[Tutorial] Hacking/Bypassing Android Password/Pattern/Face/PIN

Discover how to hack and bypass Android Lock Screen with our step-by-step tutorial covering various types and scenarios of smartphones

[Tutorial] Hacking/Bypassing Android Password/Pattern/Face/PIN


Android is one of the most popular SmartPhone Operating System. As of now, there are over a billion android users. Every android user must be familiar with Pattern/PIN lock/Face Recognition, a security feature which ensures authorized access to their devices. But sometimes the users forget the pattern or they try the wrong pattern more than the permitted number of tries allowed, getting locked out. In this guide, I have collected almost all possible methods to break/bypass a pattern/PIN/Face protected android device.

Disclaimer: It is unethical and illegal to hack or exploit software without proper authorization. The information in this post is provided solely for educational purposes, and the author and publisher of this blog do not endorse or encourage any illegal activities. It is provided at the reader's own risk, and any consequences of actions taken based on the information in the post are the reader's responsibility. Therefore, the author and publisher of this blog disclaim any liability for any loss, damage, or legal consequences resulting from the use of the information in this post. We strongly advise our readers to conduct themselves responsibly and ethically and use software and applications only for the purposes specified in their respective terms of service.

Follow the below given methods one by one.

Don't forget to check this post: How To Hack WiFi Using Android 

Method 1 ( Only If Custom Recovery like Cwm, TWRP, Xrec, Etc... is Installed:)


1. Download this zip Pattern Password Disable on to your sd card (using your PC, as you can't get into your phone)
2. Insert the sd card into your phone
3. Reboot into recovery mode
4. Flash the zip
5. Reboot
6. Done!

Note: After Restarting if it still asks any pattern/PIN, just try some random pattern/PIN

Method 2 (For All Devices With Custom Recovery Installed )

Procedure (Using Aroma File Manager)

1.Download and Copy Aroma File manager.zip to your memory card.

2. Open your recovery (press volume Down + Power button or it can be different according to the phones. Generally, the phones who have pressable button on the middle they have to press all three buttons. Google for your pattern)

3. There will be an option in recovery called “mount”. Go in that option and then mount all the cache and everything that is there.

4. Then select “update” and select “apply update from SD/external” and select aroma file manger.zip file that you downloaded.

5. After Flashing or updating, the aroma file manager will open. Use volume keys for up/down and power button 2 select like you use to get into recovery.

6. In aroma File manager, Go to menu, which is located on the bottom strip and then select Settings.

7. Go to bottom n select “mount all partition in startup ” then exit from aroma file manager.

8. Now after exit, re-update that aroma file again and it will open again.

9. Go to data >> and then System.

Then find ‘gesture.key’ (for pattern lock) and ’password.key’ (for password lock) then long touch on gesture.key or password.key and sum option will be prompted, choose to delete and delete that file and restart.

Note: After Restarting if it still asks any pattern/PIN, Read :just try some random pattern/PIN

Read: Hacking Android: Pattern Lock Guessing Vulnerability

Method 3 (No Custom Recoveries Installed)


  • PC(Linux or Windows+Cygwin Installed)
  • USB Cable and
  • adb(Android Debug Bridge) installed.

How to install ADB(Linux)

Open Terminal Type the below command and hit enter.
sudo apt-get install android-tools-adb
 Follow the instructions until everything is installed.

How to install ADB(Windows)

Download the .exe and run it. For download & Instrutions refer the guide here


  • Connect the phone to the computer via USB(phone should be turned on).
  • Open a terminal window(Linux) or cmd(windows).
  • Type the below commands one by one, pressing enter.
adb devices
adb shell
cd data/system
rm *.key
  • That's all. Reboot the device.
  • Note: After Restarting if it still asks any pattern/PIN, just try some random pattern/PIN

Method 4 (All Devices Via ADB - SQL Command)

Open terminal(Linux)/cmd(Windows) and type the following commands, each at a time, followed by enter.
adb shell
cd /data/data/com.android.providers.settings/databases
sqlite3 settings.db
update system set value=0 where name='lock_pattern_autolock';
update system set value=0 where name='lockscreen.lockedoutpermanently';
Done. Reboot the device.
Note: After Restarting if it still asks any pattern/PIN, just try some random pattern/PIN

