GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 07-31-2023, 06:14   #3271 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,821

vivo Y83 Pro Pattern and FRP lock Remove with Hydra Tool


- Keep press boot info
Code:
-------------------------------------------------------
To Enable BROM  Mode : 
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode : 
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM40)
  Device          : /6&2bbff36a&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&2bbff36a&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM40] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 0D397390757A15D9DA5B64964B4E57D5
  SOC_ID          : 2C30B820CC9EA73B49DE936F8ACC58EB8D0D8CC8CEB4C45FFC8EFA20D25558D0

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..
Not Found
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 150100524436344D
Sending auto preloader from dump... 
Hydra Auto Preloader Search Enabled..
Hydra will find compatible preloader files...
-----------------------------
Found 10 Compatible Preloaders..
-----------------------------
 1-preloader_blackjack_64.bin...Sending... [DRAM setup passed.] [Ok]
-----------------------------
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100524436344D42017128CEE61511 - RD64MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 45
--------------- Reading build.prop content ---------------
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo 1726
  Product        : k62v1_64_bsp
  Manufacturer   : vivo
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 8.1.0 O11019 1661156809 release-keys
  Device         : PD1803F_EX
  Display ID     : O11019 release-keys
  Security Patch : 2021-03-01
  Platform       : =MTK6765
  Fingerprint    : vivo/1726/1726:8.1.0/O11019/1661156809:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 8699380*********
 IMEI2 : 8699380*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_k62v1_64_bsp.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_0D397390757A15D9DVVDDD64964B4E57D5\Auto\072423173411\6765_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 15.469 MB                   = Ok
 - persist(persist.bin), 48 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 5 MB                                    = Ok
Backup Done!!!

Elapsed Time : 00:01:21



- Service Function
- Ultra Power
- Rebuild Userdata


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
                        Ultra Power
                      Rebuild Userdata
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM40)
  Device          : /6&2bbff36a&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&2bbff36a&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM40] Ok
Reading Partition Table .. 
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100524436344D42017128CEE61511 - RD64MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 45
--------------- Reading build.prop content ---------------
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo 1726
  Product        : k62v1_64_bsp
  Manufacturer   : vivo
  ID             : O11019
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 8.1.0 O11019 1661156809 release-keys
  Device         : PD1803F_EX
  Display ID     : O11019 release-keys
  Security Patch : 2021-03-01
  Platform       : =MTK6765
  Fingerprint    : vivo/1726/1726:8.1.0/O11019/1661156809:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 86993**********
 IMEI2 : 86993**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
---------------------------
        Ultra Power    
---------------------------
Formatting Userdata : 
Operation : MTK_FUDRebuild Ok
Removing FRP :  Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:08

  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 08-01-2023, 06:24   #3272 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,821
Lenovo TB-8505X FRP Lock Remove With Hydra Tool


- First Keep press boot info
Code:
-------------------------------------------------------
To Enable BROM  Mode : 
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode : 
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM12)
  Device          : /6&2e01eb57&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&2e01eb57&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM12] Ok
Handshaking...Ok
  HwCode          : 0717 {MT6761/MT6762/MT3369/MT8766B}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA01
  SW Ver          : 0200
  ME_ID           : 93D1A6B02D18898A1A09FC266ADD9D6D
  SOC_ID          : D3F6399C6DB30E02435157090A7871E263CC1276D3700D8BBFDC647E31E1A33E

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00037F68
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_akita_row_call.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 1501005158363341
Sending auto preloader from dump...  [preloader_akita_row_call.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A500-233.25 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100515836334142039863D41C28EB - QX63AB
  HW-CODE         : 0x717
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x200
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 42
--------------- Reading build.prop content ---------------
  Product        : akita_row_call
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Description    : full_akita_row_call-user 10 QP1A.190711.020 TB-8505X_U release-keys
  Display ID     : TB-8505X_S300686_220706_BMP
  Security Patch : 2022-07-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : ************
 IMEI2 : ************
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_akita_row_call.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0717_93D1A6B02DDSSWW33R8A1A09FC266ADD9D6D\Auto\072523093020\6761_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 9.469 MB                    = Ok
 - persist(persist.bin), 48 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 1024 KB                                 = Ok
Backup Done!!!

Elapsed Time : 00:01:24



- Service Function
- Factory Reset Protection[FRP]
- Auto

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM12)
  Device          : /6&2e01eb57&0&3
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&2e01eb57&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM12] Ok
Reading Partition Table .. 
  ERAM Size       : 0x000000000003A500-233.25 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 150100515836334142039863D41C28EB - QX63AB
  HW-CODE         : 0x717
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x200
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 42
--------------- Reading build.prop content ---------------
  Product        : akita_row_call
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Description    : full_akita_row_call-user 10 QP1A.190711.020 TB-8505X_U release-keys
  Display ID     : TB-8505X_S300686_220706_BMP
  Security Patch : 2022-07-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : **************
 IMEI2 : **************
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Action Result :  Ok

Elapsed Time : 00:00:07
  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 08-01-2023, 06:26   #3273 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,821
Realme C2 (RMX1941) Pattern and frp lock remove with Hydra Tool

