***IMEI REPAIR FUNCTION****Hydra Tool MTK Module v1.0.3.60
[Added] - Vivo MTK IMEI Repair by Flash Mode
[Added] - Vivo Demo Remove by Flash Mode
[Added] -OPPO/Realme Demo Remove by Flash Mode
[Added] - OPPO/Realme ID Remove by Flash Mode
[Added] -Samsung MTK FRP Remove by Flash Mode
[Added] -Preloader to BROM Switch New Method
[Added] -MTK Fix Orange Message
[Added] -MTK Read/Write RPMB (eMMC and UFS)
[Added Mediatek New Soc's ] -
- MediaTek Dimensity 1200 (MT6893)
- MediaTek Dimensity 1000+ (MT6889)
Added Following Models for
Read/Write Firmware, Unlock Bootloader, Reset FRP, Format, Partition Manager
- Xiaomi Poco F3 GT (Ares)
- Xiaomi Redmi K30 Ultra (cezanne)
- Xiaomi Redmi K40 Game Enhanced Edition (Ares)
- OPPO Reno 6 Pro (CPH2249)
- OPPO Reno 6 Pro (PEPM00)
- OPPO Reno5 Pro (CPH2201)
- OPPO Reno5 Pro (PDSM00)
- OPPO Reno5 Pro (PDST00)
- Realme GT Neo Flash (RMX3031)
- Realme X7 Max (RMX3031)
- Realme X7 Pro (RMX2111)
- Realme X7 Pro (RMX2121)
- Vivo iQoo Z1 (V1986A)
- Huawei Honor V40 (YOK-AN10)
- Huawei Honor X10 Max (KKG-AN10, KKG-AN00)
- Huawei Honor 30 Lite (MXW-AN00)
- Huawei Enjoy 20 Pro (DVC-AN20)
- Huawei Honor 30 Youth (MXW-AN00)
- Huawei Enjoy Z 5G (DVC-AN00)
- Huawei Honor Play 4 (TNNH-AN00)
- Huawei Honor X10 Max (KKG-AN00)
- Huawei Maimang 9
- OnePlus Nord 2
- Coolpad Cool X (CPD1939)
P.S: If you already have the package no need to re-download, Just Click the Update All Button at HumTool
** Hydra Tool Offical Web Page **
You can check from official webpage supported models and functions
Most models Supported Read Firmware, Write Firmware, Repair IMEI, Reset FRP, Factory Reset e.t.c
HYDRA Tool - Powerful Advanced Complete
Huawei Flashmode
Searching for MTK Device...Found
Port Identification :Flashmode BROM
FriendlyName :MediaTek USB Port_V1632 (COM39)
Device :5&faeca2a&0&5
SymbolicName :\??\USB#VID_0E8D&PID_0003#5&faeca2a&0&5#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Driver Ver :09/01/2011,2.0.1136.0
Handshaking...Ok
Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : E5
SBC : 01 (True)
SLA : 00 (False)
DAA : 04 (True)
SWJTAG : 04 (True)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 20 (True)
MEMWRITE : 40 (True)
CMD_C8 : 80 (True)
Exploiting Device...
Exploit Sent..
Successfully Exploited...
Handshaking...Ok
--- ENABLE AUTO PREL DUMP ----
Handshaking...
Identifying Hardware ID.....
Reading Device hardware info..
hw code : 0766MT6765 [6765]
hw subcode : 8A00
hw version : CA00
sw version : 0000
Target config : 00
SBC : 00 (False)
SLA : 00 (False)
DAA : 00 (False)
SWJTAG : 00 (False)
EPP : 00 (False)
CERT : 00 (False)
MEMREAD : 00 (False)
MEMWRITE : 00 (False)
CMD_C8 : 00 (False)
MEID : D2138C98E5E7F3729841F69CFBE5CEFF
Stage 1..[Size:216440]
Sending : Please wait.. Accepted
Identifying Protocol...
Protocol : New
Synchronization...SYNC
Preloader Initialization...
Parsing preloader_k61v1_64_mexico.bin
Init : [STATUS_EMI_SETTING_VERSION_ERROR]
Elapsed Time : 00:00:47