METHOD I
Solution For Everyone With Recovery (Cwm, Twrp, Xrec,Etc...) Installed:
INSTRUCTIONS:
1. Download this zip Pattern Password Disable (Download from attachments) on to your sdcard
(using your PC, as you cant get into your phone, right )
2. Insert the sdcard into your phone
3. Reboot into recovery mode
4. Flash the zip
5. Reboot
6. Done!
Note : If You See The Gesture Pattern Grid Or Password After Restarting, Don't Worry. Just Try Any Random Pattern Or Password And it Should Unlock.
METHOD 2
Solution For Everyone Without Recovery Installed - ADB :
What You Need:
=>A computer running a Linux distro or Windows+Cygwin
=>USB cable to connect your phone to the PC
=>Adb installed
How to install adb:
1. Open Terminal
2. Type:
Code:
"sudo apt-get install android-tools-adb"
-> Hit [Enter]
3. Follow the instructions until everything is installed.
INSTRUCTIONS:
1. Connect you (turned on) Phone to the Computer via USB.
2. Open a terminal window.
3. Type:
Code:
adb devices
adb shell
cd data/system
su
rm *.key
4. Done...Now You Just Have To Reboot.
Note : If You See The Gesture Pattern Grid Or Password After Restarting, Don't Worry. Just Try Any Random Pattern Or Password And it Should Unlock.
METHOD 3
Solution For Everyone Before Lock Accident :
SMS Bypass - Download Link - Install It On Your Device (Download from attachments)
This App Allows You To Remotely Bypass Your Phone's Screen Lock By Sending A SMS.
It Removes Your Gesture Pattern Or Password After Receiving A Preset Keyword Along With A Secret Code Via SMS.
SMS Bypass App Requires Root.
INSTRUCTIONS:
1.First, make sure you give permanent root access to the app.
2.Change the secret code to your preferred choice. The default password is : 1234
3.To reset your screen lock, send the following message from another phone:
Code:
secret_code reset
Example:
Code:
1234 reset
Note 1 : There is a space between your secret code and reset. Also the secret code is case sensitive.
Note 2 : There is an option available to change the preset keyword. Default is : reset - Your phone will restart and your lock screen will be reset.
Note 3 : If You See The Gesture Pattern Grid Or Password After Restarting, Don't Worry. Just Try Any Random Pattern Or Password And it Should Unlock.
METHOD 4
Solution For Everyone Via Adb - SQL Command :
INSTRUCTIONS:
=>Type This Commands Separated In Your Terminal (CMD Prompt) :
Code:
adb shell
cd /data/data/com.android.providers.settings/databases
sqlite3 settings.db
update system set value=0 where name='lock_pattern_autolock';
update system set value=0 where name='lockscreen.lockedoutpermanently';
.quit
=>Now You Just Have To Reboot.
Note : If You See The Gesture Pattern Grid Or Password After Restarting, Don't Worry. Just Try Any Random Pattern Or Password And it Should Unlock.
METHOD 5
Solution For Everyone Via Adb - File Removal :
INSTRUCTIONS:
=>Type This Command In Your Terminal (CMD Prompt) :
Code:
adb shell rm /data/system/gesture.key
Note : If You See The Gesture Pattern Grid Or Password After Restarting, Don't Worry. Just Try Any Random Pattern Or Password And it Should Unlock.
METHOD 6
Solution For Everyone With USB Debugging Enabled :
INSTRUCTIONS:
Primary Step for all method:
Download & Extract to anywhere - Bypass Security Hack (Download from attachments)
Open SQLite Database Browser 2.0.exe in SQLite Database Browser.
Run pull settings.db.cmd inside By-pass security Hacks folder to pull out the setting file out of your phone.
Drag settings.db and drop to SQLite Database Browser 2.0.exe program.
Navigate to Browse data tab, At table there, click to list down the selection & selete secure
Instruction To Remove Pattern Lock:
Now, find lock_pattern_autolock, Delete Record
Close & save database
Run push settings.db.cmd and reboot your phone
Instruction To Remove PIN Lock:
Now, Find Or Create lockscreen.password_type, double-click & change it's value to 65536, Apply changes!
Now, find lock_pattern_autolock, Delete Record, If doesn't exist, Ignore
Close & save database
Run push settings.db.cmd and reboot your phone
Instruction To Remove Password Lock:
Now, find lockscreen.password_salt, Delete Record
Now, find lockscreen.password_type, Delete Record
Close & save database
Run push settings.db.cmd and reboot your phone
Note : If You See The Gesture Pattern Grid Or Password After Restarting, Don't Worry. Just Try Any Random Pattern Or Password And it Should Unlock.
METHOD 7
Solution For Everyone With Recovery Installed :
INSTRUCTIONS:
1.Download and Copy Aroma File manager.zip (Download from attachments) to your memory card.
2. Open your recovery (press volume Down + Power button or it can be different according to the phones.
Generally the phones who have press able button on the middle they have to press all three buttons. Google for you pattern there are lots)
3. There’ll b an option in recovery called “mount”. Go in that option and then mount all the cache and everything it is there.
