcfg (0)b [devcfg] b0 Ok
- dsp (0)b [dsp] b0 Ok
- keystore (0)b [keystore] b0 Ok
- frp (0)b [frp] b0 Ok
- mota (0)b [mota] b0 Ok
- dip (0)b [dip] b0 Ok
- syscfg (0)b [syscfg] b0 Ok
- apdp (0)b [apdp] b0 Ok
- msadp (0)b [msadp] b0 Ok
- dpo (0)b [dpo] b0 Ok
- fsc (0)b [fsc] b0 Ok
- ssd (0)b [ssd] b0 Ok
- mcfg (0)b [mcfg] b0 Ok
- modemst1 (0)b [modemst1] b0 Skipped
- modemst2 (0)b [modemst2] b0 Skipped
- misc (0)b [misc] b0 Ok
- oeminfo (0)b [oeminfo] b0 Ok
- bootfail_info (0)b [bootfail_info] b0 Ok
- rrecord (0)b [rrecord] b0 Ok
- rainbow (0)b [rainbow] b0 Ok
- pad0 (0)b [pad0] b0 Ok
- aboot (0)b [aboot] b0 Ok
- cmnlib (0)b [cmnlib] b0 Ok
- cmnlib64 (0)b [cmnlib64] b0 Ok
- keymaster (0)b [keymaster] b0 Ok
- fsg (0)b [fsg] b0 Skipped
- DDR (0)b [DDR] b0 Ok
- sec (0)b [sec] b0 Skipped
- devinfo (0)b [devinfo] b0 Ok
- limits (0)b [limits] b0 Ok
- modem (0)b [modem] b0 Ok
- erecovery_kernel (0)b [erecovery_kernel] b0 Ok
- erecovery_ramdis (0)b [erecovery_ramdis] b0 Ok
- erecovery_vendor (0)b [erecovery_vendor] b0 Ok
- kernel (0)b [kernel] b0 Ok
- ramdisk (0)b [ramdisk] b0 Ok
- recovery_ramdisk (0)b [recovery_ramdisk] b0 Ok
- recovery_vendor (0)b [recovery_vendor] b0 Ok
- persist (0)b [persist] b0 Ok
- cache (0)b [cache] b0 Ok
- odm (0)b [odm] b0 Ok
- preload (0)b [preload] b0 Ok
- patch (0)b [patch] b0 Ok
- log (0)b [log] b0 Ok
- version (0)b [version] b0 Ok
- product (0)b [product] b0 Ok
- cust (0)b [cust] b0 Ok
- vendor (0)b [vendor] b0 Ok
- system (0)b [system] b0 Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:34:07
  Reply With Quote
Old 11-29-2021, 09:46   #2780 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 36
Posts: 1,032
Member: 1724862
Status: Offline
Thanks Meter: 355
Huawei Y7 2019 (DUB-LX1) Fix Sound Problem done With by Hydra Edl FLashıng

Huawei Y7 2019 (DUB-LX1) Fix Sound Problem done With by Hydra Edl FLashıng



Quote:
Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM80)
SymbolicName :??USB#VID_05C6&PID_9008#5&1e6bc522&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 02/05/2018,3.0.0.0

Getting device info .. . ...
Serial No.: 0x4156FC6C
HW_ID : 0009A0E100150065
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID : 0x0065
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff57 3dba61bf6ae119

Firehose Loader [0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_ QUALCOMM_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 0009A0E100150065
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 0065
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff57 3dba61bf6ae119
OEM_VERSION : SIA1000073848
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00019
--------------------------------------------------

SaharaBoot... Ok
Sending .............b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 286953654
Firmware Version : 0
Product Name : GD6BMB
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ....
Unable To find Build.prop

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backup___Security_112921114951. sec
Backup Security Success....

