This app was mentioned in
with an average of
From SuperSU playstore
- Superuser access prompt
- Superuser access logging
- Superuser access notifications
- Per-app notification configuration
- Temporary unroot
- Deep process detection (no more unknowns)
- Works in recovery (no more segfaulting)
- Works when Android isn't properly booted
- Works with non-standard shell locations
- Always runs in ghost mode
- Wake on prompt
- Convert to /system app
- Complete unroot
- Backup script to survive CyanogenMod nightlies
- Icon selectable from 5 options + invisible
- Theme selectable from 4 options
- Launch from dialer: ##1234## or ##7873778## (##SUPERSU##)
NOTE: Not all phones take both codes. On some phones you need to use single # instead of double *##
The Pro version additionally offers:
can't remember what cm superuser thing does its not in the nightly I have atm
i haven't removed it but it didn't showin the main thread either anyway instructions below
How to completely unroot phone and fix "unable to authenticate" on pogo versions 0.37.0 and above
Download SuperSu from the google play store, [link]
After installing SuperSu open it, click on the settings tab and press Full Unroot and allow the process to finish.
If you had xposed framework on your phone you will need to ensure that all data from xposed is removed, or Pokemon go will be "unable to authenticate"
To remove the xposed data go here [link] and download "Xposed-Disabler-Recovery.zip" Download it!
I then rebooted my phone into recovery and flashed "Xposed-Disabler-Recovery.zip"
After the phone restarted I can now run 0.39.0
ChainFire's SuperSu app has the ability to unroot for various things like accepting OTA updates. Maybe you can try that. Might need the pro version, not sure.
> Install Systemless Root
Can you elaborate? Do you mean the SuperSU app from the PlayStore?
> Using terminal, type "su" (grant permission) and then type "chmod 751 /su/bin/"
> -Run a safetynet test and it should work.
Sorry, I'm a bit new to this. By terminal, do you mean cmd prompt? What does "safetynet test" mean? Can you elaborate on these steps? Sorry, I usually just root by downloading and running some automated tool.
Try to install it manually? That tutorial is outdated by the way, use this
I googled it and found that towelroot will work. click the lambda to download the apk, install it, and then click "make it ra1n" and I assume it should then be rooted. after that, you have to download SuperSU and let it update the binary. then, you should be all set!
> Sony Xperia Z1
This may work if you want to attempt root. Not sure if it will work with the latest firmware on the phone, so YMMV. Generally doing this won't cause any issues, and if root fails the phone will probably just reboot in my experience, but as with all things of this sort, caveat emptor.
As for Tincore, once you have root access, you'll need to install SuperSU to grant applications root access. Once you have root and have SuperSU installed, just install and launch Tincore. SuperSU will prompt you to grant root access to the application. No need for a pre-rooted ROM or anything.
You might want to re-root and then unroot it.
I found this guide to root generic tablets. Not sure if that will work, but you can give it a try.
If you managed to re-root it successfully, you can then unroot it with SuperSU app.
Once you got it unrooted, try running SIF again.
> fastboot oem unlock
count? Together with
these are my essentials. :)
once you get to 4.4.2, root with one click method.
Do not forget to install SuperSU([link])
install Flashfy(in appstore), open it up, give it permission to have root access. Then you can follow this guide here: [link]
once you have done that, follow the CM guide
Just to confirm, you:
Have root access on your phone, and a root app like SuperSU
Downloaded sixpair tool
plugged PS3 controller into PC via USB, ran sixpair
Launched sixaxis on your phone
manually changed the BT address on your ps4 controller in sixpair to the address at the bottom of the sixaxis page on your phone, then set it?
Once you do that, it should be able to pair up, unless something's changed recently, or if the process is different from the PS3 controller connection. I haven't used it in a while since my phone isn't rootable without some serious pain and loss of data (I previously had it on my tablet).
I had this problem when I first installed CM12 on a new Nexus 6. Not sure if the rooting process failed or if I lost it when I flashed CM12, but none of my apps that required root (AdAway, File Manager, etc.) could get root access even though I had root access enabled under developer settings. I ended up having to reflash the rooted image.
You may also want to download SuperSU. CM12 has a built-in root manager, but I've found that SuperSU is a little easier to work with.
