lico-n / ZygiskFrida

Injects frida gadget using zygisk to bypass anti-tamper checks.
MIT License
493 stars 88 forks source link

Not working #11

Closed rushkii closed 1 year ago

rushkii commented 1 year ago

I used com.mobile.legends,10000 then I used frida -R gadget in my Termux, but it says Failed to spawn: unable to connect to remote frida-server. But when I don't use delay, it looks everything fine when I used frida command, but suddenly the connection is terminated or either the app crashed. How to solve this?

This is when I don't use delay: image

and this is when I use it: image

lico-n commented 1 year ago

For me both with and without delay works fine for this application.

Could you please make sure that you don't have any other frida magisk modules installed? This is not really compatible with other frida modules like f.e. MagiskFrida.

Please provide logs for adb logcat -v tag | grep -e "Frida" or alternatively adb logcat -s ZygiskFrida.

lico-n commented 1 year ago

As there are no more information I will close this issue.

This doesn't seem to be an issue with ZygiskFrida but with more app specific anti-tamper checks. Purely connecting to the gadget without scripts works. If you try to interact with the libil2cpp, you will get issues because it has more protections built in that are not within the scope of this project.

ekko-zhao commented 1 year ago

when I used frida command

image

my command like this

image

How to solve this,thanks!

lico-n commented 1 year ago

when I used frida command image my command like this image How to solve this,thanks!

The current bundled gadget version is 16.x.x. Make sure that your frida cli has the same major version or replace the gadget with the version you are using

ekko-zhao commented 1 year ago

Based on the scenario shown in the image below, even though it seems like the injection was successful, is it still getting intercepted by the app's detection mechanism?

image
lico-n commented 1 year ago

Based on the scenario shown in the image below, even though it seems like the injection was successful, is it still getting intercepted by the app's detection mechanism?

image

Yes, the app is detecting it.