★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Redmi Note 10 (sunny) Edl Flashıng With by Hydra
190700001543_HQTool.exe_EDL_Flashing_10-27-2021-114836.jpeg

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM36)
SymbolicName :??USB#VID_05C6&PID_9008#5&6044b84&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 09/27/2017,2.1.2.9

Getting device info .. . ...
Serial No.: 0x11083A57
HW_ID : 000950E100720000
MSM ID : 0x000950E1, SM6150-Qualcomm Snapdragon 675
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader [prog_emmc_firehose_Sm6150_ddr_2.elf]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag : _auth
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000950E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : c3-bsp-builder-job004.bj
IMAGE_VARIANT : SDM6150LA
QC_VERSION : BOOT.XF.3.1-00157-SM6150LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..................................b Okb0
Connecting to Firehose...
Ping ..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[nNZA3PKJRf
Signature @256bytes Authentication.... Accepted ........
Identifying Chip.... ....UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Mar 7 2019 - 23:06:29

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 300
Serial Number : 1129467726
Firmware Version : 605
Product Name : MT128GASAO4U21 0605
Physical titions : 6
Total Logical Blocks:
Drive [0] 30119936 [114,898 GB]
Drive [1] 2048 [8 MB]
Drive [2] 2048 [8 MB]
Drive [3] 32768 [128 MB]
Drive [4] 1048576 [4 GB]
Drive [5] 32768 [128 MB]

Protocol : Universal
Running : Ok

Failed to read information from phone.

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backup___Security_102721114650.sec
Backup Security Success....

----------------------------
Flashing Selected titions....0
- persist (0)b [persist.img] b0 Ok0
- misc (0)b [misc.img] b0 Ok0
- super (0)b [super_1.img] b0 Ok0
- super (0)b [super_2.img] b0 Ok0
- super (0)b [super_3.img] b0 Ok0
- super (0)b [super_4.img] b0 Ok0
- super (0)b [super_5.img] b0 Ok0
- vbmeta_system_a (0)b [vbmeta_system.img] b0 Ok0
- metadata (0)b [metadata_1.img] b0 Ok0
- metadata (0)b [metadata_2.img] b0 Ok0
- userdata (0)b [userdata_1.img] b0 Ok0
- userdata (0)b [userdata_2.img] b0 Ok0
- userdata (0)b [userdata_3.img] b0 Ok0
- userdata (0)b [userdata_4.img] b0 Ok0
- userdata (0)b [userdata_5.img] b0 Ok0
- userdata (0)b [userdata_6.img] b0 Ok0
- userdata (0)b [userdata_7.img] b0 Ok0
- userdata (0)b [userdata_8.img] b0 Ok0
- userdata (0)b [userdata_9.img] b0 Ok0
- userdata (0)b [userdata_10.img] b0 Ok0
- ffu (0)b [ffu.img] b0 Ok0
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok0
- xbl_a (1)b [xbl.elf] b0 Ok0
- xbl_config_a (1)b [xbl_config.elf] b0 Ok0
- PrimaryGPT (1)b [gpt_main1.bin] b0 Ok0
- xbl_b (2)b [xbl.elf] b0 Ok0
- xbl_config_b (2)b [xbl_config.elf] b0 Ok0
- PrimaryGPT (2)b [gpt_main2.bin] b0 Ok0
- PrimaryGPT (3)b [gpt_main3.bin] b0 Ok0
- aop_a (4)b [aop.mbn] b0 Ok0
- tz_a (4)b [tz.mbn] b0 Ok0
- hyp_a (4)b [hyp.mbn] b0 Ok0
- modem_a (4)b [NON-HLOS.bin] b0 Ok0
- bluetooth_a (4)b [BTFM.bin] b0 Ok0
- abl_a (4)b [abl.elf] b0 Ok0
- dsp_a (4)b [dspso.bin] b0 Ok0
- keymaster_a (4)b [km41.mbn] b0 Ok0
- boot_a (4)b [boot.img] b0 Ok0
- cmnlib_a (4)b [cmnlib.mbn] b0 Ok0
- cmnlib64_a (4)b [cmnlib64.mbn] b0 Ok0
- devcfg_a (4)b [devcfg.mbn] b0 Ok0
- qupfw_a (4)b [qupv3fw.elf] b0 Ok0
- vbmeta_a (4)b [vbmeta.img] b0 Ok0
- dtbo_a (4)b [dtbo.img] b0 Ok0
- imagefv_a (4)b [imagefv.elf] b0 Ok0
- uefisecapp_a (4)b [uefi_sec.mbn] b0 Ok0
- vendor_boot_a (4)b [vendor_boot.img] b0 Ok0
- aop_b (4)b [aop.mbn] b0 Ok0
- tz_b (4)b [tz.mbn] b0 Ok0
- hyp_b (4)b [hyp.mbn] b0 Ok0
- modem_b (4)b [NON-HLOS.bin] b0 Ok0
- bluetooth_b (4)b [BTFM.bin] b0 Ok0
- abl_b (4)b [abl.elf] b0 Ok0
- dsp_b (4)b [dspso.bin] b0 Ok0
- keymaster_b (4)b [km41.mbn] b0 Ok0
- boot_b (4)b [boot.img] b0 Ok0
- cmnlib_b (4)b [cmnlib.mbn] b0 Ok0
- cmnlib64_b (4)b [cmnlib64.mbn] b0 Ok0
- devcfg_b (4)b [devcfg.mbn] b0 Ok0
- qupfw_b (4)b [qupv3fw.elf] b0 Ok0
- vbmeta_b (4)b [vbmeta.img] b0 Ok0
- dtbo_b (4)b [dtbo.img] b0 Ok0
- imagefv_b (4)b [imagefv.elf] b0 Ok0
- uefisecapp_b (4)b [uefi_sec.mbn] b0 Ok0
- devinfo (4)b [devinfo.img] b0 Ok0
- logfs (4)b [logfs_ufs_8mb.bin] b0 Ok0
- storsec (4)b [storsec.mbn] b0 Ok0
- secdata (4)b [sec.elf] b0 Ok0
- PrimaryGPT (4)b [gpt_main4.bin] b0 Ok0
- PrimaryGPT (5)b [gpt_main5.bin] b0 Ok
0
Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:02:19
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
ATU-L22 (Y6 2018) Edl Format Userdata With by Hydra
210400014131_HQTool.exe_EDL_FormatUserDataZeroWipe_10-27-2021-142649.jpeg
Brand : HUAWEI Model : ATU-L22 (Y6 2018) Storage : Auto
Loader: Huawei-ATU-Y6.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :??USB#VID_05C6&PID_9008#7&2f34f2ea&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0xC2282
HW_ID : 000560E10015003A
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
MODEL_ID : 0x003A
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119