----------------------------
Flashing Selected titions....
- gpt (0)b [gpt] b0 Ok
- sbl1 (0)b [sbl1] b0 Ok
- rpm (0)b [rpm] b0 Ok
- tz (0)b [tz] b0 Ok
- devcfg (0)b [devcfg] b0 Ok
- dsp (0)b [dsp] b0 Ok
- keystore (0)b [keystore] b0 Ok
- frp (0)b [frp] b0 Ok
- mota (0)b [mota] b0 Ok
- dip (0)b [dip] b0 Ok
- syscfg (0)b [syscfg] b0 Ok
- apdp (0)b [apdp] b0 Ok
- msadp (0)b [msadp] b0 Ok
- dpo (0)b [dpo] b0 Ok
- fsc (0)b [fsc] b0 Ok
- ssd (0)b [ssd] b0 Ok
- mcfg (0)b [mcfg] b0 Ok
- modemst1 (0)b [modemst1] b0 Skipped
- modemst2 (0)b [modemst2] b0 Skipped
- misc (0)b [misc] b0 Ok
- oeminfo (0)b [oeminfo] b0 Ok
- bootfail_info (0)b [bootfail_info] b0 Ok
- rrecord (0)b [rrecord] b0 Ok
- rainbow (0)b [rainbow] b0 Ok
- pad0 (0)b [pad0] b0 Ok
- aboot (0)b [aboot] b0 Ok
- cmnlib (0)b [cmnlib] b0 Ok
- cmnlib64 (0)b [cmnlib64] b0 Ok
- keymaster (0)b [keymaster] b0 Ok
- fsg (0)b [fsg] b0 Skipped
- DDR (0)b [DDR] b0 Ok
- sec (0)b [sec] b0 Skipped
- devinfo (0)b [devinfo] b0 Ok
- limits (0)b [limits] b0 Ok
- modem (0)b [modem] b0 Ok
- erecovery_kernel (0)b [erecovery_kernel] b0 Ok
- erecovery_ramdis (0)b [erecovery_ramdis] b0 Ok
- erecovery_vendor (0)b [erecovery_vendor] b0 Ok
- kernel (0)b [kernel] b0 Ok
- ramdisk (0)b [ramdisk] b0 Ok
- recovery_ramdisk (0)b [recovery_ramdisk] b0 Ok
- recovery_vendor (0)b [recovery_vendor] b0 Ok
- persist (0)b [persist] b0 Ok
- cache (0)b [cache] b0 Ok
- odm (0)b [odm] b0 Ok
- preload (0)b [preload] b0 Ok
- patch (0)b [patch] b0 Ok
- log (0)b [log] b0 Ok
- version (0)b [version] b0 Ok
- product (0)b [product] b0 Ok
- cust (0)b [cust] b0 Ok
- vendor (0)b [vendor] b0 Ok
- system (0)b [system] b0 Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:34:07
  Reply With Quote
Old 11-29-2021, 09:52   #2781 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 36
Posts: 1,032
Member: 1724862
Status: Offline
Thanks Meter: 355
Realme C25 (RMX3191) Unlock Bootlaoder With by Hydra

Realme C25 (RMX3191) Unlock Bootlaoder With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM11)
Device : 6&38a36d0c&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#6&38a36d0c&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 994E379C2F98E41759A0A7F6D5024D6A
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 8E7BD1AEEA6F50252F5B952D902493F8
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 13014E47314A395238100FEBDC1A2857 - G1J9R8
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_oppo6768.bin
Creating Scatter file... C:Hydra ToolBackupAuto0707__112921110751MT6768_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x15F08000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x1CEA2000] 64 MB -> nvdata.bin...0 Ok
-persist [0x20EA2000] 48 MB -> persist.bin...0 Ok
-protect1 [0x23EA2000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x246A2000] 9.367 MB -> protect2.bin...0 Ok
-nvram [0x27700000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0707__112921110751
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 8E7BD1AEEA6F50252F5B952D902493F8
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 13014E47314A395238100FEBDC1A2857 - G1J9R8

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:47
  Reply With Quote
Old 11-30-2021, 08:45   #2782 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 36
Posts: 1,032
Member: 1724862
Status: Offline
Thanks Meter: 355
Mi Max 3 (Nitrogen) Edl Frp Remove done by Hydra

Mi Max 3 (Nitrogen) Edl Frp Remove done by Hydra



Quote:
Brand : XIAOMI Model : Mi Max 3 (Nitrogen) Storage : Auto
Loader: 0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC _XIAOMI_auth.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :??USB#VID_05C6&PID_9008#6&16f71b94&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0xE7237EF2
HW_ID : 000CC0E100000000
MSM ID : 0x000CC0E1,
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441b def0cd57e3c370

