Solved Post All Your Success Stories With Your EFT Dongle

This topic has been solved

rajsingh

Winner
Aug 21, 2018
919
250
india
Samsung g 615f Reset Screen Lock Without data Lost






Thx To Orignal Poster
 

rajsingh

Winner
Aug 21, 2018
919
250
india
G960F Mtk root by EFT
EASY-TEAM
Waiting For Android Device.......OK
Reading Device Info.......OK
Product: samsung
Device Chipset: mt6580
Device Model: SM-G960F
Device Serial: R28J31WRJZV
Android Version: 7.0
Android SDK: 23
Architecture: armeabi-v7a
Free space in system disk: 88.1M
Phone Mode: Normal Mode
Checking Root Permission.......OK
 

Abdullah

Friend's Martview
Oct 22, 2016
1,421
4,067
Pakistan
PayPal:

Donate money to this user
P8 Lite ALE-L21 Pattern Lock Remove Without Losing Data Done.!!

Connecting Fastboot ..........
Connecting Fastboot .......Ok
Model Phone: :ALE-L21
SW: :ALE-L21C185B200
Writing: system.img.....
Writing: system.img OKAY
Flash Done By EFT Dongle
 

somedays

Friend's Martview
Sep 19, 2018
138
35
Malaysia
Success flash dead Samsung Note 5

Opening Port COM5...........OK


Verifying Download Mod


OK


Initialization.......OK


Reading Phone Partitation Table........OK


Partition Size : 8192


Unpak pit .......OK


FLASHING FIRMWARE TO PHONE.....


Writing: sboot.bin.......OK


Writing: cm.bin.......OK


Writing: boot.img.......OK


Writing: recovery.img.......OK


Writing: modem.bin.......OK


Writing: system.img.......OK


Writing: cache.img.......OK


FLASHING DONE!


Rebooting PDA TO NORMAL MODE........OK
 

Abdullah

Friend's Martview
Oct 22, 2016
1,421
4,067
Pakistan
PayPal:

Donate money to this user
Huawei G7-L11 Flash Done
Connecting Fastboot ..........
EFT Dongle
Connecting Fastboot .......
Connecting Fastboot .......Ok
Model Phone: HUAWEI G7-L11
SW: G7-L11C185B510
Connecting Server .....
Connecting Server .....Ok
Writing: md5rsa.img.....
Skip: md5rsa.img This Not Partition:OKAY
Writing: rpm.img.....
Writing: rpm.img OKAY
Writing: tz.img.....
Writing: tz.img OKAY
Writing: sbl1.img.....
Writing: sbl1.img OKAY
Writing: modem.img.....
Writing: modem.img OKAY
Writing: hyp.img.....
Writing: hyp.img OKAY
Writing: modemst1.img.....
Writing: modemst1.img OKAY
Writing: modemst2.img.....
Writing: modemst2.img OKAY
Writing: fsg.img.....
Writing: fsg.img OKAY
Writing: logo.img.....
Skip: logo.img This Not Partition:OKAY
Writing: aboot.img.....
Writing: aboot.img OKAY
Writing: recovery.img.....
Writing: recovery.img OKAY
Writing: system.img.....
Writing: system.img OKAY
Erasing : userdata partition.....
Erase : userdata partition:OKAY
Writing: userdata.img.....
Writing: userdata.img OKAY
Erasing : cache partition.....
Erase : cache partition:OKAY
Writing: cache.img.....
Writing: cache.img OKAY
Erasing : cust partition.....
Erase : cust partition:OKAY
Writing: cust.img.....
Skip: cust.img:OKAY
Writing: persist.img.....
Writing: persist.img OKAY
Writing: fw.img.....
Skip: fw.img This Not Partition:OKAY
Writing: boot.img.....
Writing: boot.img OKAY
Flash Done By EFT Dongle
 

Abdullah

Friend's Martview
Oct 22, 2016
1,421
4,067
Pakistan
PayPal:

Donate money to this user
Infinix HOT4 LTE FRP Lock Reset | Infinix HOT 4 Pro LTE FRP Lock Reset


Wating Device..........OK
CPU: MT6737M
Chip Version: 0x0000ca00
Chip Ext Clock: EXT_26M
Writing Mode..........OK
Internal RAM:
Internal SRAM Size: 128.00 KB
External RAM: Type DRAM
External Ram Size: 2.00 GB
EMMC:
EMMC PART BOOT1 Size: 4.00 MB
EMMC PART BOOT2 Size: 4.00 MB
EMMC PART RPMB Size: 4.00 MB
EMMC PART USER Size: 14.68 GB
Battery:
Battery Voltage: 3758
Injection..........OK
Detecting Parts info............OK
[ID: 1] [preloader] BaseAddr(0x00000000) Size(0x00400000)
[ID: 8] [pgpt] BaseAddr(0x00000000) Size(0x00080000)
[ID: 8] [proinfo] BaseAddr(0x00080000) Size(0x00300000)
[ID: 8] [nvram] BaseAddr(0x00380000) Size(0x00500000)
[ID: 8] [protect1] BaseAddr(0x00880000) Size(0x00a00000)
[ID: 8] [protect2] BaseAddr(0x01280000) Size(0x00a00000)
[ID: 8] [lk] BaseAddr(0x01c80000) Size(0x00080000)
[ID: 8] [para] BaseAddr(0x01d00000) Size(0x00080000)
[ID: 8] [boot] BaseAddr(0x01d80000) Size(0x01000000)
[ID: 8] [recovery] BaseAddr(0x02d80000) Size(0x01000000)
[ID: 8] [logo] BaseAddr(0x03d80000) Size(0x00800000)
[ID: 8] [expdb] BaseAddr(0x04580000) Size(0x00a00000)
[ID: 8] [seccfg] BaseAddr(0x04f80000) Size(0x00080000)
[ID: 8] [oemkeystore] BaseAddr(0x05000000) Size(0x00200000)
[ID: 8] [secro] BaseAddr(0x05200000) Size(0x00600000)
[ID: 8] [keystore] BaseAddr(0x05800000) Size(0x00800000)
[ID: 8] [tee1] BaseAddr(0x06000000) Size(0x00500000)
[ID: 8] [tee2] BaseAddr(0x06500000) Size(0x00500000)
[ID: 8] [frp] BaseAddr(0x06a00000) Size(0x00100000)
[ID: 8] [nvdata] BaseAddr(0x06b00000) Size(0x02000000)
[ID: 8] [metadata] BaseAddr(0x08b00000) Size(0x02500000)
[ID: 8] [system] BaseAddr(0x0b000000) Size(0xd3800000)
[ID: 8] [cache] BaseAddr(0xde800000) Size(0x19000000)
[ID: 8] [userdata] BaseAddr(0xf7800000) Size(0x2b2b80000)
[ID: 8] [flashinfo] BaseAddr(0x3aa380000) Size(0x01000000)
[ID: 8] [sgpt] BaseAddr(0x3ab380000) Size(0x00080000)
Detecting Device info.......OK
Product: Infinix
Device Model: Infinix HOT4 LTE
ID: X5511-H3716A-M-PK-180320V135
Sw Internal:
Build Date: Tue Mar 20 17:17:56 CST 2018
Chip Ver: S01
Android Version: 6.0
Architecture: arm64-v8a
FRP RESET... [FRP] .....OK
All Done By EFT Dongle
 
Top