The exploit ("GingerBreak") itself is made by The Android Exploid Crew. I made the APK and did some slight modding to the exploit code to install from an APK If it doesn't, don't forget to post your logcat as attachment, and mention your device details and GingerBreak version. Will eventually be integrated, I guessĭonate to Chainfire by PayPal: click this linkĭonate to The Android Exploid Crew by PayPal: report back if it does or doesn't work on specific devices. WORKS ON A RARE SGS2, BUT NOT ON MOST (seems to be only pre-release devices that are rootable this way)ĪCER A500 / ICONIA Look here (click). NO IT DOES NOT WORK ON THE GALAXY ACE (yet ?) Also, if it gets stuck but you do see the card mounting/unmounting, try formatting your SD card yourself and try again (or use a different SD card) - often this works (a fix for both issues is being looked at) WARNING: Apparently on some devices the root exploit causes the SD card (internal or external) to be formatted. Optional: Uninstall GingerBreak, you don't need it on your phone anymore Optional: Install BusyBox from Market (I personally prefer the stericsson installer) Make sure the Superuser app is install and working If there are no problems, the device will reboot (note that the reboot itself can take like 10 minutes due to cache wipe) Get the APK on the phone somehow, and install it
![sd card formatter apk root sd card formatter apk root](https://www.easeus.com/images/en/screenshot/partition-manager/cannot-format-sd-card-to-fat32-banner.png)
Make sure you have an SD card (formatted and) inserted Optional: Press the Thanks button below this post You want to reboot! So if the root doesn't stick, you (still) have a problem. It fscks vold, you do not want to be running like that. The GingerBreak exploit should not be used to attain temproot and continue using the device. For temproot purposes, use the raw binary exploit (linked below), not this APK. While (temporary?) root access may be attained, due to locked bootloaders, efuses, S-ON, and whatnot this may still not work on your device. So check that out after you manually pull battery after 15 minutes or so of being stuck. In rare occasions, even if the device does not reboot, you may still have root. The exploit may take a while to run, but not more than 10 minutes, if it does, get me a logcat, and reboot the device. The APK must be installed to device, NOT SD card You need to have an SD card (formatted and) inserted - if it doesn't work, try formatting the SD card in your computer, or switching it with a different (or old, etc) SD card You must have USB debugging enabled on your device The installer script attempts to install the su binary and superuser APK, and reboots If it succeeds, the exploit remounts /system as read-write and runs the installer script The exploit attempts to attain root access
![sd card formatter apk root sd card formatter apk root](https://cdn.retrorgb.com/images/SDFormatter.jpg)
The APK puts the right files in the right place to run the exploit What the APK and exploit do is as follows: This specific exploit may work on various Froyo and Honeycomb versions as well.
![sd card formatter apk root sd card formatter apk root](https://www.pandorarecovery.com/wp-content/uploads/2022/12/format-sd-card.jpg)
The GingerBreak APK is a wrapper around the newly released GingerBreak exploit (credits to The Android Exploid Crew), which is meant to attain root access on GingerBread. I can't "fix" the exploit, you will have to wait for a new exploit to come out, or root a different way!
![sd card formatter apk root sd card formatter apk root](https://www.partitionwizard.com/images/uploads/articles/2019/07/sd-card-formatter/sd-card-formatter-5.jpg)
NOTICE: Gingerbreak is an exploit that has been fixed in many of the latest Android versions and releases.