pyler
pyler
Lucky Patcher hooks this apk "com.us.ragnarok" but in hook he somehow checks for superuser.apk file, but app gets fake path since RootCloak was applied.. Disable Lucky Patcher hooks for this...
/system/app/FAKEJUNKFILE.apk is fake path instead of /system/app/Superuser.apk.. so file not found..
``` #define _GNU_SOURCE #include #include #include FILE *fopen(const char *path, const char *mode) { printf("In our own fopen, opening %s\n", path); __android_log_print(ANDROID_LOG_INFO, "ROOTCLOAK", "path %s, mode %s", path, mode); FILE...
https://cedricvb.be/post/intercepting-android-native-library-calls/
https://github.com/apitrace/apitrace/issues/296
@NHellFire Okey, i use now setprop wrap.com.devadvance.rootinspect LD_PRELOAD=/data/local/librootcloak.so but I wasnt able to get even your exception you got.. Maybe you can show what you do?
NHellFire , I tested it on Genymotion 6.0 device. But I will look on it...
NHellFire , I tested it on Genymotion 6.0 device. But I will look on it... Edit: Yes, your method works. LD_PRELOAD=./data/app/com.devadvance.rootcloak2.debug-1/lib/x86/librootcloak.so date seems to work fine but not sure if...
if I tried to run setprop wrap.com.devadvance.rootinsp LD_PRELOAD=/data/app/com.devadvance.rootcloak2.debug-1/lib/x86/librootcloak.so and they I launched RootInspector. I get no messgae in log, even no " Error reading pid from wrapped process, child may...
Good :) I think I will also hack it on my old Samsung phone, emulator can have undefined behaviour in this case.