NCK Box / Dongle Premium v2 Unisoc Module v2.3.8 Released - [18/10/2025]

GsmToto

Super Moderator
Jan 1, 2021
5,632
22,324
UK
Skype
gsmtoto
Sonork ID
100.1684601



Added:


Motorola

  • E13
  • G14


Hisense

  • V40 HLTE229
  • H60 HNR553T
  • A5 pro HLTE203T
  • A5 pro cc HLTE203T
  • Q5 HITV105C


ZTE

  • Blade A51
  • Blade A52
  • Voyage 40 se
  • Axon20 4G


Umidigi

  • G1 Max
  • A15
  • Active T1

Code:
Supported read info, wipe/factory reset, reset FRP, backup/restore security, read/write flash, Diag mode wipe, Diag mode read info, repair IMEI (not supported by Motorola), Diag mode repair sn.

Added

  1. Added enable ADB by QR code
  2. Not all phones support this feature and must have android 11+
  3. Added another method to safe wipe phone.
  4. Added auto security backup on bootloader unlock, if unlock fail, simple restore backup to put phone to initial state.
  5. Added detection for EROFS filesystem, EROFS will be implemented in next update.
  6. Fixed read info on phones what have super partition and ext4 filesystem.



Official Websites:

NCK Box / Dongle Premium v2
www.nck-pro.com


Download From Support Area or


Downloads – NCK Box / Dongle Premium v2


PASSWORD IS: NckTeam
 

GsmToto

Super Moderator
Jan 1, 2021
5,632
22,324
UK
Skype
gsmtoto
Sonork ID
100.1684601
Job: Reset FRP
Exploit: INFINIX V1

Expected connection: PRELOADER
Connect USB Cable to turned off device without pressing any key.
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V1632 (Android) (COM86) [\\?\usb#vid_0e8d&pid_2000#5&212ac8fc&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: PRELOADER PORT
Helio Boot PL Exploit
HW ID : MT6761 [0717] Helio A20/P22/A22/A25/G25
HW VER : 8A00,CA01,0200
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 9A4C2D233D82BB3A0D4CF7936E0FD2BB
SoC ID[0] : 7C195AE8BFEBCF0BBC7CFCDFA1CA8726
SoC ID[1] : FF8BCAE143FE42AE2E3CA2DF4B03D316
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Running Exploit (Old)...Done
Sending DA2...OK
Activating DA Extension...Done
HRID : AE0DFC096CBC2547D5288C01858C0FA9
SRAM : 0x000000000003A600 [233.50 KB]
DRAM : 0x0000000080000000 [2.00 GB]
EMMC ID : 58K731
EMMC CID : D6010335384B37333168E59B27008869
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x000000073A000000 [28.91 GB]
Reading Parititon Info...OK
SuperPartList: system_ext_a begin: 0x34100000
SuperPartList: product_a begin: 0x81200000
SuperPartList: vendor_a begin: 0xD6B00000
SuperPartList: system_a begin: 0xE6700000
SuperPartList: system_ext_a-cow begin: 0x11C98E000
Brand : TECNO
Manufacturer : TECNO MOBILE LIMITED
Name : TSSI
Cpu Abi : armeabi-v7a
And. Ver. : 11
Security Patch : 2024-01-01
Build Dt. : Fri Jan 12 15:35:34 CST 2024
Display ID : TECNO-RGo-32-240110V97
Ver. Inc. : 240112V566
Locale : en-US
Patch : 2024-01-01
IMEI 1: 358512810470643
IMEI 2: 358512810470650
Reset FRP Data...Done
If FRP remain on Phone, Then Try Reset FRP 2025
Process finished
[NCK MTK Exploit Tool v2.3]
 
Top