[{"data":1,"prerenderedAt":522},["ShallowReactive",2],{"\u002Ffeatures\u002Froot-file-manager":3},{"id":4,"title":5,"body":6,"description":514,"extension":515,"meta":516,"navigation":517,"path":518,"seo":519,"stem":520,"__hash__":521},"features\u002Ffeatures\u002Froot-file-manager.md","Root File Manager for Android — Full System File Access",{"type":7,"value":8,"toc":490},"minimark",[9,33,38,156,160,167,170,195,199,206,215,220,223,227,234,238,246,250,261,265,272,276,283,287,294,310,319,323,326,349,353,375,379,456,460],[10,11,12,13,17,18,22,23,22,26,22,29,32],"p",{},"AnExplorer gives ",[14,15,16],"strong",{},"full root access"," to advanced Android users. Browse, copy, move, rename, and edit files in every protected partition of your device — ",[19,20,21],"code",{},"\u002Fsystem",", ",[19,24,25],{},"\u002Fdata",[19,27,28],{},"\u002Fcache",[19,30,31],{},"\u002Fvendor",", and more.",[34,35,37],"h2",{"id":36},"what-root-access-unlocks","What Root Access Unlocks",[39,40,41,57],"table",{},[42,43,44],"thead",{},[45,46,47,51,54],"tr",{},[48,49,50],"th",{},"Capability",[48,52,53],{},"Without Root",[48,55,56],{},"With Root",[58,59,60,74,87,99,111,123,135,144],"tbody",{},[45,61,62,69,72],{},[63,64,65,66],"td",{},"Browse ",[19,67,68],{},"\u002Fsdcard\u002F",[63,70,71],{},"✅",[63,73,71],{},[45,75,76,82,85],{},[63,77,65,78,81],{},[19,79,80],{},"\u002Fdata\u002Fapp\u002F"," (installed APKs)",[63,83,84],{},"❌",[63,86,71],{},[45,88,89,95,97],{},[63,90,65,91,94],{},[19,92,93],{},"\u002Fandroid\u002Fdata\u002F"," (app private files)",[63,96,84],{},[63,98,71],{},[45,100,101,107,109],{},[63,102,103,104],{},"Edit ",[19,105,106],{},"\u002Fsystem\u002Fbuild.prop",[63,108,84],{},[63,110,71],{},[45,112,113,119,121],{},[63,114,103,115,118],{},[19,116,117],{},"\u002Fetc\u002Fhosts"," (block domains)",[63,120,84],{},[63,122,71],{},[45,124,125,131,133],{},[63,126,127,128],{},"Copy files to ",[19,129,130],{},"\u002Fsystem\u002F",[63,132,84],{},[63,134,71],{},[45,136,137,140,142],{},[63,138,139],{},"Uninstall system apps\u002Fbloatware",[63,141,84],{},[63,143,71],{},[45,145,146,152,154],{},[63,147,148,149],{},"Edit any config file in ",[19,150,151],{},"\u002Fdata\u002F",[63,153,84],{},[63,155,71],{},[34,157,159],{"id":158},"how-anexplorer-handles-root","How AnExplorer Handles Root",[10,161,162,163,166],{},"AnExplorer detects root access automatically. When you navigate to a restricted path, it requests the ",[19,164,165],{},"su"," permission from your root manager (Magisk, SuperSU, KingRoot). You grant it once per session.",[10,168,169],{},"Modifications are done safely:",[171,172,173,185,192],"ul",{},[174,175,176,177,180,181,184],"li",{},"System partition is remounted ",[14,178,179],{},"read-write"," before writing, then ",[14,182,183],{},"read-only"," immediately after",[174,186,187,188,191],{},"Dangerous operations (delete ",[19,189,190],{},"\u002Fsystem\u002Fframework\u002F...",") prompt a confirmation",[174,193,194],{},"Root operations are logged in the session for review",[34,196,198],{"id":197},"common-root-use-cases","Common Root Use Cases",[200,201,103,203,205],"h3",{"id":202},"edit-etchosts-system-level-ad-blocking",[19,204,117],{}," — System-Level Ad Blocking",[10,207,208,209,214],{},"Replace\u002Fappend entries in the hosts file to block analytics domains and ad networks at the network layer. AnExplorer's ",[210,211,213],"a",{"href":212},"\u002Ffeatures\u002Ftext-editor","Text Editor"," opens the file with root write access.",[200,216,103,218],{"id":217},"edit-systembuildprop",[19,219,106],{},[10,221,222],{},"Change device fingerprint, DPI, screen density, or enable hidden developer options. AnExplorer makes a backup copy before saving.",[200,224,226],{"id":225},"browse-app-private-data","Browse App Private Data",[10,228,229,230,233],{},"Open ",[19,231,232],{},"\u002Fandroid\u002Fdata\u002Fcom.example.app\u002F"," to inspect databases, shared preferences, and cache files. Useful for developers debugging installed apps.",[200,235,237],{"id":236},"silent-apk-installuninstall","Silent APK Install\u002FUninstall",[10,239,240,241,245],{},"The ",[210,242,244],{"href":243},"\u002Ffeatures\u002Fapk-installer","APK Installer"," can silently install APKs and remove system bloatware without Android's confirmation screen when root is available.",[200,247,249],{"id":248},"copy-system-fonts-or-ringtones","Copy System Fonts or Ringtones",[10,251,252,253,256,257,260],{},"Add custom fonts to ",[19,254,255],{},"\u002Fsystem\u002Ffonts\u002F"," or custom ringtones to ",[19,258,259],{},"\u002Fsystem\u002Fmedia\u002Faudio\u002Fringtones\u002F"," — changes survive app Restarts.",[200,262,264],{"id":263},"backup-app-data","Backup App Data",[10,266,267,268,271],{},"Copy the entire ",[19,269,270],{},"\u002Fandroid\u002Fdata\u002F[package]\u002F"," folder before a factory reset to preserve app data (logins, game saves, configs).",[34,273,275],{"id":274},"adb-root-access-no-physical-root-required","ADB Root Access (No Physical Root Required)",[10,277,278,279,282],{},"AnExplorer supports ",[14,280,281],{},"ADB-based root"," for devices that have ADB debugging enabled but are not Magisk-rooted. This gives elevated file access without modifying the device's system partition.",[200,284,286],{"id":285},"how-adb-root-works","How ADB Root Works",[10,288,289,290,293],{},"ADB root (",[19,291,292],{},"adb root",") restarts the ADB daemon with root permissions. AnExplorer can then:",[171,295,296,304,307],{},[174,297,298,299,22,301,303],{},"Browse normally restricted paths (e.g. ",[19,300,93],{},[19,302,80],{},")",[174,305,306],{},"Read and copy protected files",[174,308,309],{},"Run commands with elevated privileges",[10,311,312,315,316,318],{},[14,313,314],{},"Requirements",": Developer Options enabled, USB Debugging or Wireless Debugging on, and the device must allow ",[19,317,292],{}," (most stock production builds disable this; AOSP emulators and developer\u002Fengineering builds allow it).",[200,320,322],{"id":321},"wifi-adb-root","WiFi ADB Root",[10,324,325],{},"Android 11+ supports wireless ADB pairing:",[327,328,329,336,343,346],"ol",{},[174,330,331,332,335],{},"Enable ",[14,333,334],{},"Developer Options → Wireless Debugging"," on the device",[174,337,338,339,342],{},"Open AnExplorer → ",[14,340,341],{},"Tools → ADB Connect"," → pair via IP:port and pairing code",[174,344,345],{},"AnExplorer negotiates ADB root session automatically when the device permits it",[174,347,348],{},"Navigate to restricted paths — AnExplorer requests elevated access transparently",[200,350,352],{"id":351},"usb-adb-root","USB ADB Root",[327,354,355,358,365,368],{},[174,356,357],{},"Connect device via USB and trust the host PC",[174,359,360,361,364],{},"Ensure ",[14,362,363],{},"USB Debugging"," is enabled",[174,366,367],{},"AnExplorer detects the connection and escalates to ADB root if the device allows it",[174,369,65,370,22,372,374],{},[19,371,93],{},[19,373,130],{},", or other restricted paths",[200,376,378],{"id":377},"adb-root-vs-magisk-root","ADB Root vs Magisk Root",[39,380,381,393],{},[42,382,383],{},[45,384,385,387,390],{},[48,386,50],{},[48,388,389],{},"ADB Root",[48,391,392],{},"Magisk Root",[58,394,395,405,415,428,437,446],{},[45,396,397,400,402],{},[63,398,399],{},"No system modification",[63,401,71],{},[63,403,404],{},"❌ (systemless but required)",[45,406,407,411,413],{},[63,408,65,409],{},[19,410,93],{},[63,412,71],{},[63,414,71],{},[45,416,417,423,426],{},[63,418,419,420,422],{},"Full ",[19,421,130],{}," write",[63,424,425],{},"⚠️ Read-only on production",[63,427,71],{},[45,429,430,433,435],{},[63,431,432],{},"Silent APK install",[63,434,71],{},[63,436,71],{},[45,438,439,442,444],{},[63,440,441],{},"Persistent (survives reboot)",[63,443,71],{},[63,445,71],{},[45,447,448,451,453],{},[63,449,450],{},"All production devices",[63,452,71],{},[63,454,455],{},"✅ (if bootloader unlockable)",[34,457,459],{"id":458},"supported-root-managers","Supported Root Managers",[171,461,462,468,473,478,484],{},[174,463,464,467],{},[14,465,466],{},"Magisk"," (recommended — systemless root)",[174,469,470],{},[14,471,472],{},"SuperSU",[174,474,475],{},[14,476,477],{},"KingRoot",[174,479,480,483],{},[14,481,482],{},"Any SU binary"," at standard paths",[174,485,486,489],{},[14,487,488],{},"ADB root"," — via USB or WiFi ADB (developer\u002Fengineering builds; no Magisk required)",{"title":491,"searchDepth":492,"depth":492,"links":493},"",2,[494,495,496,507,513],{"id":36,"depth":492,"text":37},{"id":158,"depth":492,"text":159},{"id":197,"depth":492,"text":198,"children":497},[498,501,503,504,505,506],{"id":202,"depth":499,"text":500},3,"Edit \u002Fetc\u002Fhosts — System-Level Ad Blocking",{"id":217,"depth":499,"text":502},"Edit \u002Fsystem\u002Fbuild.prop",{"id":225,"depth":499,"text":226},{"id":236,"depth":499,"text":237},{"id":248,"depth":499,"text":249},{"id":263,"depth":499,"text":264},{"id":274,"depth":492,"text":275,"children":508},[509,510,511,512],{"id":285,"depth":499,"text":286},{"id":321,"depth":499,"text":322},{"id":351,"depth":499,"text":352},{"id":377,"depth":499,"text":378},{"id":458,"depth":492,"text":459},"Access, edit and manage all system files on rooted Android. Full read\u002Fwrite access to \u002Fsystem, \u002Fdata, \u002Fcache partitions. Edit build.prop, hosts file, scripts and protected directories in AnExplorer.","md",{},true,"\u002Ffeatures\u002Froot-file-manager",{"title":5,"description":514},"features\u002Froot-file-manager","hv3Sk-mOT170dFAYg6J4FL0Ak_-FNQ3HZ_VdQ_jYmKE",1778415392745]