SELECCIONAN MODE: BROM SECURITY BYPASS Y RESET FRP. CONECTAN CON AMBOS BOTONES DE VOL POR 3 SEGUNDOS Y LISTO, EL PROGRAMA HARA EL TRABAJO, ADJUNTO LOG.
Job: Reset FRP
Mode: Brom security bypass
Connect Device in BROM Mode using VOL UP + DOWN and insert cable.
New device need TESTPOINT for BROM Mode.
Waiting for device...Found
Port Info : MediaTek USB Port (COM9) [\\?\usb#vid_0e8d&pid_0003#5&2942b78f&0&1#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1512.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6761 [0717] Helio A20/P22/A22/A25/G25
Details : 8A00,CA01,0200
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
MEID : F1AB4463C98B3EFBB7759C0BD0FE0183
SoC ID[0] : 8F6C3F52ADA44A1F5B64D949351544F4
SoC ID[1] : 8D4431B3D469C9E8FC808C37456329DA
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_tb8766p1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 90014A484247346132A555831063892F
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : FAC7ABA3AD4FB349BD404EC9670AC570
Int. RAM : 0x0000000000039000 [228.00 KB]
Ext. RAM : 0x00000000C0000000 [3.00 GB]
Flash ID : HBG4a2
CID : 90014A484247346132A555831063892F
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
SuperPartList: product begin: 0x27900000
SuperPartList: system begin: 0xA1000000
SuperPartList: vendor begin: 0xFF300000
Brand : hotpepper
Manufacturer : hotpepper
Model : Puya
Name : Puya
Cpu Abi : arm64-v8a
And. Ver. : 12
Security Patch : 2023-09-05
Build Dt. : Wed Nov 15 13:50:42 CST 2023
Display ID : HPP-AP31-A-V8_20231024
Ver. Inc. : 1697696886
Locale : en-US
Patch : 2023-09-05
IMEI 1: 350112672013249
Reset FRP Data...Done
If FRP remain on Phone, Then Try Reset FRP 2025
Process finished
[NCK MTK Exploit Tool v2.3]
LOG TXT : 20250927_174822.txt
RECUERDEN INSTALAR DRIVERS MTK
Job: Reset FRP
Mode: Brom security bypass
Connect Device in BROM Mode using VOL UP + DOWN and insert cable.
New device need TESTPOINT for BROM Mode.
Waiting for device...Found
Port Info : MediaTek USB Port (COM9) [\\?\usb#vid_0e8d&pid_0003#5&2942b78f&0&1#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1512.0 [usb2ser.sys]
: BROM PORT
Hw ID : MT6761 [0717] Helio A20/P22/A22/A25/G25
Details : 8A00,CA01,0200
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
MEID : F1AB4463C98B3EFBB7759C0BD0FE0183
SoC ID[0] : 8F6C3F52ADA44A1F5B64D949351544F4
SoC ID[1] : 8D4431B3D469C9E8FC808C37456329DA
Executing Exploit...Done
Reading Preloader...OK
Saved as : preloader_tb8766p1_64_bsp.bin
Loading EMI Config from Preloader...OK
Sec. Cfg : [SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : brom
Speed : HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID : 90014A484247346132A555831063892F
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID : FAC7ABA3AD4FB349BD404EC9670AC570
Int. RAM : 0x0000000000039000 [228.00 KB]
Ext. RAM : 0x00000000C0000000 [3.00 GB]
Flash ID : HBG4a2
CID : 90014A484247346132A555831063892F
BOOT1 : 0x0000000000400000 [4.00 MB]
BOOT2 : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000000400000 [4.00 MB]
USERAREA : 0x0000000747C00000 [29.12 GB]
Reading Parititon Info...OK
SuperPartList: product begin: 0x27900000
SuperPartList: system begin: 0xA1000000
SuperPartList: vendor begin: 0xFF300000
Brand : hotpepper
Manufacturer : hotpepper
Model : Puya
Name : Puya
Cpu Abi : arm64-v8a
And. Ver. : 12
Security Patch : 2023-09-05
Build Dt. : Wed Nov 15 13:50:42 CST 2023
Display ID : HPP-AP31-A-V8_20231024
Ver. Inc. : 1697696886
Locale : en-US
Patch : 2023-09-05
IMEI 1: 350112672013249
Reset FRP Data...Done
If FRP remain on Phone, Then Try Reset FRP 2025
Process finished
[NCK MTK Exploit Tool v2.3]
LOG TXT : 20250927_174822.txt
RECUERDEN INSTALAR DRIVERS MTK
Última edición por un moderador: