|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
| LinkBack | Thread Tools | Display Modes |
10-11-2022, 14:19 | #346 (permalink) |
No Life Poster Join Date: Jan 2003 Location: France
Posts: 590
Member: 19927 Status: Offline Sonork: joe-lindien Thanks Meter: 58 | Wiko u10 frp Initializing usb... OK Waiting for device... COM102 [PRELOADER:0E8D:2000] Jumping to BROM... OK Bypassing authentication... OK Analyzing... preloader_v745an.bin [MT6765:4:752] [Internal] Handshaking... OK Reading hardware info... OK * Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000 * Security Config : SCB SLA DAA * MEID : 688730760469111ABCE5E41D240B2A0B Sending Download-Agent... OK Syncing with target... OK Booting device... OK Syncing with DA... OK **Storage : EMMC - CID : 350301D6.33374B38.BB5C6831.FF282495 **Vendor : Samsung - Name : 58K731 - Serial : 613792604 - Rev : 104 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 28,91 GiB Reading partition info... OK [40] Reading device info... OK ** Model Name : W-V745-EEA ** Manufacturer : WIKO ** Platform : v745an ** Android Version : 11 ** Security Patch : 2021-05-05 ** Build ID : RP1A.200720.011 release-keys ** Build : 05141912 ** Build Date : Fri May 14 19:15:31 CST 2021 Erasing FRP... OK UNLOCKTOOL 2022.10.05.2 Elapsed time : 12 seconds |
The Following User Says Thank You to Angello For This Useful Post: |
10-14-2022, 09:41 | #347 (permalink) | |
No Life Poster Join Date: Feb 2010 Location: e.cameros shop Age: 45
Posts: 6,003
Member: 1229604 Status: Offline Sonork: 100.1602688 Thanks Meter: 4,815 | huawei y9 prime frp bypass Quote:
| |
The Following User Says Thank You to ernie78™ For This Useful Post: |
10-15-2022, 09:26 | #348 (permalink) |
Freak Poster Join Date: Oct 2020 Location: india
Posts: 184
Member: 2970939 Status: Offline Thanks Meter: 50 | [SPRD] ERASE FRP Selected Model : Realme C11 (SPD) Code Name : RMX3231 Operation : Erase FRP [1] **Authenticating... OK **Retrieving data... OK [410.68 KiB] Hold VOL DOWN then plug-in USB cable! Waiting for device... COM39 Protocol : SPRD3 Sending FDL1... OK [50.22 KiB] Boot ver: Spreadtrum Boot Block version 1.1 Sending FDL2... OK [823.8 KiB] Reading DEVINFO... OK ** Model Name : RMX3231 ** Android Version : 11 ** Security Patch : 2021-08-05 ** Build ID : RMX3231_11.A.38 Erasing FRP... OK UNLOCKTOOL 2022.10.05.2 Elapsed time : 21 seconds |
The Following User Says Thank You to .::BIG BOSS::. For This Useful Post: |
10-17-2022, 07:40 | #349 (permalink) |
No Life Poster Join Date: Jul 2009 Location: SINDH PAKISTAN
Posts: 7,462
Member: 1080718 Status: Offline Sonork: 100.1596539 QQ-2710826805 Thanks Meter: 2,247 | oppo A83 pattern unlock done [COLOR=#444444;]SAFE FORMAT [KEEP DATA][/COLOR] Make sure phone battery level is at least 10%! Waiting for device... COM4 Handshaking... OK Booting META mode... OK Make sure phone battery level is at least 10%! Waiting for device... COM38 Authenticating... OK Initializing META... OK Connecting to META... OK [Ver:0] [Rate:921600] Reading Software Info... OK Brand : OPPO Board : full_oppo6763_17101 Platform : mt6763 Model : CPH1729 Android : 7.1.1 Security Patch : 2019-10-05 Build ID : CPH1729EX_11_A.35_200903 Build Date : Fri Sep 4 00:52:36 CST 2020 Oppo Name : OPPO A83 Oppo Model : CPH1729 Safe formatting data... OK Rebooting device... OK UNLOCKTOOL 2022.10.05.2 Elapsed time : 44 seconds |
10-17-2022, 09:32 | #350 (permalink) | |
No Life Poster Join Date: Feb 2010 Location: e.cameros shop Age: 45
Posts: 6,003
Member: 1229604 Status: Offline Sonork: 100.1602688 Thanks Meter: 4,815 | tecno pouvoir 4 password plus frp bypass Quote:
| |
10-17-2022, 10:25 | #351 (permalink) |
Junior Member Join Date: Jul 2014 Location: United Arab Emirates
Posts: 17
