New Update SFT Dongle v1.0.19 (Release date: 28th MAY 2019 )

Status
Not open for further replies.

Martview

Staff member
Administrator
Feb 25, 2017
800
946
Malaysia & Australia
SFT Dongle v1.0.19

Release DATE: 28th MAY 2019

-----------------------------------------------------------------------


  • ADD: Adding Sign auth for Mi Type New (free 1 month trial period )
  • ADD: Identity,Read, Erase, Write with Mi-Auth Qualcomm [ First in the word ]
  • ADD: Adding Mount Fs Info Mi-Account
  • ADD: Adding Remove Paternlock vivo New Security Without lost data [ user data encrypted ]
  • ADD: New command manual fastboot
  • ADD: Brom MTK Support new model
  • BUG: Repair remove pattern lock vivo ( clean data ) Qualcomm & mtk
  • BUG: Repair micloud method 2 type old MI
  • BUG: Repair Clean Micloud method 2
  • BUG: Write Debrick Intell




DOWNLOAD LINK CLICK HERE

=================================================================================================================

BUY FROM RESELLER LISTED AT THIS OFFICIAL WEBSITE

=================================================================================================================
 
Last edited:

NIAMGAILUNG

Active Member
Nov 9, 2018
15
2
Please download link
SFT Dongle v1.0.19

Release DATE: 28th MAY 2019

-----------------------------------------------------------------------


  • ADD: Adding Sign auth for Mi Type New (free 1 month trial period )
  • ADD: Identity,Read, Erase, Write with Mi-Auth Qualcomm [ First in the word ]
  • ADD: Adding Mount Fs Info Mi-Account
  • ADD: Adding Remove Paternlock vivo New Security Without lost data [ user data encrypted ]
  • ADD: New command manual fastboot
  • ADD: Brom MTK Support new model
  • BUG: Repair remove pattern lock vivo ( clean data ) Qualcomm & mtk
  • BUG: Repair micloud method 2 type old MI
  • BUG: Repair Clean Micloud method 2
  • BUG: Write Debrick Intell



=================================================================================================================

BUY FROM RESELLER LISTED AT THIS OFFICIAL WEBSITE

=================================================================================================================

Sent From Redmi Note 5 Pro Using Martview Forum App
 

alir3za70

Active Member
Dec 23, 2018
23
1
And one question with this update am I be able to remove permanently mi cloud from phone even came back with factory reset?

Sent from my SM-A600FN using Tapatalk
 

Katencho

Member
Apr 19, 2019
8
2
  • ADD: Adding Sign auth for Mi Type New (free 1 month trial period )
this is autorized account for xiaomi flash and remove mi account, and after month can pay for more time?
 
  • Like
Reactions: ayan bagwan

Dr.sunilsingh

Friend's Martview
Aug 2, 2018
402
823
india
Skype
[email protected]
Sonork ID
1681209
New Update SFT Dongle v1.0.19

SFT Dongle v1.0.19 New Version :

Password : sahabatsft




1



2




3






 

Shensohau

Member
Aug 18, 2018
11
0
Venezuela
Skype
Shensohau
Sonork ID
1611724
Any tester??? only can use old version, lastest version do not works... if somebody can report me, I will Appreciate!!!
 

Dr.sunilsingh

Friend's Martview
Aug 2, 2018
402
823
india
Skype
[email protected]
Sonork ID
1681209
Flashing Redmi 6 pro ( sakura ) done 100% Edl mode 9008 for flashing with :G: SFT Dongle :S:

BY :Y: Dr.ResearchCenter Team









Scanning port Qualcomm HS-USB QDLoader 9008
Connect Qualcomm HS-USB QDLoader 9008 ( COM8 )
Initializing device ...
SerialNumber : 0x4ffd0b88
MSM_ID : 0x000460e1 [ 8953 EMMC ]
SBLVersion : 0x00000002
Sending loader Size 390.1 KB ... OK
-- Sha1 : 99d450ddc2912cdf908746e968dad348ed681183
-- Md5 : d346ab0e6f296e060bb660065a75f1b4
-- Crc32 : 12e405a5
Sending ping ... OK
Getting DDR info ...
Sig tag can be recevied before authentication
Connection internet ... OK
Initialize data ... OK
Request OrignMi ... OK
OrgnKey = AQAAAPkiAACIC_1PS1X9pDpC6XYb9Uq0zlrtiA
Calculate OrignMi ... OK
Configuration SignKey ... OK
Writing Signkey ... Done
Sending ping ... OK
Getting DDR info ...
-- Result ID Buf@0x08073900 Fh@0x08070768
-- MemoryName eMMC
-- MaxFromTarget 4096
-- MaxToTarget 1048576
-- Version 1
-- TargetName 8953
Configurate DDR sucessfully
Getting Product Memory ...
Manufacture : 0x15 ( Samsung )
Product Name : GD6BMB ( 0x474436424D42 ) Rev: 00
Getting size memory ...
Capacity : 29.1 GB ( 31281119232 Bytes )
Boot1 : 4096 KB
Boot2 : 4096 KB
Rpmb : 4096 KB
User Area : 29.1 GB ( 31268536320 Bytes )
Configure size sucessfully

Proccessing RawProgram0.xml
Writing: BackupGPT at (512*NUM_DISK_SECTORS)-16896. ... Done
Writing: PrimaryGPT at 0x00000000-0x000043FF ... Done
Writing: sec at 0x0000B000-0x0000EFFF ... Done
Writing: lksecapp at 0x00040000-0x0005FFFF ... Done
Writing: lksecappbak at 0x00060000-0x0007FFFF ... Done
Writing: devcfg at 0x00080000-0x000BFFFF ... Done
Writing: devcfgbak at 0x000C0000-0x000FFFFF ... Done
Writing: apdp at 0x00100000-0x0013FFFF ... Done
Writing: msadp at 0x00140000-0x0017FFFF ... Done
Writing: sbl1 at 0x00180000-0x001FFFFF ... Done
Writing: sbl1bak at 0x00200000-0x0027FFFF ... Done
Writing: rpm at 0x00280000-0x002FFFFF ... Done
Writing: rpmbak at 0x00300000-0x0037FFFF ... Done
Writing: cmnlib at 0x00500000-0x005FFFFF ... Done
Writing: cmnlibbak at 0x00600000-0x006FFFFF ... Done
Writing: cmnlib64 at 0x00700000-0x007FFFFF ... Done
Writing: cmnlib64bak at 0x00800000-0x008FFFFF ... Done
Writing: keymaster at 0x00900000-0x009FFFFF ... Done
Writing: keymasterbak at 0x00A00000-0x00AFFFFF ... Done
Writing: misc at 0x00B00000-0x00BFFFFF ... Done
Writing: aboot at 0x00C00000-0x00CFFFFF ... Done
Writing: abootbak at 0x00D00000-0x00DFFFFF ... Done
Writing: tz at 0x01000000-0x011FFFFF ... Done
Writing: tzbak at 0x01200000-0x013FFFFF ... Done
Writing: splash at 0x04000000-0x04FFFFFF ... Done
Writing: dsp at 0x05000000-0x05FFFFFF ... Done
Writing: mdtp at 0x06000000-0x07FFFFFF ... Done
Writing: boot at 0x0C000000-0x0FFFFFFF ... Done
Writing: recovery at 0x10000000-0x13FFFFFF ... Done
Writing: modem at 0x18000000-0x1FFFFFFF ... Done
Writing: cache at 0x20000000-0x2FFFFFFF ... Done
Writing: system at 0x40000000-0xFFFFFFFF ... Done
Writing: vendor at 0x100000000-0x13FFFFFFF ... Done
Writing: cust at 0x140000000-0x173FFFFFF ... Done
Write RawProgram xml successfuly.
Proccessing Patch0.xml
PATCH XML gpt_main0.bin offset 16
PATCH XML DISK offset 16
PATCH XML gpt_backup0.bin offset 14
PATCH XML DISK offset -19
PATCH XML gpt_main0.bin offset 1
PATCH XML DISK offset 1
PATCH XML gpt_backup0.bin offset 32
PATCH XML DISK offset -1
PATCH XML gpt_main0.bin offset 1
PATCH XML DISK offset 1
PATCH XML gpt_backup0.bin offset 32
PATCH XML DISK offset -1
PATCH XML gpt_backup0.bin offset 32
PATCH XML DISK offset -1
PATCH XML gpt_main0.bin offset 1
PATCH XML DISK offset 1
PATCH XML gpt_backup0.bin offset 32
PATCH XML DISK offset -1
PATCH XML gpt_main0.bin offset 1
PATCH XML gpt_main0.bin offset 1
PATCH XML DISK offset 1
PATCH XML DISK offset 1
PATCH XML gpt_backup0.bin offset 32
PATCH XML gpt_backup0.bin offset 32
PATCH XML DISK offset -1
PATCH XML DISK offset -1
Patch xml successfuly.
Restart your device ... OK
Elapsed Time : 00:03:16











 
Last edited:
Status
Not open for further replies.
Top