
The Evolution of Reverse Engineering: From Manual Reconstruction to Automated Disassembling
Explore what static and dynamic analysis tools and techniques can be used for software reverse engineering automation.

Explore what static and dynamic analysis tools and techniques can be used for software reverse engineering automation.

Learn how to search for embedded software vulnerabilities using databases and evaluate their risks to your application.

Learn how to build the File Provider API for macOS. Implement this extension to let your macOS application access files on remote servers.

Learn about .NET Standard, its advantages for system modernization, and how to target your project for it.

Learn how to perform Windows API hooking with Python, explore simple examples, and see how the Deviare and WinAppDbg libraries can be used for API hoo...

In this case study, we describe how we developed drivers for virtual reality headset in parallel with the device.

Apriorit case study on implementing artificial intelligence (AI) in a healthcare solution for follicle detection, segmentation, and measurement.

Learn three methods for getting COM server process ID and discover undocumented functionality of COM server interfaces.

Learn what man-in-the-middle attacks are and how to use MITM tools to find vulnerabilities in your networks before attackers exploit them.

Learn how moving applications to the cloud can help you keep all your corporate apps, services, and resources always available and secure.
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.