| MASTG-TECH-0028 | Get Open Connections | platform:android |
| MASTG-TECH-0109 | Intercepting Flutter HTTPS Traffic | platform:android |
| MASTG-TECH-0013 | Reverse Engineering Android Apps | platform:android |
| MASTG-TECH-0011 | Setting Up an Interception Proxy | platform:android |
| MASTG-TECH-0005 | Installing Apps | platform:android |
| MASTG-TECH-0128 | Performing a Backup and Restore of App Data | platform:android |
| MASTG-TECH-0024 | Reviewing Disassembled Native Code | platform:android |
| MASTG-TECH-0126 | Obtaining App Permissions | platform:android |
| MASTG-TECH-0019 | Retrieving Strings | platform:android |
| MASTG-TECH-0006 | Listing Installed Apps | platform:android |
| MASTG-TECH-0041 | Library Injection | platform:android |
| MASTG-TECH-0032 | Execution Tracing | platform:android |
| MASTG-TECH-0021 | Information Gathering - API Usage | platform:android |
| MASTG-TECH-0127 | Inspecting an App's Backup Data | platform:android |
| MASTG-TECH-0038 | Patching | platform:android |
| MASTG-TECH-0141 | Inspecting the Merged AndroidManifest | platform:android |
| MASTG-TECH-0116 | Obtaining Information about the APK Signature | platform:android |
| MASTG-TECH-0026 | Dynamic Analysis on Non-Rooted Devices | platform:android |
| MASTG-TECH-0014 | Static Analysis on Android | platform:android |
| MASTG-TECH-0027 | Get Open Files | platform:android |
| MASTG-TECH-0010 | Basic Network Monitoring/Sniffing | platform:android |
| MASTG-TECH-0036 | Emulation-based Analysis | platform:android |
| MASTG-TECH-0009 | Monitoring System Logs | platform:android |
| MASTG-TECH-0025 | Automated Static Analysis | platform:android |
| MASTG-TECH-0003 | Obtaining and Extracting Apps | platform:android |
| MASTG-TECH-0008 | Accessing App Data Directories | platform:android |
| MASTG-TECH-0030 | Sandbox Inspection | platform:android |
| MASTG-TECH-0037 | Symbolic Execution | platform:android |
| MASTG-TECH-0040 | Waiting for the Debugger | platform:android |
| MASTG-TECH-0035 | JNI Tracing | platform:android |
| MASTG-TECH-0018 | Disassembling Native Code | platform:android |
| MASTG-TECH-0022 | Information Gathering - Network Communication | platform:android |
| MASTG-TECH-0017 | Decompiling Java Code | platform:android |
| MASTG-TECH-0034 | Native Code Tracing | platform:android |
| MASTG-TECH-0117 | Obtaining Information from the AndroidManifest | platform:android |
| MASTG-TECH-0015 | Dynamic Analysis on Android | platform:android |
| MASTG-TECH-0130 | Software Composition Analysis (SCA) of Android Dependencies by Creating a SBOM | platform:android |
| MASTG-TECH-0033 | Method Tracing | platform:android |
| MASTG-TECH-0002 | Host-Device Data Transfer | platform:android |
| MASTG-TECH-0140 | Obtaining Debugging Information and Symbols | platform:android |
| MASTG-TECH-0039 | Repackaging & Re-Signing | platform:android |
| MASTG-TECH-0043 | Method Hooking | platform:android |
| MASTG-TECH-0100 | Logging Sensitive Data from Network Traffic | platform:android |
| MASTG-TECH-0004 | Repackaging Apps | platform:android |
| MASTG-TECH-0112 | Reverse Engineering Flutter Applications | platform:android |
| MASTG-TECH-0045 | Runtime Reverse Engineering | platform:android |
| MASTG-TECH-0131 | Software Composition Analysis (SCA) of Android Dependencies at Build Time | platform:android |
| MASTG-TECH-0031 | Debugging | platform:android |
| MASTG-TECH-0007 | Exploring the App Package | platform:android |
| MASTG-TECH-0016 | Disassembling Code to Smali | platform:android |
| MASTG-TECH-0001 | Accessing the Device Shell | platform:android |
| MASTG-TECH-0023 | Reviewing Decompiled Java Code | platform:android |
| MASTG-TECH-0115 | Obtaining Compiler-Provided Security Features | platform:android |
| MASTG-TECH-0029 | Get Loaded Native Libraries | platform:android |
| MASTG-TECH-0129 | Verifying Android Dependencies at Runtime | platform:android |
| MASTG-TECH-0042 | Getting Loaded Classes and Methods Dynamically | platform:android |
| MASTG-TECH-0108 | Taint Analysis | platform:android |
| MASTG-TECH-0020 | Retrieving Cross References | platform:android |
| MASTG-TECH-0012 | Bypassing Certificate Pinning | platform:android |
| MASTG-TECH-0044 | Process Exploration | platform:android |
| MASTG-TECH-0125 | Intercepting Xamarin Traffic | platform:generic |
| MASTG-TECH-0122 | Passive Eavesdropping | platform:generic |
| MASTG-TECH-0119 | Intercepting HTTP Traffic by Hooking Network APIs at the Application Layer | platform:generic |
| MASTG-TECH-0120 | Intercepting HTTP Traffic Using an Interception Proxy | platform:generic |
| MASTG-TECH-0121 | Intercepting Non-HTTP Traffic Using an Interception Proxy | platform:generic |
