★★★ Post All Successfully Repaired Phones By Hydra Tool ★★★

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A37 Edl Frp Remove done With by Hydra
190400000615_HQTool.exe_EDL_FRP_RemoveAuto_12-06-2021-131755.jpeg

Brand : OPPO Model : A37 Storage : Auto
Loader: 007050E100000000_99c8c13e374c34d8_959439aa_QUALCOMM_LENOVO_peek_8916.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM36)
SymbolicName :??USB#VID_05C6&PID_9008#5&2363eed3&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 03/25/2016,2.1.2.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Phone Information .....
Brand : OPPO
Vendor : OPPO
Model : A37f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20180817.014458 release-keys
Board : msm8916
Display ID : A37fEX_11_180817
Security Patch : 2018-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo S1 Pro Remove Screen Security With Data Loss done by Hydra
190600001174_HQTool.exe_EDL_FormatUserDataAuto_12-06-2021-150403.jpeg
Brand : VIVO Model : S1 Pro (PD1945F) Storage : Auto
Loader: 0000000000730003_a7df36ffd7ab557c_90719675_VIVO.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM13)
SymbolicName :??USB#VID_05C6&PID_9008#6&3a720ed3&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 05/29/2019,2.1.3.7

Getting device info .. . ...
Serial No.: 0xCAE6A090
HW_ID : 0010A0E100730003
MSM ID : 0x0010A0E1, SM6125-Qualcomm Snapdragon 665
MODEL_ID : 0x0003
OEM_ID : 0x0073 - VIVO
PBL Ver : 00000000
PK HASH : a7df36ffd7ab557c67a6c26675e2795c92271308d7169bedb84424c862b

Firehose Loader [0000000000730003_a7df36ffd7ab557c_90719675_VIVO.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : VIVO
HW_ID : 0000000000730003
Vendor : VIVO
OEM_ID : 0073
MODEL_ID : 0003
SW_ID : 00000003
APP_ID : 00000000
pk_hash : a7df36ffd7ab557c67a6c26675e2795c92271308d7169bedb84424c862bc7b646907dd79989578590fb6370a940
OEM_VERSION : compiler02024095
IMAGE_VARIANT : NicobarPkgLAA
QC_VERSION : BOOT.XF.4.0-00210-NICOBARLAZ-1
--------------------------------------------------

SaharaBoot... Ok
Sending ..............................b Okb0
Connecting to Firehose...
Ping ..................... Ok
Configuration........
Identifying Chip.... ....UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Sep 9 2020 - 00:57:45

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 429
Serial Number : 2037279096
Firmware Version : 110
Product Name : H9HQ16AFAMMDAR
Physical titions : 6
Total Logical Blocks:
Drive [0] 30939136 [118.023 GB]
Drive [1] 2048 [8 MB]
Drive [2] 2048 [8 MB]
Drive [3] 16384 [64 MB]
Drive [4] 262144 [1024 MB]
Drive [5] 16384 [64 MB]

Protocol : Universal
Running : Ok

Phone Information ......
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2021-09-01
Platform : =SM6125

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items

Formatting Userdata...
Method : 0
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - UFS] OkOk Ok

Elapsed Time : 00:00:10
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9C (Angelica) Bootloader Unlock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM7)
Device : 6&7d0d375&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#6&7d0d375&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766 MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : F54229E68BD14FAA0BFDBF47329DA
Stage 1.. [Size:216440]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 773DEC44B72FBE4ABEA82CE561790FAF
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 45010044413430333201BD94601337C3 - DA4032
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_k65v1_64_bsp.bin
Creating Scatter file... C:Hydra ToolBackupAuto0766__120621114041MT6765_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x3BD88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x3DE88000] 64 MB -> nvdata.bin...0 Ok
-protect1 [0x45522000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x45D22000] 10.867 MB -> protect2.bin...0 Ok
-persist [0x47000000] 48 MB -> persist.bin...0 Ok
-nvram [0x52E80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0766__120621114041
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 773DEC44B72FBE4ABEA82CE561790FAF
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 45010044413430333201BD94601337C3 - DA4032

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:51
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei Y6 2018 (ATU-L22) Edl Frp Remove One Click Done With by Hydra

Brand : HUAWEI Model : ATU-L22 (Y6 2018) Storage : Auto
Loader: 000560E10015003A_6bc369511da9cadb_c0ba0f0a_HUAWEI_QUALCOMM_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : HS-USB Diagnostics 9008 (COM35)
SymbolicName :??USB#VID_05C6&PID_9008#6&1c2dbb3f&0&7#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/20/2017,2.1.2.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 647538807
Firmware Version : 858796104
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14.676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Vendor : unknown
ID : OPR6.170623.013
SDK : 26
Release : 8.0.0
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Description : generic_a53-user 8.0.0 OPR6.170623.013 eng.root.20200707.022230 test-keys
Display ID : System 8.0.0.073(09LN)
Security Patch : 2020-02-01
Fingerprint : Huawei/generic_a53/generic_a53:8.0.0/OPR6.170623.013/root07070222:user/test-keys

Reading GPT[3]
Drive [0] 56 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:05
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9A (dandelion) Bootlaoder Unlock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM8)
Device : 6&265d47d&0&6
SymbolicName :??USB#VID_0E8D&PID_0003#6&265d47d&0&6#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : A910CFE7A5A6B9488938BD5F9A95ADF7
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000E8F800000 -58.242 GB
eMMC CID : 450100444134303634013D0D58178789 - DA4064

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Huawei Honor 7X (BND-L21) Frp Remove With By Hydra


