★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

Franky38

Product Supporter
Jul 28, 2018
1,862
2,181
PayPal:

Donate money to this user
Xiaomi MI 8 SE Flashing Success by Hydra Tool
Device need bootloader unlocked and Fastboot status



Code:
Searching Device By Fastboot
Device Found...

Reading Information...
Product : product: sirius
Serial No. : serialno: d4166a99
version : getvar:version FAILED (remote: GetVar Variable Not found)
Secure : secure: yes
Device Info:
Verity mode: true
Device unlocked: true
Device critical unlocked: true
Charger screen enabled: true
--------------------------
Fastboot Flashing...
-switch(dummy.img) Ok
-vbmeta(vbmeta.img) Ok
-qupfw(qupv3fw.elf) Ok
-xbl_config(xbl_config.elf) Ok
-storsec(storsec.mbn) Ok
-storsecbak(storsec.mbn) Ok
-aop(aop.mbn) Ok
-hyp(hyp.mbn) Ok
-hypbak(hyp.mbn) Ok
-cmnlib(cmnlib.mbn) Ok
-cmnlibbak(cmnlib.mbn) Ok
-cmnlib64(cmnlib64.mbn) Ok
-cmnlib64bak(cmnlib64.mbn) Ok
-keymaster(keymaster64.mbn) Ok
-keymasterbak(keymaster64.mbn) Ok
-bluetooth(BTFM.bin) Ok
-devcfg(devcfg.mbn) Ok
-devcfgbak(devcfg.mbn) Ok
-abl(abl.elf) Ok
-ablbak(abl.elf) Ok
-misc(dummy.img) Ok
-dtbo(dtbo.img) Ok
-xbl(xbl.elf) Ok
-xblbak(xbl.elf) Ok
-tz(tz.mbn) Ok
-tzbak(tz.mbn) Ok
-dsp(dspso.bin) Ok
-logo(logo.img) Ok
-persist(persist.img) Skipped
-boot(boot.img) Ok
-recovery(recovery.img) Ok
-modem(NON-HLOS.bin) Ok
-cache(cache.img) Ok
-cust(cust.img) Ok
-system(system.img) Ok
-vendor(vendor.img) Ok
-userdata(userdata.img) Ok
All Done
--------------------------

Elapsed Time : 00:03:11
 

Franky38

Product Supporter
Jul 28, 2018
1,862
2,181
PayPal:

Donate money to this user
Vivo Y30 FRP Reset done
Vivo Y30 remove google account by 1 click

run mtk module
select brand and model
tick factory reset protection frp and click execute



Code:
Sending Loader [1] Accepted
PROTOCOL[NEW] - eMMC
PHONE SYNC[Accepted]
DA Mode : preloader
Initializing Loader [2]
Sending Loader [2] Accepted
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E53304A394B391018B6C1872743 - S0J9K9
UNICAL RID : A2E8674A314CAC2F53E1C53CD9F57532
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!

Reading System Info

Autobackup Partitions
preloader[0x00000000-0x00080000]512 KB ->preloader.bin... Done
-> Renaming Preloader.... preloader_k65v1_64_bsp.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0766--()_300520164807\MT6765_Android_scatter.txt
pgpt[0x00000000-0x00008000]32 KB ->pgpt.bin... Done
frp[0x08588000-0x08688000]1024 KB ->frp.bin... Done
nvdata[0x0A688000-0x0E688000]64 MB ->nvdata.bin... Done
nvram[0x3DE80000-0x41E80000]64 MB ->nvram.bin... Done
Done!!!
C:\Hydra Tool\\Backup\Auto\__0766--()_300520164807
MTK Phone Loader is NOW RUNNING.
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000030000000 -768 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116,484 GB
eMMC CID : 13014E53304A394B391018B6C1872743 - S0J9K9
UNICAL RID : A2E8674A314CAC2F53E1C53CD9F57532
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info

-------------------------------------
Operation : Auto
Processing... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:25
 

Franky38

Product Supporter
Jul 28, 2018
1,862
2,181
PayPal:

Donate money to this user
OPPO A71 CPH1801 Passcode Reset by Hydra

OPPO A71 2018 CPH1801 Format and Reset Pattern by hydra dongle

  1. Run Qualcomm module
  2. Select Brand and Model, from special tab tick oppo
  3. Select OPPO A71 Erase Userdata option, put your device EDL mode and click execute

 

Franky38

Product Supporter
Jul 28, 2018
1,862
2,181
PayPal:

Donate money to this user
Vsmart Bee FRP Reset Success by Hydra Tool

Vsmart Bee Android 8.1.0 Remove Google Account by Hydra Donge

  1. Run MTK Module, Select Brand and Model
  2. Tick Factory Reset protection (frp) and click execute
  3. Connect USB cable and wait for operation complete.

