FOSS Root Checker as the name suggests is an Open Source Root Checker app for verifying Root Access on Android Mobile Devices. Ever wondered what Root Checker Apps do behind the scenes on your Phones once you give them Root Access?
Well that's why I made this App! It is just a simple Root Checker for Newbies but with Transparency of what is done.
App Version : v36.23.2.0
Package ID : foss.chillastro.root.checker
Offline Release ID : foss.chillastro.root.checker.offline ( Lacks Update Checker )
Requirements : Android 6 and Higher
An Online Version of the App's Guide is given here.
Waiting for Approval on Uptodown Store and IzzyonDroid.
- TRUSTED SOURCES -
Important
This Project is not Affiliated with Google, Magisk, and other Open Source / Closed Source Referenced in this Project. Certain Brands mentioned are for General Information Only.
Warning
Do not trust sources listed in this page and NEVER TRUST .ZIP FILES PROVIDED IN ANY FORKED / STOLEN REPOSITORY'S READMEs! They Bypass Github's Security Checks and may Compromise your System with Malware and Steal your ENTIRE Data!
Note
All checks are performed on a background thread (Dispatchers.IO) to ensure your device remains responsive during the scan.
- If "Search Root" is pressed, it Checks 40+ System Paths to Find Traces of Root Access. If it finds, Root Traces are Found. If not it is clearly shown.
- Now if "Verify Root" is pressed the App Executes
su -c idand if it returns 0, Root Access is Verified. Else, Root Access not Available. - For BusyBox Checker, it checks BusyBox Specefix Paths. If not Found, the App executes
su -c which busyboxto verify BusyBox Installation.
- Ultra Low Footprint of 1.55MB ONLY!
- Privacy First Design with full transperancy. ✅
- Reduced Animations Enforced on Low end Devices ( if RAM < 4 GB ). ✅
- No Ads, In-App Purchases and no Data Collection. ✅
- Modern Material UI with Monet Theming. ✅
- Support for Android 6+ Devices. ✅
- Works with Magisk, KernelSU, KSU Forks, APatch and older Methods ✅
- Thorough Guidance provided on Rooting and Unlocking Bootloader. ✅
Root-Chcker-36.23.2.0.mp4
STEP 1 : Get Android Studio from here
STEP 2 : Clone this Repository
git clone https://github.com/Chill-Astro/FOSS-Root-Checker.git
STEP 3 : Open this Directory in Android Studio.
STEP 4 : Hit Build > Generate App Bundles or APKs > Generate APK as shown.
Alternatively Hit Build > Signed App Bundle or Apk. You will have to provide your OWN Certificate.
This method is RECOMMENDED as this is how I build myself.
// Will add Forked Repos which are genuinely good. 🤩 I will list everything Good about them.
// Will add Inactive Forks. Uh yeah that's it atleast it's Forking not Cloning! 😅
// Includes Clones who are working against the MIT Licence and Distributing Malware. All Flaws are mentioned. 😑
RuotianJoy/FOSS-Root-Checker ( Cloned + Distributing Malware 👎 )( Removed Successfully )
Please be aware: There are fraudulent repositories on GitHub that are cloning this project's name and using AI-generated readmes, but they contain completely random and unrelated files in each release. These are NOT official versions of this project.
ALWAYS ensure you are downloading or cloning this project ONLY from its official and legitimate source:
https://github.com/Chill-Astro/FOSS-Root-Checker
Check here for more details. I am trying my best to report these people.
View Details
If your download contains any of the following, DELETE IT IMMEDIATELY:
- Suspicious Windows Executables: Files ending in
.exe,.bat, or.dll(e.g.,luau.exe,StartApp.bat). - Compressed Archives: This project is distributed as an APK, never as a
.zipor.7zcontaining Windows binaries. - Hidden Scripts: Text files like
asm.txtused to execute malicious code on your PC. - The Following Folder Structure is used by Malware (Shown in a VM) :
- Magisk by @topjohnwu : For Rooting pretty much anything these days.
- KernelSU by @tiann : For Kernel-Level Rooting on GKI Devices.
- APatch by @bmax121 : For Easy Kernel-Level Rooting.
- mtkclient by @bkerler : For allowing MTK Devices to be Rooted Easily ( Including my Phone ).
- Shamiko by @LSPosed : For hiding root traces and faking bootloader status.
- Tricky Store by @5ec1cff : For spoofing Hardware Backed Attestation.
- Tricky Addon by @KOWX712 : For making the Tricky Store process accessible via WebUI.
- Zygisk Next by @Dr-TSNG : For providing a standalone Zygisk implementation.
- ReZygisk by @PerformanC : For an alternative Zygisk implementation.
- Zygisk Assistant by @snake-4 : For helping hide Zygisk from detection.
- Play Integrity Fix by @KOWX712 : For maintaining Google Play Integrity standards.
- Play Integrity Fork by @osm0sis : For the widely used community fork of the integrity fix.
- TEESimulator by @JingMatrix : An open-source alternative for TEE spoofing.
- NoHello by @MhmRdd : An open-source alternative for hiding root.
- Tricky Store OSS by @beakthoven : For providing an open-source version of Tricky Store.
- KernelSU Next by @KernelSU-Next : For the continued development and community fork of KSU.
- SkiSU Ultra by @SkiSU-Ultra : For providing specialized kernel-level rooting features.
- TWRP & OrangeFox : For the custom recoveries that make flashing these modules possible.
Appreciate my effort? Why not leave a Star ⭐ ! Also if forked, please credit me for my effort and thanks if you do! :)




