This repository provides a complete rooting kit for the Samsung A70s (SM-A707F variant) running LineageOS 21.
It includes all necessary tools and files to root your device safely and efficiently.
- Booting Files (Recovery + Boot image)
- Magisk Modules (Required modules for Magisk)
- Odin Software (Proprietary software for modifying Samsung recovery)
- Misc Apps (Google apps and others)
- Rooting will void your warranty.
- There's a risk of bootloop if instructions are not followed carefully.
- Backup your data! This process may require a factory reset.
- This kit is only for Samsung A70s (SM-A707F) running Android 11.
Using it on other devices or firmware versions may cause irreversible damage.
- π§ Prerequisites
- π§ Flashing LineageOS Recovery
- π§ Flashing LineageOS ROM
- π§ Installing Magisk and Magisk Modules
- π¦ Core Modules
- π Useful Modules
- ποΈ Uninstallation
- Make sure your phone is on the latest firmware for your region. In this case, it is Android 11.
- A Windows machine.
- Download required files from Release.
- Go to Settings > About Phone > Software information > Click Build Number a couple of times
- This should enable Developer options for your samsung device after entering your password.
- Go in Developer options > Enable OEM unlocking.
-
Shutdown your phone.
-
Hold
Vol+
andVol-
and connect your phone to a PC. -
Click volume up to continue the process on warning page.
-
Now your device is in Download Mode.
For verification, FRP Lock and OEM Lock should be OFF and KG STATUS should be checking. -
Open Odin and select:
AP
β Select the Lineage OS recovery provided.BL
,CP
,CSC
β Leave blank.
-
In Options, only check
F. Reset Time
. -
Click Start and wait for the flash to complete.
-
Now you have your Recovery installed succesfully.
- Hold
Vol-
andPower
to hard restart. - Shift to
Vol+
andPower
to go to Recovery. - Go to Factory Reset > Format system partition.
- Then, go to Apply Update > Apply from ADB.
- From the ADB folder, launch cmd-here.exe.
adb sideload [local path of custom rom]
- Then again go for applying update from ADB.
- If signature verification failed, install anyway.
adb sideload [magisk.apk path]
- Repeat applying update from ADB
adb sideload [MindTheGapps path]
- Reboot. Here it won't reboot and will ask for data reset.
- Allow data reset and you'll be fine.
- Launch Magisk from app drawer and download the app from toast notification.
- After rebooting, launch magisk and you should see Magisk icon.
- Launch Magisk and click Install in the Magisk card and select Direct Install to install Magisk.
- After reboot, launch Magisk again and go to it's settings. Enable this:
- Hide the Magisk app
- Systemless hosts
- Zygisk
- Enforce DenyList
- User Authentication
- Download the .zip file of the module
- Go to Magisk > Modules > Install from storage
- Select the .zip package
- Reboot!
- Download PIF, TrickyStore, TrickyStore Addon.
- Install PIF and reboot.
- Install TrickyStore and reboot.
- After reboot, cick on the action button on PIF module.
- Go to
/data/adb
using ZArchiver. There you will find apif.json
file. - Copy that file to
data/adb/modules/playintegrityfix
. - Install TrickyStore Addon and reboot.
- After reboot, click on the action button of
TrickStore
module. this will install KsuWebUI if you do not have KsuWebUI or MMRL installed. KsuWebUI is preferred. - Open KsuWebUI and click on Tricky Store.
- Click on menu > click on
Set Valid Keybox
. - Click on menu again > click on
Set Security Patch
> click onGet Security Patch
> click onSave
. - Done. Now you should have basic, device and strong integrity in both legacy and new response.
Do not check play integrity too frequently. Do not check at all if not necessary. Because if you check too frequently, Google with get sus.
πΉ PlayIntegrityFix
Files: relative file location
This module tries to fix Play Integrity and SafetyNet verdicts to get a valid attestation.
πΉ TrickyStore
Files: relative file location
This module is used for modifying the certificate chain generated for android key attestation.
πΉ TrickyStore Addon
Files: relative file location
This module is used for configuring Tricky Store target.txt with KSU WebUI.
πΉ playcurlNEXT
Files: relative file location
This is a rewrite of Playcurl, the old version became outdated as many things have changed. Paradoxically, this is more lightweight and easier to use.
πΉ LSposed_mod
Files: relative file location
A Riru / Zygisk module trying to provide an ART hooking framework which delivers consistent APIs with the OG Xposed, leveraging LSPlant hooking framework.
π Useful Modules
πΉ WearableSpoof
Files: relative file location
WearableSpoof is a module for LSPosed that lets you use Samsung apps (for example Wearable/Gear, SmartThings, ...) on Samsung phones running AOSP ROMs.
Required Files: APK, Restricted Settings
πΉ Twifucker
Files: relative file location
Twitter modded LSposed module
Required Files: APK
πΉ InstaEclipse
Files: relative file location
InstaEclipse is an LSPosed module designed to enhance your Instagram experience with advanced features like developer options, ghost mode, distraction-free mode, and more!