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
                        Ultra Power
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM15)
  Device          : /5&78a4f37&0&13
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&78a4f37&0&13#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM15] Ok
Reading Partition Table .. 
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29,121 GB
  EMMC CID        : 150100444436384D420296F5DE0A6617 - DD68MB
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 44
--------------- Reading build.prop content ---------------
  Vendor         : OPPO
  Manufacturer   : OPPO
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6765_19581-user 9 PPR1.180610.011 eng.root.20210309.210105 release-keys
  Security Patch : 2021-03-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 86160********
 IMEI2 : 86160********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
---------------------------
        Ultra Power    
---------------------------
Formatting Userdata : 
Operation : Safeformat Universal... Ok
Removing FRP :  Ok

Rebooting Device...
Reboot Option : OperationDone
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:04
  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 08-01-2023, 06:30   #3274 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,821
Ulefone Note 9P FRP Lock Remove with Hydra Tool


- First Keep press boot info
Code:
-------------------------------------------------------
To Enable BROM  Mode : 
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode : 
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode Preloader
  FriendlyName    : MediaTek PreLoader USB VCOM (Android) (COM31)
  Device          : /5&1c6a400a&0&8
  SymbolicName    : \\?\usb#vid_0e8d&pid_2000#5&1c6a400a&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2016,3.2
  Service         : wdm_usb

Openning Port [COM31] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : Preloader
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : FF114F221CAC3C9B8DDB75D1370F418C


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                  Preloader To Brom Function.....               
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
 - Method 1  Exploit Executed..... [Failed]
 - Method 2  Exploit Executed..... [Failed]
 - Method 3  Exploit Executed..... [Failed]

Preloader still in preloader mode...
  Connection      : Preloader

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : preloader
  DRAM config needed for : 13014E53304A394B
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 13014E53304A394B3810003600DE7591 - S0J9K8
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Reading Partition Table .. 
Partition Count : 41
--------------- Reading build.prop content ---------------
  Product        : Note_9P_EEA
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 10 QP1A.190711.020 mp1V9176 release-keys
  Display ID     : Note_9P_SH1_EEA_V01
  Security Patch : 2020-06-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 3520***********
 IMEI2 : 3520***********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_k62v1_64_bsp.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_FF114F22SSDD22343C9B8DDB75D1370F418C\Auto\072523102719\6765_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 10.867 MB                   = Ok
 - persist(persist.bin), 48 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 1024 KB                                 = Ok
Backup Done!!!

Elapsed Time : 00:00:29



- FRP Lock Remove

Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode Preloader
  FriendlyName    : MediaTek PreLoader USB VCOM (Android) (COM31)
  Device          : /5&1c6a400a&0&8
  SymbolicName    : \\?\usb#vid_0e8d&pid_2000#5&1c6a400a&0&8#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2016,3.2
  Service         : wdm_usb

Openning Port [COM31] Ok
Reading Partition Table .. 
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000001000000-16 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 13014E53304A394B3810003600DE7591 - S0J9K8
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 41
--------------- Reading build.prop content ---------------
  Product        : Note_9P_EEA
  ID             : QP1A.190711.020
  SDK            : 29
  Release        : 10
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_k62v1_64_bsp-user 10 QP1A.190711.020 mp1V9176 release-keys
  Display ID     : Note_9P_SH1_EEA_V01
  Security Patch : 2020-06-05
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 3520**********
 IMEI2 : 3520**********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:04

  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 08-01-2023, 06:33   #3275 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,821
Vivo V7 Plus (PD1708F) FRP Lock Remove with Hydra Tool


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                     Vivo Service Tool
         Factory Reset Protection(FRP)/Demo Remove
                         Zero Wipe
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

PreOperation Configuration 
 Brand : VIVO Model : V7 Plus (PD1708F) Storage : Auto
 Loader: 0009a0e100000000_60ba997fef6da9f0_e66632e0_qualcomm_vivo_peek_8953.fhprg
 Port  : Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM6)
 SymbolicName :\\?\usb#vid_05c6&pid_9008#5&1f3e3f24&0&9#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   :08/02/2017,2.1.2.7

Getting device info. [Connected].....
Serial No.: 0xFFD4C203
HW_ID     : 0009A0E100000000
MSM ID    : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450/JAADANAZA
MODEL_ID  : 0x0000
OEM_ID    : 0x0000 - QUALCOMM
PBL Ver   : 00000000
PK HASH   : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43
 
Firehose Loader[0009a0e100000000_60ba997fef6da9f0_e66632e0_qualcomm_vivo_peek_8953.fhprg]
--------------------------------------------------
  Header Type    : OLD
  TargetMSM      : 8953
  Tag            : _peek
  Version        : 3
  Code_size      : 288
  Signature_size : 256
  fhVendor       : VIVO
  HW_ID          : 0009A0E100000000
  Vendor         : QUALCOMM
  OEM_ID         : 0000
  MODEL_ID       : 0000
  SW_ID          : 0000000000000003
  APP_ID         : 
  pk_hash        : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43
  OEM_VERSION    : compiler033
  IMAGE_VARIANT  : JAADANAZA
  QC_VERSION     : BOOT.BF.3.3-00221
--------------------------------------------------

