Open ghost opened 2 years ago
When applying APKKiller, I got ErrorReport notification. not sure if its from my device or not, but i called invoke-static {p1}, Lcom/kuro/APKKiller;->Start(Landroid/content/Context;)V
in util001/notification/ErrApplication.smali
Hi. I've been attempting to utilize APKKiller to bypass signature detection on a Unity game called Ensemble Stars Music (JP ver) with the Android package name of
jp.co.happyelements.boysm
. The signature detection appears to be carried out in a native library; nothing of real value can be found in the smali code.Here's a rough overview of what I've done to patch the APK, in the case that I've done something incorrectly to cause APKKiller to not work as intended:
std::vector<std::vector<uint8_t>> apk_signatures;
in APKKiller.h with it.jp.co.happyelements.boysm.OverrideUnityPlayerActivity
).util001.notification.ErrorReport
; clicking sends aandroid.intent.action.SENDTO
intent.I believe APKKiller was able to execute and patch the APK, as logs from the device indicate that it was running. The logs are attached below:
Logs:
It would be useful to know if this failure to bypass the game's signature check protection is due to something that I've done wrong, or if APKKiller is unable to bypass it yet. If the APK file is required for debugging purposes, it's available here.