Leon Jacobs
Leon Jacobs
Could you try some vanilla Frida instrumentation using a simple script to test if that works? The other option is to provide some device log output to see if that...
I have not really tested system applications much, so, some reverse engineering will be required for those. That said, objection does not yet hook Trustkit, and adding it as described...
Thanks for the report. Indeed, this is an edge case I also ran into end last year. I suppose this is a step we can add after the patcher unpacks...
As in iOS apps running on apple silicon? Not right now (especially since I don't have the hardware for it), but if Frida works on the platform, the changes required...
This is going to be covered nicely in some new things I have in the cooker.™
I know we had some internal discussions about this, but I wanted to update the status of this PR here. @StingraySA could you update the PR to remove the active...
This does not appear to be the case on all apps/devices though.
It checks `$PATH` for `aapt`, so just modify `$PATH` to include it's location.
Will keep this open. Makes sense to try some sane defaults, but `$PATH` modifications will always be the last resort.
There are plenty of resources available online for this. But in short, you would do something like `export PATH=$PATH:/path/to/aapt`.