Rooting Android Device With Framaroot

Rooting android with Framaroot

Your Android device can get really boring especially if you have been stuck with its stock ROMs for quite so long. To customize your device, you will need to flash new custom ROMs, but you will need to rooting android device first. This process can be done with the help of a fastboot or ADB that uses command lines to push Su binaries. But most of the time, you will need a specific toolkit for this. Others, on the other hand, depend on a PC.

Fortunately, Framaroot was developed. This app makes it easier to rooting android devices. You won’t need any command or connection to PC to rooting android device. This is a simple apk developed by alephzain. It can be downloaded and installed as apk here  or here . And once installed, it will push SU binaries and Super SU to root it. It is compatible with a wide range of devices which run on Android 2.x.x to 4.x.x. Below is a list of devices which Framaroot is compatible with but are not limited to this list as more devices are being introduced.

Compatible devices:

 

Qualcomm devices for Gandalf exploit:

 

  • ZTE V880G/ZTE V955
  • Xiaomi Mi-2s
  • teXet TM-4677
  • teXet TM-3204R
  • Sony Xperia L C210X
  • Sony Xperia E C1505/Dual C1605
  • Sharp Aquos Phone SH930W
  • Samsung Galaxy Win I8552
  • Pantech IM-A840S Vega S5
  • Pantech Discover
  • Orange Nivo
  • Oppo Find 5
  • Micromax A111 Canvas Doodle
  • MEDION Life P4013
  • LG Optimus LTE 2
  • LG Optimus L7 P700/P705
  • LG Optimus L7 II P710/P713/P714/P715
  • LG Optimus L5 E610/612/615
  • LG Optimus L3 II E425
  • LG Optimus G E970/E975
  • LG Optimus F5 (P875)
  • LG L7 II P710/P714/P715
  • LG Nitro HD
  • Lenovo S870E
  • Kyocera Torque
  • Karbonn Titanium S5
  • Huawei U8825D Ascend G330D
  • Huawei U8815/U8816 Ascend G300/G301
  • Huawei Honor Pro (U8950-1)
  • HTC One S
  • Highscreen Spark/OMEGA Q/Blast/Strike/Boost
  • Google Nexus 4
  • Gigabyte GSmart Rio R1
  • Gigabyte GSmart G1315 Skate
  • FAEA F1
  • DNS S4504/S4503/S4502
  • Disgo 8400g
  • Cloudfone Thrill 430x
  • BWT18+ (Fortis Evo)
  • Asus Transformer Pad Infinity TF700KL
  • Asus Padfone Infinity
  • Asus Padfone ½
  • More feedbacks…

 

MTK Devices for Boromir exploit:

 

  • ZTE V987 Grand X Quad
  • ZTE V880G/H
  • ZOPO ZP900 Leader
  • ZOPO ZP300+
  • ZOPO ZP 910
  • ZOPO C2 Platinum
  • THL W200
  • THL W100 (130711)
  • THL V12
  • Texet TM-5277
  • TeXet NaviPad TM-7055HD
  • Star S5 Butterfly
  • Sharp AQUOS SH837W
  • Prestigio MultiPhone PAP 4505DUO
  • Prestigio MultiPhone 4055
  • Philips W736
  • Philips 5%36
  • OUMEI X5
  • Oppo findway U7015
  • Newman N1
  • Motorola RAZR D3
  • Micromax Canvas HD
  • Lenovo S820, S920, A390
  • Lenovo P770
  • Lenovo IdeaTab S6000-H
  • Lenovo IdeaTab A3000-H
  • Lenovo IdeaPhone S720
  • Lenovo IdeaPhone P700i
  • Lava iris 405
  • KENEKSI Beta
  • Jiayu G4
  • Jiayu G3S
  • Jiayu G2
  • iOcean X7
  • IconBIT NetTAB Space 3G Duo
  • Huawei U8836D G500 Pro
  • HKC Q79 3G
  • Highscreen Alpha GTX
  • Haipai I9389
  • GoClever Fone 570Q
  • Fly IQ451
  • Fly IQ446 Magic
  • Fly IQ443 Trend
  • Fly IQ442 Miracle
  • Fly IQ441 Radiance
  • Fly IQ440 Energie
  • Explay Surfer 8.31 3G
  • Explay Surfer 7.32 3G
  • Explay Polo
  • Explay Infinity II
  • Explay HD Quad
  • DAXIAN XY100S
  • Chinese Star S7580
  • ASUS Memo Pad HD 7
  • Amoi N28
  • Alcatel OT Idol 6030X/6030D/6030H/
  • Alcatel OT 997D
  • Alcatel OT 8008D Scribe HD
  • Alcatel OT 4030D S’POP
  • More…