For anyone wondering, the app itself is hosted in the official XDA thread:
And the direct link for the latest version is also active:
Also, if you have questions about what is Magisk, you know, Google is your friend. Basically is a SuperSU replacement that allows root access to be "hidden", so apps cannot know if you run a rooted phone or not. Even passes SafetyNet checks, so banks, or even Netflix cannot know that you are rooted.
Happy rooting ;)
Edit: Added more information about Magisk for the lazy ones.
Motorola provides a way to unlock the bootloader, keep in mind this will likely void your warranty. From there you can flash a custom recovery, I'd recommend TWRP. Then you can just flash superuser. Relatively simple and painless thanks to Motorola allowing us to unlock bootloaders and selling themselves and not letting carriers (Verizon) mess with us.
Unlock Bootloader: [link]
Custom Recovery (TWRP): [link]
Superuser (flash this zip in the recovery): [link]
Superuser app (install this after the last step and let it do its thing): [link]
If there are any issues or anything xda is a great site to look for guides and more in depth help and most issues have been dealt with there usually.
Actually, I can make a quick guide for you here!
Allow the installation of apps from unknown sources by opening Settings > Security and make sure "Unknown sources" is checked.
Download and install towelroot on your phone.
Open the app and press the "make it ra1n" button. It should say that it was successful.
Install SuperSU from the Google Play Store
Open the app, and when it asks for the installation method, select Normal. After its done, it will tell you to reboot, do so.
After you are booted back up, download Flashify from the Google Play Store.
Open the app and grant it root access when it asks.
In the menu, select "Recovery Image" then select the newest one in the list.
After its done downloading, press "Yup!"
And you're done!
You now have root access with a superuser application installed (SuperSU) as well as a custom recovery installed (TWRP)
Hope this helped!
For the Galaxy S4, most people root so they can install a custom ROM to make the phone look better, perform faster, get better battery life, etc. Some install a ROM that is based off Touchwiz, which is Samsung's version of Android, so they can keep the "Samsung feel". While some install a ROM that is based off AOSP, which is a stock Android ROM, these often provides faster performance and better battery life regardless of the device. Although it does require you to factory reset your device. If you would like more information on this, tell me!
Most root apps can be found in the app store. Greenify is well known for increasing battery life, SD Maid is great for clearing space, Titanium Backup is the best backup app to backup anything, I've also had good results with sEFix recently, many people preach for Clean Master although I'm personally not a fan.
Explore some and poke around the xda page for your device!
Here is a set of steps that worked for me:
1). Activate developer options & enable Root Access for "Apps and Adb".
2). Install SuperSu, IGNORING the SuperSu binary update.
3). In settings of SuperSu, perform a "Full unroot" and reboot.
4). Reboot again into recovery and flash Magisk and phh's Super User. Reboot & Install APKs for both via Google Play Store.
5). Activate "Magisk Hide" in Settings menu for Magisk. Reboot & check SafetyNet status (should be green).
6). Install Pokemon Go. Hide Pokemon Go app in Magisk. Reboot.
I've gotten the app to work again with the latest update even though I'm using CM13 (which has built-in root). The following steps worked for me, please don't attempt unless you know what you're doing, I will not take responsibility if you brick your phone (I guess flashing the CM build again from recovery should fix most issues):
As I said, the game runs again on my phone (Xiaomi Redmi Note 3 Pro, snapdragon version with CM13) and it survives a reboot. I assume these steps would need to be repeated after updating the CM build but I haven't yet verified my assumption.
I'll do my best to explain what I can. I'm definitely not well versed in this kind of thing, but I do have some experience with roms and rooting. ok so,
Step 1 = Rooting your device. The instructions mention Root Genius as a particular method to use. Be sure to note several attempts may be needed.
Step 2 = installing Super SU. Super su is a root permissions app that helps you manage which apps are allowed root access on your device. I linked the US playstore version but if you're outside of the US you may have to look on apk mirror to get your hands on it.
Step 3= opening and ensuring Super SU is working correctly. Once installed, open Super SU and it should prompt you with a request to allow root access. Select yes. It may also ask you to update the binaries. It's important that you select update binaries normally. The other option, "CWM/TWRP", is for those who have a custom recovery installed.
Step 4 = Installing MKTDroid tools and device drivers on your PC. The instructions state that windows 7 is the ideal windows version, but I'm guessing it will run on most windows versions. As for the drivers, that should be pretty self explanatory. "Drivers" are what allow windows to recognize and interact with your device. The beginning of this video talks about this step..
Step 5 = is installing adbd on your phone. I'm not sure this step is necessary though. I'm also not sure which app they're talking about. I found this one by searching "adbd" in the playstore. The one I linked is by Chainfire, who also makes Super SU. So I'd trust that app over any other one. As a side note, if you haven't enabled usb debugging, see the video I linked in the last step.
*Step 6 = Activating the app from step 5. Be sure and read through the description of the adbd app you choose to install. It looks as though some can cause problems when you're trying to get your device recognized by your computer.
Step 7 = Allowing root shell permissions to the Mkt Droid program on your PC. I found this video which walks you through this step as well as Step 8. Make sure to watch it a couple times through before attempting it.
Step 8 = backing up your NVRam. please see video from step 7.
Step 9 = Flashing G750- T00. Here is where things start to dip out beyond my knowledge. So it appears that the OP didn't link the flash tool in the instructions, but some digging around got me to this thread, which appears to be the "flash tool" in question. I also found this video which is a guide to using the tool. Though I think you can disregard the first half of the video because your drivers should be installed already.
Step 10 = after flashing the G750-T00 rom, you need to regain root access to your phone. Like in the first step you need to root your phone using Root Genius. Then find a google playstore .apk file online somewhere. Your best shot is most likely apk mirror. Once you have the playstore installed on your device, you need to re-install which ever adbd app you installed in step 5. Keep in mind, you wont have a carrier signal after flashing the rom so you'll need access to wi-fi to accomplish this step completely. Lastly you need to return to MKTdroid tools and restore the NVRam back up you made in step 7. The video I linked in step 7 shows you how to restore the NVRam back up. this will bring back your carrier cell signal.
Step 11 = Flashing the "251 base". This means returning to the SP Flashtool and installing the link titled "Rooted with twrp recovery inbuild base rom". This will install a custom recovery apparently. Next you have to go into your phones settings and go to back-up/ restore option, and then do a factory reset.
Step 12 = Flashing Gapps through Twrp custom recovery. You should have the Gapps package linked in the tutorial page already on your device, if not download them to your phone directly or download to your pc and then drag and drop them onto your phone, into a location you can easily access. Boot into recovery (this is usually done by holding the volume up or volume down key as well as the power key as you boot the device). Once booted into recovery,select wipe and format options > Clear cache > yes. Back out, then select Clear Dalvik/Art cache > yes. Back out to main menu, select flash zip. Then Browse for the Gapps file you placed on your device. select it, then flash it. back out to main menu, select reboot device. You can use on screen buttons to navigate TWRP or you can use the volume keys to move and power button to select options.
Hopefully this has helped clear some stuff up. One thing that concerns me is that they never mention using the link titled "B113 4.2.2 base with unlocked bootloader" in the instructions. But reading through the xda thread I noticed you're supposed to flash that file at some point. Let me know what you think or if you have questions.
You can follow this guide to downgrade to your G3's stock firmware. Keep in mind it will erase EVERYTHING so backup what you need. Also it's very important that on step 16 of the guide select 'BOARD DL' under the Action Mode section before continuing.
After that you'll want to go into your devices settings app and enable 'Unknown Sources'. Once in the app go to General>Security>Unknown Sources>Enable>OK. Here's a video of it in action if it helps.
Once you have that done you can head to this xda thread in Chrome on your device and download the Stump Root APK.
Install the APK and open it. WARNING: YOU WILL BE GREETED WITH ANNOYING ASS MUSIC^^^mute^it^pls. Then press the 'Grind' button and wait until it instructs you to reboot the device, then reboot.
After rebooting install SuperSU from the play store. This will grant root permissions to anything that needs them on your device.
Uninstall Stump Root
Your G3 should now be rooted. It will also be running KitKat so if you need any help installing a custom recovery or a Lollipop rom feel free to ask.
Here is a set of steps that worked for me (HTC One M8 running CM14 on AT&T):
2). Install SuperSu, IGNORING the SuperSu binary update if prompted.
Try deleting Magisk and installing SuperSU from play store or Kingroot from it's official site
Supersu has over 50 million installs and is highly rated. [link]
That's not very likely if most who try to root end up with bricks.