4. Then select “update” and select “apply update from SD/external” and select aroma file manger.zip file that you downloaded using above QR code above.
5. After Flashing or updating, the aroma file manger will open. Use volume keys for up/down and power button 2 select like you use to get into recovery.
6. In aroma File manager , Go to menu , which is located in bottom strip and then select Settings.
7. Go to bottom n select “mount all partition in startup ” then exit from aroma file manger.
8. Now after exit , re-update that aroma file again and it will open again.
9. Go to data >> and then System.
Then find ‘gesture.key’ (for pattern lock) and ’password.key’ (for password lock) then
long touch on gesture.key or password.key and sum option will be prompted , choose delete and delete that file and restart.
Note : If You See The Gesture Pattern Grid Or Password After Restarting, Don't Worry.
Just Try Any Random Pattern Or Password And it Should Unlock
Bypass Android Pattern lock
Kategori
Kategori
MY BLOGGER. Powered by Blogger.
Recent Comments
Tags
- 3 Necessary things to become Expert Certified Hacker
- DNSMAP Video Tutorial on Kali Linux – DNS Information Gathering
- DNSTRACER Video Tutorial on Kali Linux – DNS Analysis Tool
- Enums: Functions
- Hack Any Facebook Account !
- Hack like a pro (How to hack a Facebook part 2 )
- Hack: a new programming language for HHVM
- How to Become a Free Software Hacker
- How to Become a Hacker
- How to become a Professional Hacker | Hackingloops
- How to Crack Wi-Fi Passwords—For Beginners!
- I will make you expert How to become Professional Hacker 3 Necessary things to become a expert Hacker
- Penetration Testing of Apple iOS : Exploited by Sandbox Vulnerability
- security scanning and auditing.
- Shapes: Introduction
- Tools: Hh_server
- Using Nmap for Network Mapper. It is an open source security tool for network exploration
- Want to become Hacker
Formulir Kontak
Followers
Archives
-
▼
2016
(158)
-
▼
March
(156)
- Want to become Hacker, I will make you expert
- 3 Necessary things to become Expert Certified Hacker
- How to become a Professional Hacker | Hackingloops
- DNSMAP Video Tutorial on Kali Linux – DNS Informat...
- DNSTRACER Video Tutorial on Kali Linux – DNS Analy...
- Penetration Testing of Apple iOS : Exploited by Sa...
- 4 ways to Hack Facebook account password
- Hack: a new programming language for HHVM
- Enums: Functions
- Shapes: Introduction
- Overview: Typing
- Hack
- How to Crack Wi-Fi Passwords—For Beginners!
- How Do I Share ZIP, PDF or APK Files on WhatsApp?
- 2 Simple Ways to Spy on WhatsApp Account of Someon...
- How Do I Stop WhatsApp Downloading Media Automatic...
- How Can I Hide Last Seen Timestamp on My Android D...
- How Can I Make Fake Whatsapp Conversation to Fool ...
- How Can I Get All My Deleted WhatsApp Messages Back?
- Tips to speed up your pc
- How to Hack Databases: Running CMD Commands from a...
- How to Hack Databases: Extracting Data from Online...
- How to Hack Databases: Hacking MySQL Online Databa...
- How to Hack Databases: Cracking SQL Server Passwor...
- How to Hack Databases: Hunting for Microsoft's SQL...
- How to Hack Databases: The Terms & Technologies Yo...
- C/C++ for Hackers: Part 10 (System Commands)
- C/C++ for Hackers: Part 9 (Installing CodeBlocks i...
- C/C++ for Hackers: Part 8 (Getting User Input)
- C/C++ for Hackers: Part 7 (Variables)
- C/C++ for Hackers: Part 6 (Our First Program in C+...
- C/C++ for Hackers: Part 5 (More on the GNU GCC Com...
- C/C++ for Hackers: Part 4 (Programming vs Scripting)
- C/C++ Programming for Hackers: Part 3 (Examining t...
- C/C++ Programming for Hackers: Part 2 (The History...
- C/C++ Programming for Hackers: Part 1 (Introduction)
- How to Hack Bluetooth, Part 3: Reconnaissance
- How to Hack Bluetooth, Part 2: Using MultiBlue to ...
- How to Hack Bluetooth, Part 1: Terms, Technologies...
- 5 Smarter Ways to Search On Your iPhone Or iPad, S...
- How to run Android apps in Windows with a Virtual ...
- 20 EVERNOTE TRICKS, EVERNOTE TIPS, EVERNOTE TRICKS
- 15 Google Maps Tricks You Need to Try, google maps...
- How to switch from iPhone to Android and keep all ...
- How to Turn off Photo Back up with the Google Sett...
- change, How to add, or delete users in Android Lol...
- Best Ways To Recover Photos From A Lost Phone, Way...
- THE WAYS IN WHICH YOU CAN TAKE CHARGE OF YOUR IPHO...
- make your own antivirus
- CONVERT ANY TEXT TO AUDIO WITHOUT ANY SOFTWARE, CO...
- WHAT MEASURES TO TAKE IF YOUR PC IS DAMAGED DUE TO...