Firehose Loader [Huawei-ATU-Y6.mbn]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8917
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 000560E10015003A
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 003A
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119
OEM_VERSION : ubuntu
IMAGE_VARIANT : LAADANAZA
QC_VERSION : BOOT.BF.3.3-00193
--------------------------------------------------

SaharaBoot... Ok
Sending ...................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3895579526
Firmware Version : 4
Product Name : QE63MB
Physical titions : 3
Total Logical Blocks:
Drive [0] 30535680 [14.561 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPR6.170623.013
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.0.0 OPR6.170623.013 eng.root.20190116.111633 test-keys
Display ID : System 8.0.0.073(00FL)
Security Patch : 2019-01-01
Fingerprint : Huawei/generic_a53/generic_a53:8.0.0/OPR6.170623.013/root01161116:user/test-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method : 0
Zero Wipe
Processing...
- Formatting Userdata [Zero Wipe] Ok Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Cherry Mobile Flare j2 Mini Factory Reset With by Hydra

Port : [Auto] Scanning... COM27
Opening Port... (COM27) Ok
------------------------------------------
Factory Reset/Format Userdata...
------------------------------------------
Reading IMEI... .
IMEI 1 : 3**************
IMEI 2 : 3**************
Executing... Factory Reset

Reading System Info ..
Vendor : Cherry Mobile
Model : Flare J2 Mini
Android Ver : 6.0
Device : Flare_J2_Mini
Board : Cherry_Mobile
Display ID : Cherry_Flare_J2_Mini_V10_14.03.2017
Security Patch : 2017-01-05
Platform : sc8830
FRPPST : /dev/block/platform/sdio_emmc/by-name/persist
Fingerprint : Cherry_Mobile/Flare_J2_Mini/Flare_J2_Mini:6.0/MRA58K/1489466323:user/release-keys
ro_product_hardware : SP7731C

Action Result.. Ok

Elapsed Time : 00:01:01
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Redmi 9C (angelica) Bootloader Unlock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM3)
Device : 5&147da55b&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#5&147da55b&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 60365842CDBF924806598FEA5FFF17FE
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58,242 GB
eMMC CID : 450100444134303634011E5D6D15676F - DA4064

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Y7 2019 (DUB-LX3) EDL Frp Remove With by Hydra

Brand : HUAWEI Model : DUB-LX3 (Y7 2019) Storage : Auto
Loader: prog_emmc_firehose_11.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM45)
SymbolicName :??USB#VID_05C6&PID_9008#5&194485c0&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 12/17/2018,2.1.3.5

Getting device info .. . ...
Serial No.: 0xF8CC4C4F
HW_ID : 0009A0E100150065
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
MODEL_ID : 0x0065
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119

Firehose Loader [prog_emmc_firehose_11.mbn]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 0009A0E100150065
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 0065
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119
OEM_VERSION : SIA1000073848
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00019
--------------------------------------------------

SaharaBoot... Ok
Sending .............b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2695338927
Firmware Version : 0
Product Name : GD6BMB
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.root.20210204.212200 test-keys
Display ID : System 8.2.0.036(1UW2)
Security Patch : 2020-09-01

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
P20 Lite (ANE-LX1) Remove Frp With by Hydra



Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len :
#C_version :
#D_version :
#PLMN :
#BoardID :
#DeviceName :
Build number : ANE-LX3 9.1.0.355(C605E4R1P3)
Product Model : ANE-LX3
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : hi6250
system_update_state :
vendorcountry : hw/la
soc_id : 0.5
ro_build_fingerprint : 0.5
ro_build_version_full : 0.5
ro_build_version_qcom : 0.5
psid.........
#SN : KPSDU18808001727
#IMEI1 : 867xxxxxxxxxxxxx
#IMEI2 : 867xxxxxxxxxxxxx

Security Info....
#Dongle_info : 0.5
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing.... Ok

Elapsed Time : 00:00:01
 

Attachments

  • 181200000031_HMainTool.exe_FB_Huawei_FRP_10-28-2021-202245.jpeg
    181200000031_HMainTool.exe_FB_Huawei_FRP_10-28-2021-202245.jpeg
    210.1 KB · Views: 2
Last edited by a moderator:

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Vivo Y53 Edl Format Userdata Without Recovery Lock With by Hydra

Brand : VIVO Model : Y53 Storage : Auto
Loader: 8917.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM31)
SymbolicName :??USB#VID_05C6&PID_9008#6&1485bec3&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 03/25/2016,2.1.2.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1334556401
Firmware Version : 165
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14.676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20200118.112618 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01181129:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method :
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:07
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Oppo F7 (CPH1819) Factory Reset Without Recovery Lock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM12)
Device : 5&709fa6&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#5&709fa6&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0788 MT6771 [6771]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0788 MT6771 [6771]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : FE0CECE012A09C1D6C871DA9A673E07C
Stage 1.. [Size:229160]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing preloader_oppo6771_17197.bin
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 4A792D6FA1C9AD68099A27F2B40DF53B
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100444836444D42059A8F9092B4FD - DH6DMB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-04-05
StorageType : mtp
Userdata State : Encrypted

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_oppo6771.bin
Creating Scatter file... C:UsersACERDesktophydra toolBackupAuto0788__102921104136MT6771_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x07C88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x09D88000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x0FD88000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x10588000] 10.469 MB -> protect2.bin...0 Ok
-persist [0x11800000] 48 MB -> persist.bin...0 Ok
-nvram [0x20D00000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:UsersACERDesktophydra toolBackupAuto0788__102921104136
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 4A792D6FA1C9AD68099A27F2B40DF53B
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100444836444D42059A8F9092B4FD - DH6DMB

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6771-user 10 QP1A.190711.020 7604ad4e2b1328a1 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-04-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Erase Userdata
Processing...
Formatting Userdata...
Action Result : Ok

Elapsed Time : 00:01:40
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Oppo A35 Remove Oppo ID With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM5)
Device : 6&228f68d&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#6&228f68d&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

D:Hydra ToolBackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : FE1712CE80F48B249D75DB151677AD67
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : DC6209A3493B8BDEE569F200AE684D54
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044483644414208DFD2D0E85841 - DH6DAB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_oppo6765.bin
Creating Scatter file... D:Hydra ToolBackupAuto0766__103021122232MT6765_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x15088000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x17188000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x1E822000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x1F022000] 15.867 MB -> protect2.bin...0 Ok
-persist [0x20800000] 48 MB -> persist.bin...0 Ok
-nvram [0x2C600000] 64 MB -> nvram.bin...0 Ok
Done!!!
D:Hydra ToolBackupAuto0766__103021122232
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 DC6209A3493B8BDEE569F200AE684D54
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 15010044483644414208DFD2D0E85841 - DH6DAB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Remove Oppo/Realme ID
Processing...
ACK : 0xFFFF0000[]
Done
Action Result : Ok

Elapsed Time : 00:00:52
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Y6P 2020 (MED-LX9) Safeformat Clear Master With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM15)
Device : 5&e658374&0&10
SymbolicName :??USB#VID_0E8D&PID_0003#5&e658374&0&10#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 7BA6DC2C4FA42577D59FB103C688EEA3
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100525036344D4201C7AC90A6871F - RP64MB

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Safe Format Master Clear 1
Processing...
Safeformat Master Clear 1...
Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Huawei Y9 Prime 2019 (STK-L22) Remove Frp Done by Hydra

Searching Device By Fastboot
Device Found...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len : 0x0000005D
#C_version : C636
#D_version : D000
#PLMN : 51502
#BoardID : 7711
#DeviceName : STK-L22
Build number : STK-L22 10.0.0.412(C636E6R2P2)
Product Model : STK-L22
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : kirin710
system_update_state :
vendorcountry : hw/spcseas
soc_id :
ro_build_fingerprint :
ro_build_version_full :
ro_build_version_qcom :
psid.........
#SN :
#IMEI1 :
#IMEI2 :

Security Info....
#Dongle_info : RSA-2048,0x9001,0x7000,0x6000,0x5100,0x5000
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing.... Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Y6 2018 (ATU-L22) Remove Frp done by Hydra

Brand : HUAWEI Model : ATU-L22 (Y6 2018) Storage : Auto
Loader: Huawei-ATU-Y6.mbn
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM15)
SymbolicName :??USB#VID_05C6&PID_9008#6&688a3b8&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0x1F0ABD8F
HW_ID : 000560E10015003A
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
MODEL_ID : 0x003A
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119

Firehose Loader [Huawei-ATU-Y6.mbn]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8917
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 000560E10015003A
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 003A
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119
OEM_VERSION : ubuntu
IMAGE_VARIANT : LAADANAZA
QC_VERSION : BOOT.BF.3.3-00193
--------------------------------------------------

SaharaBoot... Ok
Sending ...................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 654628948
Firmware Version : 4
Product Name : QE63MB
Physical titions : 3
Total Logical Blocks:
Drive [0] 30535680 [14.561 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPR6.170623.013
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.0.0 OPR6.170623.013 eng.root.20200225.190715 test-keys
Display ID : System 8.0.0.073(091X)
Security Patch : 2020-02-01
Fingerprint : Huawei/generic_a53/generic_a53:8.0.0/OPR6.170623.013/root02251907:user/test-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Mi 8 (dipper) Edl Flashıng Completely Free and One Click Without credit Without auth

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM30)
SymbolicName :??USB#VID_05C6&PID_9008#5&385d8a3&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/04/2013,2.1.0.5

Getting device info .. . ...
Serial No.: 0xE41135FC
HW_ID : 0008B0E100720000
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : c924a35f39ce1cdd1b8d5a9f3b8e3c51317930431d7a9dd5a55028965fe65

