EFT Post All Successfully Repaired Phones by EFT Dongle

EFT Dongle

GsmToto

Super Moderator
Jan 1, 2021
5,793
22,447
UK
Skype
gsmtoto
Sonork ID
100.1684601
Preparing Environment : OK
Check Apple drivers..... ✓..
Checking iDevices.....OK
Checking SSH......Checking SSH......P:14..OK
Reading iDevice info.....OK
Activation Status: Unactivated
BuildVersion: 19H394
CPU Arch: arm64
Device Class: iPhone
Device Name: iPhone
Firmware Version: pongoOS-2.6.3-3ce56339
Device IMEI: 359204074236048
Product Name: iPhone OS
Product Type: iPhone 7
IOS Version: 15.8.5
SIM Status: kCTSIMSupportSIMStatusNotInserted
Device Serial Number: F17SF3SZHG7F
DeviceID: 9190ddf105cf77a1758d9cb80cf5b5cce7234b84
MEID Status: Not Supported
Preparing Hello....OK
Generating Activation Files....OK
Uploading recache buffer - Success
Uploading getkey buffer - Success
Uploading kernel buffer - Success
Setting permissions...
Executing recache and kernel...
Kernel execution failed. Cleaning up...
Error Activate
Operation {Hello Screen ios 11.x/18.x} ID: 0B892200AA46FD3D
Elapsed time 00:16 -- Version 5.3.3 Release 0001 Build 582
 

halees

Junior Member
Nov 3, 2020
1
1
hebron
iphone 13 pro max bypass

Preparing Environment : OK

Monitoring for device...

✓ Device Connected

Model: A15 | 13 Pro Max Bypass (iPhone14,3)

iOS Version: 26.1

Serial Number: FVMC9YMX2T

UDID: 00008110-000E6888012A801E

Activation State: Unactivated

Unsupported iOS version: 26.1

User chose to proceed although the version is under testing.

Starting activation process...

Starting attempt 1/6

Activation attempt 1 in progress...

Rebooting device via IosClass_ method...

Device rebooted successfully

Waiting for device to reconnect...

Device reconnected successfully

Collecting system logs...

System logs collected successfully via IosClass_ method

Extracting log archive: 00008110-000E6888012A801E.logarchive

Log archive extracted successfully to: C:/eft pro/./00008110-000E6888012A801E.logarchive

Analyzing device data...

Contacting activation server...

Server response received successfully

Downloading activation data...

Activation data downloaded successfully

Removing file from device

File removed successfully from device

Removing file from device

File removed successfully from device

Removing file from device

File removed successfully from device

Applying activation data to device via IosClass_ method...

Activation data applied successfully via exe method

Rebooting device via IosClass_ method...

Device rebooted successfully

Waiting for device to reconnect...

Device reconnected successfully

Attempt 1 failed

Preparing next attempt...

Starting attempt 2/6

Activation attempt 2 in progress...

Rebooting device via IosClass_ method...

Device rebooted successfully

Waiting for device to reconnect...

Device reconnected successfully

Collecting system logs...

System logs collected successfully via IosClass_ method

Extracting log archive: 00008110-000E6888012A801E.logarchive

Log archive extracted successfully to: C:/eft pro/./00008110-000E6888012A801E.logarchive

Analyzing device data...

Contacting activation server...

Server response received successfully

Downloading activation data...

Activation data downloaded successfully

Removing file from device

File removed successfully from device

Removing file from device

File removed successfully from device

Removing file from device

File removed successfully from device

Applying activation data to device via IosClass_ method...

Activation data applied successfully via exe method

Rebooting device via IosClass_ method...

Device rebooted successfully

Waiting for device to reconnect...

Device activated during reconnection

=== ACTIVATION SUCCESSFUL ===

Device has been successfully activated!

