Redirecting Functions in Shared ELF Libraries
This article includes brief description of ELF structure and principles of its usage. It is used to provide the solution for intercepting function cal...
This article includes brief description of ELF structure and principles of its usage. It is used to provide the solution for intercepting function cal...
The article is devoted to the development of the library that implements the Diffie – Hellman cryptographic algorithm of key exchange. The library a...
Once long time ago I was curious how to get a descriptor of the module mapped into memory (.exe or .dll), if its name and other attributes needed for ...
In this article, I would like to tell you how to read the SMS, MMS, and Emails data from your Windows Mobile device. Also I’ll describe some differe...
This article demonstrates one possible method of merging N sorted large text files using Forecasting algorithm in the style suggested by D.Knuth. The ...
The usage of DocumentProperties and SetPrinter API functions gives an opportunity to change the printer settings. But, when using them, I could not ha...
This article represents the results of the small interesting research conducted in our Research Team. The Leader of this team is sharing the results o...
This article is the continue of the previously posted project Hide Driver. Like the first article this one doesn't pretend to be full and original. Th...
Long time ago we started publishing here the articles written by developers and reversers from our team. Here is the new one - our reverser gives some...
Once we faced the need to investigate how Samsung cellular phones work; we required some information from them, which is not documented (and will neve...
Tell us about your project
Send us a request for proposal! We’ll get back to you with details and estimations.
Book an Exploratory Call
Do not have any specific task for us in mind but our skills seem interesting?
Get a quick Apriorit intro to better understand our team capabilities.
Book time slotContact us