SaharaBoot... Ok
Sending ..................Ok
Connecting to Firehose...
Ping... Ok 
Configuration[FHProt_Auto]......
Identifying Chip....
Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 1048576
 MaxPayloadSizeToTargetInBytesSupported : 1048576
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8953
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 1288621082
Firmware Version    : 21
Product Name        : RH64AB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  122142720[58,242 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
          Drive [0] 56 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Brand          : vivo
  Vendor         : vivo
  Model          : vivo 1716
  Product        : msm8953_64
  Manufacturer   : vivo
  ID             : OPM1.171019.026
  SDK            : 27
  Release        : 8.1.0
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : msm8953_64-user 8.1.0 OPM1.171019.026 eng.compil.20210507.122248 release-keys
  Device         : msm8953_64
  Display ID     : OPM1.171019.026 release-keys
  Security Patch : 2021-03-01
  Platform       : msm8953
  Fingerprint    : vivo/1716/1716:8.1.0/OPM1.171019.026/compil05071222:user/release-keys
--------------- end of build.prop content ---------------

Auto Backup Security partitions...
Reading Security Items....
 - modemst1(modemst1.bin), 1,5 MB                      = Ok
 - modemst2(modemst2.bin), 1,5 MB                      = Ok
 - fsg(fsg.bin), 1,5 MB                                = Ok
 - fsc(fsc.bin), 512 Bytes                             = Ok
 - persist(persist.bin), 32 MB                         = Ok

C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\0009A0E100000000_FFD4C203\Auto_Backup\072523210600
Backup Security Success....

Rebooting Phone.... Ok

Action Result :  Ok

Elapsed Time : 00:00:07
  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 08-01-2023, 06:34   #3276 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,821
Xiaomi Redmi Note 12 Flashing Done with Hydra Tool


- Connect phone fastboot mode
- select firmware and write fastboot method



Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                  Qualcomm Flashing Function......               
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching Device By Fastboot
Device Found...
 - persist[0](persist.img), 32 MB Skipped
 - super[0](super.img), 6.903 GB                       = Ok
 - vbmeta_system_a[0](vbmeta_system.img), 4 KB         = Ok
 - metadata[0](metadata.img), 44.074 KB                = Ok
 - rescue[0](rescue.img), 40.074 KB                    = Ok
 - opcust[0](opcust.img), 60.098 KB                    = Ok
 - opconfig[0](opconfig.img), 40.074 KB                = Ok
 - userdata[0](userdata.img), 670.317 MB               = Ok
 - xbl_a[0](xbl.elf), 2.965 MB                         = Ok
 - xbl_config_a[0](xbl_config.elf), 63.895 KB          = Ok
 - xbl_b[0](xbl.elf), 2.965 MB                         = Ok
 - xbl_config_b[0](xbl_config.elf), 63.895 KB          = Ok
 - rpm_a[0](rpm.mbn), 246.758 KB                       = Ok
 - tz_a[0](tz.mbn), 3.309 MB                           = Ok
 - hyp_a[0](hyp.mbn), 386.383 KB                       = Ok
 - modem_a[0](NON-HLOS.bin), 164.863 MB                = Ok
 - bluetooth_a[0](BTFM.bin), 908 KB                    = Ok
 - abl_a[0](abl.elf), 204 KB                           = Ok
 - dsp_a[0](dspso.bin), 32 MB                          = Ok
 - keymaster_a[0](km41.mbn), 261.201 KB                = Ok
 - boot_a[0](boot.img), 128 MB                         = Ok
 - devcfg_a[0](devcfg.mbn), 46.055 KB                  = Ok
 - qupfw_a[0](qupv3fw.elf), 55.927 KB                  = Ok
 - vbmeta_a[0](vbmeta.img), 8 KB                       = Ok
 - dtbo_a[0](dtbo.img), 8 MB                           = Ok
 - imagefv_a[0](imagefv.elf), 1.996 MB                 = Ok
 - core_nhlos_a[0](Core_NON-HLOS.bin), 122.061 MB      = Ok
 - uefisecapp_a[0](uefi_sec.mbn), 121.771 KB           = Ok
 - featenabler_a[0](featenabler.mbn), 84.282 KB        = Ok
 - vendor_boot_a[0](vendor_boot.img), 96 MB            = Ok
 - featenabler_b[0](featenabler.mbn), 84.282 KB        = Ok
 - cust[0](cust.img), 1.443 GB                         = Ok
 - logfs[0](logfs_ufs_8mb.bin), 16 KB                  = Ok
 - storsec[0](storsec.mbn), 20.088 KB                  = Ok
 - fsgall[0](fsgall.img), 4.669 MB                     = Ok

Elapsed Time : 00:11:49

  Reply With Quote
The Following User Says Thank You to Unlockinfo For This Useful Post:
Old 08-02-2023, 04:50   #3277 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,821
Casper VIA P3 FRP Lock Remove with Hydra Tool


