GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Product Support Sections > Special Solutions / Services / WebShop > GSMFABRICA Products > HYDRA TOOL

Reply
 
LinkBack Thread Tools Display Modes
Old 01-29-2021, 05:00   #1096 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Opo A12 CPH 2083 Format user data successfully done by Hydra Tool


Opo A12 CPH 2083 Format user data successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Brand : OPPO Model : A12 cph2083 Connection : Flash Mode

=====================================
Connection
-Please wait...
-Connect Phone...
-Found...[COM7]

TPortConnection.Create...(COM7)..Opening...Ok

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
#Executing Exploit..
#SUCCESS..

Handshaking...Ok

Identifying Hardware ID.....
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E0

Preparing Download Agent..
DA : 6765.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Mode : brom
Preloader Initialization...
Parsing preloader_oppo6765_19451.bin
Init : Accepted

Execute Secondary Loader
Init : Loader [2]
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 7BC3F371A2ADE3B485D7BA2DF32FACED
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044483644414208142CF41197C9 - DH6DAB

DA Speed : high-speed
DA Speed : high-speed

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_19451-user 9 PPR1.180610.011 eng.root.20201126.014332 release-keys
Security Patch : 2020-11-05
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_oppo6765_19451.bin
Creating Scatter file... C:\Users\kair_\Desktop\hydra tool\HydraTool_Fullpackage_01-25-2021\\Backup\Auto\__0766--9__260121173147\MT6765_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x0DE88000]1024 KB ->frp.bin...Ok
-nvdata[0x0FF88000]64 MB ->nvdata.bin...Ok
-persist[0x17800000]48 MB ->persist.bin...Ok
-nvram[0x23600000]64 MB ->nvram.bin...Ok
Done!!!
C:\Users\kair_\Desktop\hydra tool\HydraTool_Fullpackage_01-25-2021\\Backup\Auto\__0766--9__260121173147
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 7BC3F371A2ADE3B485D7BA2DF32FACED
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044483644414208142CF41197C9 - DH6DAB

Reading GPT-EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_19451-user 9 PPR1.180610.011 eng.root.20201126.014332 release-keys
Security Patch : 2020-11-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Auto
Processing...
Formatting Userdata... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:58
BR
Dipendra Pathak

  Reply With Quote
Old 01-29-2021, 05:04   #1097 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Xiaomi Redmi Note 8 (ginkgo) bypass by Flashing Method successfully done by Hydra Too

Xiaomi Redmi Note 8 (ginkgo) bypass by Flashing Method successfully done by Hydra Too

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM6)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&32011445&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :05/29/2019,2.1.3.7

Getting device info......
Serial No.: 0x07BB4F54
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
PBL Ver : 00000000
PK HASH : 1BEBE3863A6781DB4B01086063007334
DE9E5CA14971C7C4F4358EC9D79CDA46

Firehose Loader[Xiaomi_redminote8_loader.elf]
SaharaBoot... Ok
Sending ..............................Ok
Connecting to Firehose...
Ping..................... Ok
Configuration.........
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 19
Serial Number : 370796665
Firmware Version : 4
Product Name : S0J9K8
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information......
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 8
ID : PKQ1.190616.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : ginkgo-user 9 PKQ1.190616.001 V11.0.12.0.PCOMIXM release-keys
Miui Ver : V11
Device : ginkgo
Mod_device : ginkgo_global
Display ID : PKQ1.190616.001
Security Patch : 2020-11-01
Fingerprint : xiaomi/ginkgo/ginkgo:9/PKQ1.190616.001/V11.0.12.0.PCOMIXM:user/release-keys


----------------------------
Flashing Selected Partitions....
- Easy_Soluciones_FRP(0)[Redmi_Note_8_FRP.bin] Ok
- Easy_Soluciones_Mi_Account(0)[Mi_Account.img] Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:31
BR
Dipendra Pathak

  Reply With Quote
Old 01-29-2021, 05:15   #1098 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Xioami Redmi Note 5 FIND ME DEVICE successfully disable using BEST Hydra Tool

Huawei ATU-L42 (Y6 2018) FRP successfylly removed by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM10)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&9dafd45&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2012,2.0.9.9

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping....... Ok
Configuration.......................
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 8192
MaxPayloadSizeToTargetInBytesSupported : 8192
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Nov 23 2018 - 22:03:03

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3442133050
Firmware Version : 2
Product Name : DD68MB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 8192[4 MB]

Protocol : Universal
Running : Ok
Reading GPT[4]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]


