SuperSU v2.82: Ultimate Root Package for Any Android Devices

SuperSU by Chainfire is the most phenomenal root exploit package to gain root access on many popular Android phones from any brands including Xiaomi, Huawei, Asus, Oppo, HTC, Google Pixel, etc. More over, it is not only an exploit package but also an app to manage root access so that users can keep eyes on which apps want to and already have access to super user on their phones. The app can also keep track on what apps you have granted root access on them so they won’t keep asking for root permission each time you run each of them. Shortly, it also works like a security guard for your phone since granting root access is something risky and prone to virus or malware infection.

In this page, we listed direct download link(s) to flashable SuperSU zip package to root your phone. The files are mirrored and hosted in our Europe. The files are also kept in tact, original, and untouched. TWRP custom recovery is required to flash it. Full credits and thanks belong to Chainfire, the developer.

Newer version listed in the top. We’ll try to keep this page updated regularly.

Key Features

  • Superuser access prompt
  • Superuser access logging
  • Superuser access notifications
  • Per-app notification configuration
  • Temporary unroot
  • Deep process detection (no more unknowns)
  • Works in recovery (no more segfaulting)
  • Works when Android isn’t properly booted
  • Works with non-standard shell locations
  • Always runs in ghost mode
  • Wake on prompt
  • Convert to /system app
  • Complete unroot
  • Backup script to survive CyanogenMod nightlies
  • Icon selectable from 5 options + invisible
  • Theme selectable from 4 options
  • Launch from dialer: *#*#1234#*#* or *#*#7873778#*#* (*#*#SUPERSU#*#*)
  • Note: Not all phones take both codes. On some phones you need to use single *# instead of double *#*#


Official page:

Mirror links:

File name :
Version 2.82 sr5 | 13091 downloads | Size: 7 MB

Change logs v2.82 SR5:

This SR5 update corrects error on flashing with TWRP on Google Pixel based on Android Oreo. Oreo devices using file-based encryption refuse to boot with an unencrypted data partition. This update adds a work-around for this.

- suinit: Fix (flashed) TWRP 3.1.1 compatibility on Pixel (XL)
- FBE: allow FBE devices to boot unencrypted (unless KEEPFORCEENCRYPT is set)
File name :
Version 2.82 update 20170528234214 | 1279 downloads | Size: 6 MB
File name :
Version 2.82 stable | 875 downloads | Size: 6 MB
File name :
Version 2.79 sr3 | 1665 downloads | Size: 6 MB

Change logs v2.79 SR3:

- Fix erroneously deleting SuperSU's copy of app_process on 6.0 since 2.79-SR1
- GUI: Fix app_process requirement detection when supersu context used
- Fully eliminate sugote binary, no longer needed due to SELinux handling improvements in earlier versions
- Support /system/xbin/sush as default shell
- Adjust LD_PRELOAD filtering to exclude suhide's libraries
- ZIP: Motorola: default to systemless mode
File name :
Version 2.79 sr1 | 233 downloads | Size: 6 MB

Change logs v2.79 SR1:

This update focuses primarily on SELinux changes for Nougat:

- SuperSU will now use it's own 'u:r:supersu:s0' context to run in, rather than reusing the 'u:r:init:s0' context.
This can prevent some conflicts from occurring, but it may also cause some root apps (or complete firmwares) to suddenly stop working. Please report these in the BETA thread on XDA. In time this feature may be ported back to Marshmallow as well.

- SuperSU no longer modifies file_contexts[.bin].
This modifications caused issues on some firmwares, though why this happens exactly has not been identified. Regardless, it has been refactored away.
File name :
Version 2.79 (stable) | 271 downloads | Size: 6 MB
File name :
Version 2.78 sr5 | 139 downloads | Size: 6 MB
File name :
Version 2.78 sr4 | 97 downloads | Size: 6 MB
File name :
Version 2.78 sr2 | 154 downloads | Size: 6 MB

You can get faster updated information on new post via our social media account. Like us on Facebook or subscribe your email to our news letter. Please do not hesitate to send us any query or write a message in the comment section below this article. Share us your opinion or your experience! Thanks..

Liked this post? Use the buttons below to share it with your friends..

No Responses

Write a response

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Get more stuff like this
faster in your inbox

New tips, tricks, interesting apps and tools. No spammy messages. Give it a try, you can unsubscribe anytime.

Thank you for subscribing.

Something went wrong.