★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Redmi Note 8 (ginkgo) Remove Mi Account BL Locked in Sideload mode by Hydra Tool
211100020784_HydraTool.exe__04-17-2023-010355.jpeg

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Tool
Mi Account
Bypass Miaccount
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Xiaomi Sideload - Account removal/Bypass

Adb Handler [Console]
Starting ADB Server....
Searching Device By ADB
Device Found...
Sate : sideload
Product name : ginkgo
Product model : Redmi_Note_8
Product device : ginkgo


Model : ginkgo_global
Android VERSION : 11
OS Version : V12.5.2.0.RCOMIXM
Branch : F
Language :
Region : FR

Processing...

Scanning Patching address...
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]
> Patching address detected [PATCHED]Done!!
Total Items patched : 14
Successfully patched address..
Action Result : Ok

Action Result : Ok

Elapsed Time : 00:00:50
 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Sprint UMX U683CL Remove FRP With by Hydra
200700005070_HydraTool.exe__04-19-2023-145846.jpeg

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Service Tool
Factory Reset Protection
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM2)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&1ed94e55&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/02/2017,2.1.2.7

Getting device info......
Serial No.: 0x19F1F058
HW_ID : 009600E100000000
MSM ID : 0x009600E1, MSM8909-Qualcomm Snapdragon 210/DAADANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 1 Compatible Files..Found match Firehose...

Firehose Loader[009600e10029001b_cc3153a80293939b_bdbfb81f_asus_qualcomm_peek_8909.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8909
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 009600E10029001B
Vendor : ASUS
OEM_ID : 0029
MODEL_ID : 001B
SW_ID : 0000000000000003
APP_ID :
pk_hash : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f
OEM_VERSION : REGURL
IMAGE_VARIANT : DAADANAZA
QC_VERSION : BOOT.BF.3.1.2.C2-00011
--------------------------------------------------

SaharaBoot... Ok
Sending ..............Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8909
Version : 1


Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : Umx
Vendor : Umx
Model : U683CL
Product : U683CL
Manufacturer : Umx
ID : U683CL_01.01.03
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : U683CL_01.01.03.152848
Device : U683CL
Display ID : U683CL_01.01.03.152848
Security Patch : 2019-07-01
Emmc_size : 8GB
Fingerprint : Umx/U683CL/U683CL:8.1.0/U683CL_01.01.03/152848:user/release-keys


Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 1.5 MB = Ok
- modemst2(modemst2.bin), 1.5 MB = Ok
- fsg(fsg.bin), 1.5 MB = Ok
- fsc(fsc.bin), 512 Bytes = Ok
C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\009600E100000000_19F1F058\Security_Backup\041923145845.sec
Backup Security Success....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk

Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:00:11
 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Oppo A37F Read Pattern One Click With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Service Tool
Format/Factory Reset
Read Pattern
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM8)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&df2ee03&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :07/08/2015,2.1.2.0

Getting device info......
Serial No.: 0x26DDE7B0
HW_ID : 007050E100000000
MSM ID : 0x007050E1, MSM8916-Qualcomm Snapdragon 410 /HAAAANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 1 Compatible Files..Found match Firehose...

Firehose Loader[007050e10029001e_cc3153a80293939b_ae162be1_asus_qualcomm_peek_8916.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8916
Tag : _peek
Version : 3
Code_size : 96
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 007050E10029001E
Vendor : ASUS
OEM_ID : 0029
MODEL_ID : 001E
SW_ID : 0000000000000003
APP_ID :
pk_hash : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f
OEM_VERSION :
IMAGE_VARIANT :
QC_VERSION :
--------------------------------------------------

SaharaBoot... Ok
Sending .....Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items


Phone Information.....
Brand : OPPO
Vendor : OPPO
Model : A37f
Product : A37f
Manufacturer : OPPO
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20180817.014458 release-keys
Display ID : A37fEX_11_180817
Security Patch : 2018-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config


Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 1,5 MB = Ok
- modemst2(modemst2.bin), 1,5 MB = Ok
- fsg(fsg.bin), 1,5 MB = Ok
- fsc(fsc.bin), 512 Bytes = Ok
C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\007050E100000000_26DDE7B0\Security_Backup\041923130257.sec
Backup Security Success....
Trying to search : gatekeeper.pattern.key
Trying to search : personalpattern.key
Trying to search : cm_gesture.key
Trying to search : gesture.key FOUND
Gesture Data : 8E9D7E8E6BC4E77529D93115D84F65D6C7008261
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 1258
1 2 3
4 5 6
7 8 9


Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:00:34
 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Redmi Go (tiare) Remove FRP With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Service Tool
Factory Reset Protection
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM20)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&22a11f28&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :05/29/2019,2.1.3.7

Getting device info......
Serial No.: 0x8BB9D97E
HW_ID : 000560E100000000
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425/LAADANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found 42 Compatible Files..Found match Firehose...

