Skip to content

Android Rooting Resources Hub 2026

Comprehensive reference for Android rooting, customization, and recovery.


Quick Navigation


🚀 Getting Started

Core checklist

StepDescriptionResource
1. Learn BasicsUnderstand what root access meansWhat is Root?
2. Safety CheckReview risks and benefitsIs Rooting Safe?
3. Device GuideFind your specific deviceDevice Guides
4. PreparationBackup and unlock bootloaderBootloader Guide

Android version compatibility

Android VersionRecommended MethodKernelNotes
Android 16APatch / KernelSUGKI 2.0Developer Preview - experimental support
Android 15APatch / KernelSU / MagiskGKI 2.0Stable across all methods
Android 14Magisk / APatch / KernelSUGKI 2.0Mature and well-tested
Android 13Magisk / KernelSUGKI / LegacyBroad device support
Android 12–12LMagiskGKI / LegacyMost compatible
Android 11 & belowMagiskLegacyLong-term support

TIP

GKI (Generic Kernel Image) devices - typically Android 12+ with kernel 5.10+ - have the widest method compatibility. Check your kernel version in Settings → About Phone → Kernel Version.


Core Tooling

Root solutions

SolutionBest ForAndroidZygiskHide RootStatusSource
MagiskUniversal compatibility6.0+✅ Built-inDenyListActiveGitHub
KernelSUKernel-level stealth root12+ (GKI)Via moduleBuilt-inActiveGitHub
KernelSU NextAdvanced kernel root, broader kernel support4.4–6.6 kernelsVia moduleBuilt-in + SUSFSActiveGitHub
APatchModern GKI devices12+ (GKI)Via moduleKPM-basedActiveGitHub
LSPosed (Fork)Xposed framework modules8.1–16RequiredN/AActiveGitHub

NOTE

Magisk remains the most universally compatible solution. KernelSU and APatch offer superior stealth on GKI devices but require kernel-level integration. KernelSU Next is an advanced kernel-based root solution supporting kernels from 4.4 up to 6.6, extending compatibility to non-GKI and older devices.

TIP

For the best root hiding currently, KernelSU Next + SUSFS is recommended by the community. For Xposed modules, LSPosed (JingMatrix fork) is the actively maintained option.

Zygisk implementations

ToolPurposeCompatibilitySource
Magisk Built-in ZygiskDefault Zygisk in MagiskMagisk 24+Built into Magisk
ZygiskNextStandalone Zygisk for KSU/Magisk/APatchMagisk, KernelSU, APatchGitHub
ReZygiskTransparent, open-source Zygisk forkMagisk, KernelSU, APatchGitHub

TIP

View the Zygisk Implementations Comparison for detailed strengths and trade-offs of each option.

Non-root privilege tools

ToolPurposeRoot RequiredSource
ShizukuDelegated ADB/system API access without full rootNoGitHub
DhizukuDevice owner delegation via ShizukuNoGitHub
aShell YouModern ADB shell interfaceNoGitHub

Recovery and flashing tools

Custom recoveries

RecoveryFeaturesCompatibilitySource
TWRPIndustry standardUniversaltwrp.me
OrangeFoxEnhanced UI, built-in toolsSelect devicesorangefox.download
PitchBlackTWRP fork with extrasSelect devicespitchblackrecovery.com
SkyHawkLightweight alternativeSelect devicesGitHub
AOSP Recovery SourceOfficial base recoveryReferenceAOSP

Platform tools

ToolPurposePlatformSource
ADB & FastbootCore Android debug/flash toolsAllAndroid SDK
Android Flash ToolWeb-based flashing (Pixel/AOSP)Webflash.android.com
HeimdallOpen-source Samsung flashingAllGitHub
OdinSamsung firmware flashing (official)WindowsSamsung community distribution
Mi Flash ToolXiaomi fastboot flashingWindowsxiaomiflashtool.com
SP Flash ToolMediaTek SoC flashingWindows/Linuxspflashtool.com
MTK ClientOpen-source MediaTek bypass/flashPythonGitHub
QFIL (Qualcomm)Qualcomm EDL mode flashingWindowsQualcomm package
LineageOS RecoveryOfficial LineageOS recovery buildsDevice-specificLineageOS Wiki