Operation {Bypass A12} ID: D21A790C1965DF08

Elapsed time 04:20 -- Version 5.3.3 Release 0001 Build 582
 
  • Like
Reactions: GsmToto

GsmToto

Super Moderator
Jan 1, 2021
5,793
22,447
UK
Skype
gsmtoto
Sonork ID
100.1684601
A14 | 12 Pro Bypass (iPhone13,3)
iOS Version: 26.1

Preparing Environment : OK
Monitoring for device...
✓ Device Connected
Model: A14 | 12 Pro Bypass (iPhone13,3)
iOS Version: 26.1
Serial Number: DNPF6B4B0D83
UDID: 00008101-00120DE026FA001E
Activation State: Unactivated
Unsupported iOS version: 26.1
User chose to proceed although the version is under testing.
Starting activation process...
Starting attempt 1/6
Activation attempt 1 in progress...
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device reconnected successfully
Collecting system logs...
System logs collected successfully via IosClass_ method
Extracting log archive: 00008101-00120DE026FA001E.logarchive
Log archive extracted successfully to: C:/Program Files (x86)/EFT Dongle/./00008101-00120DE026FA001E.logarchive
Analyzing device data...
Contacting activation server...
Server response received successfully
Downloading activation data...
Activation data downloaded successfully
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Applying activation data to device via IosClass_ method...
Activation data applied successfully via exe method
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device reconnected successfully
Attempt 1 failed
Preparing next attempt...
Starting attempt 2/6
Activation attempt 2 in progress...
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device reconnected successfully
Collecting system logs...
System logs collected successfully via IosClass_ method
Extracting log archive: 00008101-00120DE026FA001E.logarchive
Log archive extracted successfully to: C:/Program Files (x86)/EFT Dongle/./00008101-00120DE026FA001E.logarchive
Analyzing device data...
Contacting activation server...
Server response received successfully
Downloading activation data...
Activation data downloaded successfully
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Applying activation data to device via IosClass_ method...
Activation data applied successfully via exe method
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device reconnected successfully
Attempt 2 failed
Preparing next attempt...
Starting attempt 3/6
Activation attempt 3 in progress...
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device reconnection timeout
Device did not reconnect after reboot
Attempt 3 failed
Preparing next attempt...
Starting attempt 4/6
Cannot detect device, waiting...
Starting attempt 5/6
Activation attempt 5 in progress...
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device activated during reconnection
Collecting system logs...
System logs collected successfully via IosClass_ method
Extracting log archive: 00008101-00120DE026FA001E.logarchive
Log archive extracted successfully to: C:/Program Files (x86)/EFT Dongle/./00008101-00120DE026FA001E.logarchive
Analyzing device data...
Contacting activation server...
Server response received successfully
Downloading activation data...
Activation data downloaded successfully
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Applying activation data to device via IosClass_ method...
Activation data applied successfully via exe method
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device activated during reconnection
=== ACTIVATION SUCCESSFUL ===
Device has been successfully activated!
Operation {Bypass A12} ID: 30F3020D76BFD773
Elapsed time 08:18 -- Version 5.3.3 Release 0001 B[/COLOR
 

arshad iqbal

Active Member
Aug 3, 2017
20
7
punjab pakistan
IPHONE 7 Hello Bypass


Preparing Environment : OK

Check Apple drivers..... ✓..

Checking iDevices.....OK

Checking SSH......Checking SSH......P:14..OK

Reading iDevice info.....OK

Activation Status: Unactivated

BuildVersion: 19H394

CPU Arch: arm64

Device Class: iPhone

Device Name: iPhone

Firmware Version: iBoot-7459.140.15

Device IMEI: 359164076271437

Device MEID: 35916407627143

Product Name: iPhone OS

Product Type: iPhone 7

IOS Version: 15.8.5

SIM Status: kCTSIMSupportSIMStatusNotInserted

Device Serial Number: DNQSGE7HHG71

DeviceID: 0a2f674b45cbde5ba262a22f5e07fe1a8d7cae6f

MEID Status: Supported

Preparing Hello....OK

Generating Activation Files....OK

Uploading recache buffer - Success

Uploading getkey buffer - Success

Uploading kernel buffer - Success

Setting permissions...

Executing recache and kernel...

Downloading temp.plist - Success

Downloading com.apple.MobileGestalt.plist - Success

Re-uploading plist files - Success

Adding activation records...OK

Uploading Activation Record (activation_record.plist) - Success

Adding FairPlay files...

