Çözüldü OPPO A37F (Neo 9) Desen Kilidi Öğrenme Bilgi Kaybı Olmadan Screen Lock Security Hydra Tool (1 Viewer)

YuSuF02

Kılıç kınından çıkmadıkça it sürüsü dağılmaz.
Onursal Yönetici
GSM Expert
Usta Üye
Kayıtlı Kullanıcı
OPPO A37.jpeg
[HIDETHANKS]
Kod:
PreOperation Configuration
 Brand : OPPO Model : A37F (Neo 9) Storage : Auto
 Loader: 8916.mbn
 Port  : Auto
 Connection  : Flash Mode

Finding EDL Port..[COM112]
Getting device info.......
Serial No.: 0x2156DB7B
MSM ID    : 0x007050E1
PBL Ver   : 00000000
PK HASH   : CC3153A80293939B90D02D3BF8B23E02
            92E452FEF662C74998421ADAD42A380F
 
Firehose Loader[8916.mbn]
Initializing SaharaBoot... Ok
Sending .....Ok

Finding EDL Port..[COM112]
Connecting to Firehose...
Ping... Ok
Configuration......
Identifying Chip....Ok
Chip Configuration :
 MemoryName : eMMC
 MaxPayloadSizeToTargetInBytes : 16384
 MaxPayloadSizeToTargetInBytesSupported : 16384
 MaxPayloadSizeFromTargetInBytes : 4096
 MaxXMLSizeInBytes : 4096
 TargetName : 8916
 Version : 1

Running : Ok
 
Reading GPT[3]Ok
Phone Information.....
  Model : A37f
  Brand : OPPO
  Android Ver : 5.1.1
  Manufacturer : OPPO
  Device :
  Board : msm8916
  Display ID : A37fEX_11_190711
  Security Patch : 2018-03-01
  Platform : msm8916
  Kernel ID : 2018-03-01
  FRPPST : /dev/block/bootdevice/by-name/config
  Fingerprint :
  ro_product_hardware :
  sys_hardware_version :

======================================
Reading GPT[3]Ok
Operation : ScreenLock Security
Read Pattern
Processing...
Trying to search : gatekeeper.pattern.key
Trying to search :  personalpattern.key
Trying to search : cm_gesture.key
Trying to search : gesture.key FOUND
Gesture Data : 2BF9A672D9942D31628DBB816484F8893E5D5779
Bruteforcing pattern hash..Please wait for few seconds
Pattern Code : 2145
1 2 3
4 5 6
7 8 9

 
Ok
All Done
======================================

Elapsed Time : 00:00:11

[/HIDETHANKS]
 
Üst