Aporte Alcatel Joy Tab 2 - 9032z - Frp Nckbox |
Bienvenido, invitado ( Identificarse | Registrarse )
![]() ![]() |
Aporte Alcatel Joy Tab 2 - 9032z - Frp Nckbox |
Aug 11 2023, 12:47 PM
Publicado:
#1
|
|
|
Miembro del Clan ![]() Grupo: Miembros Mensajes: 23 Agradecimientos: 17 Registrado: 13-December 16 Desde: Usa Miembro No.: 904,887 Pais:
|
Para quitar cuenta Google de la tablet Alcatel Joy Tab 2 9032z
Abrir NCKBOX AndroidMTK y elegir la pestaña FRP-PATTERN-PRIVACY En Phone setting La primer opcion 0-By CPU La segunda opcion MT6761 Sin tocar nada elegir el boton Reset FRP Seguir las instrucciones: Apagada presionar los botones de volumen +(mas) y - (menos) al mismo tiempo, y conectar a la PC. Exe version: NCKBox AndroidMTK 3.0.3 Selected model: 0-By CPU MT6761 [auto]Action: Reset FRP Phone must be off with battery inside. Battery must be charged Please insert USB cable now... Keep "VOL-" button untill inserting USB cable. For some phones need to keep "VOL+ and VOL-" button untill inserting USB cable. For some phones need to keep "VOL+" button untill inserting USB cable. Detected(12) : MediaTek USB Port (COM12) [12] \\?\usb#vid_0e8d&pid_0003#6&35c31b9d&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} CPU: MT6761 CPU code: 717 Target config: e7 *********************** Secure boot enabled: true Need serial link authorization: true Need download agent authorization: true SWJTAG enabled: true EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: false Root cert required: false Memory read authorization: true Memory write authorization: true Cmd 0xC8 blocked: true *********************** Executing exploit, do not disconnect phone Exploit has been executed successfully. [3b200]Dumping phone preloader. Preloader: C:\ProgramData\Android_MTK_Backup_Folder\preloader_backup\preloader_apollo84gtmo.bin Waiting for handle to become active...... Reseived active handle repply from phone...... Booting phone Detected(12) : MediaTek USB Port (COM12) [12] \\?\usb#vid_0e8d&pid_0003#6&35c31b9d&0&3#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Boot mode: Brom Phone detected...Please wait BBCHIP: 6761 200 ca01 Using Algo 1. Helio MT6761 phone detected, swithing to helio api Helio enabled DRAM in First Da: FALSE Sending loader..... BBCHIP MT6761 [1]Storage EMMC Block size: 512 EMMC FW VERSION: 00:00:00:00:00:00:00:00 EMMC CID: 15010044583638 : 000000000000000000 EMMC UA SIZE: 0x747c00000 BOOT STYLE: EMMC BOOT FULL LENGTH: 0x748800000 [29.133 GB] [EMMC]FORMAT [0]FRP Reset Done. [helio]Wait untill phone will start charging. [0]All done.