- first keep press boot info
- after boot info never disconnect phone
- select frp lock and click execute


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1633 (COM16)
  Device          : /7&a154d4e&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#7&a154d4e&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM16] Ok
Handshaking...Ok
  HwCode          : 0788 {MT6771/MT8385/MT8183/MT8666}
  Hwver           : 0000
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : 846F1D336D0C21DC41A97FA344848DB3
  SOC_ID          : 939F416E234531D8A59AA8730E6FD7EF51723D658084BA2F6447C1FCED3DC75D

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00042270
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_x005_k71v1_64_bsp.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 13014E53304A3937
Sending auto preloader from dump...  [preloader_x005_k71v1_64_bsp.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000039000-228 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29,121 GB
  EMMC CID        : 13014E53304A39375910010292C1C4EF - S0J97Y
  HW-CODE         : 0x788
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 41
--------------- Reading build.prop content ---------------
  Brand          : Casper
  Vendor         : Casper
  Model          : VIA_P3
  Product        : VIA_P3
  Manufacturer   : Casper
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : tr-TR
  Description    : VIA_P3-user 9 PPR1.180610.011 133 release-keys
  Device         : VIA_P3
  Display ID     : VIA_P3_20191204_c1.01
  Security Patch : 2019-11-05
  Fingerprint    : Casper/VIA_P3/VIA_P3:9/PPR1.180610.011/133:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 351958*********
 IMEI2 : 351958*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_x005_k71v1_64_bsp.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0788_846F1D33DDFF477C21DC41A97FA344848DB3\Auto\072823170940\6771_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 9,469 MB                    = Ok
 - persist(persist.bin), 48 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 1024 KB                                 = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:44

  Reply With Quote
Old 08-02-2023, 04:54   #3278 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,821
Huawei Y7 Prime (LDN-L21) FRP Lock Remove with Hydra Tool


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                   Qualcomm Service Tool
                  Factory Reset Protection
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

PreOperation Configuration 
 Brand  AUTO Model  AUTO Storage  Auto
 Loader Auto
 Port   Auto

 Searching for Qualcomm 9008 Device...Found
 FriendlyName Qualcomm HS-USB QDLoader 9008 (COM4)
 SymbolicName usb#vid_05c6&pid_9008#6&2e01eb57&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
 Driver Ver   08022017,2.1.2.7

Getting device info. [Connected].....
Serial No. 0xDCBB6EA7
HW_ID      0004F0E100150041
MSM ID     0x0004F0E1, MSM8937-Qualcomm Snapdragon 430FAADANAZA
MODEL_ID   0x0041
OEM_ID     0x0015 - HUAWEI
PBL Ver    00000000
PK HASH    6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119

Hydra Enable Auto search Firehose..
 #Please wait...
 #Search by filename filter.....
 #Found 8 Compatible Files ..Found match Firehose...
 
Firehose Loader[0004f0e100150041_6bc369511da9cadb_2f9ef3a5_huawei_qualcomm_peek_8937.fhprg]
--------------------------------------------------
  Header Type     OLD
  TargetMSM       8937
  Tag             _peek
  Version         3
  Code_size       288
  Signature_size  256
  fhVendor        QUALCOMM
  HW_ID           0004F0E100150041
  Vendor          HUAWEI
  OEM_ID          0015
  MODEL_ID        0041
  SW_ID           0000000000000003
  APP_ID          
  pk_hash         6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119
  OEM_VERSION     SIA1000073869
  IMAGE_VARIANT   FAADANAZA
  QC_VERSION      BOOT.BF.3.3-00221
--------------------------------------------------

SaharaBoot... Ok
Sending ...........Ok
Connecting to Firehose...
Ping... Ok 
Configuration[FHProt_Auto].......
Ok
Chip Configuration 
 MemoryName  eMMC
 MaxPayloadSizeToTargetInBytes  16384
 MaxPayloadSizeToTargetInBytesSupported  16384
 MaxPayloadSizeFromTargetInBytes  4096
 MaxXMLSizeInBytes  4096
 TargetName  8937
 Version  1

 STORAGE DEVICE INFO 
Memory Type          eMMC
Block Size in Bytes  512
Page Size            512
Manufacturer ID      144
Serial Number        3324283128
Firmware Version     0
Product Name         HAG4a2
Physical Partitions  3
Total Logical Blocks
          Drive [0]  30777344[14.676 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]

Protocol  Universal
Running  Ok

Reading GPT[3]
          Drive [0] 56 Items
          Drive [1] 0 Items
          Drive [2] 0 Items

--------------- Reading build.prop content ---------------
build.prop
  Vendor          unknown
  Manufacturer    unknown
  ID              OPR6.170623.013
  SDK             26
  Release         8.0.0
  ABI             arm64-v8a
  CPU abilist     arm64-v8a,armeabi-v7a,armeabi
  Locale          en-US
  Description     generic_a53-user 8.0.0 OPR6.170623.013 eng.root.20180901.015728 test-keys
  Display ID      System 8.0.0.072(000K)
  Security Patch  2018-09-01
  Fingerprint     Huaweigeneric_a53generic_a538.0.0OPR6.170623.013root09010157usertest-keys
--------------- end of build.prop content ---------------
 - Removing FRP
Executing ...
 - Removing FRP [Zero Wipe] OkOk