Firehose Loader[000560e100000000_57158eaf1814d78f_01740d29_qualcomm_xiaomi_peek_8917.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8917
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000560E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : c3-miui-ota-bd102.bj
IMAGE_VARIANT : LAADANAZA
QC_VERSION : BOOT.BF.3.3-00214
--------------------------------------------------

SaharaBoot... Ok
Sending ...................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3414487664
Firmware Version : 6
Product Name : FE62MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14.561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 48 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi Go
Product : tiare
Manufacturer : Xiaomi
ID : OPM1.171019.026
SDK : 27
Release : 8.1.0
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-IN
Description : tiare-user 8.1.0 OPM1.171019.026 V10.2.14.0.OCLINXM release-keys
Device : tiare
Display ID : OPM1.171019.026.V10.2.14.0.OCLINXM
Security Patch : 2020-03-05
Emmc_size : 16GB
Fingerprint : Xiaomi/tiare_in/tiare:8.1.0/OPM1.171019.026/V10.2.14.0.OCLINXM:user/release-keys


Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 10 MB = Ok
- modemst2(modemst2.bin), 10 MB = Ok
- fsg(fsg.bin), 10 MB = Ok
- fsc(fsc.bin), 512 Bytes = Ok
C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\000560E100000000_8BB9D97E\Security_Backup\043023151631.sec
Backup Security Success....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk

Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:00:25



 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Samsung Galaxy A20 (SM-A205GN) FRP Remove With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Samsung Service Tool
Factory Reset Protection
FRP Offline Method 2
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Scanning Port....

Openning Port [COM9] Ok
Init Samsung Device..... Ok
Reading Device Informations....
Model :
HW Version :
SW Version :
MNC :
MCC :
IMEI :
SN :
Unqiue Code :
Connection :
SWVER : A205GNDXU1ASE3/A205GNOLO1ASE3/A205GNDXU1ASE3/A205GNDXU1ASE3
IMEINUM :
Reactivation Status : On


Adb Handler [Console]
Starting ADB Server....
Searching Device By ADB
Device Found...
Sate : device
Product name : a20xtc
Product model : SM_A205GN
Product device : a20


Adb Handler [Console]
Starting ADB Server....
Searching Device By ADB
Device Found...
Sate : device
Product name : a20xtc
Product model : SM_A205GN
Product device : a20

Read Buildprop....
Brand : samsung
Model : SM-A205GN
ABI : arm64-v8a
Display ID : PPR1.180610.011.A205GNDXU1ASE3
Security Patch : 2019-04-01
Platform : exynos5
FRPPST : /dev/block/persistent
Fingerprint : samsung/a20xtc/a20:9/PPR1.180610.011/A205GNDXU1ASE3:user/release-keys

Action Result : Success!!


Elapsed Time : 00:00:52
 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Samsung Galaxy J7 Prime (G610F) Flashing With by Hydra Tool

=====================================
SAMSUNG FLASHING
=====================================

Scanning Port....

Openning Port [COM8] Ok
-----------------------------------
ODIN PROTOCOL
-----------------------------------
Model : SM-G610F
UN : C0000245B13C424
CAPA : 32
VENDOR : TOSHIBA
FWVER : 32
PRODUCT : 3
SALES : 500073
Device Mode : Download Mode
CPU : EXYNOS
Total Binary Size is 3550.99MB
Initialize Phone : Ok
Partition Information Table(PIT)
- Backup
Backup PIT (COM_TAR2LSI7870) Ok
- Reading.. Ok
- Mapping..Ok
Partition Flashing....
- BOOT(boot.img), 16.293 MB = Ok
- RECOVERY(recovery.img), 17.754 MB = Ok
- SYSTEM(system.img), 2.523 GB = Ok
- USERDATA(userdata.img), 690.794 MB = Ok
- BOOTLOADER(sboot.bin), 1.649 MB = Ok
- PARAM(param.bin), 1.338 MB = Ok
- CM(cm.bin), 2.145 MB = Ok
- RADIO(modem.bin), 32.826 MB = Ok
- CP_DEBUG(modem_debug.bin), 5 MB = Ok
- CACHE(cache.img), 83.594 MB = Ok
- HIDDEN(hidden.img), 16.035 MB = Ok
- CACHE(cache.img), 83.594 MB = Ok
- HIDDEN(hidden.img), 16.035 MB = Ok
Flashing Done

Rebooting Device...Done!!!


Elapsed Time : 00:02:17
 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Redmi 4X (santoni) FRP Remove with by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Service Tool
Factory Reset Protection
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : XIAOMI Model : Redmi 4X (Santoni) Storage : Auto
Loader: 0006B0E100000000_57158eaf1814d78f_dde34a47_QUALCOMM_XIAOMI_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM7)
SymbolicName :\\?\usb#vid_05c6&pid_9008#5&115a75a8&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :12/17/2018,2.1.3.5

Getting device info......
Serial No.: 0x2ED8D2CE
HW_ID : 0006B0E100000000
MSM ID : 0x0006B0E1, MSM8940-Qualcomm Snapdragon 435/FAADANAZA
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Firehose Loader[0006B0E100000000_57158eaf1814d78f_dde34a47_QUALCOMM_XIAOMI_peek_8937.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0006B0E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : modem-ci
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3-00214
--------------------------------------------------

SaharaBoot... Ok
Sending .....................Ok
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 484036861
Firmware Version : 13
Product Name : QE13MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 30535680[14,561 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Brand : Xiaomi
Vendor : Xiaomi
Model : Redmi 4X
Product : santoni
Manufacturer : Xiaomi
ID : N2G47H
SDK : 25
Release : 7.1.2
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : santoni-user 7.1.2 N2G47H V11.0.2.0.NAMMIXM release-keys
Miui Ver : V11
Device : santoni
Display ID : N2G47H
Security Patch : 2018-10-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : Xiaomi/santoni/santoni:7.1.2/N2G47H/V11.0.2.0.NAMMIXM:user/release-keys


Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 1,5 MB = Ok
- modemst2(modemst2.bin), 1,5 MB = Ok
- fsg(fsg.bin), 1,5 MB = Ok
- fsc(fsc.bin), 512 Bytes = Ok
C:\Hydra Tool\Backup\QUALBackup\QUALCOMM\0006B0E100000000_2ED8D2CE\Security_Backup\050123140746.sec
Backup Security Success....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk

Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:00:06
 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Realme 8 (RMX3085) İmei repair with by Hydra Tool

-------------------------------------------------------
To Enable BROM Mode :
Method 1 - Bootkey (Vol + - Power) or any combination
Method 2 - Enable Preloader to brom(crashing Method)
Method 3 - Test Point Data0 + ground
To Enable Preloader Mode :
Method 1 - Just Insert cable
-------------------------------------------------------

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port (COM10)
Device : /5&325c9816&0&5
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&325c9816&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2
Service : wdm_usb

Openning Port [COM10] Ok
Handshaking...Ok
HwCode : 0813 {MT6785}
Hwver : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : 555748F0FB8AA01466F9226B73F0E1BD
SOC_ID : F194607CAFAAA0709B274630555D4D186E861027831126B4F8913D552BB2D87B

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200BC4
Starting to dump...
Prel Size : 0x0005B600
Successfully dump preloader.. [C:\Hydra Tool\Boot\PreloaderDump\preloader_k85v1_64.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Patching da2 ... Ok
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : brom
DRAM config needed for : 4839485131364145434D4D4441520000
Sending auto preloader from dump... [preloader_k85v1_64.bin]
Sending emi data.. [DRAM setup passed.]
Sending emi data succeeded.
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000080000-512 KB
IRAM Size : 0x0000000180000000-6 GB
UFS MID : 0x48
UFS FWVer : 0xA107
UFS Blocksize : 0x0000000000001000-4 KB
UFS LU0 Size : 0x0000000000400000-4 MB
UFS LU1 Size : 0x0000000000400000-4 MB
UFS LU2 Size : 0x0000001DCB000000-119.172 GB
UFS ID : H
UFS CID : 4839485131364145434D4D444152000000000000
HW-CODE : 0x813
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Upload data was accepted. Jumping to stage 2...
DA Extensions successfully added
Reading Partition Table ..
Partition Count : 52
--------------- Reading build.prop content ---------------
Unable to read system info..
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 8683***********
IMEI2 : 8683***********
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_k85v1_64.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0813_555748F0FB8AA01466F9226B73F0E1BD\Auto\050323143106\6785_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 8 MB = Ok
- persist(persist.bin), 50.367 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- oppo_custom(oppo_custom.bin), 1024 KB = Ok
- opporeserve1(opporeserve1.bin), 8 MB = Ok
- opporeserve2(opporeserve2.bin), 64 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
Backup Done!!!