 

YuSuF02

Active Member
May 20, 2020
35
7
İstanbul
Run MTK Module
Clickk - Factory Reset Protection (FRP)
Cabl Meta Mode
Click Execute

Code:
Hydra MediaTeK Tool  Ver 1.0.1 Build 76
Windows 8.1 (Version 6.3, Build 9600, 32-bit Edition)
Intel(R) Pentium(R) CPU G3450 @ 3.40GHz
Intel(R) HD Graphics
Ram Installed : 3 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial     : XXXXXXXXXXXXXX
Initialize : OKAY
Status     : Activated
Life       : 0-[0-0-0-0-0]


Brand : AUTO Model : AUTO Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL +
 * Preloader Mode : Just Insert cable

Connection[WAITING]Found[COM38] Status[Opened]
Identifying Hardware ID
BROM CPUID     : 0699 (0000)MT6739[6739]
BROM HW_SW_VER : 8A00 CB00 0002 0000
FUSEID : 00000000
SECURE VERSION : 05
BL VERSION : FE
BR Secured : 00
NORMAL BOOT
Preparing Download Agent..
Download Agent : 6739.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[NEW] - eMMC
PHONE SYNC[Accepted]
DA Mode : brom
Preloader Initialization....
Parsing preloader_lava6739_32_op63.bin
Sending FlashInit Accepted
Initializing Loader [2]
Sending Loader [2]
16
434E5953Accepted
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000003A3E00000 -14,561 GB
eMMC CID   : 150100464536324D4203CBFC978766D9 - FE62MB
UNICAL RID : AB0DC0735CD916783D6E59EC22E6B824
DA Speed : high-speed
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!

Reading System Info
Model           :    Bee
Brand           :    vsmart
Android Ver     :    8.1.0
Manufacturer    :    vsmart
Device          :    V220A
Display ID      :    V220A_OPEN_U_M5_20200206
Security Patch      :    2020-02-01
Kernel ID        :    2020-02-01
FingerPrint       :    vsmart/V220A_open/V220A:8.1.0/O11019/V220A_OPEN_U_M5_20200206:user/release-keys

Autobackup Partitions
 preloader[0x00000000-0x00080000]512 KB  Done
 -> Renaming Preloader....  preloader_k39tv1_bsp_1g.bin
 Creating Scatter file... C:\Hydra Tool\\Backup\Auto\vsmart_Bee_0699--8.1.0(V220A_OPEN_U_M5_20200206)_170520120240\MT6739_Android_scatter.txt
 nvdata[0x03688000-0x05688000]32 MB  Done
 nvram[0x10700000-0x10C00000]5 MB  Done
Done!!!
C:\Hydra Tool\\Backup\Auto\vsmart_Bee_0699--8.1.0(V220A_OPEN_U_M5_20200206)_170520120240
MTK Phone Loader is NOW RUNNING.
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000400000 -4 MB
eMMC USER  : 0x00000003A3E00000 -14,561 GB
eMMC CID   : 150100464536324D4203CBFC978766D9 - FE62MB
UNICAL RID : AB0DC0735CD916783D6E59EC22E6B824
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
Model           :    Bee
Brand           :    vsmart
Android Ver     :    8.1.0
Manufacturer    :    vsmart
Device          :    V220A
Display ID      :    V220A_OPEN_U_M5_20200206
Security Patch      :    2020-02-01
Kernel ID        :    2020-02-01
FingerPrint       :    vsmart/V220A_open/V220A:8.1.0/O11019/V220A_OPEN_U_M5_20200206:user/release-keys

-------------------------------------
Operation : Auto
Processing... Ok

Elapsed Time : 00:00:23
 

YuSuF02

Active Member
May 20, 2020
35
7
İstanbul
Run MTK Module
Clickk - Factory Reset Protection (FRP)
Cabl Meta Mode
Click Execute


Code:
Hydra MediaTeK Tool  Ver 1.0.1 Build 74
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 64-bit Edition)
Intel(R) Pentium(R) CPU G2030 @ 3.00GHz
Intel(R) HD Graphics
Ram Installed : 4 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version    : Hydra Tool v 1.1
Serial     : XXXXXXXXXXXXXXXX
Initialize : OKAY
Status     : Activated
Life       : 0-[4-0-0-0-1]