Rebooting Phone.... Ok

Action Result   Ok

Elapsed Time  000017

  Reply With Quote
Old 08-02-2023, 04:58   #3279 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,821
Oppo A83 Pattern and FRP Lock Remove with Hydra Tool


- first keep press boot info

Code:
-------------------------------------------------------
To Enable BROM  Mode : 
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode : 
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1633 (COM4)
  Device          : /6&299c7bb&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&299c7bb&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM4] Ok
Handshaking...Ok
  HwCode          : 0690 {MT6763}
  Hwver           : 0000
  Target config   : E5
  SBC             : 01 (True)
  SLA             : 00 (False)
  DAA             : 04 (True)
  SWJTAG          : 04 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA01
  SW Ver          : 0001
  ME_ID           : 5B26A76B463E98656D76AEE6E234A69D
  SOC_ID          : 118B2B4D26BFB93B14444D5F4BEB3F9DD2B2870F357BD4AB48DA0404A68E2C30

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..
Not Found
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A4842473461
Sending auto preloader from dump... 
Hydra Auto Preloader Search Enabled..
Hydra will find compatible preloader files...
-----------------------------
Found 3 Compatible Preloaders..
-----------------------------
 1-preloader_k63v2_64_bsp_ulax5.bin...Sending... [DRAM setup passed.] [Ok]
-----------------------------
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000040000-256 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 90014A484247346132A51F70E83715ED - HBG4a2
  HW-CODE         : 0x690
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x1
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 42
--------------- Reading build.prop content ---------------
  Brand          : OPPO
  Vendor         : OPPO
  Model          : OPPO A83js
  Product        : oppo6763_17101
  Manufacturer   : OPPO
  ID             : N6F26Q
  SDK            : 25
  Release        : 7.1.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6763_17101-user 7.1.1 N6F26Q 1599151965 release-keys
  Device         : M6763D
  Display ID     : A83jsEX_11_A.35_200903
  Security Patch : 2019-10-05
  Platform       : mt6763
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_oppo6763_17101.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0690_5B26A76B463E98656D76AEE6E234A69D\Auto\072823170059\6763_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 12.469 MB                   = Ok
 - persist(persist.bin), 48 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - oppo_custom(oppo_custom.bin), 1024 KB               = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 1024 KB                                 = Ok
Backup Done!!!

Elapsed Time : 00:01:14




- Service Function
- Format/Factory Reset/ScreenLock
- Auto


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
              Format/Factory Reset/ScreenLock
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1633 (COM4)
  Device          : /6&299c7bb&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&299c7bb&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM4] Ok
Reading Partition Table .. 
  ERAM Size       : 0x0000000000040000-256 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 90014A484247346132A51F70E83715ED - HBG4a2
  HW-CODE         : 0x690
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x1
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 42
--------------- Reading build.prop content ---------------
  Brand          : OPPO
  Vendor         : OPPO
  Model          : OPPO A83js
  Product        : oppo6763_17101
  Manufacturer   : OPPO
  ID             : N6F26Q
  SDK            : 25
  Release        : 7.1.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6763_17101-user 7.1.1 N6F26Q 1599151965 release-keys
  Device         : M6763D
  Display ID     : A83jsEX_11_A.35_200903
  Security Patch : 2019-10-05
  Platform       : mt6763
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
------------------------------
   Factory Reset Flash Mode..  
------------------------------
Operation : Safeformat Universal...

Action Result :  Ok

Elapsed Time : 00:00:12





- Select FRP Lock Remove
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1633 (COM4)
  Device          : /6&299c7bb&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#6&299c7bb&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM4] Ok
Reading Partition Table .. 
  ERAM Size       : 0x0000000000040000-256 KB
  IRAM Size       : 0x00000000C0000000-3 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 90014A484247346132A51F70E83715ED - HBG4a2
  HW-CODE         : 0x690
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x1
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 42
--------------- Reading build.prop content ---------------
  Brand          : OPPO
  Vendor         : OPPO
  Model          : OPPO A83js
  Product        : oppo6763_17101
  Manufacturer   : OPPO
  ID             : N6F26Q
  SDK            : 25
  Release        : 7.1.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6763_17101-user 7.1.1 N6F26Q 1599151965 release-keys
  Device         : M6763D
  Display ID     : A83jsEX_11_A.35_200903
  Security Patch : 2019-10-05
  Platform       : mt6763
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : OperationDone
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:13
  Reply With Quote
Old 08-02-2023, 05:03   #3280 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,821
Redmi 6A Pattern and FRP lock remove with Hydra Tool



