Requirements: All Android Version
Overview: Here's a one-click root with almost all phones and all android versions. (including the i9000, Droid, Nexus One, etc).YOU CAN ROOT ALMOST ALL ANDROID PHONES!
The program requires Micro soft .NET Framework 2.0+ or Mono v1.2.6+
Operations systems with native support:
If you run Mac or another Linux flavor, make sure you install Mono:
http://www.go-mono.com/mono-downloads/download.html
You NEED to put your phone on USB Debugging mode
You NEED to install make sure the Android drivers for your phone are installed
Make sure you DO NOT mount your SD card.
If you still can't get something to run, try doing it in recovery mode.
Compatibility list
Please note that if you device is not listed here, it doesn't automatically make it incompatible. The list is definitely incomplete.
Use the search feature to search for your phone model: http://forum.xda-developers.com/sear...hreadid=803682
With the absolutely beautiful ADB exploit I use, titled rageagainstthecage (ratc), absolute ALL devices can be rooted. This is because it exploit is ADB which all devices use. There is an issue though. Some devices have a NAND lock which does not allow you to write to the /system mount. Because of this, you can't copy su, sqlite or busybox to /system/bin. This creates some issues but there is a work around. For things that don't need access to /system (like enabling non-market apps) I can use the ratc exploit to make those changes. If your device cannot use su in /system/bin then you can simple select a checkbox (as of v1.5) that says to use ratc.
There are 3 levels of "root" we can define:
Level 1: Shell Root (with ratc rooting the adb shell but no /system write access)
Level 2: Temporary Root (/system/bin/su installed but lost on reboot)
Level 3: Full Root (/system/bin/su installed and sticks)
Some devices have a NAND lock. SuperOneClick will only give a Shell root until you remove this lock.
The following phones can use http://unrevoked.com to remove this lock:
The T-Mobile (HTC) G2 has something different which may or may not be a hardware flaw. I have yet to really research the device, but while it may root, it won't be permanent since copying /su to /system/bin/su has problems. I believe this is a Level 2 root, but to be honest, I need to research more.
All other devices has a Level 3 root via SuperOneClick
Mod Edit: this app will set off some anti virus software...here's a small explanation by pulser_g2:
rageagainstthecage is a root exploit via a fork bomb.
It IS a potentially malicious payload, BUT it is being used with owner's consent to root the phone.
The DreamDroid malware use exactly same payload - they are trojans, but this is a helpful tool.
It IS a dangerous tool in the wrong hands, but this is a root exploit, so you should exercise common sense and a little understanding of what it does and how it works.
Changelog:
v2.3.3:
http://depositfiles.com/files/5ggml6wzq
Overview: Here's a one-click root with almost all phones and all android versions. (including the i9000, Droid, Nexus One, etc).YOU CAN ROOT ALMOST ALL ANDROID PHONES!
The program requires Micro soft .NET Framework 2.0+ or Mono v1.2.6+
Operations systems with native support:
- W indows V ista
- W indows 7
- Ubuntu Hardy (8.04 LTS)
- Ubuntu Jaunty (9.04)
- Ubuntu Karmic (9.10)
- Ubuntu Lucid (10.04 LTS)
- Ubuntu Maverick (10.10)
- Debian Lenny (5.0)
- Debian Squeeze (testing)
- Debian Sid (unstable)
- Debian Experimental
If you run Mac or another Linux flavor, make sure you install Mono:
http://www.go-mono.com/mono-downloads/download.html
You NEED to put your phone on USB Debugging mode
You NEED to install make sure the Android drivers for your phone are installed
Make sure you DO NOT mount your SD card.
If you still can't get something to run, try doing it in recovery mode.
Compatibility list
Please note that if you device is not listed here, it doesn't automatically make it incompatible. The list is definitely incomplete.
Use the search feature to search for your phone model: http://forum.xda-developers.com/sear...hreadid=803682
- Acer Liquid Metal
- Dell Streak
- HTC Magic (Sapphire) 32B
- HTC Bee
- LG Ally
- Motorola Atrix4G
- Motorola Charm
- Motorola Cliq
- Motorola Droid
- Motorola Flipside
- Motorola Flipout
- Motorola Milestone
- Nexus One
- Samsung Captivate
- Samsung Galaxy 551 (GT-I5510)
- Samsung Galaxy Portal/Spica I5700
- Samsung Galaxy S 4G
- Samsung Galaxy S I9000
- Samsung Galaxy S SCH-I500
- Samsung Galaxy Tab
- Samsung Transform M920
- Samsung Vibrant
- Sony Ericsson Xperia E51i X8
- Sony Ericsson Xperia X10
- Sprint Hero
- Telus Fascinate
- Toshiba Folio 100
With the absolutely beautiful ADB exploit I use, titled rageagainstthecage (ratc), absolute ALL devices can be rooted. This is because it exploit is ADB which all devices use. There is an issue though. Some devices have a NAND lock which does not allow you to write to the /system mount. Because of this, you can't copy su, sqlite or busybox to /system/bin. This creates some issues but there is a work around. For things that don't need access to /system (like enabling non-market apps) I can use the ratc exploit to make those changes. If your device cannot use su in /system/bin then you can simple select a checkbox (as of v1.5) that says to use ratc.
There are 3 levels of "root" we can define:
Level 1: Shell Root (with ratc rooting the adb shell but no /system write access)
Level 2: Temporary Root (/system/bin/su installed but lost on reboot)
Level 3: Full Root (/system/bin/su installed and sticks)
Some devices have a NAND lock. SuperOneClick will only give a Shell root until you remove this lock.
The following phones can use http://unrevoked.com to remove this lock:
- Sprint EVO 4G (HTC Supersonic)
- Droid Incredible (HTC Incredible)
- HTC Desire GSM
- HTC Desire CDMA (HTC BravoC)
- HTC Aria
- Droid Eris (HTC DesireC)
- HTC Wildfire (HTC Buzz)
The T-Mobile (HTC) G2 has something different which may or may not be a hardware flaw. I have yet to really research the device, but while it may root, it won't be permanent since copying /su to /system/bin/su has problems. I believe this is a Level 2 root, but to be honest, I need to research more.
All other devices has a Level 3 root via SuperOneClick
Mod Edit: this app will set off some anti virus software...here's a small explanation by pulser_g2:
rageagainstthecage is a root exploit via a fork bomb.
It IS a potentially malicious payload, BUT it is being used with owner's consent to root the phone.
The DreamDroid malware use exactly same payload - they are trojans, but this is a helpful tool.
It IS a dangerous tool in the wrong hands, but this is a root exploit, so you should exercise common sense and a little understanding of what it does and how it works.
Changelog:
v2.3.3:
- Motorola ADB Patching
- Checks for shell root before applying exploits
- Unroot has been fixed to work more reliably
- LG devices no longer need to use alternate ADB
- Better LG phone support
- Auto driver installation
- zergRush and Superuser 3.0.6 included
http://depositfiles.com/files/5ggml6wzq
Andro-Freaks: Superoneclick V2.3.3 Full Apk >>>>> Download Now
ReplyDelete>>>>> Download Full
Andro-Freaks: Superoneclick V2.3.3 Full Apk >>>>> Download LINK
>>>>> Download Now
Andro-Freaks: Superoneclick V2.3.3 Full Apk >>>>> Download Full
>>>>> Download LINK