Phone Information.....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi Note 5
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : whyred-user 8.1.0 OPM1.171019.011 V9.5.27.0.OEIRUFA release-keys
Miui Ver : V9
Device : whyred
Mod_device : whyred_ru_global
Display ID : OPM1.171019.011
Security Patch : 2018-07-01
Fingerprint : xiaomi/whyred_ru/whyred:8.1.0/OPM1.171019.011/V9.5.27.0.OEIRUFA:user/release-keys

Processing Find Device Disable.........
InodeNo : 3964.
OPM1.171019.011_FindDevice
Action Result : Ok

Elapsed Time : 00:00:08
BR
Dipendra Pathak

  Reply With Quote
Old 01-29-2021, 05:26   #1099 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Lenevo L38041 Format use data using EDL method successfully done by Hydra Tool

Lenevo L38041 Format use data using EDL method successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : LENOVO Model : L38041 (K5 Pro) Storage : Auto
Loader: LV_2_8.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM214)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&2effdc72&0&2#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/17/2018,2.1.3.5

Getting device info......
Serial No.: 0xABD69198
MSM ID : 0x000CC0E1,
PBL Ver : 00000000
PK HASH : 0374637D23C4E2EEDE23DA5D60C1E7AB
CD81CCC4CD641045F859B317650F47DF

Firehose Loader[LV_2_8.elf]
SaharaBoot... Ok
Sending ...............................Ok
Connecting to Firehose...
Ping......... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : MSM8996
Version : 1
DateTime : Nov 21 2018 - 13:57:02

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 909493425
Firmware Version : 2
Product Name : 3H6CAB
Physical Partitions : 4
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Drive [3] 32768[16 MB]

Protocol : Universal
Running : Ok

Phone Information.....
Brand : Lenovo
Vendor : Lenovo
Model : Lenovo L38041
ID : OPM1.171019.019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : kunlun_emada-user 8.1.0 OPM1.171019.019 5.0.105_190821 release-keys
Device : kunlun
Display ID : OPM1.171019.019 dev-keys
Security Patch : 2019-06-01
Fingerprint : Lenovo/kunlun_emada/kunlun:8.1.0/OPM1.171019.019/5.0.105_190821:user/release-keys

Reading GPT[4]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items
Drive [3]

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe method] OkOkOk

Elapsed Time : 00:00:07
BR
Dipendra Pathak

  Reply With Quote
Old 01-29-2021, 05:31   #1100 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Vivo Y30 Formatting selected partition successfully done by Hydra Tool

Vivo Y30 Formatting selected partition successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
Connection
-Please wait...
-Found...
-PreLoader...[COM13]

TPortConnection.Create...(COM13)..Opening...Ok

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : FF93483BB88A3A9472548987BC0D7256
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E53304A394B3910189AC26627C7 - S0J9K9

Reading GPT-EMMC [0x00008000] 130 Items

Format Selected Partition
Formatting [nvdata] Ok!
Formatting [nvram] Ok!

TPortConnection.Destroy.....Closing...Ok..
=====================================

Elapsed Time : 00:00:28
BR
Dipendra Pathak

  Reply With Quote
Old 01-29-2021, 05:34   #1101 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Xiaomi Redmi 8 (Olive) FRP removed by Flashing method by Hydra Tool

Xiaomi Redmi 8 (Olive) FRP removed by Flashing method by Hydra Tool

Screen Short:



Logs:

Quote:
Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM9)
SymbolicName :\??\USB#VID_05C6&PID_9008#5&38880d19&0&1#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :

Getting device info......
Serial No.: 0xDFE2B721
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000000
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[2oWRWTREDBrip8VZ8Y0EtLfWU4o]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1671884084
Firmware Version : 909127728
Product Name : hB8aP>
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Phone Information......
Vendor : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V11
Mod_device : olive_global
Security Patch : 2020-09-01
Emmc_size : 16GB


----------------------------
Flashing Selected Partitions....
- config(0)[afrianz.bin] Ok
- persist(0)[persist.img] Ok
----------------------------
Done!