- First keep press boot info

Code:
-------------------------------------------------------
To Enable BROM  Mode : 
     Method 1    - Bootkey (Vol + - Power) or any combination
     Method 2    - Enable Preloader to brom(crashing Method)
     Method 3    - Test Point Data0 + ground
To Enable Preloader  Mode : 
     Method 1    - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM30)
  Device          : /7&d3e40fc&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#7&d3e40fc&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM30] Ok
Handshaking...Ok
  HwCode          : 0766 {MT6765/MT8768t}
  Hwver           : 0000
  Target config   : E7
  SBC             : 01 (True)
  SLA             : 02 (True)
  DAA             : 04 (True)
  SWJTAG          : 06 (True)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 20 (True)
  MEMWRITE        : 40 (True)
  CMD_C8          : 80 (True)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA00
  SW Ver          : 0000
  ME_ID           : F745FFA71BE7DB7F9B1DF620A71B312C
  SOC_ID          : 27CFC4DA1E3D356D16B7CA80BE72A37069BA4DF3476C076237537FB9651A0A5C

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x00039370
Successfully dump preloader..  [C:\Hydra Tool\Boot\PreloaderDump\preloader_cactus.bin]
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A4841473461
Sending auto preloader from dump...  [preloader_cactus.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x00000003AB400000-14.676 GB
  EMMC CID        : 90014A484147346132A50309E49265FF - HAG4a2
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 43
--------------- Reading build.prop content ---------------
  Brand          : xiaomi
  Model          : Redmi 6A
  Product        : cactus
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys
  Device         : cactus
  Display ID     : SW_S98506AE1_V009_M13_XM_C3C_USR
  Security Patch : 2020-05-01
  Fingerprint    : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 862953*********
 IMEI2 : 862953*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
Backing up Security..
 - preloader(preloader.bin), 512 KB                    = Ok  [preloader_cactus.bin]
  *Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0766_F745FFA71B222EEEF9B1DF620A71B312C\Auto\072823191851\6765_Android_scatter.txt
 - pgpt(pgpt.bin), 32 KB                               = Ok
 - nvram(nvram.bin), 64 MB                             = Ok
 - nvdata(nvdata.bin), 64 MB                           = Ok
 - frp(frp.bin), 1024 KB                               = Ok
 - protect1(protect1.bin), 8 MB                        = Ok
 - protect2(protect2.bin), 9.469 MB                    = Ok
 - persist(persist.bin), 64 MB                         = Ok
 - proinfo(proinfo.bin), 3 MB                          = Ok
 - nvcfg(nvcfg.bin), 32 MB                             = Ok
 - sec1(sec1.bin), 2 MB                                = Ok
 - seccfg(seccfg.bin), 8 MB                            = Ok
 - lk(lk.bin), 1024 KB                                 = Ok
Backup Done!!!

Elapsed Time : 00:00:37




- Factory Reset Phone
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
              Format/Factory Reset/ScreenLock
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM30)
  Device          : /7&d3e40fc&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#7&d3e40fc&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM30] Ok
Reading Partition Table .. 
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x00000003AB400000-14.676 GB
  EMMC CID        : 90014A484147346132A50309E49265FF - HAG4a2
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 43
--------------- Reading build.prop content ---------------
  Brand          : xiaomi
  Model          : Redmi 6A
  Product        : cactus
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys
  Device         : cactus
  Display ID     : SW_S98506AE1_V009_M13_XM_C3C_USR
  Security Patch : 2020-05-01
  Fingerprint    : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 862953********
 IMEI2 : 862953********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------
------------------------------
   Factory Reset Flash Mode..  
------------------------------
Operation : Safeformat Universal...

Action Result :  Ok

Elapsed Time : 00:00:04





- FRP Lock Remove
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM30)
  Device          : /7&d3e40fc&0&4
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#7&d3e40fc&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM30] Ok
Reading Partition Table .. 
  ERAM Size       : 0x000000000003A000-232 KB
  IRAM Size       : 0x0000000080000000-2 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x00000003AB400000-14.676 GB
  EMMC CID        : 90014A484147346132A50309E49265FF - HAG4a2
  HW-CODE         : 0x766
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 43
--------------- Reading build.prop content ---------------
  Brand          : xiaomi
  Model          : Redmi 6A
  Product        : cactus
  ID             : PPR1.180610.011
  SDK            : 28
  Release        : 9
  ABI            : armeabi-v7a
  CPU abilist    : armeabi-v7a,armeabi
  Locale         : en-GB
  Description    : cactus-user 9 PPR1.180610.011 V11.0.8.0.PCBMIXM release-keys
  Device         : cactus
  Display ID     : SW_S98506AE1_V009_M13_XM_C3C_USR
  Security Patch : 2020-05-01
  Fingerprint    : xiaomi/cactus/cactus:9/PPR1.180610.011/V11.0.8.0.PCBMIXM:user/release-keys
  StorageType    : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
 IMEI1 : 862953*********
 IMEI2 : 862953*********
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Action Result :  Ok

Elapsed Time : 00:00:05
  Reply With Quote
Old 08-02-2023, 05:05   #3281 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,821
ZTE A3 Lite FRP Lock Remove with Hdyra Tool


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                  Service Tool Function..
                  Factory Reset Protection
                       Factory Reset
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

****************** PRESS BOOT KEY ******************
 VOL + OR VOL - , OR Combination Vol - +
 Feature Phone :  Call Button
 Please hold boot key until second boot.. 
*******************************************
Scanning Port....

