Hydra Hydra Tool MTK Module v1.0.3.60 [MTK Vivo IMEI | OPPO ID | RPMB]

Hydra Tool

techy147

Product Supporter
Jun 14, 2020
160
164
Space
Hydra Tool MTK Module v1.0.3.60




[Added] - Vivo MTK IMEI Repair by Flash Mode
[Added] - Vivo Demo Remove by Flash Mode
[Added] -OPPO/Realme Demo Remove by Flash Mode
[Added] - OPPO/Realme ID Remove by Flash Mode
[Added] -Samsung MTK FRP Remove by Flash Mode
[Added] -Preloader to BROM Switch New Method
[Added] -MTK Fix Orange Message
[Added] -MTK Read/Write RPMB (eMMC and UFS)

[Added Mediatek New Soc's ] -
  • MediaTek Dimensity 1200 (MT6893)
  • MediaTek Dimensity 1000+ (MT6889)



Added Following Models for
Read/Write Firmware, Unlock Bootloader, Reset FRP, Format, Partition Manager


  • Xiaomi Poco F3 GT (Ares)
  • Xiaomi Redmi K30 Ultra (cezanne)
  • Xiaomi Redmi K40 Game Enhanced Edition (Ares)

  • OPPO Reno 6 Pro (CPH2249)
  • OPPO Reno 6 Pro (PEPM00)
  • OPPO Reno5 Pro (CPH2201)
  • OPPO Reno5 Pro (PDSM00)
  • OPPO Reno5 Pro (PDST00)

  • Realme GT Neo Flash (RMX3031)
  • Realme X7 Max (RMX3031)
  • Realme X7 Pro (RMX2111)
  • Realme X7 Pro (RMX2121)

  • Vivo iQoo Z1 (V1986A)

  • Huawei Honor V40 (YOK-AN10)
  • Huawei Honor X10 Max (KKG-AN10, KKG-AN00)
  • Huawei Honor 30 Lite (MXW-AN00)
  • Huawei Enjoy 20 Pro (DVC-AN20)
  • Huawei Honor 30 Youth (MXW-AN00)
  • Huawei Enjoy Z 5G (DVC-AN00)
  • Huawei Honor Play 4 (TNNH-AN00)
  • Huawei Honor X10 Max (KKG-AN00)
  • Huawei Maimang 9

  • OnePlus Nord 2

  • Coolpad Cool X (CPD1939)


P.S: If you already have the package no need to re-download, Just Click the Update All Button at HumTool


** Hydra Tool Offical Web Page **

You can check from official webpage supported models and functions
Most models Supported Read Firmware, Write Firmware, Repair IMEI, Reset FRP, Factory Reset e.t.c

HYDRA Tool - Powerful Advanced Complete


 

sundukwe

Active Member
Jan 1, 2020
22
9
good update yes..... but please try your best next update to work with all wondows with 64bits ........
[your software does not work with 64bits windows]
 

sundukwe

Active Member
Jan 1, 2020
22
9
my setup not working in 64bits windows can somebody help please........ [hydratool..
 

aliipi

Active Member
Oct 28, 2019
77
14
Hydra MediaTeK Tool Ver 1.0.3 Build 71

not changing why

=====================================
***IMEI REPAIR FUNCTION****
Vivo Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port (COM7)
Device :5&faeca2a&0&6
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&faeca2a&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking...Ok

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : C4B9D18955D13125FD07F9E6AF888DB6
Stage 1..[Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Preloader Initialization...
Parsing preloader_k68v1_64_Vivo_MT6768.bin
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1E681B02598C9BEBCA85F67E55398ADD
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100445636444D42021036901C3783 - DV6DMB
Executing : ACCEPTED...

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : full_k68v1_64-user 11 RP1A.200720.012 eng.compil.20210729.214112 release-keys
Display ID : RP1A.200720.012 release-keys
Security Patch : 2021-08-01
Platform : =MTK6768
StorageType : mtp
Userdata State : Not Encrypted

Autobackup Partitions
-preloader[0x00000000]512 KB ->preloader.bin...Ok
-> Renaming Preloader.... preloader_k68v1_64.bin
Creating Scatter file... E:\BOX\HYDRA TOOL\HydraTool_FullPackage_08-01-2021\\Backup\Auto\0707__103021000959\MT6768_Android_scatter.txt
-pgpt[0x00000000]32 KB ->pgpt.bin...Ok
-frp[0x05508000]1024 KB ->frp.bin...Ok
-nvdata[0x13208000]64 MB ->nvdata.bin...Ok
-persist[0x17208000]48 MB ->persist.bin...Ok
-protect1[0x1A208000]8 MB ->protect1.bin...Ok
-protect2[0x1AA08000]13.969 MB ->protect2.bin...Ok
-nvram[0x1DF80000]64 MB ->nvram.bin...Ok
Done!!!
E:\BOX\HYDRA TOOL\HydraTool_FullPackage_08-01-2021\\Backup\Auto\0707__103021000959
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1E681B02598C9BEBCA85F67E55398ADD
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1EC00000 -116.48 GB
eMMC CID : 150100445636444D42021036901C3783 - DV6DMB