Uploading FairPlay (IC-Info.sisv) - Success

Skip Setup...OK

Disabling OTA updates and rebooting...OK

Operation {Hello Screen ios 11.x/18.x} ID: 7C20E820C8280AA1

Elapsed time 00:11 -- Version 5.3.3 Release 0001 Build 582
 
  • Like
Reactions: GsmToto

GsmToto

Super Moderator
Jan 1, 2021
5,793
22,447
UK
Skype
gsmtoto
Sonork ID
100.1684601
Preparing Environment : OK
Monitoring for device...
✓ Device Connected
Model: A12 | XS Max Bypass (CN) (iPhone11,6)
iOS Version: 18.7.2
Serial Number: F2LYX2RBKPH4
UDID: 00008020-000664A63491002E
Activation State: Unactivated
Unsupported iOS version: 18.7.2
User chose to proceed although the version is under testing.
Starting activation process...
Starting attempt 1/6
Activation attempt 1 in progress...
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device reconnected successfully
Collecting system logs...
System logs collected successfully via IosClass_ method
Extracting log archive: 00008020-000664A63491002E.logarchive
Log archive extracted successfully to: D:/eft tool/update33/./00008020-000664A63491002E.logarchive
Analyzing device data...
Contacting activation server...
Server response received successfully
Downloading activation data...
Activation data downloaded successfully
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Applying activation data to device via IosClass_ method...
Activation data applied successfully via exe method
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device reconnected successfully
Attempt 1 failed
Preparing next attempt...
Starting attempt 2/6
Activation attempt 2 in progress...
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device reconnected successfully
Collecting system logs...
System logs collected successfully via IosClass_ method
Extracting log archive: 00008020-000664A63491002E.logarchive
Log archive extracted successfully to: D:/eft tool/update33/./00008020-000664A63491002E.logarchive
Analyzing device data...
Contacting activation server...
Server response received successfully
Downloading activation data...
Activation data downloaded successfully
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Removing file from device
File removed successfully from device
Applying activation data to device via IosClass_ method...
Activation data applied successfully via exe method
Rebooting device via IosClass_ method...
Device rebooted successfully
Waiting for device to reconnect...
Device activated during reconnection
=== ACTIVATION SUCCESSFUL ===
Device has been successfully activated!
Operation {Bypass A12} ID: A3A4625C1ED53885
Elapsed time 04:53 -- Version 5.3.3 Release 0001 Build 582
 

GsmToto

Super Moderator
Jan 1, 2021
5,793
22,447
UK
Skype
gsmtoto
Sonork ID
100.1684601
Waiting For Device Connection...
USB PORT: MediaTek USB Port (COM35)
Port: MediaTek USB Port (COM35)
Manufacturer: MediaTek Inc.
OPEN COM PORT... OK
Handshake... OK
Read CHIP ID... OK
HW-CODE: 0X766
CPU: MT6765
Read Chip Version... OK
HW-SUBCODE: 0X8A00
HW-VERSION: 0XCA00
SW-VERSION: 0X0000
Read Phone Configuration... OK
Bypass Security Protection... OK
Dump EMI Config... OK
Send Protection Files BROM... OK
Check BROM status... OK
Setup DEVICE... OK
Init HARDWARE... OK
Setup DEVICE... OK
Read DEVICE Status... BROM
Load emi config from customize model... FAIL
EMI NOT FOUND
Init EXT RAM... OK
Send Download Agent... OK
Send Download Agent Extended... OK
Read Device Info... OK
EMMC INFO:
EMMC Boot1 Size: 4.00 MB
EMMC Boot2 Size: 4.00 MB
EMMC RPMB Size: 4.00 MB
EMMC USER Size: 58.24 GB
EMMC CID: 15010052483634414205EFEF9B75C561
RAM INFO:
SRAM Size: 224.00 KB
DRAM Size: 4.00 GB
CHANGE TO HIGH-SPEED PORT... OK
Server ... OK
Get Partition ... OK
Read Build Prop Info... OK
Manufacturer: OPPO
Android Version: 8.1.0 (Oreo)
Security Patch: 2021-04-05
Build ID: O11019
Build: b
Read Internal Storage Info... OK
USERDATA: 51.52 GB
USERDATA: ENCRYPTED
Prepare data... OK
RESET FRP... OK
READ MISC PARTITION... OK
Patch misc partition to format data... OK
Finalize... OK
Reboot... OK
Elapsed Time: 10 secs, 557 msecs
 