>that you can save apps in the SD card directly when you root your phone
I don't know of an actual option like that. There is a "Move to SD card" in the settings, but it doesn't work the way you want it: it doesn't move the entire installation, only certain data, and in case of SIF it doesn't even touch the heaviest folder ― files ― so you'll only free a few kilobytes.
However it is possible to move the heaviest folder(s) manually and then use symbolic links to it in its place. Here is my setup, for example: 1.0Gb files folder is moved to the sdcard. You can either root your phone and do it via some terminal emulator (that's what I did), but it should also be possible with adb, in which case you wouldn't need to root, but you'll need your PC. If you want to go with the former, SuperSU works well to hide the su binary, so that you could play. I also already have a guide written, and I can translate it into English if there is a need for it.
SuperSU in PlayStore
Are you using SuperSu?
Open it, and see if it is allowing root access to Helium.
I am on COS 11s (kitkat, 05q), rooted, unlocked bootloader, xposed, SuperSU installed, 480 DPI.
I got it to work this way:
SkyDragon is a modded stock ROM, and is based on 12B, just as Jasmine ROM and Eclipse G3 are.
Never gave me issues, and that was my daily driver for sometime, how odd. Anyways.
However, here are the steps:
(This is the correct firmware file for your phone: [link] )
Root with Stump: [link]
Install SuperSU (from the PlayStore): [link]
Toggle Pro version (without paying) in the settings.
Enable survival mode in the settings
Upgrade via normal software update to 12B.
If you are currently rooted (that means a superuser app such as SuperSU is installed as well) and you want to run CM, follow these steps.
Install the app Rashr and download the newest TWRP recovery from their official website. TWRP is a custom recovery, it allows you to do nandroid backups (full, complete backups of your system) and flash ROM's among other things
Open Rashr and install the .img file you just downloaded, it's a 2 click process
Download the newest CM Nightly and corresponding GAPPS package onto your SD Card
Turn off your phone completely
Hold the power and volume down buttons to get into TWRP
Perform a backup within TWRP (Just follow the onscreen prompts, the recovery is all touch-based so it should be simple)
Perform a full wipe within TWRP (Second verse same as the first)
Flash the ROM, then the GAPPS. Reboot your system from within TWRP.
The first boot may take awhile, but if all went well you will be greeted with Lollipop!
If you're unsatisfied with CM, you can enter TWRP and restore the backup you just made (nothing should be lost if you did a full backup). If you want a different ROM you can use these steps in pretty much the same way.
Try this: [link]
You should be able to deny root access whenever that app trys to use it. There is also a temporary unroot option.
Here is a set of steps that worked for me. For best results, start with fresh ROM.
Did it install a SU app? Like this?
you can try installing SuperSU going into setting of this app and remove root from there
I have the S3 as well. I just ran SuperSU and did a full unroot. I don't find myself using root privileges that often anyway.
Have you tried to install SuperSu after rooting the phone?
FFS, really? We’re all just helpless slaves to our cell phones, whose functioning we couldn’t possibly begin to understand or control!
Uninstall or freeze anything you don’t need/use in your phone’s Application Manager (an applet inside System Settings, usually). If you don’t know what some inscrutably named service or program is, Google “inscrutableProgramName Android” and chances are somebody else knows what it is or whether you need it. If you aren’t sure about some piece of system software, leave it. Periodically check the list of applications to make sure nothing unexpected shows up or changes status.
Learn a little bit about Android (it’s a Java layer on top of Linux, and should be treated as such) and how it works on your phone, then sit down on a free weekend and set to work on it. Root it (i.e., install and enable a native-ish su program that allows a Linux command to be run with the most possible privilege) and make sure there’s something interposed between any app with native exec ability and the su binary. I use SuperSU for this, which will pester you a bit but do its job regardless. Do not grant anything else root access unless there’s a very good reason for it. You having root access, however, allows you somewhat better control over the surveillance device you’re carrying around. You probably don’t need a new “ROM” (=OS image, really nothing all that ROMly about it at all except insofar as it’s typically stored in Flash) but if you want to play with that, find a good bootloader, make backups, and have fun.
