SuperSU by Chainfire is the most phenomenal root exploit package to gain root access on many popular Android phones from any brands including Xiaomi, Huawei, Asus, Oppo, HTC, Google Pixel, etc. More over, it is not only an exploit package but also an app to manage root access so that users can keep eyes on which apps want to and already have access to super user on their phones. The app can also keep track on what apps you have granted root access on them so they won’t keep asking for root permission each time you run each of them. Shortly, it also works like a security guard for your phone since granting root access is something risky and prone to virus or malware infection.
In this page, we listed direct download link(s) to flashable SuperSU zip package to root your phone. The files are mirrored and hosted in our Europe. The files are also kept in tact, original, and untouched. TWRP custom recovery is required to flash it. Full credits and thanks belong to Chainfire, the developer.
Newer version listed in the top. We’ll try to keep this page updated regularly.
Key Features
- Superuser access prompt
- Superuser access logging
- Superuser access notifications
- Per-app notification configuration
- Temporary unroot
- Deep process detection (no more unknowns)
- Works in recovery (no more segfaulting)
- Works when Android isn’t properly booted
- Works with non-standard shell locations
- Always runs in ghost mode
- Wake on prompt
- Convert to /system app
- Complete unroot
- Backup script to survive CyanogenMod nightlies
- Icon selectable from 5 options + invisible
- Theme selectable from 4 options
- Launch from dialer: *#*#1234#*#* or *#*#7873778#*#* (*#*#SUPERSU#*#*)
- Note: Not all phones take both codes. On some phones you need to use single *# instead of double *#*#
Download
Official page:
http://download.chainfire.eu/supersu-stable
Mirror links:
SR5-SuperSU-v2.82-SR5-20171001224502.zip
Change logs v2.82 SR5:
This SR5 update corrects error on flashing with TWRP on Google Pixel based on Android Oreo. Oreo devices using file-based encryption refuse to boot with an unencrypted data partition. This update adds a work-around for this.
- suinit: Fix (flashed) TWRP 3.1.1 compatibility on Pixel (XL) - FBE: allow FBE devices to boot unencrypted (unless KEEPFORCEENCRYPT is set)
UPDATE-SuperSU-v2.82-20170528234214.zip
SuperSU-v2.82-201705271822.zip
SR3-SuperSU-v2.79-SR3-20170114223742.zip
Change logs v2.79 SR3:
- Fix erroneously deleting SuperSU's copy of app_process on 6.0 since 2.79-SR1 - GUI: Fix app_process requirement detection when supersu context used - Fully eliminate sugote binary, no longer needed due to SELinux handling improvements in earlier versions - Support /system/xbin/sush as default shell - Adjust LD_PRELOAD filtering to exclude suhide's libraries - ZIP: Motorola: default to systemless mode
SR1-SuperSU-v2.79-SR1-20161221223537.zip
Change logs v2.79 SR1:
This update focuses primarily on SELinux changes for Nougat: - SuperSU will now use it's own 'u:r:supersu:s0' context to run in, rather than reusing the 'u:r:init:s0' context. This can prevent some conflicts from occurring, but it may also cause some root apps (or complete firmwares) to suddenly stop working. Please report these in the BETA thread on XDA. In time this feature may be ported back to Marshmallow as well. - SuperSU no longer modifies file_contexts[.bin]. This modifications caused issues on some firmwares, though why this happens exactly has not been identified. Regardless, it has been refactored away.
UPDATE-SuperSU-v2.79-20161211114519.zip
SR5-SuperSU-v2.78-SR5-20161130091551.zip
SR4-SuperSU-v2.78-SR4-20161115184928.zip
SR2-SuperSU-v2.78-SR2-20161029143931.zip