Firehose Loader [0008C0E100010000_a7b8b82545a98eca_28f4dc3c_GENERIC _XIAOMI_auth.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM :
Tag : _auth
Version : 5
Code_size : 416
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 3006000000010000
Vendor : GENERIC
OEM_ID : 0001
MODEL_ID : 0000
SW_ID : 000000000000000B
APP_ID :
pk_hash : a7b8b82545a98eca23d6e9105fb464568d1b5828264903441b def0cd57e3c370
OEM_VERSION : c3-bsp-builder-job001.bj
IMAGE_VARIANT : Sdm660LA
QC_VERSION : BOOT.XF.1.4-00255-S660LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ...............................b Okb0
Connecting to Firehose...
Ping ......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Aug 2 2018 - 22:27:53

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1192343262
Firmware Version : 162
Product Name : HCG8a4
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.190910.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : nitrogen_global
Security Patch : 2020-08-01

Reading GPT[4]
Drive [0] 80 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:10
  Reply With Quote
Old 11-30-2021, 08:53   #2783 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 36
Posts: 1,032
Member: 1724862
Status: Offline
Thanks Meter: 355
Oppo F1s Pattern lock read code Without data loss by Hydra

Oppo F1s Pattern lock read code Without data loss by Hydra



Quote:
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM4)
Device : 5&ae137ff&0&6
SymbolicName :??USB#VID_0E8D&PID_0003#5&ae137ff&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326 MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 01
SBC : 01 (True)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
D:GSM GADGETHydraTool_FullPackage_08-01-2021BackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326 MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 6CD6FB30DA47A2CA0CB78D8568884376
Stage 1.. [Size:219288]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4E6FE696DFF8F6EECD6694B19CBC58A4
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A40AEB44F78365 - HBG4a2
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : A1601
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15331-user 5.1 LMY47I 1562665575 release-keys
Device : A1601
Board : full_oppo6750_15331
Display ID : A1601EX_11_A.40_190709
Security Patch : 2018-01-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_oppo6750_15131.bin
Creating Scatter file... D:GSM GADGETHydraTool_FullPackage_08-01-2021BackupAuto0326__113021093808MT6750T_Android_sc atter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x03F88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x04088000] 32 MB -> nvdata.bin...0 Ok
-protect1 [0x08088000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x08888000] 15.469 MB -> protect2.bin...0 Ok
-nvram [0x0CF00000] 5 MB -> nvram.bin...0 Ok
Done!!!
D:GSM GADGETHydraTool_FullPackage_08-01-2021BackupAuto0326__113021093808
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 4E6FE696DFF8F6EECD6694B19CBC58A4
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A484247346132A40AEB44F78365 - HBG4a2

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : A1601
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15331-user 5.1 LMY47I 1562665575 release-keys
Device : A1601
Board : full_oppo6750_15331
Display ID : A1601EX_11_A.40_190709
Security Patch : 2018-01-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : .0 Found
Gesture Data : B86056C615A37D86E0B3359C8B00EEB7B28D6CCF
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 123654
1 2 3
4 5 6
7 8 9
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:03:32

  Reply With Quote
Old 11-30-2021, 09:08   #2784 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 36
Posts: 1,032
Member: 1724862
Status: Offline
Thanks Meter: 355
Redmi 9 (lancelot) Unlock Bootloader With by Hydra

Redmi 9 (lancelot) Unlock Bootloader With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM3)
Device : 5&17411534&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#5&17411534&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : A129AB79C83AA6DC2709008F4AED7CC3
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044503644414203FA74CC8ED - DP6DAB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:02
  Reply With Quote
Old 12-01-2021, 09:05   #2785 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 36
Posts: 1,032
Member: 1724862
Status: Offline
Thanks Meter: 355
Redmi 9A (dandelion) Bootloader Unlock Done with by Hydra

Redmi 9A (dandelion) Bootloader Unlock Done with by Hydra



Quote:
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM11)
Device : 6&376ffbcd&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&376ffbcd&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : B4EB508333897D2F423E32CB04AA23AD
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100424A5444345209DEADBC11870F - BJTD4R

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:05
  Reply With Quote
Old 12-01-2021, 09:13   #2786 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 36
Posts: 1,032
Member: 1724862
Status: Offline
Thanks Meter: 355
Redmi 8A (olivelite) Edl Frp Remove with by Hydra

Redmi 8A (olivelite) Edl Frp Remove with by Hydra



Quote:
Brand : XIAOMI Model : Redmi 8A (olivelite) Storage : Auto
Loader: 000BF0E100720000_57158eaf1814d78f_e551cac5_XIAOMI_ auth_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM26)
SymbolicName :??USB#VID_05C6&PID_9008#5&373328e8&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 02/05/2018,3.0.0.0

