Tech mistake |Welcome to the XDA-Developers Root Directory. Here, you can find root tutorials for most devices that are on the XDA Forums. Learn how to root any Android device! If you don’t see your device listed or you see a misplaced link, send a PM to PG101, with the device details and a link to the root thread on XDA.
For those new to the world of rooting, acquiring root access essentially grants you elevated permissions. With root access, you are able to access and modify files that would normally be inaccessible, such as files stored on the /data and /system partitions. Having root access also allows you to run an entirely different class of third-party applications and apply deep, system-level modifications. And by proxy, you may also be able to access certain device features that would otherwise be inaccessible or use existing features in new ways.
Having root access isn’t the end all-be all of device modification–that title is usually reserved for fully unlocked bootloaders and S-Off. That said, root access is generally the first step on your journey to device modification. As such, root access is often used to install custom recoveries, which then can be used to flash custom ROMs, kernels, and other device modifications. Root access also enables users to install the powerful and versatile Xposed Framework, which itself acts as a gateway to easy, non-destructive device modification.
Due to its inherent power, having root access is often dangerous. Thankfully, there are root brokering applications such as SuperSU that only grant root access to applications of your choosing. There are also various root-enabled utilities available to help you restore in the event that something goes wrong. For starters, you can use any number of root-enabled application backup tools to backup your applications and their data to your local storage, your PC, and even online cloud storage. And in conjunction with a custom recovery, rooted users are able to perform a full, system-wide Nandroid backup that essentially takes a snapshot of your current smartphone or tablet at any particular time.
We can go on about the virtues of root access ad infinitum, but we’ll stop for now because we sense you salivating at the prospect of root access and what you can do with your device once root is achieved. Head to the links below to begin the journey.
PLEASE NOTE: Rooting a device may void the warranty on the device. It may also make the device unstable or if not done properly, may completely brick the device. Some methods may install additional apps/software on your device. XDA-Developers or the author does not take any responsibility for your device. Root at your own risk and only if you understand what you are doing!
JUMP TO:
SAMSUNG | HTC | GOOGLE | MOTOROLA | SONY | LG | OPPO | ONEPLUS | AMAZON | OTHERS
_________________
Magisk Root
Framaroot
Many devices can be rooted using this application. Check your device for compatibility.
Towelroot
Created by XDA Recognized Developer geohot, Towelroot is another root exploit app that is compatible with a large range of devices. The root exploit itself is built around Linux kernel CVE-2014-3153 discovered by hacker Pinkie Pie, and it involves an issue in the Futex subsystem that in turn allows for privilege escalation. Although specifically designed for certain variants of the Galaxy S5, it is compatible with the majority of devices running unpatched kernels.
CF-Auto-Root
Created by XDA Senior Recognized Developer Chainfire, CF-Auto-Root is a root for “rooting beginners” and those who want to keep as close to stock as possible. CF-Root is meant to be used in combination with stock Samsung firmwares as well as Nexus devices, and be the quickest and easiest way for your first root. In essence, it does nothing but install and enable SuperSU on your system, so apps can gain root access.
KingRoot
KingRoot is root for people who just want to have root access to their devices, and not necessarily wanting to flash anything extra. It works on almost all devices from Android version 2.x to 5.0. Working of KingRoot is based on system exploit. The most suitable root strategy will be deployed from cloud to your device according to the ROM information on the device. The best part of using this root method is that it does not trip KNOX and have the ability to close Sony_RIC perfectly.