Member: 2223182 Status: Offline Thanks Meter: 7 | unlocktool stuck on 64 bit drivers during bypass apple device Ramdisk2 take about 10 minutes to complete ramdisk 2 process due to install 64bit drivers akways need help |
10-18-2022, 14:53 | #354 (permalink) |
Freak Poster Join Date: Oct 2020 Location: india
Posts: 184
Member: 2970939 Status: Offline Thanks Meter: 50 | OnePlus 6T frp failed unlock tool ERASE FRP Selected Model : OnePlus 6T Code Name : OnePlus6T Operation : Erase FRP [1] **Authenticating... OK **Retrieving data... OK [291.73 KiB] Initializing data... OK Waiting for HS-USB QDLoader 9008... COM13 Connecting to device... OK Handshaking... OK Reading bootloader info... OK **Serial : 776675195 SoC : [Snapdragon 845] [SDM845] [0x0008B0E1] **OEM : Oppo/Oneplus [0x0051] Model : Unknown [0x0000] **PK_HASH[0] : DD7C5F2E53176BEE91747B53900CCEC3 **PK_HASH[1] : 3DD30FA4DED0DFE9BAF9156E6910862F Writing flash programmer... OK Connecting to flash programmer... OK Configuring device... OK **Firehose config : UFS [Sector:4096] [Target:0] [Host:1048576] Reading partition map... OK - LU Count : 6 Reading software info... OK ** Model Name : ONEPLUS A6013 ** Product Name : OnePlus6T ** Manufacturer : OnePlus ** Platform : sdm845 ** Android Version : 10 ** Security Patch : 2021-05-01 ** Build : 2105112216 ** Build Date : Tue May 11 22:22:27 CST 2021 Erasing FRP... FAIL UNLOCKTOOL 2022.10.05.2 Elapsed time : 21 seconds |
10-18-2022, 14:55 | #355 (permalink) |
Freak Poster Join Date: Oct 2020 Location: india
Posts: 184
Member: 2970939 Status: Offline Thanks Meter: 50 | vivo y12 new Security Patch : 2022-05-01 frp dine with test point FORMAT DATA Initializing usb... OK Waiting for device... COM5 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing... preloader_k62v1_64_bsp.bin [MT6765:11:1872] [Cust] Handshaking... OK Reading hardware info... OK * Hardware : MT6765 [Helio G25|G35|P35] 0766 8A00 CA00 0000 * Security Config : SCB SLA DAA * MEID : 6F647B0F9D49BE1B59136F6D84878988 Sending Download-Agent... OK Syncing with target... OK Booting device... OK Syncing with DA... OK **Storage : EMMC - CID : 684A0190.50613843.FB66033E.1F46A0C9 **Vendor : SK Hynix - Name : hC8aP> - Serial : 2697591654 - Rev : 3 **Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 58.24 GiB Reading partition info... OK [42] Reading device info... OK ** Model Name : vivo 1901 ** Product Name : 1901 ** Manufacturer : vivo ** Platform : k62v1_64_bsp ** Android Version : 11 ** Security Patch : 2022-05-01 ** Build ID : RP1A.200720.012 release-keys ** Build : eng.compil.20220822.174609 ** Build Date : Mon Aug 22 17:41:18 CST 2022 ** Vivo Model : PD1901BF_EXMA ** OS Name : Funtouch ** OS Version : 9.0 ** OS Build : Funtouch OS_9 Erasing FRP... OK Erasing USERDATA... OK UNLOCKTOOL 2022.10.05.2 Elapsed time : 15 seconds |
10-19-2022, 05:49 | #356 (permalink) |
Junior Member Join Date: May 2012
Posts: 4
Member: 1761721 Status: Offline Thanks Meter: 0 | oppo f1w super old, pattern lock and factory reset done. [EDL] FACTORY RESET Selected Model : Oppo F1f/F1w Code Name : Oppo F1-F1W Operation : Factory Reset [1] Authenticating... OK Retrieving data... OK [59.85 KiB] Initializing data... OK Waiting for HS-USB QDLoader 9008... COM3 Connecting to device... OK Handshaking... OK Reading bootloader info... OK Serial : 104827030 SoC : [Snapdragon 610] [MSM8936] [0x0090B0E1] OEM : Qualcomm [0x0000] Model : Unknown [0x0000] PK_HASH[0] : CC3153A80293939B90D02D3BF8B23E02 PK_HASH[1] : 92E452FEF662C74998421ADAD42A380F Writing flash programmer... OK Connecting to flash programmer... OK Configuring device... OK Firehose config : eMMC [Sector:512] [Target:4096] [Host:16384] Reading partition map... OK - LU Count : 1 Reading software info... OK Model Name : F1f Manufacturer : OPPO Platform : msm8916 Android Version : 5.1.1 Security Patch : 2017-12-01 Build ID : F1EX_11_190307 OTA Version : F1EX_11.A.24_INT_902_201903071442 Erasing FRP... OK Total sector : 64 Erasing USERDATA... OK Rebooting... OK UNLOCKTOOL 2022.10.05.2 Elapsed time : 13 minutes 8 seconds |
