samloader-actions is a GitHub CI script designed to download the required files for Magisk to root your phone without needing to download big firmware files..!
❗️WARNING: If you input a wrong IMEI, the script will fail to get the firmware from the Samsung server.
❗️WARNING: You must update the phone's software to the latest version before unlocking the bootloader.
Note
If you wish to upload the final results to your Telegram, create a public Telegram channel and a bot, add the bot to the channel as an admin, and set the GitHub environment secret TELEGRAM_BOT_TOKEN
with your bot token and TELEGRAM_CHAT_ID
with your channel's ID.
Requirements:
- a Samsung device with your latest Samsung software update.
- Unlocked bootloader.
- PC and USB cable.
- Samsung USB Driver and ODIN. ( Link 1, Link 2, Or download "Odin" and "Samsung USB drivers" from google )
- 🧠
01. Update your Samsung device to the latest software update.
- Otherwise, your device will fail to boot..❗
02. Backup your important files/photos/videos/messages to an external storage.
- Because your device will reset during the bootloader unlocking process.
03. Unlock your device's bootloader using the guides below.
04. Follow every step in the "Usage" Section.
1. Give this repository a Star ⭐️ and fork it.
🗒 Note: You can find the value for CSC in "Settings > About phone > Software information > Service provider software version".
5. After 10-15 minutes, you can find the output files in your Telegram channel or Workflow's artifacts. (I'll choose the artifact.)
Note
IF you didn't add the Telegram bot token and Channel ID to environment secrets, you will see a failure at the end of the script, just ignore it..!
10. Open Magisk Manager > Choose the first "Install" button > "Select and Patch a File" > Choose the tar file which we copied to internal storage > "LET'S GO ->"
1.mp4
14. Press "Start" in ODIN. It will begin to flash the patched file required for Magisk root to your device.
15. Now, your device should boot up. If it fails, just do a "wipe data/factory reset" using Android recovery. (In my case, I didn't want to do a reset)
- Scamsung + Samloader - The core.
- Magisk - The powerful rooting method.
- vbmeta-disable-verification - Used to Disable AVB.
- AIK-Linux - Used to Unpack the boot.img to check the Ramdisk status.