29
Mar
WeakSauce

You've taken the plunge and thrown down some cold hard cash on a brand new HTC One M8, but you're feeling stifled because Verizon doesn't want to allow the bootloader to be unlocked? You might want to check out WeakSauce, a handy new root exploit by XDA recognized developers Justin Case (jcase) and beaups. It's a simple tool that can set up root on both the HTC One M8 and last year's model, the HTC One (codenamed M7).

07
Feb
thumb
Last Updated: February 12th, 2014

This contest is now over.

The final results are listed below. If you've won, you will be contacted in the near future. Congratulations!

Everyone else - keep participating and stay tuned to Android Police so that you don't miss our upcoming giveaway announcements. You can follow AP on Twitter, Facebook, Google+, and RSS.

Jeremy Gomez

Torsten Mueller

Jasper Vinkenvleugel

robetx

An Vo

Rob Mounts

Andrew Aiello

Jason

Lluís Batet

Adam Marks

Any decent bank heist movie always has one common hurdle for the would-be thieves: a regularly changing access code to the vault, and only one person knows what it is.

04
Nov
motoX_03_mobile
Last Updated: November 5th, 2013

Some Moto X owners weren't particularly happy to learn that a recent OTA with improvements to the camera also had the undesirable consequence of breaking root acquired through PwnMyMoto. Fortunately, the creator of PwnMyMoto, Justin Case, is back with an updated root method that works on the latest Moto X update and should be compatible with all recent Motorola firmwares.

Update: RockMyMoto is confirmed to also work on the latest firmwares for the Droid Maxx, Ultra, and Mini.

16
Sep
nexusae0_moto-x-thiumb

That didn't take long. Just 2 days after Justin Case released a root method for the Moto X, Droid Ultra, Droid Mini, and Droid Maxx, he's already back with a hack that bypasses write protection. By disabling the write protection afforded by the bootloader, it becomes possible to flash 3rd-party ROMs, themes, and other mods. In other words, the flood gates are open for the modding community.

Much like MotoRoot, PwnMyMoto is packaged as a single app that must be sideloaded with adb.

18
Mar
thumb

When buying used phones off of eBay, Craigslist, or the like, a primary concern of anyone purchasing CDMA devices (Verizon, Sprint, Boost Mobile, Virgin Mobile, etc.) is the status of the phone's ESN (electronic serial number). If a device's ESN is registered as "banned" on its carrier because it has been listed as stolen or is attached to an unpaid account, then that phone cannot be activated on said carrier. Thus, the phone is either useless or has to be activated on a pre-paid carrier, which is generally not all that desirable and drastically decreases a device's worth.

17
Jan
image
Last Updated: January 19th, 2012

Justin Case has done it again, bringing root access back to users of Amazon's Kindle Fire who accepted the recent firmware update to version 6.2.2. BurritoRoot 2 is an easy-to-use exploit that only requires adb (Android debug bridge) and a few moments of your time. Users looking to root their device after Amazon's latest firmware update can grab BurritoRoot 2 using the download mirrors below.

To use the exploit, just download the file and run the following commands from adb:

adb push BurritoRoot2.bin /data/local/

adb shell chmod 777 /data/local/BurritoRoot2.bin

adb shell /data/local/BurritoRoot2.bin

adb root

adb shell id

<if uid = 0 continue, if not start over>

adb remount

adb push su /system/xbin/su

adb shell chown 0.0 /system/xbin/su

adb shell chmod 06755 /system/xbin/su

adb remount

adb install Superuser.apk (skip this step if its already installed)

For more information, check out Justin's original thread over at XDA.

16
May
htc_thunderbolt-577x4081
Last Updated: May 25th, 2011

UPDATE: The Gingerbread radio is apparently being linked to hard bricks. We have removed the link for the time being, until this issue is resolved, or a new radio version is leaked.

This morning 911Sniper dropped a leaked Gingerbread test build for the HTC Thunderbolt, but there was one issue: it wasn't flashable. Our buddy Justin Case from TeamAndIRC immediately took it to the lab and started dissecting its parts to see what needed to be done.