Elapsed Time : 00:00:16
BR
Dipendra Pathak

  Reply With Quote
Old 01-29-2021, 05:44   #1102 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Vivo Y20 PD2034F Forced Erease to remove FRP and userdata successfully done by Hydra

Vivo Y20 PD2034F Forced Erease to remove FRP and userdata successfully done by Hydra Tool

Screen Short:



Logs:

Quote:
PreOperation Configuration
Brand : VIVO Model : Y20 PD2034F Storage : Auto
Loader: Vivo_Y20i_PD2034F_ddr.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM43)
SymbolicName :\??\USB#VID_05C6&PID_9008#8&3b333475&0&3#{a5dcbf1 0-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x25537092
MSM ID : 0x001360E1,
PBL Ver : 00000000
PK HASH : A7DF36FFD7AB557C67A6C26675E2795C
922CF671308CFD7169BEDB84424C862B

Firehose Loader[Vivo_Y20i_PD2034F_ddr.elf]
SaharaBoot... Ok
Sending .................................Ok
Connecting to Firehose...
Ping......................... Ok
Configuration........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 21 2020 - 23:37:55

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 300
Product Name : KM5H80018M-B424
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 15337472[58,508 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 262144[1024 MB]
Drive [5] 8192[32 MB]

Protocol : Universal
Running : Ok
Reading GPT[6]
Drive [0] ERROR: The operation is not allowed for read...
Drive [1] ERROR: The operation is not allowed for read...
Drive [2] ERROR: The operation is not allowed for read...
Drive [3] ERROR: The operation is not allowed for read...
Drive [4] ERROR: The operation is not allowed for read...
Drive [5] ERROR: The operation is not allowed for read...

Processing Forced Erase....
- Forced Erase frp Ok
- Forced Erase userdata Ok
Action Result : Ok

Elapsed Time : 00:00:33
BR
Dipendra Pathak

  Reply With Quote
Old 01-30-2021, 03:53   #1103 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Xiaomi Redmi 6A (Cactus) Mi Account successfully Removed without Auth and Credit

Screen Short:





BR
Dipendra Pathak

  Reply With Quote
The Following User Says Thank You to Dipendra Pathak For This Useful Post:
Old 01-30-2021, 04:06   #1104 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Oppo A12 CPH2083 Password Remove enabling BROM Exploit just using USB Data Cable.

Oppo A12 CPH2083 Password Remove

enabling BROM Exploit just using USB Data Cable. No need ISP or Server

Screen Short:



Logs:

BR
Dipendra Pathak

  Reply With Quote
Old 01-30-2021, 04:32   #1105 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
VIVO Y50 (PD1935) Frp and Pattern removed done by Hydra Tool

VIVO Y50 (PD1935) Frp and Pattern removed done by Hydra Tool

Screen Short:





BR
Dipendra Patha
k
  Reply With Quote
Old 01-30-2021, 04:40   #1106 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Xiaomi Redmi Note 9 (merlin) IMEI Repair successfully Done by Hydra Tool

Xiaomi Redmi Note 9 (merlin) IMEI Repair successfully Done by Hydra Tool

Screen Short:



BR
Dipendra Pathak

  Reply With Quote
Old 01-30-2021, 04:46   #1107 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Huawei MED-LX9 Y6P 2020 Huawei ID Remove by Hydra Tool

Huawei MED-LX9 Y6P 2020 Huawei ID Remove by Hydra Tool

Screen Short:




BR
Dipendra Pathak

  Reply With Quote
Old 01-30-2021, 04:51   #1108 (permalink)
Product Manager
 
Dipendra Pathak's Avatar
 
Join Date: Apr 2008
Location: Whitehole throught Blackhole!
Posts: 9,582
Member: 747989
Status: Offline
Sonork: 100.1593052
Thanks Meter: 8,609
Huawei ATU-L42 (Y6 2018) FRP successfylly removed by Hydra Tool

Huawei ATU-L42 (Y6 2018) FRP successfylly removed by Hydra Tool

Screen Short:




BR
Dipendra Pathak

  Reply With Quote
Old 01-30-2021, 09:05   #1109 (permalink)
No Life Poster
 
pintu_das's Avatar
 
Join Date: Jan 2015
Location: Narsingdi, Dhaka, Bangladesh
Age: 27
Posts: 2,164
Member: 2325851
Status: Offline
Sonork: 100.1680491
Thanks Meter: 2,317
Donate money to this user
Talking vivo u20 1921 password remove done








Hydra Qualcomm Tool Ver 1.0.2 Build 72
Windows 10 (Version 10.0, Build 18362, 64-bit Edition)
Intel(R) Core(TM) i7-8700 CPU @ 3.20GHz
Intel(R) UHD Graphics 630
Ram Installed : 8 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : 200300003558
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]

PreOperation Configuration
Brand : VIVO Model : U20 (PD1941F) Storage : Auto
Loader: Vivo_V17_Pro_SDM675.elf
Port : Auto
Connection :

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM159)
SymbolicName :\??\USB#VID_05C6&PID_9008#7&3cd3280&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info..Ok
Device MODE : Firehose
Connecting to Firehose...
Ping..................... Ok
Configuration........
Identifying Chip........UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 2 2020 - 22:00:29

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 462
Serial Number : 1297306958
Firmware Version : 900
Product Name : KM8V7001JA-B813
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 30947328[118.055 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 8192[32 MB]
Drive [4] 262144[1024 MB]
Drive [5] 16384[64 MB]

Protocol : Universal
Running : Ok
Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Phone Information......
Brand : vivo
Vendor : vivo
Model : vivo 1921
ID : PKQ1.190302.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : sm6150-user 9 PKQ1.190302.001 compiler08241706 release-keys
Device : PD1941F_EX
Display ID : PKQ1.190302.001 release-keys
Security Patch : 2020-08-01
Platform : =SM6150
Fingerprint : vivo/1921/1921:9/PKQ1.190302.001/compiler08241706:user/release-keys

Processing Safe Format New - UFS....
- Removing FRP [Zero Wipe] Ok
- Formatting Userdata [Safe Vivo New] Ok
Action Result : Ok

Rebooting Phone.... Ok

Elapsed Time : 00:00:05
  Reply With Quote
Old 01-30-2021, 11:23   #1110 (permalink)
No Life Poster
 
Gsm-Ahmed's Avatar
 
Join Date: Jan 2020
Location: Algeria
Posts: 790
Member: 2944109
Status: Offline
Thanks Meter: 621
Donate money to this user
C idea CM422 Backup Firmware




Code:
Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
Connection
 -Please wait...
 -Found...[COM16]

TPortConnection.Create...(COM16)..Opening...Ok


Reading System Info
  Brand          : CM422
  Vendor         : alps
  Model          : CM422
  ID             : KOT49H
  SDK            : 19
  Release        : 6.1
  ABI            : armeabi-v7a
  Description    : b708_tab-user 4.4.2 KOT49H eng.qxbin.1583210675 test-keys
  Device         : CM422
  Board          : CM422
  Display ID     : ALPS.KK1.MP1.V2.36
  Platform       : MT6582
  Fingerprint    : alps/b708_tab/b708_tab:4.4.2/KOT49H/1583210675:user/test-keys
  StorageType    : mtp,mass_storage
  Userdata State : Not Encrypted

-------------------------------------
Operation : Backup All By Partitions Except Userdata
Processing...

Reading Partitions
 -PRELOADER[0x00000000] 512 KB -> PRELOADER.bin...Ok
   -> Renaming Preloader....  preloader_b708_tab.bin
   Creating Scatter file... C:\Hydra Tool\\Backup\Full\CM422_CM422_6582-MT6582-6.1(ALPS.KK1.MP1.V2.36)_290121161720\MT6582_Android_scatter.txt
 -MBR[0x01400000] 512 KB -> MBR.bin...Ok
 -EBR1[0x01480000] 512 KB -> EBR1.bin...Ok
 -PRO_INFO[0x01500000] 3 MB -> PRO_INFO.bin...Ok
 -NVRAM[0x01800000] 5 MB -> NVRAM.bin...Ok
 -PROTECT_F[0x01D00000] 10 MB -> PROTECT_F.bin...Ok
 -PROTECT_S[0x02700000] 10 MB -> PROTECT_S.bin...Ok
 -SECCFG[0x03100000] 128 KB -> SECCFG.bin...Ok
 -UBOOT[0x03120000] 384 KB -> UBOOT.bin...Ok
 -BOOTIMG[0x03180000] 16 MB -> BOOTIMG.bin...Ok
 -RECOVERY[0x04180000] 16 MB -> RECOVERY.bin...Ok
 -SEC_RO[0x05180000] 6 MB -> SEC_RO.bin...Ok
 -MISC[0x05780000] 512 KB -> MISC.bin...Ok
 -LOGO[0x05800000] 3 MB -> LOGO.bin...Ok
 -EXPDB[0x05B00000] 10 MB -> EXPDB.bin...Ok
 -ANDROID[0x06500000] 1,465 GB -> ANDROID.bin...Ok
 -CACHE[0x64100000] 126 MB -> CACHE.bin...Ok
PC.rBuffer[0] <> $5A
Reading Done!!!
C:\Hydra Tool\\Backup\Full\CM422_CM422_6582-MT6582-6.1(ALPS.KK1.MP1.V2.36)_290121161720 

Rebooting Device [Reboot To Normal]
Reboot Done!!

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:05:03
  Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


 



All times are GMT +1. The time now is 22:18.



Powered by Searchlight © 2023 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2023 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2022 -
Page generated in 0.16747 seconds with 9 queries

SEO by vBSEO