Firehose Loader [Xiaomi_ufs_firehose_sdm845_ddr.elf]
--------------------------------------------------
Header Type : OLD
TargetMSM :
Tag : _auth
Version : 5
Code_size : 608
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 6000000000010000
Vendor : GENERIC
OEM_ID : 0001
MODEL_ID : 0000
SW_ID : 000000000000000B
APP_ID :
pk_hash : c924a35f39ce1cdd1b8d5a9f3b8e3c51317930431d7a9dd5a55028965fe65
OEM_VERSION : c3-bsp-builder-job004.bj
IMAGE_VARIANT : SDM845LA
QC_VERSION : BOOT.XF.2.0-00353-SDM845LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ....................................b Okb0
Connecting to Firehose...
Ping ..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[Cl0PdpLB68YxZ7gUznMwDhA5yA9]
Signature @256bytes Authentication.... Accepted ........
Identifying Chip.... ....UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Aug 17 2018 - 13:21:01

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 325
Serial Number : 538976288
Firmware Version : 254
Product Name : SDINDDH4-64G 1254
Physical titions : 6
Total Logical Blocks:
Drive [0] 14419968 [55.008 GB]
Drive [1] 2048 [8 MB]
Drive [2] 2048 [8 MB]
Drive [3] 8192 [32 MB]
Drive [4] 1179648 [4.5 GB]
Drive [5] 8192 [32 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.190828.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Miui Ver : V12
Security Patch : 2020-09-01


----------------------------
Flashing Selected titions....
- switch (0)b [dummy.img] b0 Ok
- misc (0)b [misc.img] b0 Ok
- logfs (0)b [logfs_ufs_8mb.bin] b0 Ok
- persist (0)b [persist.img] b0 Ok
- cust (0)b [cust.img] b0 Ok
- recovery (0)b [recovery.img] b0 Ok
- cache (0)b [cache.img] b0 Ok
- userdata (0)b [userdata.img] b0 Ok
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok
- xbl_config_a (1)b [xbl_config.img] b0 Ok
- xbl_a (1)b [xbl.img] b0 Ok
- PrimaryGPT (1)b [gpt_main1.bin] b0 Ok
- xbl_config_b (2)b [xbl_config.img] b0 Ok
- xbl_b (2)b [xbl.img] b0 Ok
- PrimaryGPT (2)b [gpt_main2.bin] b0 Ok
- PrimaryGPT (3)b [gpt_main3.bin] b0 Ok
- limits (4)b [dummy.img] b0 Ok
- qupfw_a (4)b [qupfw.img] b0 Ok
- qupfw_b (4)b [qupfw.img] b0 Ok
- storsec_a (4)b [storsec.img] b0 Ok
- storsec_b (4)b [storsec.img] b0 Ok
- devcfg_a (4)b [devcfg.img] b0 Ok
- devcfg_b (4)b [devcfg.img] b0 Ok
- aop_a (4)b [aop.img] b0 Ok
- aop_b (4)b [aop.img] b0 Ok
- cmnlib_a (4)b [cmnlib.img] b0 Ok
- cmnlib_b (4)b [cmnlib.img] b0 Ok
- cmnlib64_a (4)b [cmnlib64.img] b0 Ok
- cmnlib64_b (4)b [cmnlib64.img] b0 Ok
- keymaster_a (4)b [keymaster.img] b0 Ok
- keymaster_b (4)b [keymaster.img] b0 Ok
- bluetooth (4)b [bluetooth.img] b0 Ok
- hyp_a (4)b [hyp.img] b0 Ok
- hyp_b (4)b [hyp.img] b0 Ok
- abl_a (4)b [abl.img] b0 Ok
- abl_b (4)b [abl.img] b0 Ok
- tz_a (4)b [tz.img] b0 Ok
- tz_b (4)b [tz.img] b0 Ok
- logo (4)b [logo.img] b0 Ok
- dsp (4)b [dsp.img] b0 Ok
- boot (4)b [boot.img] b0 Ok
- modem (4)b [modem.img] b0 Ok
- vendor (4)b [vendor.img] b0 Ok
- system (4)b [system.img] b0 Ok
- PrimaryGPT (4)b [gpt_main4.bin] b0 Ok
- ImageFv (5)b [imagefv.elf] b0 Ok
- PrimaryGPT (5)b [gpt_main5.bin] b0 Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:03:07
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Y12s (2021) Edl Frp Remove done with by Hydra


Brand : VIVO Model : Y12s (2021) Storage : Auto
Loader: c:hydra toolhfirehose000bf0e100000000_60ba997fef6da9f0_4a3715f2_qualcomm_vivo_wut_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM27)
SymbolicName :??USB#VID_05C6&PID_9008#6&1ab5e341&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/31/2015,2.1.2.0

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 158112422
Firmware Version : 9
Product Name : GX6BAB
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Failed to read information from phone.