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading Device Information...
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
hotainfo......
#hotainfo_len :
#C_version :
#D_version :
#PLMN :
#BoardID :
#DeviceName :
Build number : BND-L21C636B152
Product Model : BND-L21
hwnff_ver : Ver2.3
key_version : huawei_key_v1
product : hi6250
system_update_state :
vendorcountry : hw/spcseas
soc_id : 0.5
ro_build_fingerprint : 0.5
ro_build_version_full : 0.5
ro_build_version_qcom : 0.5
psid.........
#SN : 3RP4C18408000720
#IMEI1 : ****************
#IMEI2 : ****************

Security Info....
#Dongle_info : 0.5
#FB Lock State : UNLOCKED
#USER Lock State : LOCKED

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Huawei Fastboot Service...
Factory Reset Protection...
Removing.... Ok

Elapsed Time : 00:00:03
 

Attachments

  • 190900002095_HMainTool.exe_FB_Huawei_FRP_12-07-2021-141655.jpeg
    190900002095_HMainTool.exe_FB_Huawei_FRP_12-07-2021-141655.jpeg
    210.2 KB · Views: 0

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 8 (olive) Edl Flashing With by Hydra

Getting device info .. . ...
Serial No.: 0x9EDAC1D9
HW_ID : 000BF0E100720000
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Firehose Loader [Xiaomi_Redmi_8_Olive.mbn]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _auth_peek
Version : 3
Code_size : 320
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000BF0E100720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 0000000100000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : c4-miui-ota-bd104.bj
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00073
--------------------------------------------------

SaharaBoot... Ok
Sending .......................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[IbE-bjy4SYq9ctcjwniFevJDEw0]
Signature @256bytes Authentication.... Accepted ......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 2794108536
Firmware Version : 162
Product Name : HCG8a4
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.191014.001
SDK : 29
Release : 10
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-GB
Miui Ver : V125
Mod_device : olivelite_global
Security Patch : 2021-09-01
Emmc_size : 16GB

Reading GPT[3]
Drive [0] 64 Items
Drive [1] 0 Items
Drive [2] 0 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backup__10_Security_120821113657.sec
Backup Security Success....

----------------------------
Flashing Selected titions....
- sec (0)b [sec.dat] b0 Skipped
- config (0)b [config.bin] b0 Ok
- vbmeta (0)b [vbmeta.img] b0 Ok
- vbmetabak (0)b [vbmeta.img] b0 Ok
- devcfg (0)b [devcfg.mbn] b0 Ok
- devcfgbak (0)b [devcfg.mbn] b0 Ok
- apdp (0)b [dummy.img] b0 Ok
- msadp (0)b [dummy.img] b0 Ok
- sbl1 (0)b [sbl1.mbn] b0 Ok
- sbl1bak (0)b [sbl1.mbn] b0 Ok
- rpm (0)b [rpm.mbn] b0 Ok
- rpmbak (0)b [rpm.mbn] b0 Ok
- cmnlib (0)b [cmnlib_30.mbn] b0 Ok
- cmnlibbak (0)b [cmnlib_30.mbn] b0 Ok
- cmnlib64 (0)b [cmnlib64_30.mbn] b0 Ok
- cmnlib64bak (0)b [cmnlib64_30.mbn] b0 Ok
- keymaster (0)b [km4.mbn] b0 Ok
- keymasterbak (0)b [km4.mbn] b0 Ok
- misc (0)b [misc.img] b0 Ok
- aboot (0)b [emmc_appsboot.mbn] b0 Ok
- abootbak (0)b [emmc_appsboot.mbn] b0 Ok
- tz (0)b [tz.mbn] b0 Ok
- tzbak (0)b [tz.mbn] b0 Ok
- dtbo (0)b [dtbo.img] b0 Ok
- dtbobak (0)b [dtbo.img] b0 Ok
- splash (0)b [splash.img] b0 Ok
- dsp (0)b [adspso.bin] b0 Ok
- dspbak (0)b [adspso.bin] b0 Ok
- persist (0)b [persist.img] b0 Ok
- mdtp (0)b [mdtp.img] b0 Ok
- mdtpbak (0)b [mdtp.img] b0 Ok
- boot (0)b [boot.img] b0 Ok
- recovery (0)b [recovery.img] b0 Ok
- cache (0)b [cache.img] b0 Ok
- modem (0)b [NON-HLOS.bin] b0 Ok
- system (0)b [system.img] b0 Ok
- vendor (0)b [vendor.img] b0 Ok
- cust (0)b [cust.img] b0 Ok
- userdata (0)b [userdata.img] b0 Ok
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok

Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-34.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-33.] OK
0 [CRC32(2,8192)] OK
0 [CRC32(NUM_DISK_SECTORS-33.,8192)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 0
Set bootable storage drive 0 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:07:48
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo Y11 (1906) Edl Frp Remove One click With by Hydra

Brand : VIVO Model : Y11 (1906) Storage : Auto
Loader: 000BF0E100000000_60ba997fef6da9f0_d8fbe714_QUALCOMM_VIVO_wut_peek_8937.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM87)
SymbolicName :??USB#VID_05C6&PID_9008#7&18b013f7&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0xDFEEC037
HW_ID : 000BF0E100000000
MSM ID : 0x000BF0E1, SDM439-Qualcomm Snapdragon 439
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43

Firehose Loader [000BF0E100000000_60ba997fef6da9f0_d8fbe714_QUALCOMM_VIVO_wut_peek_8937.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8937
Tag : _wut_peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : VIVO
HW_ID : 000BF0E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43
OEM_VERSION : compiler0182
IMAGE_VARIANT : FAADANAZA
QC_VERSION : BOOT.BF.3.3.2-00063
--------------------------------------------------