Required Files: APK
πΉ ReVancedXposed
Files: relative file location
Revanced app versions for YouTube, YouTube Music and Spotify
πΉ Magisk iOS Emoji
Files: relative file location
Systemlessly replaces the emoji font with iOS Emoji.
πΉ Disable FLAG SECURE
Files: relative file location
Xposed Module to Disable FLAG_SECURE
, enabling screenshots, screen sharing and recording in apps that normally wouldn't allow it.
πΉ Private DNS Android
Files: relative file location
A quick settings tile to switch your private dns provider. Supports any number of providers. Makes it easy to turn adblocking dns servers on or off with just a single tap.
Files: relative file location
LSPosed / EdXposed module to add Google Pixel features on Google Photos for any device.
Files: relative file location
This is a module to install Google Sans font (aka Product Sans) systemlessly through Magisk.
πΉ YABP
Files: relative file location
This module try to protect your device from bootloops and system ui failures caused by Magisk/KernelSU/APatch Modules.
πΉ GMS Flags
Files: relative file location
GMS Flags is a tool for changing parameters in Google services to activate or deactivate certain functionality in Google applications.
πΉ StevenBlock
Files: relative file location
Advanced Ad-Blocking Module for Android. Compatible with Magisk, KernelSU, and APatch.
πΉ GCAM
Files: relative file location
Google Pixel Camera MOD for Samsung A70s.
Method 1: Via Magisk App (Recommended)
- Open the Magisk App.
- Go to the Modules section.
- Find the module you want to remove.
- Tap the trash icon next to the module.
- Reboot your device.
β This is the safest and cleanest way to uninstall a module.
Method 2: Disable Module Without Booting (If Device is Bootlooping)
-
Boot into Custom Recovery (e.g., TWRP).
-
Navigate to:
/data/adb/modules/
-
Delete the folder of the module you want to remove.
Example:
rm -rf /data/adb/modules/module-name
-
Optionally, delete the file:
/data/adb/modules/module-name/update
-
Reboot your device.
Method 3: Using Magiskβs disable
Flag (Advanced Recovery Option)
- In custom recovery, create a file named:
/cache/.disable_magisk
- This disables all modules temporarily.
- Boot the phone, open Magisk, and remove the faulty module.
- Reboot normally.
Use this only if you want to remove Magisk and unroot your device completely.
- Open the Magisk App.
- Tap the Settings icon (βοΈ).
- Scroll down and tap on Uninstall Magisk.
- Choose "Complete Uninstall".
- Magisk will prompt for reboot. Tap Yes.
- Your phone will reboot and Magisk will be removed.
β This will restore your stock
boot.img
if you originally patched it with Magisk.
- Connect your phone to a PC with USB.
- Enable USB Debugging
- Go to settings
- Scroll down to About Phone
- Scroll down to Build number
- Click it several times and you should have developer options enabled.
- Go to system > Developer options
- Under debugging, enable USB debugging and Rooted debugging.
- Install Samsung USB Drivers from the repository.
- Keep the Stock Firmware folder ready.
- Launch the Odin tool.
- Now under the ADB folder, launch cmd-here.exe and type
adb reboot download
- Now in Odin, you should see
<ID:0/006> Added!!
in the log - For adding files, select the appropriate files that matches the name from the Stock Firmware folder
- In
CSC
, add CSC_OMC_ODM file.
- Now just hit Start and you are good to go!
It should only take 1-2 reboots to get to boot up the OS. If it takes more than that, consider your phone in a bootloop. Head over to this video to get out of bootloop.
This project wouldnβt be possible without the contributions and efforts of various developers and communities across the Android and rooting ecosystem.
- LineageOS β https://lineageos.org
- Magisk by topjohnwu β https://github.com/topjohnwu/Magisk
- Odin Flash Tool β Proprietary Samsung flashing tool
- ADB & Fastboot Tools β https://developer.android.com/studio/releases/platform-tools
- PlayIntegrityFix β @chiteroman
- TrickyStore & Addon β @5ec1cff, @KOWX712
- playcurlNEXT β @daboynb
- LSposed_mod β @mywalkb
- WearableSpoof β @Simon1511
- Twifucker β @Xposed-Modules-Repo
- InstaEclipse β @ReSo7200
- ReVancedXposed β @chsbuffer
- Magisk iOS Emoji β @Keinta15
- Disable FLAG_SECURE β @VarunS2002
- Private DNS Android β @karasevm
- Pixelify Google Photos β @BaltiApps
- Looki75 Product Sans Font β @Looki75
- YABP β @Magisk-Modules-Alt-Repo
- GMS Flags β @polodarb
- StevenBlock β @mikropsoft
- GCAM Port β BigKaka
- ZArchiver β Google Play Store
- APKMirror β https://www.apkmirror.com
- XDA Forums β https://xdaforums.com
Special thanks to the open-source Android modding community and everyone who contributed directly or indirectly to this project π
This project is released with respect to the licenses of included open-source projects.
Please refer to their respective licenses for usage guidelines.