This thread is a modified version of the XDA root information thread. There is no reason for me to change the majority of the information because this is all straight from the best source of Android root information.
Here, you can find root tutorials for most devices that are out on the market right now. Learn how to root any Android device!
Rooting is the process of allowing users of smartphones, tablets and other devices running the Android mobile operating system to attain privileged control (known as root access) over various Android subsystems. As Android uses the Linux kernel, rooting an Android device gives similar access to administrative (superuser) permissions as on Linux or any other Unix-like operating system such as FreeBSD or OS X.
Rooting is often performed with the goal of overcoming limitations that carriers and hardware manufacturers put on some devices. Thus, rooting gives the ability (or permission) to alter or replace system applications and settings, run specialized applications ("apps") that require administrator-level permissions, or perform other operations that are otherwise inaccessible to a normal Android user. On Android, rooting can also facilitate the complete removal and replacement of the device's operating system, usually with a more recent release of its current operating system.
Having root access isn’t the end all-be all of device modification–that title is usually reserved for fully unlocked bootloaders and S-Off. That said, root access is generally the first step on your journey to device modification. As such, root access is often used to install custom recoveries, which then can be used to flash custom ROMs, kernels, and other device modifications. Root access also enables users to install the powerful and versatile Xposed Framework, which itself acts as a gateway to easy, non-destructive device modification.
Due to its inherent power, having root access is often dangerous. Thankfully, there are root brokering applications such as SuperSU that only grant root access to applications of your choosing. There are also various root-enabled utilities available to help you restore in the event that something goes wrong. For starters, you can use any number of root-enabled application backup tools to backup your applications and their data to your local storage, your PC, and even online cloud storage. And in conjunction with a custom recovery, rooted users are able to perform a full, system-wide Nandroid backup that essentially takes a snapshot of your current smartphone or tablet at any particular time.
Many devices can be rooted using this application. Check your device for compatibility.
Created by Developer geohot, Towelroot is another root exploit app that is compatible with a large range of devices. The root exploit itself is built around Linux kernel CVE-2014-3153 discovered by hacker Pinkie Pie, and it involves an issue in the Futex subsystem that in turn allows for privilege escalation. Although specifically designed for certain variants of the Galaxy S5, it is compatible with the majority of devices running unpatched kernels.
Created by Developer Chainfire, CF-Auto-Root is a root for “rooting beginners” and those who want to keep as close to stock as possible. CF-Root is meant to be used in combination with stock Samsung firmwares as well as Nexus devices, and be the quickest and easiest way for your first root. In essence, it does nothing but install and enable SuperSU on your system, so apps can gain root access.
KingRoot is root for people who just want to have root access to their devices, and not necessarily wanting to flash anything extra. It works on almost all devices from Android version 2.x to 5.0. Working of KingRoot is based on system exploit. The most suitable root strategy will be deployed from cloud to your device according to the ROM information on the device. The best part of using this root method is that it does not trip KNOX and have the ability to close Sony_RIC perfectly.
Device Specific Root Guides
Galaxy S Advance
Galaxy S Relay
Galaxy Y Duos (GT-S5360)
Galaxy S II (JellyBean)
Galaxy SII Plus (4.1.2 | 4.2.2)
Galaxy S III (International | Verizon 4.3 – 4.1.2 | Sprint | AT&T | T-Mobile)
Galaxy S4 (International Exynos – Snapdragon | Verizon | Sprint | AT&T | T-Mobile | Canadian)
Galaxy S4 Active
Galaxy S5 (International Qualcomm/Exynos | Sprint | T-Mobile | Verizon | AT&T)
Galaxy S6 (Normal Root | PingPong Root)
Galaxy S6 Edge (Normal Root | PingPong Root)
Galaxy Note (International | Verizon | Sprint | T-Mobile | AT&T)
Galaxy Note 2 (International | Verizon | Sprint | AT&T | T-Mobile)
Galaxy Note 3 (International | Verizon | Sprint | AT&T | T-Mobile)
Galaxy Note 4 (International | Verizon | Sprint | At&T | T-Mobile)
Galaxy Note Edge
Galaxy Note Pro 12.2
Gear 2 Neo
Tab Pro (12.2, 10.1, 8.4)
Tab S (8.4 | 10.5)
HTC Desire 500
HTC Desire 610
HTC Desire 816
HTC Desire X
HTC Desire Z
HTC Desire HD
HTC Desire Eye
HTC Evo 3D
HTC Flyer/Evo View 4G
HTC Incredible S
HTC One S
HTC One V
HTC One X | One X+
HTC One M7 (International | Verizon | Sprint | AT&T | T-Mobile)
HTC One Mini
HTC One Max
HTC One M8 (International | Verizon | Sprint | AT&T | T-Mobile)
HTC One M9
Nexus 7 (Tablet)
Nexus 9 (Tablet)
Nexus 10 (Tablet)
Moto E (2015)
Moto G (2014)
Moto G (2015)
Moto X (2014)
Moto X Play
Moto X Style Pure
Droid X (MB810), Droid 2 (a955), Droid 2 Global (a956), R2D2 (a957)
Droid X2 (MB870)
Droid 3 (XT862)
Droid 4 (XT894)
Droid Razr HD
Maxx XT 1225
Xperia Line (Cross Development) (Link 1 | Link 2)
Xperia Z (For FW 10.3.1.A.0.244)
Xperia Z Ultra
Xperia Z Ultra GPe
Xperia Z2 (Tablet)
Xperia Z1 Compact
Xperia Z3 Compact
Xperia SP (For FW 12.0.A.2.245/254 and 12.1.A.1.207)
G2 (International | Verizon | Sprint | AT&T | T-Mobile)
G3 (International/Unlocked Only/AT&T)
G Watch R
Find 7 | 7a
Kindle Fire 1 (original)
Kindle Fire 2
XIAOMI Redmi 1S
XIAOMI Mi Note Pro
Nvidia Tegra Note 7
HP Slate 7 (2800)
NVidia Shield Tablet
Dell Venue / Acer Iconia A1-830
Asus Zenfone 2 (Scroll first post to read the different root methods)
Asus Zenfone 5
Alcatel OneTouch Idol 3
If you see any problems, please mention it!