FRP_NCK_... Usted aun no cumple los requisitos para descargar archivos. CLICK para mas INFO ( 135.94k )
Número de descargas: 1 |
|
|
|
A continuacion 2 usuario(s) le Agradece(n) a FACERWORLD por su Colaboracion: glen1702, LAB_SANTACRUZ | |
| Anunciante Autorizado |
Aug 11 2023, 12:47 PM
Publicado:
#
|
![]() Estas ofertas pudieran interesarte. |
|
|
|
|
Jul 18 2024, 12:21 PM
Publicado:
#2
|
|
|
Miembro del Clan ![]() Grupo: Miembros Mensajes: 29 Agradecimientos: 45 Registrado: 21-June 19 Desde: Cuba Miembro No.: 1,124,688 Pais:
|
Abrir NCKDongle Android MTK
FRP-Pattern-privacy 0-By CPU Auto Reset FRP conectamos apagado precionando vol - OK Exe version: NCKDongle AndroidMTK 2.8.3 Selected model: 0-By CPU AUTO [auto]Action: Reset FRP Phone must be off with battery inside. Battery must be charged Please insert USB cable now... Keep "VOL-" button untill inserting USB cable. For some phones need to keep "VOL+ and VOL-" button untill inserting USB cable. For some phones need to keep "VOL+" button untill inserting USB cable. Detected(45) : MediaTek USB Port_V1632 (COM45) [45] \\?\usb#vid_0e8d&pid_0003#5&25b67543&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} CPU: MT6761 CPU code: 717 Target config: e7 *********************** Secure boot enabled: true Need serial link authorization: true Need download agent authorization: true SWJTAG enabled: true EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: false Root cert required: false Memory read authorization: true Memory write authorization: true Cmd 0xC8 blocked: true *********************** Executing exploit, do not disconnect phone Exploit has been executed successfully. [3b200]Dumping phone preloader. Preloader: C:\ProgramData\Android_MTK_Backup_Folder\preloader_backup\preloader_apollo84gtmo.bin Waiting for handle to become active...... Reseived active handle repply from phone...... Booting phone Detected(45) : MediaTek USB Port_V1632 (COM45) [45] \\?\usb#vid_0e8d&pid_0003#5&25b67543&0&2#{a5dcbf10-6530-11d2-901f-00c04fb951ed} Boot mode: Brom Phone detected...Please wait BBCHIP: 6761 200 ca01 Using Algo 1. Helio MT6761 phone detected, swithing to helio api Helio enabled DRAM in First Da: FALSE Sending loader..... BBCHIP MT6761 [1]Storage EMMC Block size: 512 EMMC FW VERSION: 00:00:00:00:00:00:00:00 EMMC CID: 15010044583638 : 000000000000000000 EMMC UA SIZE: 0x747c00000 BOOT STYLE: EMMC BOOT FULL LENGTH: 0x748800000 [29.133 GB] [EMMC]FORMAT [0]FRP Reset Done. [helio]Wait untill phone will start charging. [0]All done. |
|
|
|
A continuacion 1 usuario(s) le Agradece(n) a R@iden por su Colaboracion: LAB_SANTACRUZ | |
Jan 18 2025, 03:17 PM
Publicado:
#3
|
|
|
Miembro del Clan ![]() Grupo: Miembros Mensajes: 12 Agradecimientos: 20 Registrado: 23-October 17 Desde: Ocotlan Jalisco Mexico Miembro No.: 997,738 Pais:
|
tambien sale con unlock tool
dale a mediatek erase frp generic ERASE FRP Initializing usb... OK Waiting for device... COM6 [BOOTROM:0E8D:0003] Bypassing authentication... OK Analyzing... preloader_apollo84gtmo.bin [MT6761:10:1712] [Internal] Handshaking... OK Reading hardware info... OK Hardware : MT6761 [Helio A20|A22|A25|G25|P22] 0717 8A00 CA01 0200 Security Config : SCB SLA DAA MEID : 8FAA36B873572BDBEA7A712BBCFC6C64 Sending Download-Agent [1]... OK Syncing with device... OK Booting device... OK Syncing with DA... OK Storage : EMMC - CID : 44000115.4D383658.E81B0942.A7484190 Vendor : Samsung - Name : DX68MB - Serial : 1100015643 - Rev : 9 Boot1 : 4 MiB - Boot2 : 4 MiB - RPMB : 4 MiB - User Area : 29.12 GiB Reading partition info... OK [45] Reading device info... OK [super] Model Name : 9032Z Manufacturer : TCL Platform : apollo84gtmo Android Version : 10 Security Patch : 2023-02-05 Build ID : QP1A.190711.020 release-keys Build : v1C7O-0 Build Date : Tue Jul 11 19:52:56 CST 2023 Erasing FRP... OK UNLOCKTOOL 2025.01.17.0 Elapsed time : 16 seconds |
|
|
|
![]() ![]() |
| Ver Visitas | Fecha y Hora actual: 22nd April 2026 - 10:43 PM |