Frida-Multiple-Bypass
Frida-Multiple-Bypass copied to clipboard
emulator detected LDPlayer9 Android 9 64bit - can't login MH Now com.nianticlabs.monsterhunter
emulator detected LDPlayer9 Android 9 64bit - can't login MH Now com.nianticlabs.monsterhunter bypass.js
--> Bypassing Trustmanager (Android < 7) request
--> Bypassing TrustManagerImpl checkTrusted
Process crashed: SIGSEGV SI_KERNEL
***
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'samsung/star2qltezh/star2qltechn:9/PQ3B.190801.12041624/G9650ZHU2ARC6:user/release-keys'
Revision: '0'
ABI: 'x86_64'
pid: 6438, tid: 6627, name: UnityMain >>> com.nianticlabs.monsterhunter <<<
signal 11 (SIGSEGV), code 128 (SI_KERNEL), fault addr 0x0
rax 00ffffffffffffff rbx 00000000038062c0 rcx 0000000000000005 rdx 00007fff55b64030
r8 00007fff6f1c1920 r9 00007fff6ead7620 r10 0000000000008270 r11 0000000000000246
r12 00007fff56212070 r13 006dda79c2df1b16 r14 00007fff6f1c9260 r15 00007fff6f1c3f80
rdi 00000000038062c0 rsi 0000000000000005
rbp 0000000000000009 rsp 00007ffe62bc32f0 rip 00007fff6ead776a
backtrace:
#00 pc 000000000011676a /system/lib64/libhoudini.so (offset 0xfd000)
#01 pc 00000000001db14f /system/lib64/libhoudini.so (offset 0xfd000)
#02 pc 00000000000f9f66 /system/lib64/libhoudini.so
#03 pc 00000000002f6143 /system/lib64/libhoudini.so (offset 0xfd000)
***
[SM G977N::com.nianticlabs.monsterhunter ]->
Thank you for using Frida!