Elapsed Time : 00:00:59
 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Samsung Galaxy A50 (A505G) Firmware Flashed With by Hydra Tool

=====================================
SAMSUNG FLASHING
=====================================

Scanning Port....

Openning Port [COM53] Ok
-----------------------------------
ODIN PROTOCOL
-----------------------------------
Model : SM-A505G
UN : CE11193BBD330C0C3F7E
CAPA : 128
VENDOR : SAMSUNG
FWVER : 128
PRODUCT : 0002
SALES : KLUDG4U1EA-B0C1
VER : PASS
Device Mode : Download Mode
CPU : EXYNOS
Total Binary Size is 6653.02MB
Initialize Phone : Ok
Partition Information Table(PIT)
- Backup
Backup PIT (COM_TAR2LSI9820) Ok
- Reading.. Ok
- Mapping..Ok
Partition Flashing....
- BOOT(boot.img.lz4), 15.788 MB = Ok
- RECOVERY(recovery.img.lz4), 27.384 MB = Ok
- DTB(dt.img.lz4), 78.415 KB = Ok
- DTBO(dtbo.img.lz4), 177.092 KB = Ok
- SYSTEM(system.img.lz4), 3.021 GB = Ok
- VENDOR(vendor.img.lz4), 320.652 MB = Ok
- USERDATA(userdata.img.lz4), 731.742 MB = Ok
- VBMETA(vbmeta.img.lz4), 3.328 KB = Ok
- BOOTLOADER(sboot.bin.lz4), 1.33 MB = Ok
- PARAM(param.bin.lz4), 717 Bytes = Ok
- UP_PARAM(up_param.bin.lz4), 1.599 MB = Ok
- CM(cm.bin.lz4), 319.444 KB = Ok
- KEYSTORAGE(keystorage.bin.lz4), 4.409 KB = Ok
- UH(uh.bin.lz4), 89.424 KB = Ok
- VBMETA(vbmeta.img.lz4), 3.328 KB = Ok
- RADIO(modem.bin.lz4), 22.36 MB = Ok
- CP_DEBUG(modem_debug.bin.lz4), 3.095 MB = Ok
- CACHE(cache.img.lz4), 1.593 KB = Ok
- OMR(omr.img.lz4), 1.217 KB = Ok
- PRODUCT(product.img.lz4), 207.291 MB = Ok
Flashing Done

Rebooting Device...Done!!!


Elapsed Time : 00:05:52
 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Redmi Note 8 Pro (begonia) FRP Removed With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode Preloader
FriendlyName : MediaTek PreLoader USB VCOM (Android) (COM122)
Device : /5&521a615&0&4
SymbolicName : \\?\usb#vid_0e8d&pid_2000#5&521a615&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM122] Ok
Handshaking...Ok
HwCode : 0725 {MT6779}
Hwver : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : Preloader
HW Subcode : 8A00
HW Subcode : CA01
SW Ver : 0000
ME_ID : 20B9B15FE104659CBFEC35F75ED80F83


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Preloader To Brom Function.....
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Method 1 Exploit Executed..... [Failed]
- Method 2 Exploit Executed..... [Failed]
- Method 3 Exploit Executed..... [Failed]