 

Huawei K3V2 devices for Pippin exploit

 

  • Still waiting for these devices

 

Samsung Devices for Aragorn and Legolas exploits

 

  • Samsung Lightray SCH-R940
  • Samsung Galaxy Young GT-S6312/GT-S6310
  • Samsung Galaxy Proclaim S720C
  • Samsung Galaxy Core GT-I8262
  • More…

 

Exynos devices for Legolas, Aragorn, Sam and Frodo exploits

 

  • iBerry Auxus CoreX2 3G and CoreX4 3G
  • AT&T Galaxy Note 2 SGH-I317
  • Verizon Galaxy Note 2 SCH-I605
  • Highscreen Explosion
  • T-Mobile Galaxy Note 2 T-889
  • Hyundai T7s
  • Meizu MX2
  • Impression 9702 (Exynos 4412)
  • Newman N2
  • Lenovo K860/К860i
  • Samsung Galaxy Camera EK-GC100
  • Samsung SGH-i997 Infuse 4G
  • Samsung Galaxy Note 10.1 GT-N8000, GT-N8010, GT-N8013, GT-N8020
  • Samsung Galaxy Tab 7.7 GT-P6800/GT-P6810
  • Samsung Galaxy Note 2 GT-N7100
  • Samsung Galaxy Tab Plus GT-P6200/GT-P6210
  • Samsung Galaxy Note 2 LTE GT-N7105
  • Samsung Galaxy S3 LTE GT-I9305
  • Samsung Galaxy Note 8.0
  • Samsung Galaxy Note GT-N7000
  • Samsung Galaxy S3 GT-I9300
  • Samsung Galaxy S GT-i9000
  • Samsung Galaxy S2 AT&T SGH-I777
  • Samsung Galaxy S2 GT-I9100
  • Samsung Galaxy S2 Epic 4G Touch – SPH-D710

 

Omap36XX devices for Gimli exploit

 

  • Archos Gen8
  • R2D2 (a957)
  • Cliq 2 MB611
  • Parrot ASTEROID Smart
  • Coolpad Quattro 4G
  • Droid 2 Global (a956)
  • Droid 2 (a955)
  • Droid X (MB810)
  • LG P970 Optimus Black
  • LG Marquee LS855
  • Motorola DEFY+ (MB525 / MB526)
  • Motorola XPRT
  • Motorola Droid PRO
  • Motorola Droid X

 

rooting android rooting android rooting android rooting android

Note these cases:

 

  • You may find prompt that says, “Your device seems not vulnerable to exploit included in Framaroot”. When this happens, uninstall the app.
  • If you see one or more than one exploit name and you have clicked on one of them after doing an action, you will receive the same message as the one above.
  • When the prompt reports, “Success…” reboot device.
  • For “Failed”, there was a failure installation of Superuser and Su binary.
  • When “Half-success” shows up, the file system can only be read like squashfs.
  • If failed, try another exploit.

 

Rooting Android Device:

 

  • Download apk Framaroot here  or here
  • Connect your device to the computer
  • Copy and paste the apk to the device
  • Detach your device from the computer
  • Install apk file using your device’s file manager.
  • Launch Framaroot from the device drawer
  • Choose your preferred Superuser or Super SU.
  • Choose an exploit. The process will immediately start.
  • Reboot device afterwards.

 

You may also unroot your device. Just follow the same process but this time select unroot and not Super SU.

Share your experience and/or questions in the comment section box

Let us know in the space below.

EP

[embedyt] https://www.youtube.com/watch?v=Ibb7_3eKZcE[/embedyt]

About The Author

Reply

error: Content is protected !!