- Three Easy Ways to Paste Plain Text Into Word
- Three Easy Ways to Paste Plain Text Into Word
- Smart Charger - Hack
- One-Key Keyboard Hack
- Apple ipod headphone hack
- How to hack Telnet
- Nightlight IR Detector Hack
- how to use cmd to hack (basic codes)
- How to Do Advanced Computer Yoga
- How to Hack
- Facebook Tricks
- Exploits
- Ethical Hacking Training Course Online
- Earn Money Online
- Earn Bitcoins
- Phlashing-PDOS
- DOS Attacks
- Donate Us
- Cryptography
- Cross Site Scripting (XSS)
- Computer Forensic Tools And Tricks
- Chat with Friends through Command Prompt
- Bypass Android Pattern lock
- Bug Bounty Web List
- Botnets
- Anonymous Surfing
- Android Vulnerability Updates
- Android Tools
- Locked Out of Your Phone? Here's How You Bypass th...
- Locked Out of Your Phone? Here's How You Bypass th...
- Advice from a Real Hacker: Why I'm Skeptical That ...
- Advice from a Real Hacker: How I Would Build the G...
- Wireshark Training
- How to find out what programming language a websit...
- JavaSnoop: How to hack anything in Java
- Introduction to Public-Key Cryptography
- The Six Dumbest Ideas in Computer Security
- Pentesting Tutorial 1 - Information Gathering Part...
- Backtrack Penetration Testing Tutorial
- Learn Penetration Testing
- Hacking For Dummies - Beginners Tutorials Cybrary
- League of Legends List of champions LOL
- Best Kali Linux Books
- 5 Best Hacking and Pentesting Books of 2016
- These engineers are developing artificially intell...
- Hackers targeting internet-connected systems to st...
- Spelling mistake prevented hackers taking $1bn in ...
- HOW TO HACK BEATPORT: BUY YOUR WAY INTO THE TOP 10
- Aircrack-ng 1.2 RC 4
-
▼
March
(156)
love hacker triks
Label
- 3 Necessary things to become Expert Certified Hacker
- DNSMAP Video Tutorial on Kali Linux – DNS Information Gathering
- DNSTRACER Video Tutorial on Kali Linux – DNS Analysis Tool
- Enums: Functions
- Hack Any Facebook Account !
- Hack like a pro (How to hack a Facebook part 2 )
- Hack: a new programming language for HHVM
- How to Become a Free Software Hacker
- How to Become a Hacker
- How to become a Professional Hacker | Hackingloops
- How to Crack Wi-Fi Passwords—For Beginners!
- I will make you expert How to become Professional Hacker 3 Necessary things to become a expert Hacker
- Penetration Testing of Apple iOS : Exploited by Sandbox Vulnerability
- security scanning and auditing.
- Shapes: Introduction
- Tools: Hh_server
- Using Nmap for Network Mapper. It is an open source security tool for network exploration
- Want to become Hacker
Label
- 3 Necessary things to become Expert Certified Hacker
- DNSMAP Video Tutorial on Kali Linux – DNS Information Gathering
- DNSTRACER Video Tutorial on Kali Linux – DNS Analysis Tool
- Enums: Functions
- Hack Any Facebook Account !
- Hack like a pro (How to hack a Facebook part 2 )
- Hack: a new programming language for HHVM
- How to Become a Free Software Hacker
- How to Become a Hacker
- How to become a Professional Hacker | Hackingloops
- How to Crack Wi-Fi Passwords—For Beginners!
- I will make you expert How to become Professional Hacker 3 Necessary things to become a expert Hacker
- Penetration Testing of Apple iOS : Exploited by Sandbox Vulnerability
- security scanning and auditing.
- Shapes: Introduction
- Tools: Hh_server
- Using Nmap for Network Mapper. It is an open source security tool for network exploration
- Want to become Hacker
Flickr
Featured Post
Popular
-
iCloud Apple iD BruteForcer This tool is released by "Pr0x13" at GitHub. Attackers to break into any iCloud account, potentia...
-
6×03 Oathbreaker– VideoMega ( HD )– OpenLoad – iDoWatch – Streamin – Nowvideo – WStream – FlashX
-
Prerequisites: All tutorials will need: Backtrack 5, Pentesting Lab, and Patience This will be the first tutorial on a series th...
-
In the starting of this tutorial i want clear this if u misuse this information in hacking someones computer then i am no...
-
'XSS' also known as 'CSS' - Cross Site Scripting . It is a very common vulnerability found in Web Applications, 'XSS...
-
Reward Program AT&T - http://developer.att.com/developer...
-
Basic Scanning Techniques So here I will show the basic techniques for scanning network/host. But before that, you should know some bas...
-
Google queries for locating various Web servers “Apache/1.3.28 Server at” intitle:index.of Apache 1.3.2 “Apache/2.0 Server at” intitle:inde...
-
BY: UJJWAL SAHAY CO-FOUNDER [www.thebigcomputing.com] FIND OUT MORE STUFF LIKE THIS ON TheBigComputing.com We cover unique Ethica...
-
Nir Goldshlager Founder of Break Security find the critical vulnerability in Instagram. Succesful hack allows attacker to access private p...
0 comments:
Post a Comment