10-19-2022, 07:40 | #357 (permalink) |
No Life Poster Join Date: Nov 2013 Location: pakistan P G L Age: 39
Posts: 1,147
Member: 2067643 Status: Offline Sonork: 1611265 Thanks Meter: 477 | iphone 6pluss UNTETHERED BYPASS [MEID] [NO SIGNAL] Product Type : iPhone7,1 OS Verison : 12.5.6 Serial Number : FK4NN0ACG5QT IMEI : 354440063069199 MEID : 35444006306919 SIM Status : NotInserted Initializing... OK Connecting to device... OK Calculating activation token... OK Activating device... OK Success! Finish setup on device then reboot! |
10-19-2022, 07:41 | #358 (permalink) |
No Life Poster Join Date: Nov 2013 Location: pakistan P G L Age: 39
Posts: 1,147
Member: 2067643 Status: Offline Sonork: 1611265 Thanks Meter: 477 | tecno spark 4 frp done [BROM] ERASE FRP Initializing usb... OK Waiting for device... COM15 [PRELOADER:0E8D:2000] Jumping to BROM... OK Bypassing authentication... OK Analyzing... preloader_kc2_h6113.bin [MT6761:13:2192] [Internal] Handshaking... OK Reading hardware info... OK Hardware : MT6761 [Helio A20|A22|A25|G25|P22] 0717 8A00 CA01 0200 Security Config : SCB SLA DAA MEID : 6C844AFFE9F05175E25C3A1A3C38B4E9 Sending Download-Agent... OK Syncing with target... OK Booting device... OK Syncing with DA... OK Storage : EMMC - CID : 684A0190.50613842.7475023E.B56ABD5 Vendor : SK Hynix - Name : hB8aP> - Serial : 2882892917 - Rev : 2 Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 16 MiB - User Area : 29.12 GiB Reading partition info... OK [39] Reading device info... OK Model Name : TECNO KC2 Product Name : H6113 Manufacturer : TECNO MOBILE LIMITED Platform : TECNO-KC2 Android Version : 9 Security Patch : 2021-07-05 Build ID : KC2-H6113AI-P-210705V320 Build : AI-210705V320 Build Date : Mon Jul 5 17:54:12 CST 2021 Erasing FRP... OK |
10-19-2022, 07:42 | #359 (permalink) |
No Life Poster Join Date: Nov 2013 Location: pakistan P G L Age: 39
Posts: 1,147
Member: 2067643 Status: Offline Sonork: 1611265 Thanks Meter: 477 | iphone 7 bypass with backup BOOT RAMDISK [2] Checking for device... OK Info : iPhone 7 (GSM) [iPhone9,3-d101ap] Boot : [IBOOT-2696.0.0.1.33] [DFU] Pwnder : CHECKM8 Connecting to server... OK Initializing... OK Sending ssh... OK Sending ibss.img4... OK Sending ibec.img4... OK Executing loader... OK Sending devicetree.img4... OK Sending ramdisk.img4... OK Sending kernel.img4... OK Booting RAMDISK... OK RESTORE BACKUP Initializing... OK Connecting to device... OK Mounting system... OK Backup found : 0x001414ca10b8403a.zip Initializing... OK Restoring data.. OK |
10-19-2022, 07:44 | #360 (permalink) |
No Life Poster Join Date: Nov 2013 Location: pakistan P G L Age: 39
Posts: 1,147
Member: 2067643 Status: Offline Sonork: 1611265 Thanks Meter: 477 | GET ACTIVATION Product Type : iPhone10,2 OS Verison : 15.7 Serial Number : DX8QWDEZFFG8 IMEI : 356737081406438 MEID : 35673708140643 SIM Status : NotInserted Activating with server... OK Now boot device into RAMDISK and Bypass Hello! BOOT RAMDISK [2] Checking for device... OK Info : iPhone 8 Plus (Global) [iPhone10,2-d21ap] Boot : [IBOOT-3332.0.0.1.23] [DFU] Pwnder : CHECKM8 Connecting to server... OK Initializing... OK Sending ssh... OK Sending ibss.img4... OK Sending ibec.img4... OK Executing loader... OK Sending devicetree.img4... OK Sending ramdisk.img4... OK Sending adc.img4... OK Sending rdtrust.img4... OK Sending kernel.img4... OK Booting RAMDISK... OK BYPASS HELLO Initializing... OK Connecting to device... OK Mounting system... OK Hello data found : hello_001a39a124d8a02e.zip Model : iPhone 8 Plus (Global) [iPhone10,2-d21ap] Initializing... OK Bypassing Hello Screen.. OK |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|