MASTG-TECH-0075 |
Reviewing Decompiled Objective-C and Swift Code |
platform:ios |
MASTG-TECH-0062 |
Basic Network Monitoring/Sniffing |
platform:ios |
MASTG-TECH-0092 |
Repackaging and Re-Signing |
platform:ios |
MASTG-TECH-0086 |
Method Tracing |
platform:ios |
MASTG-TECH-0057 |
Listing Installed Apps |
platform:ios |
MASTG-TECH-0072 |
Retrieving Cross References |
platform:ios |
MASTG-TECH-0094 |
Getting Loaded Classes and Methods dynamically |
platform:ios |
MASTG-TECH-0113 |
Obtaining Debugging Symbols |
platform:ios |
MASTG-TECH-0096 |
Process Exploration |
platform:ios |
MASTG-TECH-0112 |
Obtaining the Code Signature Format Version |
platform:ios |
MASTG-TECH-0080 |
Get Open Files |
platform:ios |
MASTG-TECH-0084 |
Debugging |
platform:ios |
MASTG-TECH-0055 |
Launching a Repackaged App in Debug Mode |
platform:ios |
MASTG-TECH-0064 |
Bypassing Certificate Pinning |
platform:ios |
MASTG-TECH-0052 |
Accessing the Device Shell |
platform:ios |
MASTG-TECH-0063 |
Setting up an Interception Proxy |
platform:ios |
MASTG-TECH-0114 |
Demangling Symbols |
platform:ios |
MASTG-TECH-0076 |
Reviewing Disassembled Objective-C and Swift Code |
platform:ios |
MASTG-TECH-0074 |
Information Gathering - Network Communication |
platform:ios |
MASTG-TECH-0085 |
Execution Tracing |
platform:ios |
MASTG-TECH-0081 |
Get Open Connections |
platform:ios |
MASTG-TECH-0061 |
Dumping KeyChain Data |
platform:ios |
MASTG-TECH-0077 |
Reviewing Disassembled Native Code |
platform:ios |
MASTG-TECH-0090 |
Injecting Frida Gadget into an IPA Automatically |
platform:ios |
MASTG-TECH-0069 |
Decompiling Native Code |
platform:ios |
MASTG-TECH-0070 |
Extracting Information from the Application Binary |
platform:ios |
MASTG-TECH-0071 |
Retrieving Strings |
platform:ios |
MASTG-TECH-0067 |
Dynamic Analysis on iOS |
platform:ios |
MASTG-TECH-0053 |
Host-Device Data Transfer |
platform:ios |
MASTG-TECH-0068 |
Disassembling Native Code |
platform:ios |
MASTG-TECH-0082 |
Get Shared Libraries |
platform:ios |
MASTG-TECH-0078 |
Automated Static Analysis |
platform:ios |
MASTG-TECH-0065 |
Reverse Engineering iOS Apps |
platform:ios |
MASTG-TECH-0073 |
Information Gathering - API Usage |
platform:ios |
MASTG-TECH-0066 |
Static Analysis on iOS |
platform:ios |
MASTG-TECH-0088 |
Emulation-based Analysis |
platform:ios |
MASTG-TECH-0060 |
Monitoring System Logs |
platform:ios |
MASTG-TECH-0111 |
Extracting Entitlements from MachO Binaries |
platform:ios |
MASTG-TECH-0079 |
Getting a Developer Provisioning Profile |
platform:ios |
MASTG-TECH-0097 |
Runtime Reverse Engineering |
platform:ios |
MASTG-TECH-0098 |
Patching React Native Apps |
platform:ios |
MASTG-TECH-0059 |
Accessing App Data Directories |
platform:ios |
MASTG-TECH-0118 |
Obtaining Compiler-Provided Security Features |
platform:ios |
MASTG-TECH-0054 |
Obtaining and Extracting Apps |
platform:ios |
MASTG-TECH-0091 |
Injecting Libraries into an IPA Manually |
platform:ios |
MASTG-TECH-0095 |
Method Hooking |
platform:ios |
MASTG-TECH-0110 |
Intercepting Flutter HTTPS Traffic |
platform:ios |
MASTG-TECH-0093 |
Waiting for the debugger |
platform:ios |
MASTG-TECH-0058 |
Exploring the App Package |
platform:ios |
MASTG-TECH-0087 |
Native Code Tracing |
platform:ios |
MASTG-TECH-0083 |
Sandbox Inspection |
platform:ios |
MASTG-TECH-0089 |
Symbolic Execution |
platform:ios |
MASTG-TECH-0056 |
Installing Apps |
platform:ios |
MASTG-TECH-0047 |
Reverse Engineering |
platform:generic |
MASTG-TECH-0051 |
Tampering and Runtime Instrumentation |