Don't forget to check: Task Hijacking Attack: Another Dreaded Android Vulnerability

Method 5 (All Devices Via ADB - File Removal )


Open terminal(Linux)/cmd(Windows) and type the following command.
adb shell rm /data/system/gesture.key 

That's it. You should be able to use the device without password/Pattern lock now. If it asks for password?pattern at startup just give any random pattern/PIN

Method 6 (All Devices With USB Debugging Enabled )

Procedure: (Primary Steps)

  • Download & Extract Bypass Security Hack program.
  • Open SQLite Database Browser 2.0.exe in SQLite Database Browser.
  • Navigate to By-pass security Hacks folder and open Terminal/Cmd there.
  • Run the file pull settings.db.cmd. This will pull out the setting file out of your phone.
  • Drag settings.db and drop to SQLite Database Browser 2.0.exe program.
  • Navigate to Browse data tab, 
  • At table there, click to list down the selection & delete secure

Instruction To Remove Pattern Lock:

Continuing the above procedures, find the record named lock_pattern_autolock, and delete it.
Close & save database
Run push settings.db.cmd and reboot your phone

Instruction To Remove PIN Lock:

From the list, find lockscreen.password_type, double-click it & change it's value to 65536, and apply changes. (Note: If that file is not there create it)
Next find lock_pattern_autolock, and delete record, If doesn't exist, Ignore
Close & save database
Run push settings.db.cmd and reboot your phone

Instruction To Remove Password Lock:

  • Find lockscreen.password_salt, Delete Record
  • Next find lockscreen.password_type, Delete Record
  • Close & save database
  • Run push settings.db.cmd and reboot your phone
 As always give any random password/PIN/Pattern if it asks in the first boot.

Are you a Smartphone User? Then do not forget to read this post : Ad network DDoS Vectors: Using Smartphones For Mass DDoS Attack

Method 7 (Taking Precaution Before Lock Accident) :

As the title says, this method will act as a precaution, before you get locked up, while you still have access to the device.

SMS Bypass [Root Required]- Download & Install It On Your Device.

This App Allows You To Remotely Bypass Your Phone's Screen Lock By Sending A SMS.It Removes Your Gesture Pattern Or Password After Receiving A Preset Keyword Along With A Secret Code Via SMS.
Note: SMS Bypass App Requires Root.


1.First, make sure you give permanent root access to the app.
2.Change the secret code to your preferred choice. The default password is : 1234
3.To reset your screen lock, send the following message from another phone:

secret_code reset Example:

1234 reset
Note 1 : There is a space between your secret code and reset. Also the secret code is case sensitive.
Note 2 : There is an option available to change the preset keyword. Default is : reset - Your phone will restart and your lock screen will be reset.

If None Of The Above Methods Work, Do Factory Reset/Full Wipe The Device


This tutorial has provided an overview of how to bypass the lock screen on an Android device, highlighting potential vulnerabilities and weaknesses in the system. It's important to note that this information is only for educational purposes, and we strongly advise against using these techniques for illegal or malicious purposes. Prioritizing cybersecurity and taking proactive measures to protect yourself against potential threats is critical, as is being aware of the risks associated with unauthorised access to personal data. Individuals can take control of their own cybersecurity and stay safe in an increasingly digital world if they have the right knowledge and tools.


  1. On method 3, when you type su you get "su not found"
    On method 4, when you try to cd to the databases you get permission denied.

    1. Worked fine for me..you have to run cmd/terminal as admin/root user accordingly.

    2. You mentioned method 4:Permission denied error you are getting this error because of the method 3 you have to solve method 3 stuff to get this right for method 4 the command in method 3 is trying to get root access try sudo su or try to search how to get root access in linux

  2. if i type adb devices,not show devices.showing offline .why?

  3. Great article. Works for almost all devices like a charm. This helped me and many of my colleagues to save pretty good sum of money.

  4. No Adb.Not custom recovery. How do I bypass swipe code?

  5. same as HACKER when I type adb devices nothing shows

  6. Make sure you install adb drivers first.

  7. Pull settings. do. cmd
    Permission denied

  8. Is there any way for local android phone brand to bypass.
    I have version 4.0

  9. Will this methods damage my smartphone

  10. i cant do with my phone ,vivo y31l. can anyone help me... i wipe data in hard reset, failed too , anyone please help me ???

  11. very good stuff bro you may like this too How to stuff

  12. u still need usb debuging on for method 3 and 4 ?

  13. Shows dont permission while i am in root terminal

  14. Its says after rm command you dont have permission i am in root terminal

  15. Thanks man For This Informative post.



Ad Network,3,adb,1,adblocker,1,Adblocker alternative,1,Adobe Flash Zero Day,1,Adware,1,Android,2,Android Reverse Engineering,1,Android vulnerability,3,Anonymous,1,Anonymous Browsing,2,Apple Hacking,2,Arp Poisoning,1,authentication bypass,1,Automated Tank Guage,1,Automatic Footprinting tool,1,backdoor credentials,1,BadWinmail,1,Banking trojan,1,bcmon,1,Best Adblocker,1,Best free cloud storage,1,Best Password Manager,1,Best TOR Alternative,1,Best VPN Provider,1,best VPN Rating,1,Bettercap,1,Bettercap tutorial,1,BitTorrent,1,BitTorrent Protocols,1,Browse safely,1,Car Hacking,1,Carbanak,1,CIA,1,Circuit Fingerprinting.,2,cleartext cloud API,1,CloudFlare,2,Cobalt Strike,1,Covert Pentesting,1,Cracking Encryption,1,Cracking HTTPS,1,crapware,1,Credential Stealing,1,Credentials Sniffing,1,CreeHack,1,CryptDB,1,cryptography,2,cSploit,1,CSRF,1,custom recovery,1,Cydia,1,cygwin,1,Cypher System,1,Data Breach,1,Data Exfiltration,1,DDoS,2,DDoS Attack,3,Decrypting Tor traffic,1,Deep Web,1,DEF CON 23,2,disk encryption,1,DLL Injection Attacks,1,Dnstool,1,download torrents directly,2,DrDoS,1,DriveDroid,1,DuckHunter HID,1,Elevation Of Privilege,1,encryption,2,Ettercap,1,Exitmap,1,Exploitation,2,Fanny Worm,1,Financial APT,1,Flash Alternative,1,Forgot Windows Password.,1,fraud,1,Free Cloud Storage,1,Free LastPass Premium,1,Free Uptobox Premium Account,1,Free VPN,1,Free Zbigz Premium Account,2,Freedom App,1,GasPot,1,GitHub,1,Giveaways,4,Hack Android,3,Hack Android Games,2,Hack Android In-App Purchase Non Root,1,Hack Cave,18,Hack Clash Of Clans,1,Hack Email,1,Hack Outlook,1,Hack Subway Surfer,1,Hack WiFi Android Without bcmon,1,Hack Windows 10,1,hacking android,6,hacking android pattern lock,1,Hacking Android PIN,1,Hacking Android Through Sound Waves,1,Hacking Cloudflare,1,Hacking CryptDB,1,Hacking electronics,1,Hacking embedded systems,1,Hacking Fridge,1,Hacking Gmail,1,Hacking IoT,1,Hacking KeePass,1,Hacking News,3,Hacking PayPal,1,Hacking Refrigerator,1,Hacking Team,1,Hacking tools,3,Hacking Tricks Android,5,Hacking WiFi With Android,3,Hacking Windows,4,Hacking Windows Password,1,HardSploit,1,HID Attack,1,Homomorphic Encryption,1,Honeypot,1,HORNET,3,How to hack baby monitors,1,How to hack gmail?,1,How to hack IoTs,1,How to hack MAC OS X,1,How To Hack WhatsApp,1,how to install kali nethunter on any android device,1,How Tor Works,1,HTML5,1,ICS,1,Immobilizer,1,Increase Download Speed,1,Information Gathering,1,Install NetHunter,1,Install