Install a firewall using the iptables extension your kernel almost certainly ships with. Woe betide him who decideth to use iptables from the command-line, of course; there are apps for this that will let you easily control network access for any application, and do so individually for VPN, LAN, cell, Wifi, etc. I use DroidWall. Apply the Principle of Least Privilege to everything, and of it ask: Is there a reason I want this app/service accessing the/this kind of network? At worst, if you disable access to the network something will break until you grant it access again. If you’re worried about this happening and getting in over your head, you can save and restore firewall rulesets, and you can enable logging (don’t leave on permanently, or no more disk space) to see what’s getting caught by the firewall.
Install something like XPrivacy so you can disable/dick with just about anything an application will do from within the Java side of things. This includes advertising ID, letting the thing out of the Java sandbox (e.g., native library loading), letting it see or touch any networking functions, letting it see or touch any sensors, letting it see clipboard changes, etc. etc. It can also act as another layer of separation between apps and the su binary, although realistically if the thing can exec, it can run su so be careful what you grant. (Never grant exec or native library loading unless you have a really good reason; you can whitelist specific libraries or commands in the event you do have one. Again, apply the Principle of Least Privilege.)
Install something that lets you control what happens when your phone undergoes system state transitions like starting up or powering down. I use Autostarts on F-Droid but there are a bunch of similar things out there. Apply PLP, but don’t go nuts on system services or you’ll neuter your device beyond useability.
Recommendations, involving varying levels of paranoia as befits your situation:
And of course, if you matter at all to anyone with any power, all the caution in the world will not protect your phone’s sensors and data from an attack via a myriad of vectors that Android/Linux can do jack shit about, even assuming your phone software’s impregnability otherwise. If this is the case, trust paper, fire, and little else.
There are several apps that allow you to do it easily. I used Kingo Root for my Sony Xperia S, and iRoot for my Timmy E86. :3
After rooting your phone, you'll also need to install SuperSU on your phone so you can do extra stuff like accessing hidden system files and similar (otherwise you won't be able to access /data/data/jp.co.hit_point.nekoatsume).
It's a common problem with generic tablets where the game thinks you're rooted while it's not.
How about following this guide to reroot your device first, so that you can use SuperSU app to unroot it? Someone else has tried to follow the guide and it seems to work on them.
(You know... if you provided the model of your generic tablet model, I can somehow guess where you're living at. In your case... Poland, is it? xD)
ES File Explorer (it's kinda bloated, but I haven't found a better way to stream videos over lan yet, the FTP feature is nice too)
try installing SuperSU. If you are not rooted it will tell you so.
If the game is school idol festival use this and temporarily disable root access
I've actually just had to do this again an hour ago. Been going back and forth from 4.4 to 5.0.1 for the past two days, trying to fix my signal due to upgrading modem.
All I did was .kdz to 5.0.1 for a clean slate, rooted using lollipop one click, installed supersu, then installed twrp manager and installed twrp through it. Just follow the steps and it should do the rest for you.
Ok, I will do my best here.
Start From Square One
This is where you will restore back to a clean install of ZV4 by using a TOT file.
This link has VERY detailed instructions. It is much easier than it looks. Thread Link
Root The Device
Here is where you gain access to the file system.
You should now be on Stock ZV4 Rooted with TWRP installed. You are ready to FLASH Lollipop.
Here is a link to Stock Rooted ZV8: Link
Let me know if you need me to elaborate anywhere.
He won't be able to play right now, assuming you put CyanogenMod 13 on it. CM13 is essentially pre-rooted with SuperUser permissions baked into the OS.
If you're on 12 or earlier you should be okay. You can check this by opening settings, scrolling down to 'about phone', and checking the 'Cyanogen MOD version' number.
Unfortunately a simple google search for how to do this doesn't bear fruit as everything tells you to just disable root. This will not satisfy SafetyNet.
First you need to install SuperSU from the play store: [link]
Then open SuperSU and run the Full Unroot option in its settings. [link]
After this enable developer options (go back to About Phone and tap 7 times on the 'Build Number' to enable developer options on the settings menu) then look for the root access setting and set that to disable/inactive/off/etc.
It definitely looks like the icon from SuperSU
Cyanogenmod has Superuser built into the software (obviously).
The way I removed it was going into root settings, and disabling root entirely. Then I installed SuperSU from the playstore, and use root access through that.
Cleaner looking, and more settings to configure. Highly recommend.