Openning Port [COM4] Ok
Identifying... [SPRD3]
Sending Config Ok Ok
Spreadtrum Boot Block version 1.1
Sending To phone....
Unisoc Not Secured.... Ok
Successfully booted..Ready to go...

Reading System Info..
  Vendor : ZTE
  Model : ZTE Blade A3 Lite
  Device : P932F20
  Display ID : GEN_LA_D_A3_Lite_V1.9
  Security Patch : 2021-10-05
  FRPPST : /dev/block/platform/soc/soc:ap-ahb/20600000.sdio/by-name/persist
  Fingerprint : ZTE/P932F20/P932F20:9/PPR1.180610.011/20211014.175519:user/release-keys

Reading IMEI...
BSL_REP_OPERATION_FAILED
BSL_REP_OPERATION_FAILED.
IMEI 1 : 86916***********
IMEI 2 : 86740***********
IMEI 3 : 86740***********
IMEI 4 : 86916***********
BSL_WRITE_ERROR
BSL_WRITE_ERROR
Rebooting Phone..Ok

Action Result :  Ok

Elapsed Time : 00:00:10
  Reply With Quote
Old 08-03-2023, 11:56   #3282 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,821
Oppo F5 (cph1723) factory reset with Hydra Tool



Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
              Format/Factory Reset/ScreenLock
                 Safe Format Master Clear 1
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM34)
  Device          : /5&fe88cf0&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&fe88cf0&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM34] Ok
Handshaking...Ok
  HwCode          : 0690 {MT6763}
  Hwver           : 0000
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA01
  SW Ver          : 0001
  ME_ID           : 2779AA02BEA8BD678CE7B72E762169E1
  SOC_ID          : BA75FAEB822A3D1AEEFB86973669BFD0A0B8B782853D1CB8A2CD2E1FA1A25E84

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..
Not Found
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A4843473861
Sending auto preloader from dump... 
Hydra Auto Preloader Search Enabled..
Hydra will find compatible preloader files...
-----------------------------
Found 4 Compatible Preloaders..
-----------------------------
 1-Coolpad_Cool_X_Preloader.bin...Sending... Status: 0xC0070005 = DA exceed max num
 2-preloader_e959_oq_s70_63_p0.bin...Sending... Status: 0xC0070005 = DA exceed max num
 3-preloader_k63v2_64_bsp_cs6062.bin...Sending... Status: 0xC0070005 = DA exceed max num
 4-preloader_q930.bin...Sending... Status: 0xC0070005 = DA exceed max num
-----------------------------
Selected File : D:\preloader_oppo6763_17031.bin
Sending EMI Data... [DRAM setup passed.]
Sending emi data succeeded.
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000040000-256 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 90014A484347386134A228A02535658F - HCG8a4
  HW-CODE         : 0x690
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x1
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 42
--------------- Reading build.prop content ---------------
  Brand          : OPPO
  Vendor         : OPPO
  Model          : OPPO CPH1723
  Product        : oppo6763_17031
  Manufacturer   : OPPO
  ID             : N6F26Q
  SDK            : 25
  Release        : 7.1.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6763_17031-user 7.1.1 N6F26Q 1559583323 release-keys
  Device         : M6763A
  Display ID     : CPH1723EX_11_A.36_190604
  Security Patch : 2019-06-05
  Platform       : mt6763
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
------------------------------
   Factory Reset Flash Mode..  
------------------------------
Operation : Safeformat Master Clear 1

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:01:16
  Reply With Quote
Old 08-03-2023, 11:57   #3283 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,821
Oppo F5 (cph1723) factory reset with Hydra Tool

Oppo F5 (cph1723) factory reset with Hydra Tool



Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
              Format/Factory Reset/ScreenLock
                 Safe Format Master Clear 1
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port_V1632 (COM34)
  Device          : /5&fe88cf0&0&2
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&fe88cf0&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2015,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM34] Ok
Handshaking...Ok
  HwCode          : 0690 {MT6763}
  Hwver           : 0000
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM
  HW Subcode      : 8A00
  HW Subcode      : CA01
  SW Ver          : 0001
  ME_ID           : 2779AA02BEA8BD678CE7B72E762169E1
  SOC_ID          : BA75FAEB822A3D1AEEFB86973669BFD0A0B8B782853D1CB8A2CD2E1FA1A25E84