Firmware sources

BrandOfficial SourceAlternativeNotes
Google PixelFactory ImagesOTA ImagesDirect from Google
SamsungSamsung DevelopersSamMobile, Frija, SamFWRegion-specific
XiaomiMIUI ROMXiaomi Firmware UpdaterFastboot & Recovery
OnePlusOnePlus SupportOxygen Updater apppayload.bin format
NothingNothing SupportLimited availabilityNew brand
MotorolaMotorola SupportLolinet MirrorsVerify region
ASUSASUS SupportDirect downloadsROG & Zenfone
RealmeRealme Supportrealme-updaterOZIP format

Module & App Repositories

RepositoryTypeContentLink
MMRLMagisk modulesCommunity modulesGitHub
Fox MMRLModule managerAlternative clientGitHub
LSPosed ModulesXposed modulesApp modificationsRepository
Root Apps IndexCurated collection470+ root appsCollection
IzzyOnDroidF-Droid repoFOSS appsIzzyOnDroid
KernelSU Module RepoKernelSU modulesOfficial module repositorymodules.kernelsu.org

Extraction and utility tools

ToolPurposeSource
Payload-Dumper-AndroidExtract partitions from OTA.zip or payload.bin on Android without a PCGitHub
payload-dumper-goExtract payload.binGitHub
payload-dumper-pyPython payload extractorGitHub
payload-dumper-rustAndroid OTA payload dumperGitHub
AnyKernel3Kernel packaging/flashing frameworkGitHub

GKI kernel builds with root support

ProjectFeaturesSource
WildKernels GKIKernelSU/KernelSU-Next with WildKSU Manager support, SUSFS root hiding patches, BBG Baseband Guard securityGitHub
WildKernels OnePlusKSU + SUSFS builds for OnePlus GKI devicesGitHub

Learning and Reference

Comprehensive guides

Guide CategoryDescriptionLink
Master Rooting GuideComplete rooting workflowIndex
Device-Specific GuidesBrand-specific proceduresDevice Guides
Method ComparisonsChoose the right root methodComparison
DebloatingRemove unwanted apps safelyDebloat Guide
Ad BlockingSystem-wide ad removalAdBlock Guide
Custom Recovery BasicsFlashing and backup workflowHow to Install Custom Recovery

Communities and Support

Primary communities

PlatformFocusBest ForLink
XDA DevelopersDevelopment hubROMs, kernels, modsForum
X/TwitterGeneral rootingQuick help, discussionsX
r/MagiskMagisk specificModules, troubleshootingReddit
r/LineageOSCustom ROMsROM supportReddit
Telegram GroupsReal-time chatQuick responsesVarious channels
Pixel CommunityPixel specific rootingDevice updatesReddit
ReZygisk TelegramReZygisk supportModule updates & discussionTelegram

Developer communities

CommunityFocusPlatform
Android DevelopersOfficial documentationdeveloper.android.com
AOSPAndroid Open Sourcesource.android.com
GrapheneOS DiscordHardening and security insightsgrapheneos.org

Firmware and Device Data

Manufacturer unlock policies

BrandUnlock MethodWarranty ImpactWait PeriodReversibleGuide
Google PixelOEM unlock toggleMaintainedNoneGuide
OnePlusOEM unlock toggleVoidedNoneGuide
XiaomiMi Unlock ToolVoided7–30 daysGuide
SamsungOEM unlock (regional)Voided + Knox trippedNone❌ Knox permanentGuide
NothingOEM unlock toggleVoidedNoneGuide
MotorolaUnlock code requestVoidedNoneGuide
ASUSASUS Unlock appVoidedNoneASUS Unlock Tool
RealmeDeep Testing appVoidedApplication requiredRealme Community
SonyUnlock code via websiteVoided + DRM keys lostNone⚠️ DRM permanentSony Developer portal
FairphoneOEM unlock toggleMaintainedNoneFairphone docs
OPPODiscontinuedN/AN/AN/ANo longer available
HuaweiBlocked since 2018N/AN/AN/AThird-party only (risky)
ROMBaseFocusRoot SupportWebsite
LineageOSAOSPStability, privacy, broad device supportOptional (add-on)lineageos.org
GrapheneOSAOSPHardened securityDiscouragedgrapheneos.org
CalyxOSAOSPPrivacy with usabilityOptionalcalyxos.org
/e/OS (Murena)LineageOSDe-Googled, microG built-inOptionale.foundation
crDroidLineageOSHeavy customizationBuilt-in supportcrdroid.net
Evolution XAOSPPixel features + customizationBuilt-in supportevolution-x.org
Paranoid AndroidAOSPUnique UX featuresOptionalparanoidandroid.co
PixelOSAOSPPixel experience on non-PixelsBuilt-in supportpixelos.net
Pixel ExperienceAOSPPixel features (broader devices)Built-in supportpixelexperience.org

