The Note 4 is undoubtedly a very powerful device on its own, however you can do so much more with the device by running some great root level apps on it. Of course, we do realize that rooting is somewhat of a difficult process and might not come as easily to some as it to others, therefore today we will teach you a quick and painless way to root Note 4.
Disclaimer: We take no responsibility for any damages that might be done to your device either during or after the process, please proceed at your own risk.
Prerequisites: You will require
- Samsung’s USB drivers (click here) installed on your PC
- Minimal adb and fastboot (click here) installed on your PC
- USB debugging enabled on your device
Guide:
- Go to this website and download the file corresponding to your exact model number.
- Once the file has been downloaded, extract it to an easily accessible location.
- Open up minimal adb and fastboot after connecting your device and type in the following command: “adb reboot download” to boot your device into download mode. Alternatively, you can also do it manually (by pressing the vol. down key and power key at the same time as it restarts) as well.
- Now open up the folder you extracted and RUN Odin. If for some reason, you don’t see any lights/colored box saying something like COM, please reinstall your USB drivers for the Note 4
- Click PDA and select the .md5.tar file included in the CF Auto Root Folder.
- Click Start and wait a few minutes for your device to boot up normally once again.
- Once you’re on the home screen, find and open an app called SuperSU on your phone.
- It will ask you to try to disable Knox, just tap OK to do so.
- That’s about it, once the Knox is disabled and you can see the No Apps Configured screen, you have are pretty much done. Now you can use any root level app of your choice on your Note 4.
If you have any problems or difficulty following our simple easy to root Note 4 guide, just ask us about them in the comments below.
Also, if you enjoy this root please remember to donate to Chainfire (the original developer of the exploit).