Brand : SPICE Model : F302 Connection : Flash Mode

=====================================
How To Boot : Power off phone
 * BROM Mode : Press VOL +
 * Preloader Mode : Just Insert cable

Connection[WAITING]Found[PreLoader][COM9] Status[Opened]
Identifying Hardware ID
BROM CPUID     : 0335 (0000)MT6737[6735]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 94010000
SECURE VERSION : FF
BL VERSION : 01
BR Secured : 00
Preparing Download Agent..
Download Agent : [Not Exist]
Trying Default 6735.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2018-09-18.13:22_452898
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[OLD] - eMMC
PRMMCCID   : 460001154D32584ECF3801428132C9C4
Running DA 4.2 on BBID : 0x9B
Init Configuration Ok
Initializing Loader [2]
Sending Loader [2] Accepted
Reading Flashchip data....
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB  : 0x0000000000080000 -512 KB
eMMC USER  : 0x00000001D2000000 -7.281 GB
ERAM Size  : 0x0000000040000000 -1024 MB
IRAM Size  : 0x0000000000020000 -128 KB
UNICAL RID : 58492C74A37250B813988E37BE0864C2
eMMC CID   : 460001154D32584ECF3801428154C9C4
Change to HIGH SPEED...
Connection[WAITING]Found[COM10] Status[Opened]

Reading Partition Table
SIZE[0x000007E8] 23 Items > Done

Reading System Info
Model           :    Spice F302
Brand           :    newspice
Android Ver     :    7.0
Manufacturer    :    Spice
Device          :    Spice_F302
Display ID      :    F302-I371-7.0-OP-V035-20170628
Security Patch      :    2017-06-05
Platform        :    mt6737m
Kernel ID        :    2017-06-05
FRPPST       :    /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
FingerPrint       :    newspice/F302/Spice_F302:7.0/NRD90M/F302-I371-7.0-OP-V035-20170628:user/release-keys

Autobackup Partitions
 preloader [0x00000000-0x00080000] 512 KB  Done
 -> Renaming Preloader....  preloader_rlk6737m_35_i_n.bin
 Creating Scatter file... C:\Hydra Tool\\Backup\Auto\newspice_Spice F302_0335-mt6737m-7.0(F302-I371-7.0-OP-V035-20170628)_170520152944\MT6737_Android_scatter.txt
 nvram [0x00380000-0x00880000] 5 MB  Done
 nvdata [0x06B00000-0x08B00000] 32 MB  Done
Done!!!
C:\Hydra Tool\\Backup\Auto\newspice_Spice F302_0335-mt6737m-7.0(F302-I371-7.0-OP-V035-20170628)_170520152944
MTK Phone Loader is NOW RUNNING.


Reading System Info
Model           :    Spice F302
Brand           :    newspice
Android Ver     :    7.0
Manufacturer    :    Spice
Device          :    Spice_F302
Display ID      :    F302-I371-7.0-OP-V035-20170628
Security Patch      :    2017-06-05
Platform        :    mt6737m
Kernel ID        :    2017-06-05
FRPPST       :    /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
FingerPrint       :    newspice/F302/Spice_F302:7.0/NRD90M/F302-I371-7.0-OP-V035-20170628:user/release-keys

-------------------------------------
Operation : Auto
Processing... Ok

Elapsed Time : 00:00:14
 

YuSuF02

Active Member
May 20, 2020
35
7
İstanbul
Run Spreadrum Module
Clickk - Screen Lock Security
Cabl Diag Mode
Click Execute

Code:
Hydra SpreadTrum Tool  Ver 1.0.0 Build 64
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)
Intel(R) Core(TM) i5-3470 CPU @ 3.20GHz
Intel(R) HD Graphics
Ram Installed : 3 GB
Windows Access Right Admin
******* Dongle Info *******
Version    : Hydra Tool v 1.1
Serial     : XXXXXXXXXXX
Initialize : OKAY
Status     : Activated
Life       : 0-[6-0-0-0-0]

Port : [Auto] Scanning...COM165
TPortConnection.Create...(COM165)..Opening...Ok


----------------------------
*** DIAG ScreenLock***
Read Code/Passwords...
Code :
Code :
Code :
Code :
Ok
----------------------------