NOTE

Some ROMs (like Evolution X) include spoofing in the ROM itself. Check your ROM's documentation before adding PIF, you might not need it. Custom ROMs like CrDroid, InfinityX, and Matrixx already come with Keybox injection by default. Instead of using a PIF module, you can use TrickyStore + Keybox injection from your own ROM.


Emergency and Recovery

Common issues and solutions

IssueSymptomsSolutionGuide
BootloopStuck at logoFlash stock firmwareFix Guide
Soft BrickSystem errorsCustom recovery restoreRecovery Guide
Hard BrickNo responseEDL/Download modeDevice forums
IMEI LossNo networkBackup restorationIMEI Guide
SafetyNet FailApp detectionHide root methodsHiding Guide

Emergency tools by chipset

ChipsetToolModePurpose
QualcommQFIL/EDL ToolsEDL (9008)Deep flash recovery
MediaTekSP Flash ToolDownload ModeFull flash recovery
Samsung ExynosOdin/HeimdallDownload ModeFirmware restoration
Kirin (Huawei)HiSuiteFastbootLimited recovery

Critical backups

Backup TypeWhenToolRestore Method
EFS/IMEIBefore first rootTWRP/DDCustom recovery
Boot ImageBefore patchingStock firmwareFastboot flash
Full NandroidBefore major modsTWRPTWRP restore
Persist PartitionOnce after unlockDD commandFastboot/Recovery

Advanced Engineering

Development and debugging

ResourcePurposeLink
Android Debug BridgeCommand referenceADB Docs
Fastboot CommandsBootloader operationsFastboot Docs
Kernel BuildingCustom kernel developmentKernel Guide
SELinux PoliciesSecurity configurationSELinux Docs
Android Security BulletinSecurity updatesSecurity Updates
Android Verified BootChain of trust explainedAVB Documentation
Dynamic PartitionsFlexible partitioningDynamic Partitions
Generic Kernel ImageGKI architectureGKI Docs

Security and compliance references

TopicCoverageLink
Play Integrity APIOfficial guidance on root detectionDeveloper Docs
A/B System UpdatesSeamless update flowA/B System
Project TrebleHAL abstraction layersTreble Docs
Mainline ModulesModular update deliveryMainline

Video Tutorials

ChannelContent TypeQualityLink
XDA TVOfficial tutorialsProfessionalYouTube
HowToMenAndroid modificationsStep-by-stepYouTube
Sam BeckmanReviews & tutorialsWell-producedYouTube
TechDoctorUKAndroid TV & phonesComprehensiveYouTube

⚠️ Always verify video tutorials against written documentation for accuracy


Project resources

ResourceDescriptionURL
Official WebsiteMain hubawesome-android-root.org
GitHub RepositorySource codeGitHub
Issue TrackerBug reportsIssues
DiscussionsCommunity Q&ADiscussions
ContributingHow to helpContributing
Twitter/XUpdates@awsm_and_root

Quick reference

NeedPrimary ResourceBackup Resource
Emergency HelpFAQ EmergencyXDA Device Forums
Root AppsApp CollectionF-Droid
Module DiscoveryMMRLTelegram Channels
FirmwareManufacturer siteFirmware databases

Important: Rooting your device:

  • May void your warranty
  • Could brick your device if done incorrectly
  • Might expose security vulnerabilities
  • Can trigger anti-tampering mechanisms

Always:

  • Back up your data before rooting
  • Use official firmware sources
  • Follow guides carefully
  • Understand the risks involved

🤝 Contributing

This is a community-driven project. Contributions are welcome!