wiki.smhuda.com
Open in
urlscan Pro
172.64.147.209
Public Scan
URL:
https://wiki.smhuda.com/misc/android-rooting/lineage-os-18.1-on-oneplus-x
Submission: On December 07 via api from US — Scanned from DE
Submission: On December 07 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Wiki More SearchCtrl + K * Introduction * 👾Penetration Testing * Application Security * Mobile App Security * Android Application Testing * Security Checklist * SSL Pinning Bypasses * Non-Proxy Aware Applications * Setting up VPN Server * Bypasses * Common Proxying Issues * Android Local Storage Checks * Android Task Hijacking * Kiosk Mode / Breakout Testing * Magisk on GenyMotion * iOS Application Testing * iOS Testing Using Objection * IPA Analysis Using MobSF * iOS Jailbreak Bypass * Decrypting iOS Apps * iOS Reverse Engineering * Jailbreak Detection Bypasses * iOS Local Storage Checks * Installing IPA * ATS Auditing * iOS Jailbreaking * Frida Pinning Bypasses * Code Security * Frida on Windows * Web Application Security * Web Shells * CSV Injection * Measure Response Time using CURL * OSINT * EyeWitness * GraphQL Hacking * API Security * Security Checklist * Postman and Burp * CURL via BurpSuite * SOAP API Pentesting * Infrastructure Security * Network Infrastructure * Red Team Powershell Scripts * Mounting NFS Shares * Password Cracking/Auditing * Remote Access Sheet * Password Cracking Using Hashcat * Calculate IP Addresses from CIDR * Grep IP addresses or IP Ranges from a File * Default Credentials Checking * Check SSL/TLS Certificates * Log a terminal session * Unauthenticated Mongo DB * Microsoft SQL Server (MSSQL) * NTP Mode 6 Vulnerabilities * BloodHound * AD Offensive Testing * CrackMapExec * Select all IP addresses in Sublime Text * Convert CIDRs to an IP address list * Microsoft Exchange Client Access Server Information Disclosure * Web Server HTTP Header Internal IP Disclosure * smbclient.py * GetUserSPNs.py * Get-GPPPassword.py * SMBMap * Mounting Shares * mitm6 * AD Attacks * Weak IKE Security Configurations * Wireless Security * Cached Wireless Keys * Aircrack Suite * SSL/TLS Security * Secure Code Review * Python * Semgrep * Semgrep to HTML Report * Cloud Security * Cloud Penetration Testing * Social Engineering * Simulated Phishing * GoPhish * Tool Usage * Docker * Split * PhantomJS * Aquatone * Tmux * Ipainstaller * Public IP From Command Line * Wifite * IKE Scan * Grep * Pulling APKs * Bitsadmin * Drozer * Iptables * Python Web Server * Crackmapexec * Impacket * Nessus * Adding SUDO User * Nmap * Metasploit Payloads * SMTP Open Relay * SQLMap * Screen * Remove All After Colon * Remove Old Linux Kernels * CURL * Hashcat * Secure Copy Protocol (SCP) * SSH & PGP Tools * IP Calculator * BloodHound * Netcat File Transfer * OpenVAS * BurpSuite * Exiftool * Python Virtual Environments * Errors and Solutions * Kill Process On Specific Port * Kill SSH Port Forwarding * SSH Key * Expanding Disk on Kali VM * Scoping * Scoping Questionnaires * Mobile App Testing * OSINT * Dark Web OSINT * Certificate Chain Check * EyeWitness - Web Service Screenshot * Tor to Browse Onion Links * DarkDump - Scan Dark Web for Onion Links * Domain related File Search * Google Dorking * IP / Network Blocks owned by a Company * ⌨️Programming * Automation * Running a Service at Boot * Network Connectivity Cron * Python * Adding Columns in Pandas * Copy Entire Column Data To New Column Pandas * Loading Progress Bar * Reorder Columns in Pandas * Filename with Date/Time Stamp * Command Line Arguments * Changing Date Format * Removing Index Column Pandas * Regex - Remove HTML Tags * Column Header Mapping * 🌐Miscellaneous * Scripts * Clickjacking Checker * Bulk