Samsung
Galaxy A7 (2018)
Galaxy A8+ (SM-A730F)
Galaxy A8+ (2018)
Galaxy Ace
Galaxy S Advance
Galaxy S Relay
Galaxy W
Galaxy Y
Galaxy Y Duos (GT-S5360)
Galaxy Nexus
Galaxy S II (JellyBean)
Galaxy SII Plus (4.1.2 | 4.2.2)
Galaxy S III (International | Verizon 4.3 – 4.1.2 | Sprint | AT&T | T-Mobile)
Galaxy S4 (International Exynos – Snapdragon | Verizon | Sprint | AT&T | T-Mobile | Canadian)
Galaxy S4 Active
Galaxy S5 (International Qualcomm/Exynos | Sprint | T-Mobile | Verizon | AT&T)
Galaxy S6 (Normal Root | PingPong Root)
Galaxy S6 Edge (Normal Root | PingPong Root)
Galaxy S6 Edge+
Galaxy S7
Galaxy S7 Edge
Galaxy S8 (Recovery and Root)
Galaxy S8 Plus (Recovery and Root)
Galaxy S9 (Recovery and Root)
Galaxy S9+ (Recovery and Root)
Galaxy Note (International | Verizon | Sprint | T-Mobile | AT&T)
Galaxy Note 2 (International | Verizon | Sprint | AT&T | T-Mobile)
Galaxy Note 3 (International | Verizon | Sprint | AT&T | T-Mobile)
Galaxy Note 4 (International | Verizon | Sprint | At&T | T-Mobile)
Galaxy Note 5 (Root via Kernel)
Galaxy Note 7
Galaxy Note 8
Galaxy Note 9
Galaxy Note Edge
Galaxy Note Pro 12.2
Galaxy Gear
Gear 2
Gear 2 Neo
Tab Pro (12.2, 10.1, 8.4)
Tab S (8.4 | 10.5)
Tab S2
Tab 3
Tab 4
Galaxy Tab S4
HTC
HTC Butterfly
HTC Desire
HTC Desire 500
HTC Desire 610
HTC Desire 816
HTC Desire X
HTC Desire Z
HTC Desire HD
HTC Desire Eye
HTC Evo 3D
HTC Flyer/Evo View 4G
HTC Incredible
HTC Incredible S
HTC One S
HTC One V
HTC One X | One X+
HTC Sensation
HTC One M7 (International | Verizon | Sprint | AT&T | T-Mobile)
HTC One Mini
HTC One Max
HTC One M8 (International | Verizon | Sprint | AT&T | T-Mobile)
HTC One M9
HTC One A9
HTC 10 (2016)
HTC U11 (Root Via Magisk | Custom Recovery)
HTC U11+ (TWRP and Root)
HTC U12+ (Basic pre guide to root without TWRP)
Chromecast
Nexus One
Nexus 4
Nexus 5
Nexus 5X
Nexus 6
Nexus 6P
Nexus 7 (Tablet)
Nexus 9 (Tablet)
Nexus 10 (Tablet)
Nexus Player
Pixel C
Pixel XL
Pixel Life
Pixel 2 XL(Magisk [WIP] / SuperSu)
Pixel 3
Pixel 3 XL
Motorola
Moto E
Moto E (2015)
Moto G
Moto G (2014)
Moto G (2015)
Moto G4 Plus
Moto X
Moto X (2014)
Moto X Play
Moto X Style Pure
Moto Z
Moto G4 Plus
Droid X (MB810), Droid 2 (a955), Droid 2 Global (a956), R2D2 (a957)
Droid X2 (MB870)
Droid 3 (XT862)
Droid 4 (XT894)
Droid Razr
Droid Razr HD
Maxx XT 1225
XOOM
Moto Z
Sony
Xperia Line (Cross Development) (Link 1 | Link 2)
Xperia T/V/TX
Xperia Z (For FW 10.3.1.A.0.244)
Xperia Z Ultra
Xperia Z Ultra GPe
Xperia Z1
Xperia Z2
Xperia Z3
Xperia Z5
Xperia Z5 Premium
Xperia Z2 (Tablet)
Xperia Z1 Compact
Xperia Z3 Compact
Xperia Z5 Compact
Xperia S
Xperia SP (For FW 12.0.A.2.245/254 and 12.1.A.1.207)
Xperia U
Xperia X Performance F8132
Xperia XA (F31xx, F32xx)
Xperia XZ
Xperia XZs
Smartwatch 3
LG
G Flex
G2 (International | Verizon | Sprint | AT&T | T-Mobile)
G2 Mini
G3 (International/Unlocked Only/AT&T)
G4
G5 (H850) (RS988)
G6
Pro 2
Lucid 2
G-Flex 2
G Watch
G Watch R
LG V10 (T-Mobile)
LG V20
Oppo
N1
N3
R819
Find 5
Find 7 | 7a
OnePlus
OnePlus One
OnePlus Two
OnePlus X
One Plus 3
One Plus 3T
OnePlus 5
OnePlus 5T
OnePlus 6
OnePlus 6T
Amazon
Kindle Fire 1 (original)
Kindle Fire 2
Others
Elephone Vowney
XIAOMI Redmi 1S
XIAOMI Mi Note Pro
XIAOMI Mi 4C
XIAOMI Mi 5
XIAOMI Mi A1
XIAOMI Mi Mix 2S
XIAOMI Poco F1
XIAOMI Mi A2
XIAOMI Mi A2 Lite
ZTE Blade
Nvidia Tegra Note 7
HP Slate 7 (2800)
NVidia Shield Tablet
Dell Venue / Acer Iconia A1-830
Asus Zenfone 2 (Scroll first post to read the different root methods)
Asus Zenfone 5
Asus Zenphone Max Pro M1
Nokia X2
Alcatel OneTouch Idol 3
ZTE Axon Elite
ZTE Axon 7
Huawei Mate 8
Huawei Mate 10
Huawei P9
Huawei P9 Plus
Huawei P10
Huawei P20
Huawei P20 Pro
Huawei Mediapad M5
Honor 7x (International Version BND-L21)
Honor 8
Honor 9 Lite
Honor View 10
Honor Note 10
Blu Pure XL
Vivo 9
Elephone S8
Updated : 04December 2018
The article was originally published here.