TL; DR#1: The post will discuss some basic methodologies for exploring the behavior of RASP solutions using static analysis, Frida, and Radare2. No method of bypassing protections will be addressed directly.