WHOIS * SMB Signing Check * FDQN to IP Address * Grep IP Addresses * Nessus Parser * Build Review Audit * Nessus Merger * Nmap2CSV * Remove Audio From Videos * Favourite Reads/Links * Hacking Posters * Windows Developer VMs * Windows Workspaces * GitHub Pages * Interview Prep * Senior Penetration Tester * CVSS Formula * Android Rooting * Lineage OS 18.1 on OnePlus X * TWRP Recover on OnePlus X * Magisk Rooting * Presentation Slides * BlackHat - USA [2022] * 🐞Vulnerability Wiki * 🌐APPLICATION LEVEL * 🔒AUTHENTICATION * Authentication Bypass * Lack of Password Confirmation * 2FA Code Brute-forceable * Lack of Verification * Lack of Throttling on Form Submissions * Lack of Rate Limiting on Login * Weak Password Complexity Rules * 🖥️SESSION MANAGEMENT * 🔑ACCESS CONTROL * 🔢INPUT VALIDATION * ➗CRYPTOGRAPHY * 📉LOGGING * 📕DATA PROTECTION * 📲COMMUNICATION * 👨💻MALICIOUS CODE * 💡LOGIC * 🗄️FILE UPLOAD * ⚙️API ISSUES * 🔍CONFIGURATIONS * 💾INFRASTRUCTURE LEVEL Powered by GitBook On this page * Reference: * Downloads: * Prerequisites Was this helpful? LINEAGE OS 18.1 ON ONEPLUS X REFERENCE: Download and Install Lineage OS 18.1 on OnePlus X (Android 11)Get Droid Tips DOWNLOADS: * LineageOS 18.1 * Gapps * Recovery - TWRP 3.2.3 14.02.2019 * https://twrp.me/oneplus/oneplusx.html PREREQUISITES * First and foremost, create a complete device backup. This is because we will be wiping the data partition which will format your device. * Next up, you will need to unlock the bootloader on your device. If you haven’t done so, refer to our guide on How to Unlock the Bootloader on OnePlus X. * Once that is done, you must also have the TWRP Recovery installed. * Also, enable USB Debugging on your device so that it gets recognized by your PC in the ADB Mode. For that, head over to Settings > About Phone > Tap on Build Number 7 times > Go back to Settings > System > Advanced > Developer Options > Enable USB Debugging. * Next, up, download, and install the Android SDK Platform Tool on your PC. This will provide you with the necessary binary files. * Also, download and install the OnePlus USB Drivers onto your PC. * Finally, download the Lineage OS 18.1 on OnePlus X: Download Link * If you want Google Apps as well, then download the Android 11 GApps file That’s it. You may now proceed with the installation steps. INSTRUCTIONS TO INSTALL LINEAGE OS 18.1 ON ONEPLUS X 1. Transfer the downloaded ROM and the GApps file to your device’s Internal Storage. 2. Now connect it to the PC via USB Cable. Make sure USB Debugging is enabled. 3. Head over to the platform-tools folder on your PC, type in CMD in the address, and hit Enter. This will launch the Command Prompt window. 4. Execute the below command in the CMD window to boot your device to TWRP Recovery Copy adb reboot recovery 5. Then, select the System, Vendor, Data, and the Cache partition and perform a right swipe to format the selected partitions. 6. After this, go to the Install section of TWRP. Navigate to the downloaded LineageOS 18.1 ZIP file, select it and perform a right swipe to install it. 7. The process might take a few minutes. When the flashing is complete, go back to the Install section and this time select the GApps package. Perform a right swipe to install this file as well. 8. Likewise, you should also wipe the cache partition. You could either use the Wipe Cache button that would be available after flashing GApps. If not, then head over to Wipe, select the Cache partition and perform a right swipe to wipe it. 9. You may now reboot your device to the newly installed OS. For that, head over to Reboot and select System PreviousAndroid RootingNextTWRP Recover on OnePlus X Last updated 2 years ago