Reading GPT-EMMC [0x00008000] 130 Items

Reading System Info

----------------------------------------------
VIVO IMEI REPAIR
----------------------------------------------
OLD IMEI..
ACK : 0x000C0004[]
IMEI=863691042029431
IMEI2=863691042029423
Writing New IMEI..
IMEI1 : 86369xxxxxxxxxxx
IMEI2 : 86369xxxxxxxxxx
ACK : 0xFFFFFFFF[]
Verifying IMEI...
ACK : 0xFFFFFFFF[]
IMEI=863691042029431
IMEI2=863691042029423

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:00:46
 

aliipi

Active Member
Oct 28, 2019
77
14
to many bugs zerowipe format not work reset password without data loss not working only bugs X650 infinix



Hydra MediaTeK Tool Ver 1.0.3 Build 71
Windows 10 (Version 10.0, Build 19042, 32-bit Edition)
Pentium(R) Dual-Core CPU E5200 @ 2.50GHz
Intel(R) Q45/Q43 Express Chipset (Microsoft Corporation - WDDM 1.1)
Ram Installed : 3 GB
Windows Access Right : Admin
Software Run As Admnistrator

******* Dongle Info *******
Version : Hydra Tool v 1.2
Serial : xxxxxxxxxxxxxxxx
Initialize : OKAY
Status : Activated
Life : 0 [0-0-0-0-0]


=====================================
Searching for MTK Device...Found
Port Identification :Flashmode Preloader
FriendlyName :MediaTek PreLoader USB VCOM (Android) (COM55)
Device :5&2b9d9f04&0&2
SymbolicName :\??\USB#VID_0E8D&PID_2000#5&2b9d9f04&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :01/22/2015,3.0.1504.0

Opened handle..
Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 6580MT6580 [6580]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 05
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
FUSEID : 02100000
FUSEID : 02100000
SECURE VERSION : FF
BL VERSION : 01

Preparing Download Agent..
DA : 6761_Infinix.bin[Not Exist]
Trying Default 6580_PL.bin
Agent: MTK_DOWNLOAD_AGENT -HYDRA
Ver : MTK_AllInOne_DA_v3.3001.2020-11-03.21:13_536568
Init : Loader [1]
Sending : Accepted

Identifying Protocol...
ERROR : CMD_JUMP_DA

Elapsed Time : 00:00:32
 

aliipi

Active Member
Oct 28, 2019
77
14
Hydra Tool MTK Module v1.0.3.60




[Added] - Vivo MTK IMEI Repair by Flash Mode
[Added] - Vivo Demo Remove by Flash Mode
[Added] -OPPO/Realme Demo Remove by Flash Mode
[Added] - OPPO/Realme ID Remove by Flash Mode
[Added] -Samsung MTK FRP Remove by Flash Mode
[Added] -Preloader to BROM Switch New Method
[Added] -MTK Fix Orange Message
[Added] -MTK Read/Write RPMB (eMMC and UFS)

[Added Mediatek New Soc's ] -

  • MediaTek Dimensity 1200 (MT6893)
  • MediaTek Dimensity 1000+ (MT6889)



Added Following Models for
Read/Write Firmware, Unlock Bootloader, Reset FRP, Format, Partition Manager


  • Xiaomi Poco F3 GT (Ares)
  • Xiaomi Redmi K30 Ultra (cezanne)
  • Xiaomi Redmi K40 Game Enhanced Edition (Ares)

  • OPPO Reno 6 Pro (CPH2249)
  • OPPO Reno 6 Pro (PEPM00)
  • OPPO Reno5 Pro (CPH2201)
  • OPPO Reno5 Pro (PDSM00)
  • OPPO Reno5 Pro (PDST00)

  • Realme GT Neo Flash (RMX3031)
  • Realme X7 Max (RMX3031)
  • Realme X7 Pro (RMX2111)
  • Realme X7 Pro (RMX2121)

  • Vivo iQoo Z1 (V1986A)

  • Huawei Honor V40 (YOK-AN10)
  • Huawei Honor X10 Max (KKG-AN10, KKG-AN00)
  • Huawei Honor 30 Lite (MXW-AN00)
  • Huawei Enjoy 20 Pro (DVC-AN20)
  • Huawei Honor 30 Youth (MXW-AN00)
  • Huawei Enjoy Z 5G (DVC-AN00)
  • Huawei Honor Play 4 (TNNH-AN00)
  • Huawei Honor X10 Max (KKG-AN00)
  • Huawei Maimang 9

  • OnePlus Nord 2

  • Coolpad Cool X (CPD1939)


P.S: If you already have the package no need to re-download, Just Click the Update All Button at HumTool


** Hydra Tool Offical Web Page **

You can check from official webpage supported models and functions
Most models Supported Read Firmware, Write Firmware, Repair IMEI, Reset FRP, Factory Reset e.t.c

HYDRA Tool - Powerful Advanced Complete


***IMEI REPAIR FUNCTION****
Huawei Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM39)
Device :5&faeca2a&0&5
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&faeca2a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :09/01/2011,2.0.1136.0

Handshaking...Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking...Ok

--- ENABLE AUTO PREL DUMP ----
Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : D2138C98E5E7F3729841F69CFBE5CEFF
Stage 1..[Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization...SYNC
Preloader Initialization...
Parsing preloader_k61v1_64_mexico.bin
Init : [STATUS_EMI_SETTING_VERSION_ERROR]

Elapsed Time : 00:00:47
 
Top