Native Function Call
|
Binary Protection |
100 |
|
S3 bucket misconfiguration
|
Web Application |
100 |
|
RIA Cross Domain Policy
|
Web Application |
100 |
|
RFI
|
Web Application |
100 |
|
Backdoor5
|
Miscellaneous |
100 |
|
Backdoor4
|
Miscellaneous |
100 |
|
Backdoor3
|
Miscellaneous |
100 |
|
Root Management Apps
|
Root Detection |
100 |
|
Root Cloaking Apps
|
Root Detection |
100 |
|
Backdoor2
|
Miscellaneous |
100 |
|
Backdoor1
|
Miscellaneous |
100 |
|
Client Side Validation Bypass
|
Web Application |
100 |
|
Old Backup Files
|
Web Application |
100 |
|
Review comment and Metadata
|
Web Application |
100 |
|
Default Credentials
|
Web Application |
100 |
|
Metafiles - Info Leakage
|
Web Application |
100 |
|
REST API HTTP Methods
|
Web Application |
100 |
|
User Password Enumeration
|
Web Application |
100 |
|
Server Fingerprint
|
Web Application |
100 |
|
Login bypass
|
Web Application |
100 |
|
Bruteforce
|
Web Application |
100 |
|
HTML5 Controls
|
Web Application |
100 |
|
RW System
|
Root Detection |
100 |
|
Su Binary
|
Root Detection |
100 |
|
Clipboard
|
Insecure Data Storage |
100 |
|
SQLite Databases (Unencrypted)
|
Insecure Data Storage |
100 |
|
External Storage
|
Insecure Data Storage |
100 |
|
Internal Storage
|
Insecure Data Storage |
100 |
|
Shared Preferences
|
Insecure Data Storage |
100 |
|
UDP Traffic
|
Non-HTTP Traffic |
100 |
|
TCP Traffic
|
Non-HTTP Traffic |
100 |
|
HTTPS Traffic
|
HTTP Traffic |
100 |
|
HTTP Traffic
|
HTTP Traffic |
100 |
|
Caesar Cipher
|
Encryption |
100 |
|
File System Expose
|
Content Providers |
100 |
|
SQL Injection
|
Content Providers |
100 |
|
Hardcoded Secret
|
Binary Protection |
100 |
|
WTF Logs
|
Logs |
100 |
|
Verbose Logs
|
Logs |
100 |
|
Warnings Logs
|
Logs |
100 |
|
Debug Logs
|
Logs |
100 |
|
Error Logs
|
Logs |
100 |
|
Informational Logs
|
Logs |
100 |
|