Offline
FRP Vne-lx3 cuenta google con nck
realizar el FRP para este modelo con la nueva herramienta NCK MTK Exploit Tool 2.0, Hay que conectar apagado presionando VOl - y VOL + +, despues el equipo iniciara en modo recovery, hacemos factory reset y listo.
Anexo Log:
Job: Reset FRP (2025)
Brand: HUAWEI
Model : Honor X6 (VNE-LX3)
Expected connection: PRELOADER
Connect USB Cable to turned off device without pressing any key.
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V2023 (Android) (COM17) [\\?\usb#vid_0e8d&pid_2000#5&ecb7860&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1512.0 [usb2ser_mtk.sys]
: PRELOADER PORT
Helio Boot PL Exploit
HW ID : MT6765 [0766] Helio P35/G35
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Active] [DAA Active]
MEID : C49B213AEF7D3EE85A08F5841D345D92
SoC ID[0] : AB16567867021973189AA2DFED73E870
SoC ID[1] : 959B0BBE9108E6177167A078AC447068
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Running Exploit (Old)...Done
Sending DA2...OK
Activating DA Extension...Done
HRID : 6072625F0DA457F75706683B35C68DD7
SRAM : 0x000000000003A000 [232,00 KB]
DRAM : 0x0000000100000000 [4,00 GB]
EMMC ID : DV4128
EMMC CID : 450100445634313238012C43582B8A0D
BOOT[1] : 0x0000000000400000 [4,00 MB]
BOOT[2] : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000001000000 [16,00 MB]
USERAREA : 0x0000001D1F000000 [116,48 GB]
Reading Parititon Info...OK
Reset FRP (2025)......
Process finished
[NCK MTK Exploit Tool v2.0]
LOG TXT : 20250629_120724.txt
Debes estar registrado para ver imágenes adjuntar
realizar el FRP para este modelo con la nueva herramienta NCK MTK Exploit Tool 2.0, Hay que conectar apagado presionando VOl - y VOL + +, despues el equipo iniciara en modo recovery, hacemos factory reset y listo.
Anexo Log:
Job: Reset FRP (2025)
Brand: HUAWEI
Model : Honor X6 (VNE-LX3)
Expected connection: PRELOADER
Connect USB Cable to turned off device without pressing any key.
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V2023 (Android) (COM17) [\\?\usb#vid_0e8d&pid_2000#5&ecb7860&0&2#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1512.0 [usb2ser_mtk.sys]
: PRELOADER PORT
Helio Boot PL Exploit
HW ID : MT6765 [0766] Helio P35/G35
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Active] [DAA Active]
MEID : C49B213AEF7D3EE85A08F5841D345D92
SoC ID[0] : AB16567867021973189AA2DFED73E870
SoC ID[1] : 959B0BBE9108E6177167A078AC447068
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Running Exploit (Old)...Done
Sending DA2...OK
Activating DA Extension...Done
HRID : 6072625F0DA457F75706683B35C68DD7
SRAM : 0x000000000003A000 [232,00 KB]
DRAM : 0x0000000100000000 [4,00 GB]
EMMC ID : DV4128
EMMC CID : 450100445634313238012C43582B8A0D
BOOT[1] : 0x0000000000400000 [4,00 MB]
BOOT[2] : 0x0000000000400000 [4,00 MB]
RPMB : 0x0000000001000000 [16,00 MB]
USERAREA : 0x0000001D1F000000 [116,48 GB]
Reading Parititon Info...OK
Reset FRP (2025)......
Process finished
[NCK MTK Exploit Tool v2.0]
LOG TXT : 20250629_120724.txt
Archivos adjuntos
Debes estar registrado para ver la lista de archivos adjuntos.