| MASTG-TECH-0049 | Dynamic Analysis | platform:generic |
| MASTG-TECH-0124 | Achieving a MITM Position Using a Rogue Access Point | platform:generic |
| MASTG-TECH-0051 | Tampering and Runtime Instrumentation | platform:generic |
| MASTG-TECH-0123 | Achieving a MITM Position via ARP Spoofing | platform:generic |
| MASTG-TECH-0047 | Reverse Engineering | platform:generic |
| MASTG-TECH-0048 | Static Analysis | platform:generic |
| MASTG-TECH-0050 | Binary Analysis | platform:generic |
| MASTG-TECH-0083 | TBD | platform:ios |
| MASTG-TECH-0139 | Attach to WKWebView | platform:ios |
| MASTG-TECH-0134 | Monitoring the Pasteboard | platform:ios |
| MASTG-TECH-0132 | Software Composition Analysis (SCA) of iOS Dependencies by Creating a SBOM | platform:ios |
| MASTG-TECH-0095 | Method Hooking | platform:ios |
| MASTG-TECH-0067 | Dynamic Analysis on iOS | platform:ios |
| MASTG-TECH-0137 | Analyzing PrivacyInfo.xcprivacy Files | platform:ios |
| MASTG-TECH-0075 | Reviewing Decompiled Objective-C and Swift Code | platform:ios |
| MASTG-TECH-0071 | Retrieving Strings | platform:ios |
| MASTG-TECH-0118 | Obtaining Compiler-Provided Security Features | platform:ios |
| MASTG-TECH-0092 | Signing IPA files | platform:ios |
| MASTG-TECH-0090 | Injecting Frida Gadget into an IPA Automatically | platform:ios |
| MASTG-TECH-0114 | Demangling Symbols | platform:ios |
| MASTG-TECH-0065 | Reverse Engineering iOS Apps | platform:ios |
| MASTG-TECH-0084 | Debugging | platform:ios |
| MASTG-TECH-0138 | Convert Plist Files to JSON | platform:ios |
| MASTG-TECH-0063 | Setting up an Interception Proxy | platform:ios |
| MASTG-TECH-0074 | Information Gathering - Network Communication | platform:ios |
| MASTG-TECH-0078 | Automated Static Analysis | platform:ios |
| MASTG-TECH-0086 | Method Tracing | platform:ios |
| MASTG-TECH-0087 | Native Code Tracing | platform:ios |
| MASTG-TECH-0136 | Retrieving PrivacyInfo.xcprivacy Files | platform:ios |
| MASTG-TECH-0056 | Installing Apps | platform:ios |
| MASTG-TECH-0077 | Reviewing Disassembled Native Code | platform:ios |
| MASTG-TECH-0110 | Intercepting Flutter HTTPS Traffic | platform:ios |
| MASTG-TECH-0054 | Obtaining and Extracting Apps | platform:ios |
| MASTG-TECH-0052 | Accessing the Device Shell | platform:ios |
| MASTG-TECH-0061 | Dumping KeyChain Data | platform:ios |
| MASTG-TECH-0079 | Obtaining a Developer Provisioning Profile | platform:ios |
| MASTG-TECH-0096 | Process Exploration | platform:ios |
| MASTG-TECH-0055 | Launching a Repackaged App in Debug Mode | platform:ios |
| MASTG-TECH-0088 | Emulation-based Analysis | platform:ios |
| MASTG-TECH-0089 | Symbolic Execution | platform:ios |
| MASTG-TECH-0091 | Injecting Libraries into an IPA Manually | platform:ios |
| MASTG-TECH-0066 | Static Analysis on iOS | platform:ios |
| MASTG-TECH-0069 | Decompiling Native Code | platform:ios |
| MASTG-TECH-0068 | Disassembling Native Code | platform:ios |
| MASTG-TECH-0081 | Get Open Connections | platform:ios |
| MASTG-TECH-0073 | Information Gathering - API Usage | platform:ios |
| MASTG-TECH-0059 | Accessing App Data Directories | platform:ios |
| MASTG-TECH-0058 | Exploring the App Package | platform:ios |
| MASTG-TECH-0093 | Waiting for the debugger | platform:ios |
| MASTG-TECH-0053 | Host-Device Data Transfer | platform:ios |
| MASTG-TECH-0097 | Runtime Reverse Engineering | platform:ios |
| MASTG-TECH-0057 | Listing Installed Apps | platform:ios |
| MASTG-TECH-0098 | Patching React Native Apps | platform:ios |
| MASTG-TECH-0112 | Reverse Engineering Flutter Applications | platform:ios |
| MASTG-TECH-0072 | Retrieving Cross References | platform:ios |
| MASTG-TECH-0082 | Get Shared Libraries | platform:ios |
| MASTG-TECH-0080 | Get Open Files | platform:ios |
| MASTG-TECH-0094 | Getting Loaded Classes and Methods dynamically | platform:ios |
| MASTG-TECH-0135 | Bypassing Biometric Authentication | platform:ios |
| MASTG-TECH-0070 | Extracting Information from the Application Binary | platform:ios |
| MASTG-TECH-0111 | Extracting Entitlements from MachO Binaries | platform:ios |
| MASTG-TECH-0064 | Bypassing Certificate Pinning | platform:ios |
| MASTG-TECH-0133 | Software Composition Analysis (SCA) of iOS Dependencies by Scanning Package Manager Artifacts | platform:ios |
| MASTG-TECH-0085 | Execution Tracing | platform:ios |
| MASTG-TECH-0060 | Monitoring System Logs | platform:ios |
| MASTG-TECH-0076 | Reviewing Disassembled Objective-C and Swift Code | platform:ios |
| MASTG-TECH-0113 | Obtaining Debugging Symbols | platform:ios |
| MASTG-TECH-0062 | Basic Network Monitoring/Sniffing | platform:ios |