Offline
Eliminar FRP Cuenta Google A Oppo A15 con Nck
Código:
Oppo A15 FRP Done
Job: Reset FRP
Mode: Brom security bypass
Connect Device in BROM Mode using VOL UP + DOWN and insert cable.
New device need TESTPOINT for BROM Mode.
Waiting for device...Found
Port Info : MediaTek USB Port (COM10) [\\?\usb#vid_0e8d&pid_0003#5&212ac8fc&0&1#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1504.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6765 [0766] Helio P35/G35
Details : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : 525118237E21D479458DEADB8CB64E5B
SoC ID[0] : D071F0B5717250DCCAB61CCA340BD145
SoC ID[1] : FD7A9A3BFEA70584E2FB174A571F9FC9
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_oppo6765.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 90014A68423861503E03004EB0A98787
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : F0232F09047076C3562D08531B554744
Int. RAM : 0x0000000000038000 [224.00 KB]
Ext. RAM : 0x00000000C0000000 [3.00 GB]
Flash ID : hB8aP>
CID : 90014A68423861503E03004EB0A98787
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
SuperPartList: system begin: 0x55900000
SuperPartList: vendor begin: 0x19BE00000
SuperPartList: oppo_product begin: 0x1C3A00000
SuperPartList: oppo_engineering begin: 0x1D4300000
SuperPartList: common_preload begin: 0x1D4400000
SuperPartList: version.20271 begin: 0x1E7B00000
SuperPartList: version.20272 begin: 0x1E8300000
SuperPartList: version.20273 begin: 0x1E8B00000
SuperPartList: version.20274 begin: 0x1E9300000
SuperPartList: version.2027A begin: 0x1E9B00000
SuperPartList: version.2027B begin: 0x1EA600000
SuperPartList: version.2027C begin: 0x1EB100000
SuperPartList: version.2027D begin: 0x1EBC00000
SuperPartList: version.2027E begin: 0x1EC700000
SuperPartList: version.202A1 begin: 0x1EC800000
SuperPartList: version.202A2 begin: 0x1ED300000
SuperPartList: version.202A3 begin: 0x1EDE00000
Cpu Abi : arm64-v8a
And. Ver. : 10
Security Patch : 2023-02-05
Build Dt. : Fri Nov 29 11:24:41 CST 2024
Display ID : QP1A.190711.020 release-keys
Locale : en-US
Patch : 2023-02-05
Security Data Not Found!
Reset FRP Data...Done
If FRP remain on Phone, Then Try Reset FRP 2025
Process finished
[NCK MTK Exploit Tool v2.3]
LOG TXT : 20251107_192923.txt