Here's a one-click root method for the Oppo Find 5. You can find source here: https://code.google.com/p/android-ca...Fsrc%2FSCRIPTS
The way this works is it will reboot your device into fastboot, boot a kernel, inject root and SuperSU(available on Android Market), set permissions, test itself and let you know if it passed or failed.
CASUAL also provides an unroot option to remove root permissions. This can also be done from within SuperSu.
- Open CASUAL with JAVA. Do you have Java?
- Select which script you want (root or recovery_
- Click the do-it button
All scripts in CASUAL are automated. Simply click the button and it will "do it". If you are a windows user, please ensure you are using proper drivers.
For nightly builds, click here: http://goo.im/devs/AdamOutler/OppoFind5
Thanks to Justin Case for whippin' up a unsecure kernel before I could do it.
TWRP comes from kamma's thread here http://forum.xda-developers.com/show....php?t=2147999
CASUAL stands for Cross-platform ADB Scripting, Univeral Android Loader. CASUAL jar files are a wrapper for the CASUAL scripting language. CASUAL allows rapid and accurate deployment of hacks and exploits. CASUAL allows for automatic updating of its scripts via pushes to the SVN server at android-casual.googlecode.com. While I expect no problems at all, if at any time a serious problem is detected with the script, i can flip a kill switch to shut CASUAL downand you will be brought to a support page.... most likely here. This is intended to add a level of security so that you know this will be safe.