SaharaBoot... Ok
Sending ...................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8937
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3370178738
Firmware Version : 8
Product Name : GD6BMB
Physical titions : 3
Total Logical Blocks:
Drive [0] 61071360 [29.121 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information ......
ID : RP1A.200720.012
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-US
Security Patch : 2021-10-01
Emmc_size : 16GB
Platform : =SDM439

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] 1 **WARNING Unauthorized tag '' 2 <?xml version="1.0" encoding="UTF-8" ?><data><response value="NAK" /></data>Failed
- Removing FRP [Erase Safety Tag] OkOk Ok

Elapsed Time : 00:00:06
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 8 Pro (begonia) Bootloader Unlock One Click With by Hydra


=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM9)
Device : 5&393fb5a&0&2
SymbolicName :??COM9
Driver Ver : 05/26/2008,6.85.10.27

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0813 MT6785 [6785]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
C:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0813 MT6785 [6785]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 77B47FDF199B4B57201642D844F26DB4
Stage 1.. [Size:234968]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 350502C2E3A2091399F9F5E35962584A
ERAM Size : 0x0000000000080000 -512 KB
IRAM Size : 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000000EE5800000 -59,586 GB
UFS CID : f1-'01H9HQ53AECMMDAR
UFS UNIQID : 0d9897a4e2c6000000000000
Executing : ACCEPTED...
f0
Reading GPT0 -UFS [0x00008000] 0 130 Items

Reading System Info
Vendor : Xiaomi
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 11 RP1A.200720.011 V12.5.2.0.RGGRUXM release-keys
Miui Ver : V125
Mod_device : begonia_ru_global
Display ID : RP1A.200720.011
Security Patch : 2021-08-01
StorageType : mtp
Userdata State : Not Encrypted
0
Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin... Ok0
-> Renaming Preloader.... preloader_begonia.bin0
Creating Scatter file... C:Hydra ToolBackupAuto0813__120821115906MT6785_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin... Ok
-frp [0x05888000] 1024 KB -> frp.bin... Ok
-nvdata [0x08188000] 64 MB -> nvdata.bin... Ok
-persist [0x0E188000] 70,469 MB -> persist.bin... Ok
-protect1 [0x12800000] 8 MB -> protect1.bin... Ok
-protect2 [0x13000000] 8 MB -> protect2.bin... Ok
-nvram [0x17580000] 64 MB -> nvram.bin... Ok
Done!!!0
C:Hydra ToolBackupAuto0813__120821115906
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 350502C2E3A2091399F9F5E35962584A
ERAM Size : 1 0x0000000000080000 -512 KB
IRAM Size : 1 0x0000000180000000 -6 GB
UFS LU0 Size: 0x0000000000400000 -4 MB
UFS LU1 Size: 0x0000000000400000 -4 MB
UFS LU2 Size: 0x0000000EE5800000 -59,586 GB
UFS CID : f1-'01H9HQ53AECMMDAR
UFS UNIQID : 0d9897a4e2c6000000000000
f0
Reading GPT0 -UFS [0x00008000] 0 130 Items
0

Reading System Info
Vendor : Xiaomi
ID : RP1A.200720.011
SDK : 30
Release : 11
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : begonia-user 11 RP1A.200720.011 V12.5.2.0.RGGRUXM release-keys
Miui Ver : V125
Mod_device : begonia_ru_global
Display ID : RP1A.200720.011
Security Patch : 2021-08-01
StorageType : mtp
Userdata State : Not Encrypted

-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : 0 Ok

Elapsed Time : 00:01:59
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A37 Remove Screen Scurity & Remove Frp One Click With by Hydra

Brand : OPPO Model : A37 Storage : Auto
Loader: 007050E100000000_99c8c13e374c34d8_959439aa_QUALCOMM_LENOVO_peek_8916.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM32)
SymbolicName :??USB#VID_05C6&PID_9008#6&31f1d36d&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 03/25/2016,2.1.2.2

Getting device info . . ...
Serial No.: 0x25E3EC49
HW_ID : 007050E100000000
MSM ID : 0x007050E1, MSM8916-Qualcomm Snapdragon 410
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : cc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f

Firehose Loader [007050E100000000_99c8c13e374c34d8_959439aa_QUALCOMM_LENOVO_peek_8916.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8916
Tag : _peek
Version : 3
Code_size : 96
Signature_size : 256
fhVendor : LENOVO
HW_ID : 007050E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 99c8c13e374c34d8f9afb065ea4c733e6b1b21cbc5a78705f041eb24acdd5fe5
OEM_VERSION :
IMAGE_VARIANT :
QC_VERSION :
--------------------------------------------------

SaharaBoot... Ok
Sending .....b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 16384
MaxPayloadSizeToTargetInBytesSupported : 16384
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8916
Version : 1


Protocol : Universal
Running : Ok

Phone Information .....
Brand : OPPO
Vendor : OPPO
Model : A37f
ID : LMY47V
SDK : 22
Release : 5.1.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : msm8916_64-user 5.1.1 LMY47V eng.root.20180817.014458 release-keys
Board : msm8916
Display ID : A37fEX_11_180817
Security Patch : 2018-03-01
Platform : msm8916
FRPPST : /dev/block/bootdevice/by-name/config

Reading GPT[3]
Drive [0] 40 Items
Drive [1] 0 Items
Drive [2] 4 Items

Formatting Userdata...
Method : 0
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk Ok

Elapsed Time : 00:00:11
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9A (dandelion) Bootloader Unlock successfully done by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM64)
Device : 6&58952f4&0&1
SymbolicName :??USB#VID_0E8D&PID_0003#6&58952f4&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 9996F71B2885EB0C76A293627277DF6D
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29,121 GB
eMMC CID : 150100424A5444345209A0C7BC3A8751 - BJTD4R

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:03
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Mi 8 (dipper) Edl Flashıng No Auth No credit With by Hydra

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM3)
SymbolicName :??USB#VID_05C6&PID_9008#6&1f333836&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 03/25/2016,2.1.2.2

Getting device info .. . ...
Serial No.: 0x8CDDBEDC
HW_ID : 0008B0E100720000
MSM ID : 0x0008B0E1, SDM845-Qualcomm Snapdragon 845
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : c924a35f39ce1cdd1b8d5a9f3b8e3c51317930431d7a9dd5a55028965fe65
Assigned Loader Not Found...
Hydra Enable Auto search Firehose..
#Please wait...
#Search by filename filter.....
#Found nothing.....
#Attempting Hydra Deep Scanning......
#Found 7 Compatible Files .. Found match Firehose...

Firehose Loader [beryllium_PocoF1.elf]
--------------------------------------------------
Header Type : OLD
TargetMSM :
Tag : _auth
Version : 5
Code_size : 608
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 6000000000010000
Vendor : GENERIC
OEM_ID : 0001
MODEL_ID : 0000
SW_ID : 000000000000000B
APP_ID :
pk_hash : c924a35f39ce1cdd1b8d5a9f3b8e3c51317930431d7a9dd5a55028965fe65
OEM_VERSION : c3-bsp-builder-job007.bj
IMAGE_VARIANT : SDM845LA
QC_VERSION : BOOT.XF.2.0-00369-SDM845LZB-1
--------------------------------------------------

SaharaBoot... Ok
Sending ....................................b Okb0
Connecting to Firehose...
Ping ..................... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[O2UiBTCNpVITFNvg91B9tlBYCII]
Signature @256bytes Authentication.... Accepted ........
Identifying Chip.... ....UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Oct 10 2018 - 22:42:48

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 429
Serial Number : 2037279096
Firmware Version : 103
Product Name : H28S8Q302CMR
Physical titions : 6
Total Logical Blocks:
Drive [0] 30038016 [114.586 GB]
Drive [1] 2048 [8 MB]
Drive [2] 2048 [8 MB]
Drive [3] 8192 [32 MB]
Drive [4] 1179648 [4.5 GB]
Drive [5] 8192 [32 MB]

Protocol : Universal
Running : Ok

Phone Information ......
Vendor : Xiaomi
ID : QKQ1.190828.002
SDK : 29
Release : 10
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : zh-CN
Miui Ver : V12
Security Patch : 2020-09-01

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
D:'be'c5'c9'df4.1'd0'a1'c3'd7'b8'df'cd'a8'd7'ee'd0'c21.31 'c3'dc'c2'eb 123Hydra ToolBackupSecurity_Backup__10_Security_120921101051.sec
Backup Security Success....

----------------------------
Flashing Selected titions....0
- switch (0)b [dummy.img] b0 Ok0
- misc (0)b [misc.img] b0 Ok0
- logfs (0)b [logfs_ufs_8mb.bin] b0 Ok0
- persist (0)b [persist.img] b0 Ok0
- persistbak (0)b [persist.img] b0 Ok0
- cust (0)b [cust.img] b0 Ok0
- recovery (0)b [recovery.img] b0 Ok0
- cache (0)b [cache.img] b0 Ok0
- userdata (0)b [userdata.img] b0 Ok0
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok0
- xbl_config_a (1)b [xbl_config.img] b0 Ok0
- xbl_a (1)b [xbl.img] b0 Ok0
- PrimaryGPT (1)b [gpt_main1.bin] b0 Ok0
- xbl_config_b (2)b [xbl_config.img] b0 Ok0
- xbl_b (2)b [xbl.img] b0 Ok0
- PrimaryGPT (2)b [gpt_main2.bin] b0 Ok0
- PrimaryGPT (3)b [gpt_main3.bin] b0 Ok0
- limits (4)b [dummy.img] b0 Ok0
- qupfw_a (4)b [qupfw.img] b0 Ok0
- qupfw_b (4)b [qupfw.img] b0 Ok0
- storsec_a (4)b [storsec.img] b0 Ok0
- storsec_b (4)b [storsec.img] b0 Ok0
- devcfg_a (4)b [devcfg.img] b0 Ok0
- devcfg_b (4)b [devcfg.img] b0 Ok0
- aop_a (4)b [aop.img] b0 Ok0
- aop_b (4)b [aop.img] b0 Ok0
- cmnlib_a (4)b [cmnlib.img] b0 Ok0
- cmnlib_b (4)b [cmnlib.img] b0 Ok0
- cmnlib64_a (4)b [cmnlib64.img] b0 Ok0
- cmnlib64_b (4)b [cmnlib64.img] b0 Ok0
- keymaster_a (4)b [keymaster.img] b0 Ok0
- keymaster_b (4)b [keymaster.img] b0 Ok0
- bluetooth (4)b [bluetooth.img] b0 Ok0
- hyp_a (4)b [hyp.img] b0 Ok0
- hyp_b (4)b [hyp.img] b0 Ok0
- abl_a (4)b [abl.img] b0 Ok0
- abl_b (4)b [abl.img] b0 Ok0
- tz_a (4)b [tz.img] b0 Ok0
- tz_b (4)b [tz.img] b0 Ok0
- logo (4)b [logo.img] b0 Ok0
- dsp (4)b [dsp.img] b0 Ok0
- boot (4)b [boot.img] b0 Ok0
- modem (4)b [modem.img] b0 Ok0
- vendor (4)b [vendor.img] b0 Ok0
- system (4)b [system.img] b0 Ok0
- PrimaryGPT (4)b [gpt_main4.bin] b0 Ok0
- ImageFv (5)b [imagefv.elf] b0 Ok0
- PrimaryGPT (5)b [gpt_main5.bin] b0 Ok
0
Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:41
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo Y53 Edl Frp Remove With by Hydra

Brand : VIVO Model : Y53 Storage : Auto
Loader: 000560E100000000_60ba997fef6da9f0_203cb924_QUALCOMM_VIVO_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM9)
SymbolicName :??USB#VID_05C6&PID_9008#5&2363eed3&0&4#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 03/25/2016,2.1.2.2

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 3103044850
Firmware Version : 13
Product Name : QE13MB
Physical titions : 3
Total Logical Blocks:
Drive [0] 30535680 [14.561 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20200118.112618 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01181129:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method :
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:06
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi Note 9 (merlin) Bootloader Unlock done With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM11)
Device : 5&16b1d641&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#5&16b1d641&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E7
SBC : 01 (True)
SLA : 02 (True)
DAA : 04 (True)
SWJTAG : 06 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0707 MT6768 [6768]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 903249A3340B2B1D5065D8B27DC6F
Stage 1.. [Size:256504]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing preloader_merlin.bin
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 70601A3D54C87EA1454E0EB3D72061D2
ERAM Size : 0x0000000000070000 -448 KB
IRAM Size : 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 13014E47314A3953391002F65A0F4761 - G1J9S9
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_merlin.bin
Creating Scatter file... C:Hydra ToolBackupAuto0707__121021152012MT6768_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x05508000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x0C4A2000] 64 MB -> nvdata.bin...0 Ok
-persist [0x104A2000] 48 MB -> persist.bin...0 Ok
-protect1 [0x164A2000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x16CA2000] 11.367 MB -> protect2.bin...0 Ok
-nvram [0x19F80000] 64 MB -> nvram.bin...0 Ok
Done!!!
C:Hydra ToolBackupAuto0707__121021152012
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 70601A3D54C87EA1454E0EB3D72061D2
ERAM Size : 1 0x0000000000070000 -448 KB
IRAM Size : 1 0x0000000100000000 -4 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000001D1F000000 -116.484 GB
eMMC CID : 13014E47314A3953391002F65A0F4761 - G1J9S9

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:01:00
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Oppo A1601 (F1S) Read Screen Security With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port_V1632 (COM20)
Device : 5&de3b74c&0&2
SymbolicName :??USB#VID_0E8D&PID_0003#5&de3b74c&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2015,3.0.1504.0

Opened handle..
Handshaking... Ok

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326 MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 01
SBC : 01 (True)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking... Ok

--- ENABLE AUTO PREL DUMP ----
Found
D:Hydra ToolBackupPreloader_dumpprel.tmp
------------------------------

Handshaking...

Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0326 MT6750T [6755]
hw subcode : 8A00
hw version : CB00
sw version : 0001
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)

MEID : 160285D206D094AE38C7745F065E7254
Stage 1.. [Size:219288]
Sending : Please wait.. Accepted

Identifying Protocol...
Protocol : New
Synchronization... SYNC
Preloader Initialization...
sing prel.tmp
Init : Accepted
Executing : SYNC

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : CE8F940CDE53B87E7874DB592385602F
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100525831424D4207C6D2DE4FC335 - RX1BMB
Executing : ACCEPTED...

Reading GPT -EMMC [0x00008000] 130 Items

Reading System Info
Brand : OPPO
Vendor : OPPO
Model : A1601
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15331-user 5.1 LMY47I 1562665575 release-keys
Device : A1601
Board : full_oppo6750_15331
Display ID : A1601EX_11_A.40_190709
Security Patch : 2018-01-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

Autobackup titions
-preloader [0x00000000] 512 KB -> preloader.bin...0 Ok
-> Renaming Preloader.... preloader_oppo6750_15131.bin
Creating Scatter file... D:Hydra ToolBackupAuto0326__121021111852MT6750T_Android_scatter.txt
-pgpt [0x00000000] 32 KB -> pgpt.bin...0 Ok
-frp [0x03F88000] 1024 KB -> frp.bin...0 Ok
-nvdata [0x04088000] 32 MB -> nvdata.bin...0 Ok
-protect1 [0x08088000] 8 MB -> protect1.bin...0 Ok
-protect2 [0x08888000] 15.469 MB -> protect2.bin...0 Ok
-nvram [0x0CF00000] 5 MB -> nvram.bin...0 Ok
Done!!!
D:Hydra ToolBackupAuto0326__121021111852
MTK Phone Loader is NOW RUNNING.

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 1 CE8F940CDE53B87E7874DB592385602F
ERAM Size : 1 0x0000000000038000 -224 KB
IRAM Size : 1 0x00000000C0000000 -3 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000000400000 -4 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 150100525831424D4207C6D2DE4FC335 - RX1BMB

Reading GPT -EMMC [0x00008000] 130 Items


Reading System Info
Brand : OPPO
Vendor : OPPO
Model : A1601
ID : LMY47I
SDK : 22
Release : 5.1
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Description : full_oppo6750_15331-user 5.1 LMY47I 1562665575 release-keys
Device : A1601
Board : full_oppo6750_15331
Display ID : A1601EX_11_A.40_190709
Security Patch : 2018-01-05
Platform : mt6750
FRPPST : /dev/block/platform/mtk-msdc.0/by-name/frp
StorageType : mtp,mass_storage
Userdata State : Not Encrypted

-------------------------------------
Operation : Read Pattern
Processing...
Searching PatternKey : .0 Found
Gesture Data : B51E06AD84A20F1D4A2B4D3080A6AFE61576A8CB
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 235896
1 2 3
4 5 6
7 8 9
Action Result : Ok

Rebooting Device [Reboot To Normal]
Reboot Done!!

Elapsed Time : 00:03:26
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9T (lime) Edl Flsahıng No credit No Auth Wİth by Hydra

Getting device info .. . ...
Serial No.: 0x72ED5363
HW_ID : 0014D0E100720000
MSM ID : 0x0014D0E1, SM_KAMORTA_H-
MODEL_ID : 0x0000
OEM_ID : 0x0072 - XIAOMI
PBL Ver : 00000000
PK HASH : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46

Firehose Loader [0000000000720000_1bebe3863a6781db_159eb52f_XIAOMI.fhprg]
--------------------------------------------------
Header Type : New
TargetMSM :
Tag :
Version : 6
Code_size : 816
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 0000000000720000
Vendor : XIAOMI
OEM_ID : 0072
MODEL_ID : 0000
SW_ID : 00000003
APP_ID : 00000000
pk_hash : 1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda4692ce5e948c6fd409408f4c919fcadfe3
OEM_VERSION : f2f760038334
IMAGE_VARIANT : KamortaPkgLAA
QC_VERSION : BOOT.XF.4.1-00187-KAMORTALAZ-2
--------------------------------------------------

SaharaBoot... Ok
Sending .................................b Okb0
Connecting to Firehose...
Ping ...................... Ok
Configuration........
Identifying Chip.... ....UFS
Ok
Chip Configuration :
MemoryName : UFS
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes :
MaxXMLSizeInBytes : 4096
TargetName :
Version : 1
DateTime : Nov 16 2020 - 01:25:39

*** STORAGE DEVICE INFO ***
Memory Type : UFS
Block Size in Bytes : 4096
Page Size : 4096
Manufacturer ID : 429
Serial Number : 2037279096
Firmware Version : 002
Product Name : H9HQ15ACPMBDAR
Physical titions : 6
Total Logical Blocks:
Drive [0] 30119936 [114.898 GB]
Drive [1] 2048 [8 MB]
Drive [2] 2048 [8 MB]
Drive [3] 32768 [128 MB]
Drive [4] 1048576 [4 GB]
Drive [5] 32768 [128 MB]

Protocol : Universal
Running : Ok

Failed to read information from phone.

Reading GPT[6]
Drive [0] 32 Items
Drive [1] 32 Items
Drive [2] 32 Items
Drive [3] 32 Items
Drive [4] 64 Items
Drive [5] 32 Items


Backup Security titions...
Reading Security Items....
> modemst1
> modemst2
> fsg
> fsc
C:Hydra ToolBackupSecurity_Backup___Security_121021191620.sec
Backup Security Success....

----------------------------
Flashing Selected titions....0
- vbmeta_system (0)b [vbmeta_system.img] b0 Ok0
- metadata (0)b [metadata.img] b0 Ok0
- persist (0)b [persist.img] b0 Ok0
- recovery (0)b [recovery.img] b0 Ok0
- super (0)b [super.img] b0 Ok0
- userdata (0)b [userdata.img] b0 Ok0
- PrimaryGPT (0)b [gpt_main0.bin] b0 Ok0
- xbl_config (1)b [xbl_config.elf] b0 Ok0
- xbl (1)b [xbl.elf] b0 Ok0
- PrimaryGPT (1)b [gpt_main1.bin] b0 Ok0
- xbl_configbak (2)b [xbl_config.elf] b0 Ok0
- xblbak (2)b [xbl.elf] b0 Ok0
- PrimaryGPT (2)b [gpt_main2.bin] b0 Ok0
- PrimaryGPT (3)b [gpt_main3.bin] b0 Ok0
- multiimgoem (4)b [multi_image.mbn] b0 Ok0
- vbmeta (4)b [vbmeta.img] b0 Ok0
- qupfw (4)b [qupv3fw.elf] b0 Ok0
- devcfg (4)b [devcfg.mbn] b0 Ok0
- storsec (4)b [storsec.mbn] b0 Ok0
- hyp (4)b [hyp.mbn] b0 Ok0
- hypbak (4)b [hyp.mbn] b0 Ok0
- cmnlib (4)b [cmnlib.mbn] b0 Ok0
- cmnlibbak (4)b [cmnlib.mbn] b0 Ok0
- cmnlib64 (4)b [cmnlib64.mbn] b0 Ok0
- cmnlib64bak (4)b [cmnlib64.mbn] b0 Ok0
- keymaster (4)b [km4.mbn] b0 Ok0
- keymasterbak (4)b [km4.mbn] b0 Ok0
- bluetooth (4)b [BTFM.bin] b0 Ok0
- abl (4)b [abl.elf] b0 Ok0
- ablbak (4)b [abl.elf] b0 Ok0
- imagefv (4)b [imagefv.elf] b0 Ok0
- imagefvbak (4)b [imagefv.elf] b0 Ok0
- uefisecapp (4)b [uefi_sec.mbn] b0 Ok0
- uefisecappbak (4)b [uefi_sec.mbn] b0 Ok0
- featenabler (4)b [featenabler.mbn] b0 Ok0
- featenablerbak (4)b [featenabler.mbn] b0 Ok0
- misc (4)b [misc.img] b0 Ok0
- rpm (4)b [rpm.mbn] b0 Ok0
- rpmbak (4)b [rpm.mbn] b0 Ok0
- tz (4)b [tz.mbn] b0 Ok0
- tzbak (4)b [tz.mbn] b0 Ok0
- logfs (4)b [logfs_ufs_8mb.bin] b0 Ok0
- dtbo (4)b [dtbo.img] b0 Ok0
- dsp (4)b [dspso.bin] b0 Ok0
- boot (4)b [boot.img] b0 Ok0
- modem (4)b [NON-HLOS.bin] b0 Ok0
- cache (4)b [cache.img] b0 Ok0
- cust (4)b [cust.img] b0 Ok0
- PrimaryGPT (4)b [gpt_main4.bin] b0 Ok0
- PrimaryGPT (5)b [gpt_main5.bin] b0 Ok
0
Flashing Patch Configuration..
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-6.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-1.] OK
0 [NUM_DISK_SECTORS-5.] OK
0 [CRC32(2,4096)] OK
0 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
0 [0] OK
0 [CRC32(1,92)] OK
0 [0] OK
0 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-6.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-1.] OK
1 [NUM_DISK_SECTORS-5.] OK
1 [CRC32(2,4096)] OK
1 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
1 [0] OK
1 [CRC32(1,92)] OK
1 [0] OK
1 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-6.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-1.] OK
2 [NUM_DISK_SECTORS-5.] OK
2 [CRC32(2,4096)] OK
2 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
2 [0] OK
2 [CRC32(1,92)] OK
2 [0] OK
2 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-6.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-1.] OK
3 [NUM_DISK_SECTORS-5.] OK
3 [CRC32(2,4096)] OK
3 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
3 [0] OK
3 [CRC32(1,92)] OK
3 [0] OK
3 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-6.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-1.] OK
4 [NUM_DISK_SECTORS-5.] OK
4 [CRC32(2,8192)] OK
4 [CRC32(NUM_DISK_SECTORS-5.,8192)] OK
4 [0] OK
4 [CRC32(1,92)] OK
4 [0] OK
4 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-6.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-1.] OK
5 [NUM_DISK_SECTORS-5.] OK
5 [CRC32(2,4096)] OK
5 [CRC32(NUM_DISK_SECTORS-5.,4096)] OK
5 [0] OK
5 [CRC32(1,92)] OK
5 [0] OK
5 [CRC32(NUM_DISK_SECTORS-1.,92)] OK
----------------------------
Done!
Operation : Setbootablestoragedrive: Drive 1
Set bootable storage drive 1 Ok

Rebooting Phone.... Ok

Elapsed Time : 00:04:15
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Samsung SM-A115M Edl Frp Remove One Click Wİth by Hydra

PreOperation Configuration b0
Brand : SAMSUNG Model : SM-A115M Storage : Auto
Loader: 0009A0E100200000_084e868b048512d8_f8ff0e69_SAMSUNG_SAMSUNG CORPORATION_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM34)
SymbolicName :??USB#VID_05C6&PID_9008#5&2dc22d9e&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 02/05/2018,3.0.0.0

Getting device info .. Ok
Device MODE : Firehose
Connecting to Firehose...
Ping .. Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 21
Serial Number : 2723400867
Firmware Version : 1
Product Name : GP6BAB
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Failed to read information from phone.

Reading GPT[3]
Drive [0] 128 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] Ok
- Removing FRP [Zero Wipe] OkOk
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] Ok
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00:00:04
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 9A (dandelion) Bootloader Unlock With by Hydra

=====================================
Searching for MTK Device... Found
Port Identification : Flashmode BROM
FriendlyName : MediaTek USB Port (COM45)
Device : 5&2e05d5bd&0&3
SymbolicName :??USB#VID_0E8D&PID_0003#5&2e05d5bd&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/22/2016,3.2

Opened handle..

Reading Device UniqueID, RAM and Flash Chip Info...
UNIQUE ID : 2314800FCEBB0C7C66586CA387900B32
ERAM Size : 0x0000000000038000 -224 KB
IRAM Size : 0x0000000080000000 -2 GB
eMMC BOOT1 : 0x0000000000400000 -4 MB
eMMC BOOT2 : 0x0000000000400000 -4 MB
eMMC RPMB : 0x0000000001000000 -16 MB
eMMC USER : 0x0000000747C00000 -29.121 GB
eMMC CID : 45010044413430333201979BA5416729 - DA4032

Reading GPT -EMMC [0x00008000] 130 Items


-------------------------------------
Operation : Unlock Bootloader
Processing...
-------------------------------
Bootloader Status...
Bootloader : Locked
-------------------------------

Verifying status after operation...
-------------------------------
Bootloader Status...
Bootloader : Unlocked
-------------------------------
Action Result : Ok

Elapsed Time : 00:00:02
 

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Redmi 6 Pro (sakura) Edl Frp Remove With by Hydra



PreOperation Configuration b0
Brand : XIAOMI Model : Redmi 6 Pro (sakura) Storage : Auto
Loader: 000460E100000000_57158eaf1814d78f_6f50979f_QUALCOMM_XIAOMI_auth_peek_8953.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM5)
SymbolicName :??USB#VID_05C6&PID_9008#5&39e6a57&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 01/10/2020,5.1.1.2

Getting device info .. . ...
Serial No.: 0x367B95AF
HW_ID : 000460E100000000
MSM ID : 0x000460E1, MSM8953-Qualcomm Snapdragon 625
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a

Firehose Loader [000460E100000000_57158eaf1814d78f_6f50979f_QUALCOMM_XIAOMI_auth_peek_8953.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8953
Tag : _auth_peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : XIAOMI
HW_ID : 000460E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000200000003
APP_ID :
pk_hash : 57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
OEM_VERSION : c3-bsp-builder-job002.bj
IMAGE_VARIANT : JAADANAZA
QC_VERSION : BOOT.BF.3.3-00228
--------------------------------------------------

SaharaBoot... Ok
Sending ....................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration.
Xiaomi Authentication needed...
Signature Request -> bob[0wmvQeJUFOQWK4qSQ06uj31nX4Y]
Signature @256bytes Authentication.... Accepted ......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8953
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 1265205737
Firmware Version : 162
Product Name : HCG8a4
Physical titions : 3
Total Logical Blocks:
Drive [0] 122142720 [58.242 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : xiaomi
Vendor : Xiaomi
Model : Redmi 6 Pro
ID : PKQ1.180917.001
SDK : 28
Release : 9
ABI : arm64-v8a
CPU abilist : arm64-v8a,armeabi-v7a,armeabi
Locale : en-GB
Description : sakura_india-user 9 PKQ1.180917.001 V12.0.4.0.PDMMIXM release-keys
Miui Ver : V12
Device : sakura_india
Mod_device : sakura_india_global
Display ID : ZQL1715-sakura_india-build-20201104125201
Security Patch : 2020-09-01
Emmc_size : 16GB
Fingerprint : xiaomi/sakura_india/sakura_india:9/PKQ1.180917.001/V12.0.4.0.PDMMIXM:user/release-keys

Reading GPT[3]
Drive [0] 60 Items
Drive [1] 0 Items
Drive [2] 0 Items

Removing FRPta...
Method : 0
Auto
Processing...
- Removing FRP
Executing ...
- Removing FRP [Zero Wipe] OkOk Ok

Elapsed Time : 00.00.06





 

Attachments

  • 190300000266_HQTool.exe_EDL_FRP_RemoveAuto_12-13-2021-131258.jpeg
    190300000266_HQTool.exe_EDL_FRP_RemoveAuto_12-13-2021-131258.jpeg
    181.4 KB · Views: 0

sero408

Friend's Martview
Sep 26, 2021
893
94
türkiye
Vivo Y53 Edl Format Userdata Without Recovery Lock With by Hydra Tool

PreOperation Configuration b0
Brand : VIVO Model : Y53 Storage : Auto
Loader: 000560E100000000_60ba997fef6da9f0_203cb924_QUALCOMM_VIVO_peek_8917.fhprg
Port : Auto

Searching for Qualcomm 9008 Device... Found
FriendlyName : Qualcomm HS-USB QDLoader 9008 (COM20)
SymbolicName :??USB#VID_05C6&PID_9008#6&df2ee03&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver : 08/02/2017,2.1.2.7

Getting device info .. . ...
Serial No.: 0x4B284BAE
HW_ID : 000560E100000000
MSM ID : 0x000560E1, MSM8917-Qualcomm Snapdragon 425
MODEL_ID : 0x0000
OEM_ID : 0x0000 - QUALCOMM
PBL Ver : 00000000
PK HASH : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43

Firehose Loader [000560E100000000_60ba997fef6da9f0_203cb924_QUALCOMM_VIVO_peek_8917.fhprg]
--------------------------------------------------
Header Type : OLD
TargetMSM : 8917
Tag : _peek
Version : 3
Code_size : 288
Signature_size : 256
fhVendor : VIVO
HW_ID : 000560E100000000
Vendor : QUALCOMM
OEM_ID : 0000
MODEL_ID : 0000
SW_ID : 0000000000000003
APP_ID :
pk_hash : 60ba997fef6da9f05885fa11f1dd6d2a90d052a257a09c2075d7246cc73c0d43
OEM_VERSION : compiler026
IMAGE_VARIANT : LAADANAZA
QC_VERSION : BOOT.BF.3.3-00199
--------------------------------------------------

SaharaBoot... Ok
Sending .................b Okb0
Connecting to Firehose...
Ping ... Ok
Configuration......
Identifying Chip....
Ok
Chip Configuration :
MemoryName : eMMC
MaxPayloadSizeToTargetInBytes : 1048576
MaxPayloadSizeToTargetInBytesSupported : 1048576
MaxPayloadSizeFromTargetInBytes : 4096
MaxXMLSizeInBytes : 4096
TargetName : 8917
Version : 1

*** STORAGE DEVICE INFO ***
Memory Type : eMMC
Block Size in Bytes : 512
Page Size : 512
Manufacturer ID : 144
Serial Number : 922304653
Firmware Version : 165
Product Name : HAG4a2
Physical titions : 3
Total Logical Blocks:
Drive [0] 30777344 [14.676 GB]
Drive [1] 8192 [4 MB]
Drive [2] 8192 [4 MB]

Protocol : Universal
Running : Ok

Phone Information .....
Brand : vivo
Vendor : vivo
Model : vivo PD1628F_EX
ID : MMB29M
SDK : 23
Release : 6.0.1
ABI : armeabi-v7a
CPU abilist : armeabi-v7a,armeabi
Locale : en-US
Description : msm8937_32-user 6.0.1 MMB29M eng.compiler.20190105.211334 release-keys
Device : PD1628F_EX
Board : QC_Reference_Phone
Display ID : MMB29M release-keys
Security Patch : 2018-08-01
Emmc_size : 16GB
Platform : msm8937
FRPPST : /dev/block/bootdevice/by-name/config
Fingerprint : vivo/PD1628F_EX/PD1628F_EX:6.0.1/MMB29M/compiler01052117:user/release-keys

Reading GPT[3]
Drive [0] 52 Items
Drive [1] 0 Items
Drive [2] 0 Items

Formatting Userdata...
Method : 0
Auto
Processing...
- Formatting Userdata
Executing ...
- Formatting Userdata [Safe Format - eMMc] OkOk Ok

Rebooting Phone.... Ok
If not rebooted, Please Power on Manually

Elapsed Time : 00:00:06
 
Top