AntiFrida_Bypass icon indicating copy to clipboard operation
AntiFrida_Bypass copied to clipboard

AntiFrida_Google.js no longer work on Pairipcore v2

Open AndroidMaster25 opened this issue 1 year ago • 0 comments

It was working before the Pairip update around May 2024. We call it Pairipcore v2

PS F:\Mobile-Modding\Frida> frida -U -f "com.candywriter.bitlife" -l AntiFrida_Google.js
     ____
    / _  |   Frida 16.5.5 - A world-class dynamic instrumentation toolkit
   | (_| |
    > _  |   Commands:
   /_/ |_|       help      -> Displays the help system
   . . . .       object?   -> Display information about 'object'
   . . . .       exit/quit -> Exit
   . . . .
   . . . .   More info at https://frida.re/docs/home/
   . . . .
   . . . .   Connected to moto g 5G plus (id=ZY227X234X)
Spawned `com.candywriter.bitlife`. Resuming main thread!
[moto g 5G plus::com.candywriter.bitlife ]-> Process crashed: Trace/BPT trap

***
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'motorola/nairo_retaile/nairo:11/RPNS31.Q4U-39-27-9-2-9/9ab668:user/release-keys'
Revision: 'pvt'
ABI: 'arm64'
Timestamp: 2024-10-12 12:20:00+0200
pid: 18462, tid: 18462, name: ywriter.bitlife  >>> com.candywriter.bitlife <<<
uid: 10405
signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr --------
Abort message: 'length_error was thrown in -fno-exceptions mode with message "vector"'
    x0  0000000000000000  x1  000000000000481e  x2  0000000000000006  x3  0000007fcd709120
    x4  fefeff21716e7362  x5  fefeff21716e7362  x6  fefeff21716e7362  x7  7f7f7f7f7f7f7f7f
    x8  00000000000000f0  x9  f55405698936b576  x10 0000000000000000  x11 ffffffc0fffffbdf
    x12 0000000000000001  x13 6576222065676173  x14 00000071c68bbd22  x15 0000ffff00000fff
    x16 00000071c68b8c80  x17 00000071c689a7c0  x18 00000071c91ea000  x19 000000000000481e
    x20 000000000000481e  x21 00000000ffffffff  x22 0000007fcd709290  x23 0000007fcd709340
    x24 0000000000020692  x25 000000002fa0b73a  x26 00000000084c6c47  x27 00000000564e2d0b
    x28 00000000000289ec  x29 0000007fcd7091a0
    lr  00000071c684e2e0  sp  0000007fcd709100  pc  00000071c684e30c  pst 0000000000001000
backtrace:
      #00 pc 000000000004e30c  /apex/com.android.runtime/lib64/bionic/libc.so!libc.so (offset 0x4e000) (abort+164) (BuildId: 41c660c694a41af9265f00d2b0edc316)
      #01 pc 0000000000000108  <anonymous:71c9582000>
***
[moto g 5G plus::com.candywriter.bitlife ]->

Thank you for using Frida!

AndroidMaster25 avatar Oct 12 '24 10:10 AndroidMaster25