Preloader still in preloader mode...
Connection : Preloader

Preparing Download Agent..[MTK_AllInOne_DA_5.2152.bin]
Uploading Stage 1....
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok 0xC0
Successfully received DA sync
ONNECTION_AGENT : preloader
DRAM config needed for : 31323847422D5546532D4D5420202020
Uploading stage 2...
Upload data was accepted. Jumping to stage 2...
Successfully uploaded stage 2
ERAM Size : 0x0000000000080000-512 KB
IRAM Size : 0x0000000180000000-6 GB
UFS MID : 0x31
UFS FWVer : 0x9QSM
UFS Blocksize : 0x0000000000001000-4 KB
UFS LU0 Size : 0x0000000000400000-4 MB
UFS LU1 Size : 0x0000000000400000-4 MB
UFS LU2 Size : 0x0000001DCA800000-119,164 GB
UFS ID : 8
UFS CID : 31323847422D5546532D4D542020202000000000
HW-CODE : 0x725
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA01
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Reading Partition Table ..
Partition Count : 46
--------------- Reading build.prop content ---------------
Product : BV9900E_EEA
ID : QP1A.190711.020
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k79v1_64-user 10 QP1A.190711.020 mp1V9433 release-keys
Display ID : BV9900E_EEA_S900AA_V1.0_20211206V06
Security Patch : 2021-11-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 3535***********
IMEI2 : 3535***********
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_k79v1_64.bin]
*Creating Scatter file... C:\Hydra Tool\Backup\MTKBKUP\0725_20B9B15FE104659CBFEC35F75ED80F83\Auto\050423121911\6779_Android_scatter.txt
- pgpt(pgpt.bin), 32 KB = Ok
- nvram(nvram.bin), 64 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 8 MB = Ok
- persist(persist.bin), 48 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- sec1(sec1.bin), 2 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:31
 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Oppo A71 (CPH1717) Format Factory Reset With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Format/Factory Reset/ScreenLock
Erase Userdata
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1633 (COM45)
Device : /6&16afa01a&0&3
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&16afa01a&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM45] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000038000-224 KB
IRAM Size : 0x0000000080000000-2 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000000400000-4 MB
EMMC USER Size : 0x00000003AB400000-14,676 GB
EMMC CID : 90014A484147346132A50E82DCB774E9 - HAG4a2
HW-CODE : 0x6750
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCB00
SW-VERSION : 0x1
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : full-speed
Reconnecting to preloader...
Connected to preloader
Partition Count : 39
--------------- Reading build.prop content ---------------
Brand : OPPO
Vendor : OPPO
Model : CPH1717
Product : oppo6750_17351
Manufacturer : OPPO
ID : N4F26M
SDK : 25
Release : 7.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_oppo6750_17351-user 7.1.1 N4F26M 1593605483 release-keys
Device : CPH1717
Display ID : CPH1717EX_11_A.28_200701
Security Patch : 2019-10-05
Platform : mt6750
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : FFFFFFFFFFFFFFF
IMEI2 : FFFFFFFFFFFFFFF
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Reconnecting to preloader...
Connected to preloader
------------------------------
Factory Reset Flash Mode..
------------------------------
Operation : Uni_FMFRP_Erase

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00.00.14
 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Vivo Y21 FRP Remove With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Factory Reset Protection[FRP]
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM22)
Device : /5&2631d8fe&0&10
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&2631d8fe&0&10#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM22] Ok
Handshaking...Ok
HwCode : 6580 {MT6580}
Hwver : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM
HW Subcode : 8A00
HW Subcode : CA00
SW Ver : 0000
ME_ID : F692726F01F293D7E4D6E5AA3ACDA02E

Exploiting Device...
Successfully Exploited..
Handshaking...Ok
Dumping Preloader from Bootrom..
Seeking preloader address..Found @ 0x00200B40
Starting to dump...
Prel Size : 0x0001F2F0
Successfully dump preloader.. [E:\FLASHER\HYDRA TOOL\Hydra Tool\Boot\PreloaderDump\preloader_bbk6580_weg_l.bin]
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
Connection : BROM
Uploading legacy da...
DA :MTK_AllInOne_DA_5.2152.bin
Legacy DA2 Patched..
Legacy DA2 CMD F0 is patched.
Successfully uploaded stage 1, jumping ..
Executing JUMP_DA Address @ 0x00200000
Jumping to 0x00200000 Ok
Got loader sync !
Reading Nand Info..
Reading EMMC Info
EMMC_INFO : 0x00000000
Uploading Stage 2
DRAM config needed for : 460001154D3231330991064299B2CB56
Reading dram nand info ...
Sending dram info ...
RAM-Length: BC000000
5A
Successfully upload stage 2

Flash and ram info.....
m_int_sram_ret : 0x00000000
m_ext_ram_ret : 0x00000000
m_ext_ram_type : 0x02
m_ext_ram_chip_select : 0x00
m_int_sram_ret : 0x00000000
m_ext_ram_size : 0x0000000040000000-1024 MB
Randomid : 0x6D67C6FCDE9B4E65984C9A5D50DC3AFF
m_emmc_ret : 0x00000000
m_emmc_boot1_size : 0x0000000000400000-4 MB
m_emmc_boot2_size : 0x0000000000400000-4 MB
m_emmc_rpmb_size : 0x0000000000400000-4 MB
m_emmc_gp_size[0] : 0x0000000000000000-0 Bytes
m_emmc_gp_size[1] : 0x0000000000000000-0 Bytes
m_emmc_gp_size[2] : 0x0000000000000000-0 Bytes
m_emmc_gp_size[3] : 0x0000000000000000-0 Bytes
m_emmc_ua_size : 0x00000003A3E00000-14.561 GB
CID : 460001154D3231330991064299B2CB56

