|
[Pixel::com.taptap]-> Process crashed: SIGTRAP SI_TKILL
***
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'google/sailfish/sailfish:8.1.0/OPM1.171019.011/4448085:user/release-keys'
Revision: '0'
ABI: 'arm64'
pid: 18037, tid: 18037, name: com.taptap >>> com.taptap <<<
signal 5 (SIGTRAP), code -6 (SI_TKILL), fault addr --------
x0 0000000000000000 x1 0000000000004675 x2 0000000000000005 x3 0000007fc5aa82c0
x4 0000000000000000 x5 0000000000000000 x6 0000000000000000 x7 7f7f7f7f7f7f7f7f
x8 00000000000000f0 x9 408be9a3b51fd90c x10 0000000000000000 x11 0000000000000000
x12 0000007fc5aa8008 x13 000000777630fff0 x14 0000000000000100 x15 00063460c91a1fc7
x16 00000076db5ecb58 x17 00000077739bb430 x18 0000000000000000 x19 0000007fc5aa82c0
x20 0000000000004675 x21 0000007fc5aa82c0 x22 0000000000000000 x23 0000007fc5aa8008
x24 000000000000469f x25 0000000000000062 x26 000000777648ea40 x27 0000000000000058
x28 0000000000000001 x29 0000007fc5aa7f10 x30 000000777634d440
sp 0000007fc5aa7f00 pc 00000077763c3500 pstate 0000000000000000
backtrace:
#00 pc 000000000009f500 /system/bin/linker64 (__dl_syscall+32)
#01 pc 000000000002943c /system/bin/linker64 (__dl__ZL13resend_signalP7siginfob+96)
#02 pc 00000000000292e4 /system/bin/linker64 (__dl__ZL24debuggerd_signal_handleriP7siginfoPv+1176)
#03 pc 00000000002622dc /data/local/tmp/re.frida.server/frida-agent-64.so
***
[Pixel::com.taptap]->
Thank you for using Frida!
这个frida检测怎么绕过,求大神指教!!!!!
补充内容 (2022-10-5 16:45):
frida能绕检测的来留言,留下联系方式,有偿 |
|