Thanks to Open Source developers, we have full root method for the LG G3!
There’s currently many root methods for the LG G3, this is one of those methods.
Now, this is the ONLY root method for those of you who T-Mobile LG G3 but also works for many others.
UPDATE: These root instructions are for KitKat ONLY! If you have Lollipop, you can follow the guide here on How to Root LG G Flex 2, G2, and G3!
Today, we will be using PurpleDrake root method to root the LG G3. There’s two ways to use PurpleDrake, you can either grab the scripts on XDA OR you can also do it manually.
Since at the time of this post they don’t have a script for Windows yet, I will be showing you how to do it manually using PurpleDrake asset files.
Please don’t forget to donate to the developers of this root method! You can donate here.
This root method should take you around 15 minutes at most so let’s do this!
Step 1. Go to Settings->General->About Phone->Software information.
Check your Android version, this root method will work on Android 4.4.2.
And also check your Build number, note the last 3 characters and make sure it’s listed here:
- AT&T LG G3 D850 w/ Build number 10D
- T-Mobile LG G3 D851 w/ Build number 10C
- Korean LG G3 F400L, F400S, F400K w/ Build number 10A or 10B
- OPEN LG G3 D855 w/ Build number 10F or 10G
- European LG G3 D855 w/ Build number 10A
For Verizon LG G3 VS985, you can use IORoot.
For AT&T LG G3, Korean LG G3, and D855, you can also use TowelRoot, which is much easier than this root method!
You may be able to try the root method anyways even if it’s not listed but please do at your risk! (It should be safe to do but I will not be responsible for loss of data!)
Step 2. Hit the Build number about 6 or 7 times until it says “You are now a developer!”.
Step 3. Next hit the Back button twice and you will see a new menu called “Developer options”. Select the new menu.
Step 4. Make sure “USB debugging” is checked ON.
Step 5. Connect a micro-USB cable from your LG G3 to your computer.
Step 6. If using Mac or Linux skip this step. For Windows, open Device Manager and make sure you see “LGE Mobile Sooner Single ADB Interface”.
If you don’t see it, download and install LG G3 drivers:
Download LG G3 driver
Step 7. Download fastboot.zip and purpledrakeasset.zip.
Unzip both files and you should get a folder called “fastboot” and “purpledrakeasset”.
Copy the files from “purpledrakeasset” into “fastboot” folder.
Step 8. Open a command prompt for Windows or Terminal Emulator for Mac or Linux. (If you don’t know how to do this, please Google it!)
chmod 755 *
chmod 755 *
Step 9. You should get a random serial number along with “offline”. Go to your phone and make sure you hit “OK” button on the “Allow USB debugging” window.
Step 10. Repeat Step 8 and you should find “device” instead!
Step 11. Next, type:
adb reboot --bnr_recovery
adb push start_restore /temp/start_restore
adb push permaroot.bin /temp/start_restore
./adb-mac reboot --bnr_recovery
./adb-mac push start_restore /temp/start_restore
./adb-mac push permaroot.bin /temp/start_restore
./adb-linux reboot --bnr_recovery
./adb-linux push start_restore /temp/start_restore
./adb-linux push permaroot.bin /temp/start_restore
*Note – Ubuntu users may have to put “sudo” in front of all the commands if you get permissions error!
Step 12. Once rebooted, install SuperSU or Superuser app from PlayStore.
Step 13. Open the app and update the binaries if it asks you.
If you do not get any error messages in the app, you have full root!
Step 14. To verify your root, you can install and run Titanium Backup app from Play Store.
To unroot your LG G3, it’s also very simple. Go into SuperSU settings and choose “Full unroot”. That’s it! Your phone will be fully unrooted, unless you’ve installed a custom recovery such as CWM or TWRP.
You will probably want to install a custom recovery like TWRP or CWM if you want to install custom ROMs. I should have a tutorial guide on that soon!
But if you want just root, you’ve got it already, great job!!! (and also it’s super easy to unroot as shown here.)
will be adding shortly here…