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:00:01
 

YuSuF02

Active Member
May 20, 2020
35
7
İstanbul
Run MTK Module
Clickk - Screen Lock Security
Cabl Diag Mode
Click Execute

Code:
Hydra MediaTeK Tool  Ver 1.0.1 Build 89
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 64-bit Edition)
AMD E-300 APU with Radeon(tm) HD Graphics
AMD Radeon HD 6310 Graphics
Ram Installed : 4 GB
Windows Access Right Admin
******* Dongle Info *******
Version    : Hydra Tool v 1.1
Serial     : XXXXXXXXXXX
Initialize : OKAY
Status     : Activated
Life       : 0-[0-0-0-0-0]


Brand : NOKIA Model : TA-1028 (Nokia 3 LTE LA NE1) Connection : Flash Mode

=====================================
Connection[WAITING]Found[COM6] Status[Opened]


Reading System Info
Model           :    Heart
Brand           :    Unknown
Android Ver     :    8.0.0
Manufacturer    :    alps
Device          :    Unknown
Board           :    MT6737
Display ID      :    00WW_3_38D
Security Patch      :    2018-09-05
Platform        :    mt6737m
Kernel ID        :    2018-09-05
FRPPST       :    /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
FingerPrint       :    Unknown/Unknown/Unknown:8.0.0/O00623/00WW_3_38D:user/release-keys

-------------------------------------
Operation : Auto
Processing... Ok

Elapsed Time : 00:00:05
 

Attachments

  • asus.jpeg
    asus.jpeg
    171.5 KB · Views: 19

YuSuF02

Active Member
May 20, 2020
35
7
İstanbul
Run Qualcomm Module
Clickk - Factory Reset Protection (FRP)
Cabl Flash Mode
Click Execute

Code:
Hydra Qualcomm  Tool  Ver 1.0.1 Build 88
Windows 7 Service Pack 1 (Version 6.1, Build 7601, 64-bit Edition)
Intel(R) Core(TM) i3-2100 CPU @ 3.10GHz
NVIDIA GeForce GT 610
Ram Installed : 8 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version    : Hydra Tool v 1.2
Serial     : xxxxxxxxxxxxx
Initialize : OKAY
Status     : Activated
Life       : 0-[0-0-0-0-0]

PreOperation Configuration
 Brand : ASUS Model : X00TD (ZenFone Max Pro M1 ZB601KL) Storage : Auto
 Loader: Asus_SDM660_1.elf
 Port  : Auto
 Connection  : Flash Mode

Searching EDL Port..[COM10]
TPortConnection.Create...(COM10)..Opening...Ok
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping...... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 8192
 MaxPayloadSizeToTargetInBytesSupported : 8192
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : MSM8996
 Version : 1
 DateTime : Dec  7 2018 - 17:09:09

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 144
Serial Number       : 770380068
Firmware Version    : 162
Product Name        : HCG8a4
Physical Partitions : 4
Total Logical Blocks:
          Drive [0]  122142720[58.242 GB]
          Drive [1]  122142720[58.242 GB]
          Drive [2]  8192[4 MB]
          Drive [3]  8192[4 MB]
Running : Ok
 
Reading GPT[4]Ok
Phone Information.....
  Model : ASUS_X01BD
  Brand : asus
  Android Ver : 9
  Manufacturer : asus
  Device : ASUS_X01BD
  Display ID : PKQ1.WW_Phone-16.2017.2004.075-20200407
  Security Patch : 2020-04-05
  Kernel ID : 2020-04-05
  Fingerprint : Android/sdm660_64/sdm660_64:9/PKQ1/16.2017.2004.075-20200407:user/release-keys
  ro_product_hardware :
  sys_hardware_version :

Reading GPT[4]Ok
*** FRP Reset ***
Resetting FRP...
Auto
Processing...
Executing ...
  [Zero Wipe]
  [Erase Safety Tag] Ok

Elapsed Time : 00:00:03


TPortConnection.Destroy.....Closing...Ok..
 

