Offline
frp Samsung a055f cuenta google con nck bit 8 u8
Código:
Samsung a055f u8 frp done
Job: Reset FRP
Mode: Brom security bypass
Connect Device in BROM Mode using VOL UP + DOWN and insert cable.
New device need TESTPOINT for BROM Mode.
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM (Android) (COM57) [\\?\usb#vid_0e8d&pid_2000#6&3a34e632&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}]
: MediaTek Inc., 3.0.1512.0 [usb2ser.sys]
: PRELOADER PORT
PRELOADER Detected! Need BROM!
Trying to crash preloader...OK
Hw ID : MT6768 [0707] Helio P65/G85 k68v1
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 392C4B6BC2BE13A056783908369FB56B
SoC ID[0] : 8C726D08F6E2FEAB1783BDA292799E96
SoC ID[1] : 879F94735FE194D3A7000A4BDFA02591
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_s96818aa1.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 150100444336444D420081EF6A769A73
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : 0C75E4799FAE998F8D516E77CC5ED2E7
Int. RAM : 0x0000000000070000 [448.00 KB]
Ext. RAM : 0x0000000100000000 [4.00 GB]
Flash ID : DC6DMB
CID : 150100444336444D420081EF6A769A73
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Reading Parititon Info...OK
SuperPartList: system begin: 0x2D900000
SuperPartList: odm begin: 0x13FC00000
SuperPartList: product begin: 0x13FE00000
SuperPartList: vendor begin: 0x1A0000000
SuperPartList: system_ext begin: 0x126A00000
Reset FRP Data...Done
If FRP remain on Phone, Then Try Reset FRP 2025
Process finished
[NCK MTK Exploit Tool v2.2]
LOG TXT : 20250807_181550.txt