Checking Connection Speed..
Configuration HighSpeed Switch : True
Full Speed Detected..
Switching To High Speed...
Connected to preloader...
Reconnecting to preloader...
Reading Partition Table ..
Partition Count : 26

Reading System Info
Brand : vivo
Vendor : vivo
Model : vivo Y21
Product : bbk6580_weg_l
Manufacturer : vivo
ID : LMY47I
SDK : 22
Release : 5.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Description : full_bbk6580_weg_l-user 5.1 LMY47I 1553784197 release-keys
Device : Y21
Display ID : LMY47I release-keys
Security Patch : 2018-04-05
Platform : mt6580
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
Fingerprint : vivo/Y21/Y21:5.1/LMY47I/1553784197:user/release-keys
StorageType : mtp,mass_storage

Reading IMEI........

IMEI Info....
IMEI1 : 869***********
IMEI2 : 869***********
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------
Backing up Security..
- preloader(preloader.bin), 512 KB = Ok [preloader_bbk6580_weg_l.bin]
*Creating Scatter file... E:\FLASHER\HYDRA TOOL\Hydra Tool\Backup\MTKBKUP\6580_F692726F01F293D7E4D6E5AA3ACDA02E\Auto\050523092232\6580_Android_scatter.txt
- pgpt(pgpt.bin), 512 KB = Ok
- nvram(nvram.bin), 5 MB = Ok
- nvdata(nvdata.bin), 32 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- protect1(protect1.bin), 10 MB = Ok
- protect2(protect2.bin), 10 MB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- seccfg(seccfg.bin), 256 KB = Ok
Backup Done!!!

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!

Action Result : Ok

Elapsed Time : 00:00:51
 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Redmi Note 8 (ginkgo) İmei Repair With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
IMEIRepair Function......
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Searching Diag Port....
Reading Phone info - Diag Mode

Openning Port [COM3] Ok
Firmware ID : MPSS.AT.4.3.1-00270-NICOBAR_GEN_PACK-1.433714.1.435199.1
Build Date : eb 16 202221:09:38Sep 13 202116:00:00nicobar.
IMEI1 :
IMEI2 : 357***********
Converting QCN to ENG QCN, Please Wait....
Anlyzze the QCN, Please Wait....
C:\Users\serif\OneDrive\Masaüstü\54564_357***********_patched.qcn
Found IMEI TWO :357***********


Generationg patch imei...
Writting QCN, Please Wait....
Diag Port Found ON : COM3
Writting File, Please Wait....
Sending SPC to Device....
SPC Send Success
Restoring File....
Restore File Success
Repair IMEI Success, Rebooting Device...

Adb Handler [Console]
Starting ADB Server....
Searching Device By ADB [device]
Device Found...
Sate : device
Product name : ginkgo
Product model : Redmi_Note_8
Product device : ginkgo


Elapsed Time : 00:00:50

 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Samsung Galaxy A22 (SM-A226B) Bootloop Fix With Flashing & by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
MTK Partition Manager Function...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM14)
Device : /5&2c60a704&0&5
SymbolicName : \\?\usb#vid_0e8d&pid_0003#5&2c60a704&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM14] Ok
Reading Partition Table ..
ERAM Size : 0x0000000000070000-448 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000001D1F000000-116,484 GB
EMMC CID : 150100335636434D42005D866A11B841 - 3V6CMB
HW-CODE : 0x989
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x1
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 56
--------------- Reading build.prop content ---------------
Product : a22x
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : a22xnsxx-user 11 RP1A.200720.012 A226BXXU3AUL1 release-keys
Display ID : RP1A.200720.012.A226BXXU3AUL1
Security Patch : 2021-12-01
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : *******************
IMEI2 : *******************
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------

Reading Selected Partitions..
- preloader(preloader.bin), 512 KB = Ok [preloader_s96801aa1.bin]
*Creating Scatter file... D:\HYDRA\Hydra Tool\Backup\MTKBKUP\0989_0FA98E4E8CDDECE31B305B6A4ED61A11\Selected\051323070434\6833_Android_scatter.txt
- pgpt(pgpt.bin), 40 KB = Ok
- md5hdr(md5hdr.bin), 3,961 MB = Ok
- efs(efs.bin), 8 MB = Ok
- sec_efs(sec_efs.bin), 8 MB = Ok
- steady(steady.bin), 4 MB = Ok
- nvdata(nvdata.bin), 64 MB = Ok
- protect1(protect1.bin), 8 MB = Ok
- protect2(protect2.bin), 8 MB = Ok
- seccfg(seccfg.bin), 8 MB = Ok
- nvram(nvram.bin), 64 MB = Ok
- spmfw(spmfw.bin), 1024 KB = Ok
- scp1(scp1.bin), 1024 KB = Ok
- sspm_1(sspm_1.bin), 1024 KB = Ok
- uh(uh.bin), 2 MB = Ok
- tee1(tee1.bin), 2 MB = Ok
- tzar(tzar.bin), 4 MB = Ok
- gz1(gz1.bin), 16 MB = Ok
- lk(lk.bin), 2 MB = Ok
- dpm_1(dpm_1.bin), 1024 KB = Ok
- mcupm_1(mcupm_1.bin), 1024 KB = Ok
- dtbo(dtbo.bin), 8 MB = Ok
- vbmeta(vbmeta.bin), 64 KB = Ok
- btd(btd.bin), 960 KB = Ok
- nvcfg(nvcfg.bin), 32 MB = Ok
- persist(persist.bin), 48 MB = Ok
- bota(bota.bin), 52 MB = Ok
- boot_para(boot_para.bin), 26 MB = Ok
- para(para.bin), 512 KB = Ok
- misc(misc.bin), 512 KB = Ok
- expdb(expdb.bin), 40 MB = Ok
- frp(frp.bin), 1024 KB = Ok
- metadata(metadata.bin), 32 MB = Ok
- keyrefuge(keyrefuge.bin), 16 MB = Ok
- keydata(keydata.bin), 16 MB = Ok
- persistent(persistent.bin), 512 KB = Ok
- proinfo(proinfo.bin), 3 MB = Ok
- md1img(md1img.bin), 200 MB = Ok
- pi_img(pi_img.bin), 1024 KB = Ok
- logo(logo.bin), 8 MB = Ok
- param(param.bin), 4 MB = Ok
- up_param(up_param.bin), 4 MB = Ok
- boot(boot.bin), 32 MB = Ok
- recovery(recovery.bin), 40 MB = Ok
- vbmeta_system(vbmeta_system.bin), 64 KB = Ok
- vbmeta_vendor(vbmeta_vendor.bin), 64 KB = Ok
- efuse(efuse.bin), 512 KB = Ok
- rsv1(rsv1.bin), 2,875 MB = Ok
- sec1(sec1.bin), 8 MB = Ok
- super(super.bin), 6,742 GB = Ok
- prism(prism.bin), 704 MB = Ok
- optics(optics.bin), 24 MB = Ok
- cache(cache.bin), 200 MB = Ok
- omr(omr.bin), 50 MB = Ok
- spu(spu.bin), 50 MB = Ok
Done Reading...

Elapsed Time : 00:15:40
 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Oppo Reno 5 Lite (CPH2205) Fix Dm-Verity With by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Function
Bootloader
Fix DM Verity
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Searching for MTK Device...Found
MTK Port Type : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM7)
Device : /6&12e3c9ed&0&1
SymbolicName : \\?\usb#vid_0e8d&pid_0003#6&12e3c9ed&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0
Service : wdm_usb

Openning Port [COM7] Ok
Reading Partition Table ..
ERAM Size : 0x000000000003A000-232 KB
IRAM Size : 0x0000000100000000-4 GB
EMMC Boot1 Size : 0x0000000000400000-4 MB
EMMC Boot2 Size : 0x0000000000400000-4 MB
EMMC RPMB Size : 0x0000000001000000-16 MB
EMMC USER Size : 0x0000000E8F800000-58.242 GB
EMMC CID : 90014A68433861503E010A3548162661 - hC8aP>
HW-CODE : 0x766
HWSUB-CODE : 0x8A00
HW-VERSION : 0xCA00
SW-VERSION : 0x0
CHIP-EVOLUTION : 0x0
DA-VERSION : 1.0
Speed : high-speed
Partition Count : 50
--------------- Reading build.prop content ---------------
Product : oplus_mssi_64_cn
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : sys_oplus_mssi_64_cn-user 11 RP1A.200720.011 1632763765238 release-keys
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-10-05
StorageType : mtp
--------------- end of build.prop content ---------------

Reading IMEI........
IMEI1 : 8632***********
IMEI2 : 8632***********
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
------------------------------
Bootloader Operation..
------------------------------
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Fix DM Verity..
Status: Ok

Rebooting Device...
Reboot Option : RebootToNormal
Rebooting Operation Done!!!!


