You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
hello
as the title said android 12 is really no way to get it work
testing pubg mobile game
android 13 seems to work but some mobile always crash
and my questions is :
this is a very powerfull tool but can you edite the sdk to support more futures ?
for example add the ability to direct deal with game syscall in jni
as the game is working inside the container and you already redirecting all its file to your sandbox namespace
it will be amazing if you give the user the ability to access all syscalls made by a process or give him a native access to that process and we can perform our own hooks and syscall monitoring
instead of modifying my whole kernel to intercept the syscalls you
sandbox tool is very useful in reversing like syscall monitoring and anlayses
i hope you consider this
and my second question i want to know if i we can redirect all IO access for all files in a specific dir
your example was redirect the maps file but can for example i redirect the entire /proc/ dir to another location ?
or the /storage/emulated/0/Android/ to another dir like : /storage/emulated/0/Vertual/Android/ or any name specifid by the user
can also add the ability to change the window title name of a process ? currently it is [FO] maybe you can allow us to modify it
thanks for this great work and i hope you can add me in telegram for more discussion and help
@matrixhxd
The text was updated successfully, but these errors were encountered:
hello
as the title said android 12 is really no way to get it work
testing pubg mobile game
android 13 seems to work but some mobile always crash
and my questions is :
this is a very powerfull tool but can you edite the sdk to support more futures ?
for example add the ability to direct deal with game syscall in jni
as the game is working inside the container and you already redirecting all its file to your sandbox namespace
it will be amazing if you give the user the ability to access all syscalls made by a process or give him a native access to that process and we can perform our own hooks and syscall monitoring
instead of modifying my whole kernel to intercept the syscalls you
sandbox tool is very useful in reversing like syscall monitoring and anlayses
i hope you consider this
and my second question i want to know if i we can redirect all IO access for all files in a specific dir
your example was redirect the maps file but can for example i redirect the entire /proc/ dir to another location ?
or the /storage/emulated/0/Android/ to another dir like : /storage/emulated/0/Vertual/Android/ or any name specifid by the user
can also add the ability to change the window title name of a process ? currently it is [FO] maybe you can allow us to modify it
thanks for this great work and i hope you can add me in telegram for more discussion and help
@matrixhxd
The text was updated successfully, but these errors were encountered: