Post here successfully operations via NCK BOX / Dongle PREMIUM v2

Vivo Y91c Password unlock success

[Erase Userdata]
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V1632 (Android) (COM19) [\\?\usb#vid_0e8d&pid_2000#5&212ac8fc&0&7#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: PRELOADER PORT
CUST_DA : INT:VIVO V1
HW ID : MT6765 [0766] Helio P35/G35
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 55F8C9610F9DA6D39AFFC3F35279DD2F
SoC ID[0] : A8651865B3A71D53867A098C03E7D0D5
SoC ID[1] : 430026A6C07DA17EF9F3B89F1BA07F08
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Running Exploit (Old)...Done
Sending DA2...OK
Activating DA Extension...Done
HRID : DAFF2B9445CE22974059470846537AA3
SRAM : 0x000000000003A000 [232.00 KB]
DRAM : 0x0000000080000000 [2.00 GB]
EMMC ID : QD63MB
EMMC CID : 150100514436334D42011929D23827DF
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
Brand : vivo
Manufacturer : vivo
Model : vivo 1820
Device : PD1818HF_EX
And. Ver. : 8.1.0
Prod. Ver. : PD1818HF_EX_A_1.22.6
Prod. Name : PD1818HF_EX
Build Dt. : Mon Mar 27 23:01:23 CST 2023
Display ID : O11019 release-keys
Ver. Inc. : 1679929289
Locale : en-US
Patch : 2021-10-01
Formating Userdata...Done
Process finished
[NCK MTK Exploit Tool v1.2]
LOG TXT : 20241223_185746.txt
 
Exe Version: NCK Samsung Tool
Brand: Samsung QC
Model: Galaxy Note10+ SM-N975U BIT8
Operation: Reset FRP
How to connect phone:
1. With phone off enter edl mode keep pressing vol+ and vol- buttons and insert usb cable
2. If this metod not work, use edl cable to force emergenty download mode.
3. If this metod not work, use testpoint to force emergenty download mode.
Searching for phone.....
Qualcomm HS-USB QDLoader 9008 (COM25) detected.
Firehose protocol: 2
HW ID: 00002000E1500A00
PK HASH: 3FD28B75E2557C5D5A80BB6112E8DD0ACAEB6D56A6DC880D3C DBF0F12CF9146B
using loader: prog_firehose_ddr_N975U_BIT8.elf
Arhitecture:64 bits
[64]Sending loader, please wait..
Waiting for loader to start...
[0] Send NOP ok, loader start.
MaxPayloadSizeToTargetInBytes: 8192
Reading partition info, wait.
Volume[0] Size: 238,26 GB Partitions count: 31
Volume[1] Size: 8 MB Partitions count: 2
Volume[2] Size: 8 MB Partitions count: 2
Volume[3] Size: 60 MB Partitions count: 32
[0390ABDF]Userdata Size: 228,17 GB
Partitions count: 67
FRP: persistent
Erasing Samsung FRP, wait.....
Erasing FRP, finished
Restarting phone.....
Total Time: 00:00:33
Done.
 
OPPO F11 pro (cph1969) Erase UD+FRP Done


UD+FRP
Logs:

[Erase UD + FRP]
Connect Device in BROM Mode using VOL UP + DOWN and insert cable.
New device need TESTPOINT for BROM Mode.
Waiting for device...Found
Port Info : MediaTek USB Port (COM11) [\\?\usb#vid_0e8d&pid_0003#6&26bde6ad&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}]
: MediaTek Inc., 3.2.0.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6771 [0788] Helio P60/P70/G80
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 7406C761BEAA6FC3503CE39D12ECDAAA
SoC ID[0] : FA25369B5E9F9D71E4D3B6391785195D
SoC ID[1] : B874B9674160AD4617711DBE5307D356
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_oppo6771.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 90014A68433861503E0360D10A5B26F1
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
Int. RAM : 0x0000000000038000 [224.00 KB]
Ext. RAM : 0x0000000180000000 [6.00 GB]
Flash ID : hC8aP>
CID : 90014A68433861503E0360D10A5B26F1
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Reading Parititon Info...OK
And. Ver. : 11
Build Dt. : Fri Dec 15 18:38:04 CST 2023
Display ID : RP1A.200720.011 release-keys
Ver. Inc. : 1702635843311
Locale : en-US
Patch : 2022-04-05
Formating Userdata...Done
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.6]
LOG TXT : 20250505_115314.txt
 
INFINIX Smart 8 FRP Reset Done


INFINIX Smart 8 FRP

Logs:

SELECTED: Tiger T606 Ver2
ACTION: Erase FRP
Start Detect phone...
Phone must be off with battery inside.
Long press "VOL -" key and insert usb cable.
For some phones need to
Long press "VOL -"+ "VOL +" key and insert usb cable.
Detected: SPRD U2S Diag (COM5)
Sending payload, keep boot key untill loader start.
Exploiting phone.....
Sending preloader 1
Sending preloader 2
Sending FDL 1.....
Sending FDL 2.....
New flash metod detected.
[5f] 743942 [5e] 819C687
UID: M3U243_7_13_7
FileSystem: EMMC
Read partition info is supported by loader.
CPU NAME: T606
Removing frp, wait...
[1]FRP: persist
Done.
[can take 0-10 sec]Wait untill phone restart.
Exe version: Unisoc Module 2.3.4
Log saved:
C:\Nckbox\spreadtrum_module\spreadtrum_module_back up_folder\Saved_Logs\_erase_frp_15.txt
Total Time: 00:00:38
Done.
 
redmi A3 frp done.


[Reset FRP]
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V1632 (Android) (COM13) [\\?\usb#vid_0e8d&pid_2000#7&4e2a85e&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: PRELOADER PORT
CUST_DA : INT:XIAOMI/blue_V816.0.X.bin
HW ID : MT6765 [0766] Helio P35/G35
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Active] [DAA Active]
MEID : 3031BC90AE85107F55F3E202F829C192
SoC ID[0] : B12FA04DE02D9DF31AC513A286D33087
SoC ID[1] : 32F03B346D0430BE7BE7B5749C383E1D
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Sending DA2...OK
HRID : BEB9BA7B99113D7BF7372CC30FB385C7
SRAM : 0x000000000003A000 [232.00 KB]
DRAM : 0x00000000C0000000 [3.00 GB]
EMMC ID : C09E00
EMMC CID : D62D00433039453030512966C4C31B43
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x0000000E92EC0000 [58.30 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.2]
 
samsung t225 frp

[Reset FRP]
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM (Android) (COM22) [\\?\usb#vid_0e8d&pid_2000#6&7243136&0&1#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: PRELOADER PORT
Preloader port found, need BROM!
Trying to crash preloader...OK
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 1D7A01974F278FAEE7ABC69AD5A3E3A7
SoC ID[0] : D118D11B433CD04D8483162178F15C24
SoC ID[1] : 4DB700405A5FBD26732CA5A8DD3D7D09
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_ot8.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 150100475836424142009808976AB801
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : 76762C576E9CA0865EF4CD40F4D10BF0
Int. RAM : 0x0000000000038000 [224.00 KB]
Ext. RAM : 0x00000000C0000000 [3.00 GB]
Flash ID : GX6BAB
CID : 150100475836424142009808976AB801
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
And. Ver. : 13
Build Dt. : Fri Sep 1 21:40:18 KST 2023
Display ID : TP1A.220624.014.T225XXS4CWI1
Ver. Inc. : T225XXS4CWI1
Locale : en-GB
Patch : 2023-06-01
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.2
 
Exe version: Nck Online AndroidMTK 1.1
Selected model: Huawei Ascend Y5 [DRA_LX3]
[auto]Action: Reset FRP
Phone must be off with battery inside.
Battery must be charged
Please insert USB cable now...
Keep "VOL-" button untill inserting USB cable.
Detected(20) : MediaTek USB Port_V1632 (COM20)
[20] \\?\usb#vid_0e8d&pid_0003#5&237d5c64&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
CPU: MT6739 CPU code: 699 Target config: e3
***********************
Secure boot enabled: true
Need serial link authorization: true
Need download agent authorization: false
SWJTAG enabled: true
EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: false
Root cert required: false
Memory read authorization: true
Memory write authorization: true
Cmd 0xC8 blocked: true
***********************
Executing exploit, do not disconnect phone
Exploit has been executed successfully.
[1dc00]Dumping phone preloader.
Preloader: C:\NckTeam\AndroidMtk_module\Android_MTK_Backup_Fo lder\preloader_backup\preloader_dura.bin
Waiting for handle to become active......
Reseived active handle repply from phone......
Booting phone
Will be used loader: MTK_AllInOne_DA_V1.bin
Detected(20) : MediaTek USB Port_V1632 (COM20)
[20] \\?\usb#vid_0e8d&pid_0003#5&237d5c64&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed}
Boot mode: Brom
Phone detected...Please wait
BBCHIP: 6739 0 ca00
Using Algo 1.
Helio MT6739 phone detected, swithing to helio api
Helio enabled DRAM in First Da: FALSE
Sending loader.....
BBCHIP MT6739
[1]Storage EMMC
Block size: 512
EMMC FW VERSION: 00:00:00:00:00:00:00:00
EMMC CID: 15010046453632 : 000000000000000000
EMMC UA SIZE: 0x3a3e00000
BOOT STYLE: EMMC BOOT
FULL LENGTH: 0x3a4a00000 [14.572 GB]
[EMMC]FORMAT
[0]FRP Reset Done.
[helio]Wait untill phone will start charging.
[0]All done.
 
Realme C25s Frp Remove Done

[Reset FRP]
Connect Device in BROM Mode using VOL UP + DOWN and insert cable.
New device need TESTPOINT for BROM Mode.
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V1632 (Android) (COM115) [\\?\usb#vid_22d9&pid_0006#5&212ac8fc&0&3#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: PRELOADER PORT
PRELOADER Detected! Need BROM!
Trying to crash preloader...OK
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 68F957C5356F7D4CF65361C047AC1386
SoC ID[0] : 181FFB8EE0798EB02034F7BCD57CFDC1
SoC ID[1] : C84E33FF1CB848EFDB1DC200ECE470AF
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_k69v1_64_k419.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 90014A684339615033011079123A180F
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : A8049957B46C4E1556C5592EAD5C6828
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : hC9aP3
CID : 90014A684339615033011079123A180F
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.6]
LOG TXT : 20250421_182053.txt
 
SAMSUNG A055F U2 FRP


[Reset FRP]
Connect Device in BROM Mode using VOL UP + DOWN and insert cable.
New device need TESTPOINT for BROM Mode.
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM (Android) (COM22) [\\?\usb#vid_0e8d&pid_2000#6&3a34e632&0&1#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 1.0.0.0 [USBSER.sys]
: PRELOADER PORT
PRELOADER Detected! Need BROM!
Trying to crash preloader...OK
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 4F978F91886D22943B76E208D7593F33
SoC ID[0] : D3B5EAD58C535B7354EA2F7727B8E94E
SoC ID[1] : 5A8EA75FBA4BD88C6B28728C48925370
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_s96818aa1.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 13014E473243323133102B8E65032ACB
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : EA31953D5A4B44B3E9947A833B56ED25
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : G2C213
CID : 13014E473243323133102B8E65032ACB
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000001D1F000000 [116.48 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.6]
LOG TXT : 20250501_052730.txt
 
Back
Top