platform:generic |
MASTG-TECH-0048 |
Static Analysis |
platform:generic |
MASTG-TECH-0049 |
Dynamic Analysis |
platform:generic |
MASTG-TECH-0050 |
Binary Analysis |
platform:generic |
MASTG-TECH-0108 |
Taint Analysis |
platform:android |
MASTG-TECH-0028 |
Get Open Connections |
platform:android |
MASTG-TECH-0007 |
Exploring the App Package |
platform:android |
MASTG-TECH-0041 |
Library Injection |
platform:android |
MASTG-TECH-0010 |
Basic Network Monitoring/Sniffing |
platform:android |
MASTG-TECH-0020 |
Retrieving Cross References |
platform:android |
MASTG-TECH-0044 |
Process Exploration |
platform:android |
MASTG-TECH-0026 |
Dynamic Analysis on Non-Rooted Devices |
platform:android |
MASTG-TECH-0100 |
Logging Sensitive Data from Network Traffic |
platform:android |
MASTG-TECH-0037 |
Symbolic Execution |
platform:android |
MASTG-TECH-0024 |
Reviewing Disassembled Native Code |
platform:android |
MASTG-TECH-0031 |
Debugging |
platform:android |
MASTG-TECH-0027 |
Get Open Files |
platform:android |
MASTG-TECH-0022 |
Information Gathering - Network Communication |
platform:android |
MASTG-TECH-0045 |
Runtime Reverse Engineering |
platform:android |
MASTG-TECH-0043 |
Method Hooking |
platform:android |
MASTG-TECH-0030 |
Sandbox Inspection |
platform:android |
MASTG-TECH-0016 |
Disassembling Code to Smali |
platform:android |
MASTG-TECH-0033 |
Method Tracing |
platform:android |
MASTG-TECH-0109 |
Intercepting Flutter HTTPS Traffic |
platform:android |
MASTG-TECH-0115 |
Obtaining Compiler-Provided Security Features |
platform:android |
MASTG-TECH-0029 |
Get Loaded Native Libraries |
platform:android |
MASTG-TECH-0042 |
Getting Loaded Classes and Methods Dynamically |
platform:android |
MASTG-TECH-0039 |
Repackaging & Re-Signing |
platform:android |
MASTG-TECH-0038 |
Patching |
platform:android |
MASTG-TECH-0018 |
Disassembling Native Code |
platform:android |
MASTG-TECH-0035 |
JNI Tracing |
platform:android |
MASTG-TECH-0015 |
Dynamic Analysis on Android |
platform:android |
MASTG-TECH-0019 |
Retrieving Strings |
platform:android |
MASTG-TECH-0006 |
Listing Installed Apps |
platform:android |
MASTG-TECH-0014 |
Static Analysis on Android |
platform:android |
MASTG-TECH-0003 |
Obtaining and Extracting Apps |
platform:android |
MASTG-TECH-0117 |
Obtaining Information from the AndroidManifest |
platform:android |
MASTG-TECH-0116 |
Obtaining Information about the APK Signature |
platform:android |
MASTG-TECH-0009 |
Monitoring System Logs |
platform:android |
MASTG-TECH-0001 |
Accessing the Device Shell |
platform:android |
MASTG-TECH-0011 |
Setting Up an Interception Proxy |
platform:android |
MASTG-TECH-0008 |
Accessing App Data Directories |
platform:android |
MASTG-TECH-0013 |
Reverse Engineering Android Apps |
platform:android |
MASTG-TECH-0025 |
Automated Static Analysis |
platform:android |
MASTG-TECH-0002 |
Host-Device Data Transfer |
platform:android |
MASTG-TECH-0034 |
Native Code Tracing |
platform:android |
MASTG-TECH-0012 |
Bypassing Certificate Pinning |
platform:android |
MASTG-TECH-0040 |
Waiting for the Debugger |
platform:android |
MASTG-TECH-0023 |
Reviewing Decompiled Java Code |
platform:android |
MASTG-TECH-0036 |
Emulation-based Analysis |
platform:android |
MASTG-TECH-0004 |
Repackaging Apps |
platform:android |
MASTG-TECH-0005 |
Installing Apps |
platform:android |
MASTG-TECH-0032 |
Execution Tracing |
platform:android |
MASTG-TECH-0021 |
Information Gathering - API Usage |
platform:android |
MASTG-TECH-0017 |
Decompiling Java Code |
platform:android |