GsmToto

Super Moderator
Jan 1, 2021
5,793
22,447
UK
Skype
gsmtoto
Sonork ID
100.1684601
Waiting For Device Connection...
USB PORT: MediaTek USB Port (COM35)
Port: MediaTek USB Port (COM35)
Manufacturer: MediaTek Inc.
OPEN COM PORT... OK
Handshake... OK
Read CHIP ID... OK
HW-CODE: 0X766
CPU: MT6765
Read Chip Version... OK
HW-SUBCODE: 0X8A00
HW-VERSION: 0XCA00
SW-VERSION: 0X0000
Read Phone Configuration... OK
Bypass Security Protection... OK
Dump EMI Config... OK
Send Protection Files BROM... OK
Check BROM status... OK
Setup DEVICE... OK
Init HARDWARE... OK
Setup DEVICE... OK
Read DEVICE Status... BROM
Load emi config from customize model... FAIL
EMI NOT FOUND
Init EXT RAM... OK
Send Download Agent... OK
Send Download Agent Extended... OK
Read Device Info... OK
EMMC INFO:
EMMC Boot1 Size: 4.00 MB
EMMC Boot2 Size: 4.00 MB
EMMC RPMB Size: 4.00 MB
EMMC USER Size: 58.24 GB
EMMC CID: 15010052483634414205EFEF9B75C561
RAM INFO:
SRAM Size: 224.00 KB
DRAM Size: 4.00 GB
CHANGE TO HIGH-SPEED PORT... OK
Server ... OK
Get Partition ... OK
Read Build Prop Info... OK
Manufacturer: OPPO
Android Version: 8.1.0 (Oreo)
Security Patch: 2021-04-05
Build ID: O11019
Build: b
Read Internal Storage Info... OK
USERDATA: 51.52 GB
USERDATA: ENCRYPTED
Prepare data... OK
RESET FRP... OK
READ MISC PARTITION... OK
Patch misc partition to format data... OK
Finalize... OK
Reboot... OK
Elapsed Time: 10 secs, 557 msecs
 

GsmToto

Super Moderator
Jan 1, 2021
5,793
22,447
UK
Skype
gsmtoto
Sonork ID
100.1684601
Preparing to download and extract driver package...
Driver files extracted successfully!
Monitoring for device...
✓ Device Connected
Model: A12 | XR Bypass (iPhone11,8)
iOS Version: 18.7.2
Serial Number: DX4FN7SYKXKN
UDID: 00008020-001169083CF1402E
Activation State: Unactivated
Unsupported iOS version: 18.7.2
User chose to proceed although the version is under testing.
Starting activation process...
Starting attempt 1/6
Activation attempt 1 in progress...
Restarting device via exe method...
Device restarted successfully
Waiting for device to reconnect...
Device reconnected successfully
Collecting system logs...
System logs collected successfully via exe method
Analyzing device data...
Contacting activation server...
Server response received successfully
Downloading activation data...
Activation data downloaded successfully
Applying activation data to device via exe method...
Activation data applied successfully via exe method
Restarting device via exe method...
Device restarted successfully
Waiting for device to reconnect...
Device reconnected successfully
Attempt 1 failed
Preparing next attempt...
Starting attempt 2/6
Activation attempt 2 in progress...
Restarting device via exe method...
Device restarted successfully
Waiting for device to reconnect...
Device reconnected successfully
Collecting system logs...
System logs collected successfully via exe method
Analyzing device data...
Contacting activation server...
Server response received successfully
Downloading activation data...
Activation data downloaded successfully
Applying activation data to device via exe method...
Activation data applied successfully via exe method
Restarting device via exe method...
Device restarted successfully
Waiting for device to reconnect...
Device activated during reconnection
=== ACTIVATION SUCCESSFUL ===
Device has been successfully activated!
Operation {Bypass A12} ID: 89D60000BDBCC1FD
Elapsed time 05:45 -- Version 5.3.3 Release 0001 Build 582
 