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Erase Safety Tag
Processing...
- Removing FRP [Erase Safety Tag] Ok Ok

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Oppo A1K (CPH1923) Format Userdata done With by Hdyra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM18)
Device : 6&3a34e632&0&4
SymbolicName :??USB#VID_0E8D&PID_0003#6&3a34e632&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 3B59773B469907C851E84FDE38041606
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100514436334D4203961B6A90A601 - QD63MB

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : PPR1.180610.011
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6762_18540-user 9 PPR1.180610.011 eng.root.20210224.174841 release-keys
Security Patch : 2021-03-05
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Erase Userdata
Processing...
Formatting Userdata...
Action Result : Ok

Elapsed Time : 00:00:06
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Oppo A5s Screen Lock Reset Only 1 Click With data loss by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM17)
Device : 6&df2ee03&0&5
SymbolicName :??USB#VID_0E8D&PID_0003#6&df2ee03&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : EC803817F290CF06ECA43399B7F0C55A
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 90014A68423861503E0366636D38662F - hB8aP>

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Vendor : OPPO
ID : O11019
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6765_18511-user 8.1.0 O11019 1616154336 release-keys
Security Patch : 2021-04-05
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP tition...
Safeformat Universal...
Action Result : Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Vivo Y21 Format Userdata done With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM6)
Device : 6&5d3d2bb&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&5d3d2bb&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 7784C0BF6B85325B3DB590619BAFD82D
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 90014A684339615033018DEA6EB36783 - hC9aP3

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Auto
Processing...
ZeroWipe FRP tition...
Safeformat Universal...
Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Vivo V11 Remove Screen Security With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM11)
Device : 6&2ec0df44&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#6&2ec0df44&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0788 MT6771 [6771]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

E:HydraTool_FullPackage_08-01-2021BackupPreloader_dumpprel.tmp
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0788 MT6771 [6771]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 2075364ECE598C4E15F882C78BB1ACE8
Stage 1.. [Size:229160]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 5AC7E709BCA9EF4541B16F14A889A17C
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100445636444D42025885D66475D7 - DV6DMB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k71v1_64_bsp-user 10 QP1A.190711.020 compiler05271827 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-05-01
Platform : =MTK6771
Fingerprint : vivo/1806/1806:10/QP1A.190711.020/compiler05271827:user/release-keys
StorageType : mtp
Userdata State : Encrypted

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_k71v1_64_bsp.bin
Creating Scatter file... E:HydraTool_FullPackage_08-01-2021BackupAuto0788_vivo_1806_1806_10_QP1A.190711.020_compiler05271827_110321101212MT6771_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05588000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x07688000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x20088000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x20888000] 15.469 MB -> protect2.bin...0 Ok
-persist [0x22000000] 48 MB -> persist.bin...0 Ok
-nvram [0x31500000] 64 MB -> nvram.bin...0 Ok
Done!!!
E:HydraTool_FullPackage_08-01-2021BackupAuto0788_vivo_1806_1806_10_QP1A.190711.020_compiler05271827_110321101212
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 5AC7E709BCA9EF4541B16F14A889A17C
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100445636444D42025885D66475D7 - DV6DMB

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k71v1_64_bsp-user 10 QP1A.190711.020 compiler05271827 release-keys
Display ID : QP1A.190711.020 release-keys
Security Patch : 2021-05-01
Platform : =MTK6771
Fingerprint : vivo/1806/1806:10/QP1A.190711.020/compiler05271827:user/release-keys
StorageType : mtp
Userdata State : Encrypted

