The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
Create Tampering and RI -> Dynamic Instrumentation -> Process Exploration
after "Method Hooking"
This section is intended to show a view of the app from within its memory. One of the recommended tools to address here is r2frida.
Check chapter 6c to keep it consistent. Once this ticket is ready: #1377