Action Result : Ok

Elapsed Time : 00:00:10
 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Samsung Galaxy A04s (SM-A047F) FRP Remove with by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Samsung Service Tool
Factory Reset Protection
FRP Remove Method 1
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Adb Handler [Console]
Starting ADB Server....
Searching Device By ADB [device]
Device Found...
Sate : device
Product name : a04snnxx
Product model : SM_A047F
Product device : a04s

Read Buildprop....
Brand : samsung
Model : SM-A047F
ABI : arm64-v8a
Display ID : SP1A.210812.016.A047FXXU1AVH4
Security Patch : 2022-08-01
Platform : universal3830
FRPPST : /dev/block/persistent
Fingerprint : samsung/a04snnxx/a04s:12/SP1A.210812.016/A047FXXU1AVH4:user/release-keys

Action Result : Success!!


Elapsed Time : 00:00:12
 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
Huawei Y7 2019 (DUB-LX1) Removed FRP in EDL Mode by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Qualcomm Service Tool
Factory Reset Protection
Auto
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

PreOperation Configuration
Brand : HUAWEI Model : DUB-LX1 (Y7 2019) Storage : Auto
Loader: 0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_QUALCOMM_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device...Found
FriendlyName :Qualcomm HS-USB QDLoader 9008 (COM174)
SymbolicName :\\?\usb#vid_05c6&pid_9008#6&31274058&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :08/31/2015,2.1.2.0

Getting device info. [Connected].....
Serial No.: 0xA20C96F3
HW_ID : 0009A0E100150065
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450/JAADANAZA
MODEL_ID : 0x0065
OEM_ID : 0x0015 - HUAWEI
PBL Ver : 00000000
PK HASH : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119

Firehose Loader[0009A0E100150065_6bc369511da9cadb_1a1074cf_HUAWEI_QUALCOMM_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : QUALCOMM
HW_ID : 0009A0E100150065
Vendor : HUAWEI
OEM_ID : 0015
MODEL_ID : 0065
SW_ID : 0000000000000003
APP_ID :
pk_hash : 6bc369511da9cadb3a7af61574f89db385003d6241bdd1ff573dba61bf6ae119
OEM_VERSION : SIA1000073848
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00019
--------------------------------------------------

SaharaBoot... Ok
Sending .............Ok
Connecting to Firehose...
Ping... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2702743483
Firmware Version : 0
Product Name : GP6BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]

Protocol : Universal
Running : Ok

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items


Phone Information.....
Vendor : unknown
Manufacturer : unknown
ID : OPM1.171019.011
SDK : 27
Release : 8.1.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.1.0 OPM1.171019.011 eng.root.20210208.182738 test-keys
Display ID : System 8.2.0.036(1UWB)
Security Patch : 2020-09-01


Backup Security partitions...
Reading Security Items....
- modemst1(modemst1.bin), 4 MB = Ok
- modemst2(modemst2.bin), 4 MB = Ok
- fsg(fsg.bin), 4 MB = Ok
- fsc(fsc.bin), 512 Bytes = Ok
C:\Hydra Tool\Backup\QUALBackup\HUAWEI\0009A0E100150065_A20C96F3\Security_Backup\051723110721.sec
Backup Security Success....
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk

Rebooting Phone.... Ok

Action Result : Ok

Elapsed Time : 00:00:37
 

sero408

Friend's Martview
Sep 26, 2021
893
92
türkiye
İtel A23 Pro (L5006C) Remove FRP in Flash Mode by Hydra Tool

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Service Tool Function..
Factory Reset Protection
Factory Reset
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

****************** PRESS BOOT KEY ******************
VOL + OR VOL - , OR Combination Vol - +
Feature Phone : Call Button
Please hold boot key until second boot..
*******************************************
Scanning Port....

Openning Port [COM34] Ok
Identifying... [SPRD3]
Sending Config Ok Ok
Spreadtrum Boot Block version 1.1
Sending To phone....
Phone is Secured and need Authentication....
Sending Challenge Key To Server....
Please wait....
Token Received.......
Writing to phone...
Token verified successfully... Ok
Successfully booted..Ready to go...

Reading System Info.
Reading IMEI...
BSL_REP_OPERATION_FAILED
BSL_REP_OPERATION_FAILED.
IMEI 1 : 3592***********
IMEI 2 : 8674***********
IMEI 3 : 8674***********
IMEI 4 : 35927***********
BSL_WRITE_ERROR
BSL_WRITE_ERROR
Rebooting Phone..Ok

Action Result : Ok

Elapsed Time : 00:00:14
 
Top