-------------------------------------
Operation : Safe Format Method 1
Processing...
Erasing FRP tition...
Safeformat Universal...
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:58
 

sero408

Friend's Martview
Sep 26, 2021
893
93
türkiye
Redmi 4X (santoni) Brick Solution Flash Loaded From Edl With by Hydra

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM51)
SymbolicName :??USB#VID_05C6&PID_9008#5&376aba2d&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 02/05/2018,3.0.0.0

Getting device info .. . ...
Serial No.: 0xEEAF6
HW_ID : 0006B0E100000000
MSM ID : 0x0006B0E1, MSM8940-Qualcomm Snapdragon 435
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Firehose Loader [mi_1_9.mbn
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0006B0E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : modem-ci
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3-00214
--------------------------------------------------

SaharaBoot... Ok
Sending .....................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1139365395
Firmware Version : 165
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0 30777344 [14.676 GB
Drive [1 8192 [4 MB
Drive [2 8192 [4 MB

Protocol : Universal
Running : Ok

Phone Information .....
Brand : Xiaomi
Vendor : Xiaomi
Model : santoni
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : santoni-userdebug 6.0.1 MMB29M FACTORY16 test-keys
Device : santoni
Board : QC_Reference_Phone
Display ID : santoni-userdebug 6.0.1 MMB29M FACTORY16 test-keys
Security Patch : xxxx-xx-xx
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/santoni/santoni:6.0.1/MMB29M/FACTORY16:userdebug/test-keys

Reading GPT[3
Drive [0 52 Items
Drive [1 0 Items
Drive [2 0 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backupsantoni_QC_Reference_Phone_6.0.1_Security_110321112431.sec
Backup Security Success....

----------------------------
Flashing Selected titions....
- modem (0)b [NON-HLOS.bin b0 Ok
- sbl1 (0)b [sbl1.mbn b0 Ok
- sbl1bak (0)b [sbl1.mbn b0 Ok
- rpm (0)b [rpm.mbn b0 Ok
- rpmbak (0)b [rpm.mbn b0 Ok
- tz (0)b [tz.mbn b0 Ok
- tzbak (0)b [tz.mbn b0 Ok
- devcfg (0)b [devcfg.mbn b0 Ok
- devcfgbak (0)b [devcfg.mbn b0 Ok
- dsp (0)b [adspso.bin b0 Ok
- splash (0)b [splash.img b0 Ok
- aboot (0)b [emmc_appsboot.mbn b0 Ok
- abootbak (0)b [emmc_appsboot.mbn b0 Ok
- boot (0)b [boot.img b0 Ok
- recovery (0)b [recovery.img b0 Ok
- system (0)b [system.img b0 Ok
- cache (0)b [cache.img b0 Ok
- persist (0)b [persist.img b0 Ok
- misc (0)b [misc.img b0 Ok
- mdtp (0)b [mdtp.img b0 Ok
- lksecapp (0)b [lksecapp.mbn b0 Ok
- lksecappbak (0)b [lksecapp.mbn b0 Ok
- cmnlib (0)b [cmnlib.mbn b0 Ok
- cmnlibbak (0)b [cmnlib.mbn b0 Ok
- cmnlib64 (0)b [cmnlib64.mbn b0 Ok
- cmnlib64bak (0)b [cmnlib64.mbn b0 Ok
- keymaster (0)b [keymaster.mbn b0 Ok
- keymasterbak (0)b [keymaster.mbn b0 Ok
- cust (0)b [cust.img b0 Ok
- userdata (0)b [userdata.img b0 Ok
- PrimaryGPT (0)b [gpt_main0.bin b0 Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34. OK
0 [NUM_DISK_SECTORS-34. OK
0 [NUM_DISK_SECTORS-34. OK
0 [NUM_DISK_SECTORS-34. OK
0 [NUM_DISK_SECTORS-1. OK
0 [NUM_DISK_SECTORS-1. OK
0 [NUM_DISK_SECTORS-33. OK
0 [CRC32(2,6656) OK
0 [CRC32(NUM_DISK_SECTORS-33.,6656) OK
0 [0 OK
0 [CRC32(1,92) OK
0 [0 OK
0 [CRC32(NUM_DISK_SECTORS-1.,92) OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:05:56
 
Top