|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source |
| LinkBack | Thread Tools | Display Modes |
10-18-2021, 06:25 | #1 (permalink) |
Product Manager Join Date: Jan 2002 Location: NCK Team Projects
Posts: 16,662
Member: 94675 Status: Offline Sonork: 100.8888 QQ3161545070 Thanks Meter: 97,241 | NCK Dongle / NCK Pro Android MTK Module v2.7.7 Released - [18/10/2021] - Added Unlock & Lock BOOTLOADER for Helio cpu. -- Tested MT6761, MT6763, MT6765, MT6768 cpu (Please Test More CPU & Report). -- Software will check phone Algo, and will not allow to use this function if phone not supported. - Added SAFE RESET FOR OPPO Phones in flash mode. -- Need to tick "bypass security" checkbox to use this feature. - Added SAFE RESET FOR VIVO Phones in flash mode. -- Need to tick "bypass security" checkbox to use this feature. - NEW - Added support for UFS Filesystem, for supported phones. Now supports All Functions related to UFS filesystem supported phones. - Added functions for the following models
Oukitel
- Updated bypass security function for supported cpu's. Supported cpu for this function:
- Improved save Preloader function for supported CPU, exe will bypass security and will dump Preloader at same time. -- After will be used this Preloader to fill EMMI setting and boot phone. --- Phone must be functional to use this function, in case of damaged firmware, will need to use external Preloader to boot phone. - Updated(fixed) generic reset in flash mode. -- Need to tick "bypass security" checkbox to use this feature. - Disabled switch to meta with bypass security enabled. -- This function was designed for use in flash mode, and it not allow to boot phone in meta. --- Many users report not working meta mode because of this. Official Website: NCK Dongle NCK PRO Website: www.nck-pro.com Download From Support OR GDrive https://drive.google.com/file/d/1ncJ...ew?usp=sharing OR Mega https://mega.nz/file/RYwGmQIC#1zk61-...LEmTYGvYNb-KQ0 Last edited by Fast Unlocking; 10-18-2021 at 07:08. |
The Following 13 Users Say Thank You to Fast Unlocking For This Useful Post: |
10-18-2021, 07:21 | #2 (permalink) |
Product Manager Join Date: Jan 2002 Location: NCK Team Projects
Posts: 16,662
Member: 94675 Status: Offline Sonork: 100.8888 QQ3161545070 Thanks Meter: 97,241 | Code: Phone must be off with battery inside. Battery must be charged Please connect phone in brom mode For some phones need to keep "VOL-" button untill inserting USB cable. For some phones need to keep "VOL+ and VOL-" button untill inserting USB cable. For some phones need to keep "VOL+" button untill inserting USB cable. Detected(6) : MediaTek USB Port (COM6) [6] \\?\usb#vid_0e8d&pid_0003#6&35c31b9d&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed} CPU: MT6761 CPU code: 717 Target config: e1 *********************** Secure boot enabled: true Need serial link authorization: false Need download agent authorization: false SWJTAG enabled: false EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: false Root cert required: false Memory read authorization: true Memory write authorization: true Cmd 0xC8 blocked: true *********************** Executing exploit, do not disconnect phone Executing selected by user payload Exploit has been executed successfully. [3b600]Dumping phone preloader. Preloader: F:\android_mtk_backup\Android_MTK_Backup_Folder\preloader_backup\preloader_wasp.bin Waiting for handle to become active...... Reseived active handle repply from phone...... Booting phone Detected(6) : MediaTek USB Port (COM6) [6] \\?\usb#vid_0e8d&pid_0003#6&35c31b9d&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Boot mode: Brom Phone detected...Please wait BBCHIP: 6761 200 ca01 Using Algo 1. Helio MT6761 phone detected, swithing to helio api Helio enabled DRAM in First Da: FALSE Sending loader..... BBCHIP MT6761 [1]Storage EMMC Block size: 512 EMMC FW VERSION: 00:00:00:00:00:00:00:00 EMMC CID: 88010344394431 : 000000000000000000 EMMC UA SIZE: 0x39d000000 BOOT STYLE: EMMC BOOT FULL LENGTH: 0x39dc00000 [14.465 GB] Checking data, wait... Phone bootloader state: Locked Unlocking bootloader.... Done. [helio]Wait untill phone will start charging. [0]All done. |
The Following 4 Users Say Thank You to Fast Unlocking For This Useful Post: |
10-18-2021, 08:06 | #3 (permalink) |
Product Manager Join Date: Apr 2002 Location: nckDongle
Posts: 13,325
Member: 11170 Status: Offline Sonork: 1603694 Thanks Meter: 6,944 | OPPO A31 safe reset. Code: Phone must be off with battery inside. Battery must be charged Please connect phone in brom mode For some phones need to keep "VOL-" button untill inserting USB cable. For some phones need to keep "VOL+ and VOL-" button untill inserting USB cable. For some phones need to keep "VOL+" button untill inserting USB cable. Detected(10) : MediaTek USB Port (COM10) [10] \\?\usb#vid_0e8d&pid_0003#5&ecb7860&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} CPU: MT6765 CPU code: 766 Target config: e5 *********************** Secure boot enabled: true Need serial link authorization: false Need download agent authorization: true SWJTAG enabled: true EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: false Root cert required: false Memory read authorization: true Memory write authorization: true Cmd 0xC8 blocked: true *********************** Executing exploit, do not disconnect phone Exploit has been executed successfully. [3e000]Dumping phone preloader. Preloader: C:\ProgramData\Android_MTK_Backup_Folder\preloader_backup\preloader_oppo6765_19581.bin Waiting for handle to become active...... Reseived active handle repply from phone...... Booting phone Detected(10) : MediaTek USB Port (COM10) [10] \\?\usb#vid_0e8d&pid_0003#5&ecb7860&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Boot mode: Brom Phone detected...Please wait BBCHIP: 6765 0 ca00 Using Algo 1. Helio MT6765 phone detected, swithing to helio api Helio enabled DRAM in First Da: FALSE Sending loader..... BBCHIP MT6765 [1]Storage EMMC Block size: 512 EMMC FW VERSION: 00:00:00:00:00:00:00:00 EMMC CID: 90014A68433961 : 000000000000000000 EMMC UA SIZE: 0xe8f800000 BOOT STYLE: EMMC BOOT FULL LENGTH: 0xe91000000 [58.266 GB] Resetting userdata. [helio]Wait untill phone will start charging. [0]All done. |
The Following User Says Thank You to orbita For This Useful Post: |
10-18-2021, 08:11 | #4 (permalink) |
Product Manager Join Date: Apr 2002 Location: nckDongle
Posts: 13,325
Member: 11170 Status: Offline Sonork: 1603694 Thanks Meter: 6,944 | Vivo Y91C safe reset(generic select, exe autodetect phone) Code: [VIVO MODE]Action: Reset To Factory. Selected 0-By CPU:ELBRUS Exe version: NCKDongle AndroidMTK 2.7.7 Phone must be off with battery inside. Battery must be charged Please connect phone in brom mode For some phones need to keep "VOL-" button untill inserting USB cable. For some phones need to keep "VOL+ and VOL-" button untill inserting USB cable. For some phones need to keep "VOL+" button untill inserting USB cable. Detected(10) : MediaTek USB Port (COM10) [10] \\?\usb#vid_0e8d&pid_0003#5&ecb7860&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} CPU: MT6765 CPU code: 766 Target config: e5 *********************** Secure boot enabled: true Need serial link authorization: false Need download agent authorization: true SWJTAG enabled: true EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: false Root cert required: false Memory read authorization: true Memory write authorization: true Cmd 0xC8 blocked: true *********************** Executing exploit, do not disconnect phone Exploit has been executed successfully. [3dc00]Dumping phone preloader. Preloader: C:\ProgramData\Android_MTK_Backup_Folder\preloader_backup\preloader_k62v1_64_bsp.bin Waiting for handle to become active...... Reseived active handle repply from phone...... Booting phone Detected(10) : MediaTek USB Port (COM10) [10] \\?\usb#vid_0e8d&pid_0003#5&ecb7860&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Boot mode: Brom Phone detected...Please wait BBCHIP: 6765 0 ca00 Using Algo 1. Helio MT6765 phone detected, swithing to helio api Helio enabled DRAM in First Da: FALSE Sending loader..... BBCHIP MT6765 [1]Storage EMMC Block size: 512 EMMC FW VERSION: 00:00:00:00:00:00:00:00 EMMC CID: 15010051443633 : 000000000000000000 EMMC UA SIZE: 0x747c00000 BOOT STYLE: EMMC BOOT FULL LENGTH: 0x749400000 [29.145 GB] Resetting userdata. [helio]Wait untill phone will start charging. [0]All done. |
The Following User Says Thank You to orbita For This Useful Post: |
10-18-2021, 13:16 | #8 (permalink) |
Freak Poster Join Date: Jul 2014
Posts: 191
Member: 2220699 Status: Offline Thanks Meter: 143 | Plz team add disable Micloud for Xiaomi devices, reset Mi account antirelock ... read Partition table... |
The Following User Says Thank You to jerrsoftware For This Useful Post: |
Bookmarks |
| |
|