Skip to content

Instantly share code, notes, and snippets.

@r3bb1t
r3bb1t / uncrackable_syscalls_4.ts
Created May 4, 2025 14:21
Frida script for bypassing direct sycalls in uncrackable 4
class AntiAntiDebugV2 {
readonly fakeMapsFile: string;
/// This will be used for redirecting syscalls which are trying to open /proc/self/maps
readonly fakeMapsFileNamePtr: NativePointer;
readonly fridaRegex: RegExp;
readonly procSelfTaskStatusRe: RegExp;
readonly fakeFilePath: string;
readonly fakeFilePathPtr: NativePointer;