YuSuF02

Active Member
May 20, 2020
35
7
İstanbul
Run Qualcomm Module
Clickk - Flash Tool
Choose Files
Phone EDL Mode
Clickk - Flash

Code:
Hydra Qualcomm  Tool  Ver 1.0.1 Build 88
Windows 10 (Version 10.0, Build 18362, 64-bit Edition)
Intel(R) Core(TM) i7-4700MQ CPU @ 2.40GHz
AMD Radeon R7 M265
Ram Installed : 8 GB
Windows Access Right Admin
Software Run As Admnistrator
******* Dongle Info *******
Version    : Hydra Tool v 1.1
Serial     : XXXXXXXXXX
Initialize : OKAY
Status     : Activated
Life       : 0-[0-0-0-0-5]

Searching EDL Port..[COM3]
TPortConnection.Create...(COM3)..Opening...Ok
Getting device info.......
Serial No.: 0x5F62CCF0
MSM ID    : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
PBL Ver   : 00000000
PK HASH   : 6BC369511DA9CADB3A7AF61574F89DB3
            85003D6241BDD1FF573DBA61BF6AE119
 
Firehose Loader[prog_emmc_firehose_11.mbn]
Initializing SaharaBoot... Ok
Sending .............Ok

Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8953
 Version : 1

*** STORAGE DEVICE INFO ***
Memory Type         : eMMC
Block Size in Bytes : 512
Page Size           : 512
Manufacturer ID     : 21
Serial Number       : 137193604
Firmware Version    : 0
Product Name        : GD6BMB
Physical Partitions : 3
Total Logical Blocks:
          Drive [0]  61071360[29,121 GB]
          Drive [1]  8192[4 MB]
          Drive [2]  8192[4 MB]
Running : Ok
 
Reading GPT[3]Ok
Phone Information.....
  Model :
  Brand :
  Android Ver : 8.1.0
  Manufacturer : unknown
  Device :
  Display ID : System 8.2.0.036(076E)
  Security Patch : 2019-12-01
  Kernel ID : 2019-12-01
  Fingerprint :
  ro_product_hardware :
  sys_hardware_version :


----------------------------
Flashing Selected Partitions
>MODEM(0)[MODEM.img] Ok
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok
Rebooting Phone.... Ok

TPortConnection.Destroy.....Closing...Ok..

Elapsed Time : 00:01:40
 

YuSuF02

Active Member
May 20, 2020
35
7
İstanbul
Run Qualcomm Module
Clickk - Partitions - Wipe Security Partitions
Phone EDL Mode
Clickk -Execute

Code:
Hydra Qualcomm  Tool  Ver 1.0.1 Build 88
Windows 10 (Version 10.0, Build 18362, 64-bit Edition)
Intel(R) Core(TM) i3-3210 CPU @ 3.20GHz
AMD Radeon HD 6450
Ram Installed : 4 GB
Windows Access Right Admin
******* Dongle Info *******
Version    : Hydra Tool v 1.1
Serial     : XXXXXXXXX
Initialize : OKAY
Status     : Activated
Life       : 1-[0-0-0-0-0]

Searching Device By Fastboot
Device Found...

Reading Information...
Product    : product: ugg
Serial No. : serialno: 5275a803
version    : version: 0.5
Secure     : secure: yes
Device Info:
    ...
    Device tampered: false
    Device unlocked: true
    Device critical unlocked: true
    Charger screen enabled: true
    Display panel:
Partitions..
Wipe Security Partitions
Processing...
Wiping Security, Please Wait...
Wipe Security Success!! Ok

Elapsed Time : 00:00:04
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Vestel Venus V6 FRP Remove by Hydra Tool

Vestel venüs google account reset by edl qdloader mode just with 1 click



PreOperation Configuration
Brand : AUTO Model : AUTO Storage : Auto
Loader: Auto
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM48]
TPortConnection.Create...(COM48)..Opening...Ok
Getting device info.......
Serial No.: 0x10FAA2F7
MSM ID : 0x0009A0E1, SDM450-Qualcomm Snapdragon 450
PBL Ver : 00000000
PK HASH : CC3153A80293939B90D02D3BF8B23E02
92E452FEF662C74998421ADAD42A380F

Firehose Loader[prog_emmc_firehose_8953_ddr.mbn]
Initializing SaharaBoot... Ok
Sending ..................Ok

Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 4046755759
Firmware Version : 1
Product Name : GD6BMB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29,121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3]Ok
Phone Information.....
Model : Venus V6
Brand : Vestel
Android Ver : 8.1.0
Manufacturer : Vestel
Device : Samos
Display ID : VS1200 release-keys
Security Patch : 2019-09-01
Kernel ID : 2019-09-01
Fingerprint :
ro_product_hardware :
sys_hardware_version :

Reading GPT[3]Ok
* FRP Reset *
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:06


TPortConnection.Destroy.....Closing...Ok..
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Nokia TA-1130 (Nokia 1 Plus) FRP Reset by Hydra Tool

Nokia TA-1130 Google Account remove with hydra dongle



Brand : NOKIA Model : TA-1130 (Nokia 1 Plus) Connection : Flash Mode

=====================================
Connection[WAITING]Found[COM7] Status[Opened]
ERAM Size : 0x0000000000040000 -256 KB
IRAM Size : 0x0000000040000000 -1024 MB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000080000 -512 KB
eMMC USER : 0x00000001D2000000 -7.281 GB
eMMC CID : 150100464E36324D4203D81B962856A1 - FN62MB
UNICAL RID : 2D7041C7EC7F14E837EB7940E672862B
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
Model :
Brand :
Android Ver : 10
Manufacturer :
Device :
Display ID : 00WW_2_10A
Security Patch : 2020-04-05
Kernel ID : 2020-04-05
FingerPrint :

-------------------------------------
Operation : Format/Erase
Processing... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:07
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Huawei JAT-LX3 (Honor Play 8A) FRP Reset by Hydra Tool

Huawei Honor Play 8A Google account remove with test point by hydra dongle



Brand : HUAWEI Model : JAT-LX3 (Honor Play 8A) Connection : Flash Mode

=====================================
How To Boot : Remove Batt if possible
* TP Ground Must be near cpu..
* Remove ground upon popup of the message dialog.

Connection[WAITING]Found[COM7] Status[Opened]
Identifying Hardware ID
BROM CPUID : 0766 (0000)MT6765[6765]
BROM HW_SW_VER : 8A00 CA00 0000 0000
FUSEID : 00000001
SECURE VERSION : 05
BL VERSION : FE
BR Secured : E5[SBC+SDA+SEL]
Security Authorization....
Sending[huawei_auth_sv5_.auth] Accepted
Preparing Download Agent..
Download Agent : Huawei__6765_8A00CA0000000000_00001000_00030000.bin
MTK_DOWNLOAD_AGENT -HYDRA
MTK_AllInOne_DA_v3.3001.2018/10/18.17:38_452898
Initializing Loader [1]
Sending Loader [1] Accepted
PROTOCOL[NEW] - eMMC
PHONE SYNC[Accepted]
DA Mode : brom
Preloader Initialization....
Parsing preloader_k62v1_64_mexico.bin
Sending FlashInit Accepted
Initializing Loader [2]
Sending Loader [2] Accepted
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100475036424D4201734197505613 - GP6BMB
UNICAL RID : ECC781A360AEBDDCC79F2D0B41821CFB
DA Speed : high-speed
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!

Reading System Info
ERROR reading system image [corrupted/erased]

Autobackup Partitions
preloader[0x00000000-0x00080000]512 KB ->preloader.bin... Done
-> Renaming Preloader.... preloader_k62v1_64_mexico.bin
Creating Scatter file... C:\Hydra Tool\\Backup\Auto\__0766--()_150620152109\MT6765_Android_scatter.txt
pgpt[0x00000000-0x00008000]32 KB ->pgpt.bin... Done
frp[0x00108000-0x00208000]1024 KB ->frp.bin... Done
nvdata[0x00A08000-0x01A08000]16 MB ->nvdata.bin... Done
nvram[0x04400000-0x04900000]5 MB ->nvram.bin... Done
Done!!!
C:\Hydra Tool\\Backup\Auto\__0766--()_150620152109
MTK Phone Loader is NOW RUNNING.
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 150100475036424D4201734197505613 - GP6BMB
UNICAL RID : ECC781A360AEBDDCC79F2D0B41821CFB
Reading GPT-EMMC [0x00008000] 130 Items
Done!!!


Reading System Info
ERROR reading system image [corrupted/erased]

-------------------------------------
Operation : Auto
Processing... Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:37
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Xiaomi Redmi 8 Olive IMEI Repair Without Root and Unlock Bootloader

Worlds First Direct Repair IMEI Without Auth, Without Credit, Without Unlock Bootloader

1 - Erase Security by EDL Mode



PreOperation Configuration
Brand : XIAOMI Model : Redmi 8 (olive) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM82]
TPortConnection.Create...(COM82)..Opening...Ok
Getting device info.......
Serial No.: 0x14406B91
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[xdkl2FTsPUdkvU93
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 3263672062
Firmware Version : 842018864
Product Name : hC9aP3
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58,242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3]Ok
Phone Information......
Model : Redmi 8
Brand : Xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : olive
Mod_device : olive_eea_global
Display ID : ZQL2115-olive-build-20200521004425
Security Patch : 2020-05-01
Kernel ID : 2020-05-01
Fingerprint : Xiaomi/olive_eea/olive:9/PKQ1.190319.001/V11.0.7.0.PCNEUXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3]Ok
Wipe Security ...
Security Data Found.
Reading Security Items....
modemst1
modemst2
fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi 8__9_Security_070820130236.sec
Backup Security Success....
Security Wipe Started..
modemst1 Ok
modemst2 Ok
fsg Ok
Security Wipe Success...Ok
Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:21


TPortConnection.Destroy.....Closing...Ok..


2 - Enable Diag Without Root Method
3 - Write 2nd IMEI by Diag Port
4 - Write ENG QCN by Diag Port
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Redmi 8 (Olive) Write Firmware Done By Hydra Tool Free Auth


Hydra Qualcomm Tool Ver 1.0.1 Build 95
Windows 10 (Version 10.0, Build 17134, 64-bit Edition)
Intel(R) Core(TM) i5-4590 CPU @ 3.30GHz
Intel(R) HD Graphics 4600
Ram Installed : 8 GB
Windows Access Right Admin
Software Run As Admnistrator
*** Dongle Info ***
Version : Hydra Tool v 1.1
Serial : 190600001084
Initialize : OKAY
Status : Activated
Life : 0-[1-0-0-0-1]
Searching EDL Port..[COM161]
TPortConnection.Create...(COM161)..Opening...Ok
Getting device info.......
Serial No.: 0x7EEDD740
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi_8_Olive.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok
Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[FhEErzAB
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...
Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1
* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1133713784
Firmware Version : 842018864
Product Name : hC9aP3
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 122142720[58.242 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3]Ok
Phone Information......
Model : Redmi 8
Brand : Xiaomi
Android Ver : 9
Miui Ver : V10
Manufacturer : Xiaomi
Device : olive
Mod_device : olive_global
Display ID : ZQL2115-olive-build-20191019025312
Security Patch : 2019-09-01
Kernel ID : 2019-09-01
Fingerprint : Xiaomi/olive/olive:9/PKQ1.190319.001/V10.3.4.0.PCNMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :
----------------------------
Flashing Selected Partitions
sec(0)[sec.dat] Skipped
config(0)[config.bin] Skipped
vbmeta(0)[vbmeta.img] Ok
vbmetabak(0)[vbmeta.img] Ok
devcfg(0)[devcfg.mbn] Ok
devcfgbak(0)[devcfg.mbn] Ok
apdp(0)[dummy.img] Ok
msadp(0)[dummy.img] Ok
sbl1(0)[sbl1.mbn] Ok
sbl1bak(0)[sbl1.mbn] Ok
rpm(0)[rpm.mbn] Ok
rpmbak(0)[rpm.mbn] Ok
cmnlib(0)[cmnlib_30.mbn] Ok
cmnlibbak(0)[cmnlib_30.mbn] Ok
cmnlib64(0)[cmnlib64_30.mbn] Ok
cmnlib64bak(0)[cmnlib64_30.mbn] Ok
keymaster(0)[km4.mbn] Ok
keymasterbak(0)[km4.mbn] Ok
misc(0)[misc.img] Ok
aboot(0)[emmc_appsboot.mbn] Ok
abootbak(0)[emmc_appsboot.mbn] Ok
tz(0)[tz.mbn] Ok
tzbak(0)[tz.mbn] Ok
dtbo(0)[dtbo.img] Ok
dtbobak(0)[dtbo.img] Ok
splash(0)[splash.img] Ok
dsp(0)[adspso.bin] Ok
dspbak(0)[adspso.bin] Ok
persist(0)[persist.img] Skipped
mdtp(0)[mdtp.img] Ok
mdtpbak(0)[mdtp.img] Ok
boot(0)[boot.img] Ok
recovery(0)[recovery.img] Ok
cache(0)[cache.img] Ok
modem(0)[NON-HLOS.bin] Ok
system(0)[system.img] Ok
vendor(0)[vendor.img] Ok
cust(0)[cust.img] Ok
userdata(0)[userdata.img] Ok
PrimaryGPT(0)[gpt_main0.bin] Ok
Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,8192)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,8192)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok
Rebooting Phone.... Ok
TPortConnection.Destroy.....Closing...Ok..
Elapsed Time : 00:05:53
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Redmi 7A IMEI Repair Without Root and Unlock Bootloader by Hydra Tool

Xiaomi Redmi 7A pine Repair IMEI without waiting unlock bootloader with testpoint

