Skip to main content

Upgrade any android to naugat


  • First of all u need a rooted phone(KingRoot is the best root tool for Android )
  • Install flashify from the play store
  • Install custom recovery like cmw/twrp(download for ur device from XDA)
  • Flash Xpose flash file via recovery(it is different for lollipop and marshmallow)
  • Download and install Xpose installer
  • Install Android N-ify
Now you have a system UI of android N 
(All the files available can be downloaded from XDA site or google it)
Or here

xposed*.zip Must be flashed with a custom recovery (e.g. TWRP) to install the framework.
SDK21 is Android 5.0 (Lollipop), SDK22 is Android 5.1 (also Lollipop) and SDK23 is Android 6.0 (Marshmallow).
I only support the latest Xposed version!xpose.zip
unistall xpose

Comments

Popular posts from this blog

How to activate window 10 and office 2019 using KMS Digital Activation Tool

KMS & Digital & Online Activation Suite 5.9 Full[Techy Things]     SUPPORTED MICROSOFT PRODUCTS: Vista Pro / Enterprise Window 7 Pro / Enterprise Windows 8 / 8.1 / 10 (All versions) Windows Server 2008/2012/2012 R2 / 2016 (all editions) Office 2010/2013/2016/2019/2021(BETA) versions. Click Here  to download KMS DIGITAL ACTIVATION TOOL 2019:- Turn off Anti Virus or Window Defender firewall for some time. Extract folder and In case of any password Enter :-2018 Open  KMS_Suite . Give admin permission by clicking yes .     Then this  Dialog box  will appear:-      In this Application it has many methods of Activating office and Window .     But we will activate it by using KMS INJECT METHOD.  PRESS 1 TO GIVE COMMAND:-                                         ...

HOW TO GET PROTECTED FROM PHISSING HACKING

How to protect against phishing scams facebookShareLinkText   twitterShareLinkText   linkedInShareLinkText A tech support scam is a form of Internet fraud that is currently gaining momentum on the Internet. The scam implements  social engineering  and fear tactics in order to get the victim to take the bait. There are three main ways this scam is executed- via cold calls, pop-up messages on the computer and incorrect search engine results. Cold Calls Tech support cold calls are when an individual calls the target, claiming to be from a reputable company and states that they have found malware on the computer. The criminal will then try to get the user to install a type of remote desktop software under the pretext of removing the infestation, which would allow the attacker access to the computer in order to install real malware. In addition to attempting to install malware on the machine, these scammers will often ask for a fee to fi...