Requirements: All Android Version
Overview: Here’s a one-click root with almost all phones and all android versions. (including the i9000, Droid, Nexus One, etc).YOU CAN ROOT ALMOST ALL ANDROID PHONES!
The program requires Micro soft .NET Framework 2.0+ or Mono v1.2.6+
Operations systems with native support:
W indows V ista
W indows 7
Ubuntu Hardy (8.04 LTS)
Ubuntu Jaunty (9.04)
Ubuntu Karmic (9.10)
Ubuntu Lucid (10.04 LTS)
Ubuntu Maverick (10.10)
Debian Lenny (5.0)
Debian Squeeze (testing)
Debian Sid (unstable)
If you run Micro soft W indows XP, install .NET F ramework v2.0 or above
If you run Mac or another Linux flavor, make sure you install Mono:
You NEED to put your phone on USB Debugging mode
You NEED to install make sure the Android drivers for your phone are installed
Make sure you DO NOT mount your SD card.
If you still can’t get something to run, try doing it in recovery mode.
Please note that if you device is not listed here, it doesn’t automatically make it incompatible. The list is definitely incomplete.
Use the search feature to search for your phone model: http://forum.xda-developers.com/sear…hreadid=803682
Acer Liquid Metal
HTC Magic (Sapphire) 32B
Samsung Galaxy 551 (GT-I5510)
Samsung Galaxy Portal/Spica I5700
Samsung Galaxy S 4G
Samsung Galaxy S I9000
Samsung Galaxy S SCH-I500
Samsung Galaxy Tab
Samsung Transform M920
Sony Ericsson Xperia E51i X8
Sony Ericsson Xperia X10
Toshiba Folio 100
With the absolutely beautiful ADB exploit I use, titled rageagainstthecage (ratc), absolute ALL devices can be rooted. This is because it exploit is ADB which all devices use. There is an issue though. Some devices have a NAND lock which does not allow you to write to the /system mount. Because of this, you can’t copy su, sqlite or busybox to /system/bin. This creates some issues but there is a work around. For things that don’t need access to /system (like enabling non-market apps) I can use the ratc exploit to make those changes. If your device cannot use su in /system/bin then you can simple select a checkbox (as of v1.5) that says to use ratc.
There are 3 levels of “root” we can define:
Level 1: Shell Root (with ratc rooting the adb shell but no /system write access)
Level 2: Temporary Root (/system/bin/su installed but lost on reboot)
Level 3: Full Root (/system/bin/su installed and sticks)
Some devices have a NAND lock. SuperOneClick will only give a Shell root until you remove this lock.
The following phones can use http://unrevoked.com to remove this lock:
Sprint EVO 4G (HTC Supersonic)
Droid Incredible (HTC Incredible)
HTC Desire GSM
HTC Desire CDMA (HTC BravoC)
Droid Eris (HTC DesireC)
HTC Wildfire (HTC Buzz)
THe HTC Legend and My Touch 3G 32A also have a NAND lock and need more specific methods to unlock.
The T-Mobile (HTC) G2 has something different which may or may not be a hardware flaw. I have yet to really research the device, but while it may root, it won’t be permanent since copying /su to /system/bin/su has problems. I believe this is a Level 2 root, but to be honest, I need to research more.
All other devices has a Level 3 root via SuperOneClick
Mod Edit: this app will set off some anti virus software…here’s a small explanation by pulser_g2:
rageagainstthecage is a root exploit via a fork bomb.
It IS a potentially malicious payload, BUT it is being used with owner’s consent to root the phone.
The DreamDroid malware use exactly same payload – they are trojans, but this is a helpful tool.
It IS a dangerous tool in the wrong hands, but this is a root exploit, so you should exercise common sense and a little understanding of what it does and how it works.
Motorola ADB Patching
Checks for shell root before applying exploits
Unroot has been fixed to work more reliably
LG devices no longer need to use alternate ADB
Better LG phone support
Auto driver installation
v2.2 is up!
zergRush and Superuser 3.0.6 included