NetHunter for any Device,1,Internet Of Things,1,Internet Privacy,2,Introduction To Penetration Testing,1,iOS 9,2,iOS hacked,1,IoT,3,IoT Security Audit Tool,1,Jailbreaking,1,Kali Linux,2,kali linux nethunter for android,1,Kali NetHunter,4,Kali NetHunter Nexus 5x,1,Kali NetHunter Sony,1,kali nethunter windows installer,1,KeeFarce,1,Kemoge,1,LastPass Premium Giveaway,1,LastPass Premium Subscription 2016,1,lenavo,1,LinkedIn,1,Lizard Squad,1,Lizard Stressor,1,LSE,1,Mabouia,1,Mac OS X Hacking,1,Malicious JavaScript,1,Malware,4,Man In The Middle Attack,4,MANA Wireless Toolkit,1,Megamos Crypto Transponder,1,MITM,5,Mount Manager Bug,1,Mozilla Firefox,1,MSOffice,1,Netflix,2,Netflix Stethoscope tool,1,NetHunter Devices,1,nethunter install guide,1,NetHunter Nexus 5x,1,NetHunter Tutorial Nexus 5x,1,nethunter tutorial pdf,1,Nord VPN,1,nsISpeculativeConnect,1,NTP Vulnerability,1,Offensive Security,1,Office Exploit,1,OLE,1,Onion Encryption,1,Onion Routing,1,Outlook Exploit,1,Overt,1,Penetration Testing,1,Penetration Testing Tutorial,1,Penetration Testing With KaliLinux,1,Penetration Testing With Metasploit,1,Pentest Report,1,Phases Of PenTesting,1,Phishing,1,PINlogger,1,Post Exploitation,1,PowerMemory,1,PowerShell,1,pre-fetch,1,Prevent In-App purchase hacks,1,privilege escalation,2,Python,1,Quantum Cryptographic Communication,1,quantum physics,1,ransomware,2,read forbes with adblock,1,read toi with adblock,1,Reaver,1,Reflected File Download Vulnerability,1,Reflective,1,Reflective DDoS Attack,1,Remote Code Execution,2,Remote exploit,2,remove ads toi,1,RfA,1,RFD,1,RFID,1,RIFFLE Tor Alternative,1,RIPv1 Protocol,1,Root Nexus 5x,1,Rooting,2,Rootkit,1,Router Keygen,1,SCADA,1,SEA,1,Searchsploit,1,Security News,40,Security Tools,4,Shodan,1,SilverPush,1,Sleepy Puppy,1,Smartphone Sensor hack,1,Smartphones,4,Smartphones hacking,1,soft and hard brick,1,speculative connect API,1,SpiderFoot,1,Sponsored,1,StageFright,2,StageFright 2.0,1,stethoscope tool implimentation,1,Stored XSS,2,StuxNet,1,Superfish,1,surveillance,1,Task hijacking Attack,1,TCP injection.,1,The Basics Of Penetration Testing,1,The Hacking Team,1,Threat Modeling,1,Tor,3,TOR Alternative,4,Tor Exit Relay,1,Tor Guard,1,Tor Hacked,3,torrent to direct converter,2,torrent to IDM,1,tow factor authentication,1,Trend Micro,1,Tutorial,7,TWRP,1,TWRP Nexus 5x,1,Types Of Pentest,1,Types Of XSS Vulnerability,1,uBlock,1,Unlock Bootloader guide,1,Unlock Bootloader Nexus 5x,1,unlock pattern lock android,2,User Focused security,1,VPN Reviews,1,Vulnerability,3,Vulnerability Analysis,1,Vulnerability scanners,1,What is Kali NetHunter,1,WhatsApp Encryption,1,WhatsApp Hacking,1,Whatsapp phishing,1,WhatsApp Vulnerability.,1,WikiLeaks,1,Windows Backdoor,1,Windows Debuggers,1,XcodeGhost,1,Xss,3,XSS Scanner,1,XTEA,1,Zbigz cookie generator,1,Zbigz premium account no survey,1,Zimperium,1,
Hack Cave | Hacks unveiled: [Tutorial] Hacking/Bypassing Android Password/Pattern/Face/PIN
[Tutorial] Hacking/Bypassing Android Password/Pattern/Face/PIN
Discover how to hack and bypass Android Lock Screen with our step-by-step tutorial covering various types and scenarios of smartphones
Hack Cave | Hacks unveiled
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content