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..
Not Found
  Target config   : 00
  SBC             : 00 (False)
  SLA             : 00 (False)
  DAA             : 00 (False)
  SWJTAG          : 00 (False)
  EPP             : 00 (False)
  CERT            : 00 (False)
  MEMREAD         : 00 (False)
  MEMWRITE        : 00 (False)
  CMD_C8          : 00 (False)
  Connection      : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
  ONNECTION_AGENT : brom
  DRAM config needed for : 90014A4843473861
Sending auto preloader from dump... 
Hydra Auto Preloader Search Enabled..
Hydra will find compatible preloader files...
-----------------------------
Found 4 Compatible Preloaders..
-----------------------------
 1-Coolpad_Cool_X_Preloader.bin...Sending... Status: 0xC0070005 = DA exceed max num
 2-preloader_e959_oq_s70_63_p0.bin...Sending... Status: 0xC0070005 = DA exceed max num
 3-preloader_k63v2_64_bsp_cs6062.bin...Sending... Status: 0xC0070005 = DA exceed max num
 4-preloader_q930.bin...Sending... Status: 0xC0070005 = DA exceed max num
-----------------------------
Selected File : D:\preloader_oppo6763_17031.bin
Sending EMI Data... [DRAM setup passed.]
Sending emi data succeeded.
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
  ERAM Size       : 0x0000000000040000-256 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000E8F800000-58.242 GB
  EMMC CID        : 90014A484347386134A228A02535658F - HCG8a4
  HW-CODE         : 0x690
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA01
  SW-VERSION      : 0x1
  CHIP-EVOLUTION  : 0x0
  DA-VERSION      : 1.0
  Speed           : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added 
Reading Partition Table .. 
Partition Count : 42
--------------- Reading build.prop content ---------------
  Brand          : OPPO
  Vendor         : OPPO
  Model          : OPPO CPH1723
  Product        : oppo6763_17031
  Manufacturer   : OPPO
  ID             : N6F26Q
  SDK            : 25
  Release        : 7.1.1
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo6763_17031-user 7.1.1 N6F26Q 1559583323 release-keys
  Device         : M6763A
  Display ID     : CPH1723EX_11_A.36_190604
  Security Patch : 2019-06-05
  Platform       : mt6763
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Unlocked
-------------------------------
------------------------------
   Factory Reset Flash Mode..  
------------------------------
Operation : Safeformat Master Clear 1

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:01:16
  Reply With Quote
Old 08-03-2023, 11:59   #3284 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,821
Realme Pad 2K FRP lock remove with Hydra Tool


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port (COM68)
  Device          : /5&2e786fd2&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&2e786fd2&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2016,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM68] Ok
Reading Partition Table .. 
  ERAM Size       : 0x0000000000070000-448 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 6B01014D4D4333324751DA999A9A78C1 - MMC32G
  HW-CODE         : 0x707
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x1
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 50
--------------- Reading build.prop content ---------------
  Brand          : realme
  Vendor         : realme
  Model          : RMP2103
  Product        : RMP2103
  Manufacturer   : realme
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo8786_wlan-user 11 RP1A.200720.011 326 release-keys
  Device         : RMP2103
  Security Patch : 2022-01-05
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:09
  Reply With Quote
Old 08-03-2023, 11:59   #3285 (permalink)
No Life Poster
 
Unlockinfo's Avatar
 
Join Date: Jul 2012
Location: GSMFABRICA-Team
Posts: 3,400
Member: 1785930
Status: Offline
Sonork: 100.1685640
Thanks Meter: 4,821
Realme Pad 2K FRP lock remove with Hydra Tool


Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
                      Service Function
               Factory Reset Protection[FRP]
                            Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

Searching for MTK Device...Found
  MTK Port Type   : Flashmode BROM 
  FriendlyName    : MediaTek USB Port (COM68)
  Device          : /5&2e786fd2&0&1
  SymbolicName    : \\?\usb#vid_0e8d&pid_0003#5&2e786fd2&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
  Driver Ver      : 01/22/2016,3.0.1504.0
  Service         : wdm_usb

Openning Port [COM68] Ok
Reading Partition Table .. 
  ERAM Size       : 0x0000000000070000-448 KB
  IRAM Size       : 0x0000000100000000-4 GB
  EMMC Boot1 Size : 0x0000000000400000-4 MB
  EMMC Boot2 Size : 0x0000000000400000-4 MB
  EMMC RPMB Size  : 0x0000000000400000-4 MB
  EMMC USER Size  : 0x0000000747C00000-29.121 GB
  EMMC CID        : 6B01014D4D4333324751DA999A9A78C1 - MMC32G
  HW-CODE         : 0x707
  HWSUB-CODE      : 0x8A00
  HW-VERSION      : 0xCA00
  SW-VERSION      : 0x0
  CHIP-EVOLUTION  : 0x1
  DA-VERSION      : 1.0
  Speed           : high-speed
Partition Count : 50
--------------- Reading build.prop content ---------------
  Brand          : realme
  Vendor         : realme
  Model          : RMP2103
  Product        : RMP2103
  Manufacturer   : realme
  ID             : RP1A.200720.011
  SDK            : 30
  Release        : 11
  ABI            : arm64-v8a
  CPU abilist    : arm64-v8a,armeabi-v7a,armeabi
  Locale         : en-US
  Description    : full_oppo8786_wlan-user 11 RP1A.200720.011 326 release-keys
  Device         : RMP2103
  Security Patch : 2022-01-05
--------------- end of build.prop content ---------------

Reading IMEI........
-------------------------------
Bootloader Status...
  Bootloader : Locked
-------------------------------

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result :  Ok

Elapsed Time : 00:00:09
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 23:06.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.43351 seconds with 9 queries

SEO by vBSEO