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2540925459
Firmware Version : 909127728
Product Name : hB8aP>
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29,121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : olivelite_global
Security Patch : 2021-05-01
Emmc_size : 16GB

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:04

}
  Reply With Quote
Old 12-01-2021, 09:19   #2787 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 36
Posts: 1,032
Member: 1724862
Status: Offline
Thanks Meter: 355
Vivo Y53 Format Userdata One click done by Hydra

Vivo Y53 Format Userdata One click done by Hydra



Quote:
Brand : VIVO Model : Y53 Storage : Auto
Loader: 000560E100000000_60ba997fef6da9f0_203cb924_QUALCOM M_VIVO_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM113)
SymbolicName :??USB#VID_05C6&PID_9008#6&5b0a393&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 1966065408
Firmware Version : 13
Product Name : QE13MB
Physical titions : 3
Total Logical Blocks:
Drive [0] 30535680 [14.561 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20190105.211334 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01052117:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk Ok

Elapsed Time : 00:00:04
  Reply With Quote
Old 12-01-2021, 16:48   #2788 (permalink)
No Life Poster
 
bilm25's Avatar
 
Join Date: Aug 2004
Age: 44
Posts: 558
Member: 78657
Status: Offline
Thanks Meter: 71
redmi 9T remove MI Account with EDL mode.
Attached Images
File Type: jpg redmi 9t.jpg (110.3 KB, 7 views)
  Reply With Quote
Old 12-02-2021, 08:58   #2789 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 36
Posts: 1,032
Member: 1724862
Status: Offline
Thanks Meter: 355
Redmi Note 9 (merlin) Bootlaoder Unlock With by Hydra

Redmi Note 9 (merlin) Bootlaoder Unlock With by Hydra



Quote:
=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM8)
Device : 6&33f3d&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#6&33f3d&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
E:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : DDAA187B2E83882D6C06B07C32A9AADA
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2ED7F8E3AEC28CE59BBC7122A30CE71E
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E47314A3953391005D5B40D5781 - G1J9S9
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... E:Hydra ToolBackupAuto0707__120221122543MT6768_Android_sca tter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05508000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x0C4A2000] 64 MB -> nvdata.bin...0 Ok
-persist [0x104A2000] 48 MB -> persist.bin...0 Ok
-protect1 [0x164A2000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x16CA2000] 11,367 MB -> protect2.bin...0 Ok
-nvram [0x19F80000] 64 MB -> nvram.bin...0 Ok
Done!!!
E:Hydra ToolBackupAuto0707__120221122543
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 2ED7F8E3AEC28CE59BBC7122A30CE71E
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E47314A3953391005D5B40D5781 - G1J9S9

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:44
  Reply With Quote
Old 12-02-2021, 09:05   #2790 (permalink)
No Life Poster
 
Join Date: Feb 2012
Age: 36
Posts: 1,032
Member: 1724862
Status: Offline
Thanks Meter: 355
Redmi Note 8 (ginkgo) Edl Frp Remove With by Hydra

Redmi Note 8 (ginkgo) Edl Frp Remove With by Hydra



Quote:
Brand : XIAOMI Model : Redmi Note 8 (ginkgo) Storage : Auto
Loader: 0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI. fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :??USB#VID_05C6&PID_9008#6&be8b923&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 07/08/2015,2.1.2.0

Getting device info .. . ...
Serial No.: 0x54C390D8
HW_ID : 0010A0E100720000
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4 358ec9d79cda46

Firehose Loader [0010A0E100720000_1bebe3863a6781db_76196dc8_XIAOMI. fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0010A0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4 358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : cibuild
IMAGE_VARIANT : NicobarPkgLAA
QC_VERSION : BOOT.XF.4.0-00149-NICOBARLAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..............................b Okb0
Connecting to Firehose...
Ping ..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 314838373
Firmware Version : 4
Product Name : S0J9K8
Physical titions : 4
Total Logical Blocks:
Drive [0] 122142720 [58,242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]
Drive [3] 32768 [16 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.200114.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V12
Mod_device : ginkgo_global
Security Patch : 2021-07-01

Reading GPT[4]
Drive [0] 88 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:23
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 15:42.



Powered by Searchlight © 2022 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2022 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2017 -
Page generated in 0.15810 seconds with 8 queries

SEO by vBSEO