  1. Put your device EDL Mode
  2. by Qualcomm Module Erase Security
  3. Enable diag without root method from reboot box
  4. Write 2nd imei and write eng qcn



PreOperation Configuration
Brand : XIAOMI Model : Redmi 7A (pine) Storage : Auto
Loader: Xiaomi_Redmi_8_Olive.mbn
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM29]
TPortConnection.Create...(COM29)..Opening...Ok
Getting device info.......
Serial No.: 0x2C20AA47
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
PBL Ver : 00000001
PK HASH : 57158EAF1814D78FD2B3105ECE4DB18A
817A08AC664A5782A925F3FF8403D39A

Firehose Loader[Xiaomi_Redmi.mbn]
Initializing SaharaBoot... Ok
Sending .......................Ok

Connecting to Firehose...
Ping... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[3roRHqBB6fgD8K3p4rZH14Qwqkd]
Checking Internet connection....
- Hydra Is Online
Connecting to Hydra Xiaomi Server...

Signature @256bytes Authentication.... Accepted......
Identifying Chip....Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

* STORAGE DEVICE INFO *
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 583130817
Firmware Version : 1
Product Name : QD63MB
Physical Partitions : 3
Total Logical Blocks:
Drive [0] 61071360[29.121 GB]
Drive [1] 8192[4 MB]
Drive [2] 8192[4 MB]
Running : Ok

Reading GPT[3]Ok
Phone Information......
Model : Redmi 7A
Brand : Xiaomi
Android Ver : 9
Miui Ver : V11
Manufacturer : Xiaomi
Device : pine
Mod_device : pine_global
Display ID : ZQL1533-pine-build-20200407194230
Security Patch : 2020-03-01
Kernel ID : 2020-03-01
Fingerprint : Xiaomi/pine/pine:9/PKQ1.190319.001/V11.0.7.0.PCMMIXM:user/release-keys
ro_product_hardware :
sys_hardware_version :

Reading GPT[3]Ok
Wipe Security ...
Security Data Found.
Reading Security Items....
modemst1
modemst2
fsg
C:\Hydra Tool\Backup\Security_Backup\Redmi 7A__9_Security_070520163141.sec
Backup Security Success....
Security Wipe Started..
modemst1 Ok
modemst2 Ok
fsg Ok
Security Wipe Success...Ok

Elapsed Time : 00:00:23


TPortConnection.Destroy.....Closing...Ok..
 

Hydra Tool

Product Manager
Aug 31, 2019
298
319
Ukraine
Xiaomi CC9e FRP Remove Success by Hydra Dongle

Xiaomi mi cc9e laurus reset frp without credit, hydra tool standalone server



PreOperation Configuration
Brand : XIAOMI Model : Mi CC9e (laurus) Storage : Auto
Loader: Xiaomi_cc9e_loader.elf
Port : Auto
Connection : Flash Mode

Searching EDL Port..[COM70]
TPortConnection.Create...(COM70)..Opening...Ok
Getting device info..
Device MODE : SAHARA

Connecting to Firehose...
Ping.....
NOTE : FILTERED : <.
NOTE : FILTERED : ?.
NOTE : FILTERED : x.
NOTE : FILTERED : m.
NOTE : FILTERED : l. Ok
Configuration........
Identifying Chip........UFS Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Jul 3 2019 - 22:23:56

* STORAGE DEVICE INFO *
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 429
Serial Number : 2037279096
Firmware Version : 004
Product Name : H9HQ53ACPMMDAR
Physical Partitions : 6
Total Logical Blocks:
Drive [0] 14501888[55,32 GB]
Drive [1] 2048[8 MB]
Drive [2] 2048[8 MB]
Drive [3] 32768[128 MB]
Drive [4] 1048576[4 GB]
Drive [5] 32768[128 MB]
Running : Ok

Reading GPT[6]Ok
Phone Information......
Model :
Brand :
Android Ver : 10
Manufacturer :
Device :
Display ID : qssi-user 10 QKQ1.190910.002 V11.0.1.0.QFQEUXM
Security Patch : 2020-04-05
Kernel ID : 2020-04-05
Fingerprint :
ro_product_hardware :
sys_hardware_version :

Reading GPT[6]Ok
* FRP Reset *
Resetting FRP...
Auto
Processing...
Executing ...
[Zero Wipe] Ok

Elapsed Time : 00:00:04


TPortConnection.Destroy.....Closing...Ok..
 
Top