GsmToto

Super Moderator
Jan 1, 2021
5,793
22,447
UK
Skype
gsmtoto
Sonork ID
100.1684601
Waiting for device...
Download port: MediaTek PreLoader USB VCOM (Android) (COM5)
Port: MediaTek PreLoader USB VCOM (Android) (COM5)
Manufacturer: MediaTek Inc.
Connect to comport... OK
Reboot to meta mode...
Waiting For Server... OKOK
Waiting for server........ OK
Wait for meta device... OK
Connect to meta device... OK
read Modem Info... OK
switch To Modem... OK
Read device info... OK
BRAND: TECNO
MODEL: TECNO CL6K
PRODUCT: CL6K-OP
MANUFACTURER: TECNO
ANDROID VERSION: 14
SECURITY PATCHED: 2024-02-05
BUILD ID: UP1A.231005.007
DISPLAY ID: CL6K-H898EF-U-OP-240327V439
BUILD DATE: WED MAR 27 07:24:15 CST 2024
BUILD: 240327V439
Load modem db data... OK
Init modem db data... OK
Init modem db data... OK
+Enable Adb.......
step1....... OK
Reboot... OK
Waiting adb Device....... OK
Reset FRP....... OK
Reboot....... OK
Elapsed Time: 4 mins, 7 secs, 967 msecs
 

arshad iqbal

Active Member
Aug 3, 2017
20
7
punjab pakistan
IPHONE XR HELLO BYPASS

Preparing to download and extract driver package...

Downloading Files (attempt 1/4)...

Extracting driver archive... 100%Driver files extracted successfully!

Monitoring for device...

✓ Device Connected

Model: A12 | XR Bypass (iPhone11,8)

iOS Version: 18.7.2

Serial Number: FK1XN5YNKXKV

UDID: 00008020-001A752A349A002E

Activation State: Unactivated

Unsupported iOS version: 18.7.2

User chose to proceed although the version is under testing.

Starting activation process...

Starting attempt 1/6

Activation attempt 1 in progress...

Restarting device via exe method...

Device restarted successfully

Waiting for device to reconnect...

Device reconnected successfully

Collecting system logs...

System logs collected successfully via exe method

Analyzing device data...

Contacting activation server...

Server response received successfully

Downloading activation data...

Activation data downloaded successfully

Applying activation data to device via exe method...

Activation data applied successfully via exe method

Restarting device via exe method...

Device restarted successfully

Waiting for device to reconnect...

Device reconnected successfully

Attempt 1 failed

Preparing next attempt...

Starting attempt 2/6

Activation attempt 2 in progress...

Restarting device via exe method...

Device restarted successfully

Waiting for device to reconnect...

Device reconnected successfully

Collecting system logs...

System logs collected successfully via exe method

Analyzing device data...

Contacting activation server...

Server response received successfully

Downloading activation data...

Activation data downloaded successfully

Applying activation data to device via exe method...

Activation data applied successfully via exe method

Restarting device via exe method...

Device restarted successfully

Waiting for device to reconnect...

Device activated during reconnection

=== ACTIVATION SUCCESSFUL ===

Device has been successfully activated!

Operation {Bypass A12} ID: 53380D4BC1D7F17F

Elapsed time 04:47 -- Version 5.3.3 Release 0001 Build 582
 
  • Like
Reactions: GsmToto

arshad iqbal

Active Member
Aug 3, 2017
20
7
punjab pakistan
IPHONE 6S HELLO BYPASS


Preparing Environment : OK

Check Apple drivers..... ✓..

Checking iDevices.....OK

Preparing paths.....OK

Checking SSH......Checking SSH......P:14..OK

Reading iDevice info.....OK

Activation Status: Unactivated

BuildVersion: 19H390

CPU Arch: arm64

Device Class: iPhone

Device Name: iPhone

Firmware Version: iBoot-7459.140.15

Device IMEI: 359486080000000

Device MEID: 35948600000000

Product Name: iPhone OS

Product Type: iPhone 6s

IOS Version: 15.8.4

SIM Status: kCTSIMSupportSIMStatusNotInserted

Device Serial Number: FRDVH0YGGRYG

DeviceID: cb7e77ea1a163c8ab52cd290c370cd29d4110434

MEID Status: Supported

Preparing Hello....OK

Generating Activation Files....OK

Uploading recache buffer - Success

Uploading getkey buffer - Success

Uploading kernel buffer - Success

Setting permissions...

Executing recache and kernel...

Downloading temp.plist - Success

Downloading com.apple.MobileGestalt.plist - Success

Re-uploading plist files - Success

Adding activation records...OK

Uploading Activation Record (activation_record.plist) - Success

Adding FairPlay files...

Uploading FairPlay (IC-Info.sisv) - Success

Skip Setup...OK

Disabling OTA updates and rebooting...OK

Operation {Hello Screen ios 11.x/18.x} ID: 60D06A3B4AF29292

Elapsed time 00:12 -- Version 5.3.3 Release 0001 Build 582
 
  • Like
Reactions: GsmToto

arshad iqbal

Active Member
Aug 3, 2017
20
7
punjab pakistan
IPHONE X REMOVE ICLOUD OPEN MENU


Remove icloud:..With Code: 358635 ..

Device:iPhone

Mode:CLEAN

Model:iPhone X

Removed:200: Done

Status:OFFLINE

-----------------------------

If the process is successful, Turn OFF WiFi then check iCloud services before flashing.

Operation {Remove Icloud Open Menu without USB/Without Proxy} ID: FA65C21B5DC94515

Elapsed time 00:34 -- Version 5.3.3 Release 0001 Build 582
 
  • Like
Reactions: GsmToto

GsmToto

Super Moderator
Jan 1, 2021
5,793
22,447
UK
Skype
gsmtoto
Sonork ID
100.1684601
Waiting for server........ OK
Prepare data... OK
Downloading da file... OK
Waiting For Device Connection...
USB PORT: MediaTek PreLoader USB VCOM (Android) COM8
Port: MediaTek USB Port COM8
Manufacturer: MediaTek Inc.
OPEN COM PORT... OK
Handshake... OK
Connect brom... OK
Check BROM status... OK
Setup DEVICE... OK
Init HARDWARE... OK
Setup DEVICE... OK
Read DEVICE Status... OK
Init EXT RAM... OKOK
HW-CODE: 0X1208
CPU: MT6789
Send Download Agent... OK
Read Sys Property... OK
SYS PROPERTY:
DA.SLA: DISABLED
Read Device Info... OK
DEV HW INFO:
battery_voltage: 4193
id: 4B4D354C3930303144412D423432340000000000
lua0_size: 0x400000
lua1_size: 0x400000
lua2_size: 0x1dcb000000
ram_size: 0x100000000
random_id: cd6b5d3558df62c19033dfdea3959db4
storage: UFS
Read DA Info... OK
DEV DA INFO:
build: Nov 15 2024:09:57:11
da_version: 2021
version: 1.0
Read Partition Table... OK
Reset frp... OK
Reset persistent... OK
Reset userdata... OK
Finalize... OK
Reboot... OK
 

GsmToto

Super Moderator
Jan 1, 2021
5,793
22,447
UK
Skype
gsmtoto
Sonork ID
100.1684601
Wait For Device...
Download port: HUAWEI USB COM 1.0 (COM7)
Port: HUAWEI USB COM 1.0 (COM7)
Manufacturer: HUAWEI Incorporated
Waiting for server........ OK
Connect to comport... OK
Handshake... OK
Writing loaders:
Write Loader1... OK
Write Loader2... OK
Wait For Fastboot Device... OK
Connect To Fastboot Device... OK
Device Model: FRD-L19
Device Serial: P6LDU16923003133
Device IMEI: 861923030892328
Device IMEI2: 861923030914734
Device Firmware: :FRD-L19C432B399
Device FB Lock: UNLOCKED
Device USER Lock: LOCKED
Device Lock: unlocked
Remove frp lock... OK
 

arshad iqbal

Active Member
Aug 3, 2017
20
7
punjab pakistan
iPhone 7 Plus (Global) Bypass With Signal



Preparing Environment : OK

Check Apple drivers..... ⚠

Installing...Installed ✔

Preparing Environment : OK

Check Apple drivers..... ✓..

Check BOOT.....NO

Reading iDevice info.....OK

Device NAME: iPhone 7 Plus (Global)

Product NAME: iPhone9,2

Device MODEL: d11ap

Device ECID: 0x11595624866326

Device CPID: 8010

Device SRTG: IBOOT-2696.0.0.1.33

Device MODE: DFU

Device CPU: A10

Waiting for server.....OK

Checking PWNDFU1.....NO

iDevices PWNDFU :.....

Verifying Drivers : Ok

Ok

Supported device: A10 PWND status: false.

Device CPU: A10

Preparing Environment : OK

Check Apple drivers..... ⚠

Installing...Not found ⚠

PWNDFU IS.....Failed

Preparing Environment : OK

Check Apple drivers..... ⚠

Installing...Not found ⚠

Installed ✔

NO

iDevices PWNDFU :.....

Verifying Drivers : Ok

Ok

Supported device: A10 PWND status: false.

Device CPU: A10

Preparing Environment : OK

Check Apple drivers..... ⚠

Installing...Not found ⚠

PWNDFU IS.....Ok

Preparing Environment : OK

Check Apple drivers..... ⚠

Installing...Installed ✔

OK

Exploiting Device [1]....

Sending File (iBSS.img4).....Failed

Sending File (iBSS.img4).....OK

Sending File (iBEC.img4).....OK

Sending File (bootlogo.img4).....OK

Sending File (devicetree).....OK

Sending File (ramdisk).....OK

Sending File (trustcache).....OK

Sending File (kernel).....OK

Successfully!

Checking iDevices.....OK

Checking SSH......P:16..OK

Waiting for server.....OK

Mounting IPhone/Ipad partition (Hello/Passcode).......OK

BuildID:11DB66EE-7FCE-11F0-8A10-0BB8F57C98B6

ProductBuildVersion:19H394

ProductCopyright:1983-2025 Apple Inc.

ProductName:iPhone OS

ProductVersion:15.8.5

SystemImageID:5D0E2283-DA43-4ECD-A811-377ECE4480E3

Checking iDevices.....OK

Checking SSH......P:16..OK

Waiting for server.....OK

Activation Files Backing up .......MAKING IC-Info.sisv...OK

Checking backup files...OK

Path:Backups/11595624866326

LastKnownICCID:8992046704241943318

PhoneNumber:

Checking iDevices.....OK

Preparing paths.....OK

Checking SSH......P:16..OK

Erase All Content and Settings ..........OK

Operation {Boot Passcode/Hello IOS 11.x Up 16.x One Click} ID: 4F59C699EE8CE2A8

Elapsed time 04:23 -- Version 5.3.4 Release 0001 Build 601
 

GsmToto

Super Moderator
Jan 1, 2021
5,793
22,447
UK
Skype
gsmtoto
Sonork ID
100.1684601
Waiting For Device Connection...
USB PORT: MediaTek USB Port (COM35)
Port: MediaTek USB Port (COM35)
Manufacturer: MediaTek Inc.
OPEN COM PORT... OK
Handshake... OK
Read CHIP ID... OK
HW-CODE: 0X326
CPU: MT6755
Read Chip Version... OK
HW-SUBCODE: 0X8A00
HW-VERSION: 0XCB00
SW-VERSION: 0X0001
Read Phone Configuration... OK
Bypass Security Protection... OK
Dump EMI Config... OK
Send Protection Files BROM... OK
Check BROM status... OK
Setup DEVICE... OK
Init HARDWARE... OK
Setup DEVICE... OK
Read DEVICE Status... BROM
Load emi config from customize model... FAIL
EMI NOT FOUND
Init EXT RAM... OK
Send Download Agent... OK
Send Download Agent Extended... OK
Read Device Info... OK
EMMC INFO:
EMMC Boot1 Size: 4.00 MB
EMMC Boot2 Size: 4.00 MB
EMMC RPMB Size: 4.00 MB
EMMC USER Size: 14.56 GB
EMMC CID: 150100474536424D420304E5AAF87493
RAM INFO:
SRAM Size: 256.00 KB
DRAM Size: 3.00 GB
CHANGE TO HIGH-SPEED PORT... OK
Server ... OK
Get Partition ... OK
Read Build Prop Info... OK
Brand: OPPO
Model: CPH1717
Product: CPH1717
Manufacturer: OPPO
Market Name: OPPO A71
Android Version: 7.1.1 (Nougat)
Security Patch: 2019-10-05
Build ID: N4F26M
Build Date: WED JUL 1 20:11:21 CST 2020
Display ID: CPH1717EX_11_A.28_200701
Build: 1593605483
OTA Version: CPH1717EX_11.A.28_0280_202007011950
Read Internal Storage Info... OK
USERDATA: 9.59 GB
USERDATA: ENCRYPTED
Prepare data... OK
RESET FRP... OK
READ MISC PARTITION... OK
Patch misc partition to format data... OK
Finalize... OK
Elapsed Time: 22 secs, 961 msecs
 

GsmToto

Super Moderator
Jan 1, 2021
5,793
22,447
UK
Skype
gsmtoto
Sonork ID
100.1684601
Checking fastboot device.....OK
Reading info.....OK
Device Model: HUAWEI VNS-L31
Device Serial: 4TE78654781265
Device IMEI: 86092****532897
Device Firmware: :VNS-L31C02B123
Device FB Lock: LOCKED
Device USER Lock: LOCKED
Device Lock: locked
Waiting for server.....OK
Reading data.....OK
Posting data to server.....OK
Waiting for server response.....OK
Unlocking device.....OK
Resetting FRP.....OK
Operation {Reset FRP using server} ID: 1F09E64E219DEFBC
Elapsed time 00:21 -- Version 5.3.4 Release 0001 Build 601
 

GsmToto

Super Moderator
Jan 1, 2021
5,793
22,447
UK
Skype
gsmtoto
Sonork ID
100.1684601
OPPO A78 FRP DONE
2025-12-11 19:01:57 - Added new log entry:
Waiting For Device Connection...
USB PORT: MediaTek PreLoader USB VCOM_V1632 (Android) (COM3)
Port: MediaTek PreLoader USB VCOM_V1632 (Android) (COM3)
Manufacturer: MediaTek Inc.
OPEN COM PORT... OK
Handshake... OK
Read CHIP ID... OK
HW-CODE: 0X766
CPU: MT6765
Read Chip Version... OK
HW-SUBCODE: 0X8A00
HW-VERSION: 0XCA00
SW-VERSION: 0X0000
Read Phone Configuration... OK
Send Protection Files BROM... OK
Check BROM status... OK
Setup DEVICE... OK
Init HARDWARE... OK
Setup DEVICE... OK
Read DEVICE Status... PRELOADER
Send Download Agent... OK
Read Device Info... OK
EMMC INFO:
EMMC Boot1 Size: 4.00 MB
EMMC Boot2 Size: 4.00 MB
EMMC RPMB Size: 4.00 MB
EMMC USER Size: 58.24 GB
EMMC CID: 11010030363447333050D5199FAE75CB
RAM INFO:
SRAM Size: 224.00 KB
DRAM Size: 3.00 GB
CHANGE TO HIGH-SPEED PORT... OK
Server ... OK
Get Partition ... OK
Read Build Prop Info... OK
Brand: OPLUS
Model: OSSI
Product: OSSI
Manufacturer: OPLUS
Android Version: 12
Security Patch: 2022-06-05
Build ID: SP1A.210812.016
Build Date: THU JUN 30 13:04:19 CST 2022
Display ID: SP1A.210812.016 RELEASE-KEYS
Build: 9656565459787
Read Internal Storage Info... OK
USERDATA: 47.47 GB
USERDATA: ENCRYPTED
Prepare data... OK
RESET FRP... OK
Finalize... OK
Reboot... OK
 
Top