
Modifying Network Traffic with NFQUEUE and ARP Spoofing
Use NFQUEUE and ARP spoofing to monitor and intercept network traffic between the Linux kernel and the user space.
LIVE Webinar
Secure SDLC with Automation Pipelines for SaaS Products
LIVE ON
December 11, 2025
9 AM PST | 6 PM CET


Use NFQUEUE and ARP spoofing to monitor and intercept network traffic between the Linux kernel and the user space.

In this article, we explain how you can debug your Linux kernel and its modules during runtime.

This article explains the pros and cons of using DKMS. It will be useful for driver developers who are debating whether to use DKMS to distribute thei...

Though a blockchain is just a distributed ledger with an immutable chain of data, blockchains can be successfully implemented in various business sphe...

An Apriorit system programming expert analyzes the pros and cons of applying formal verification to smart contracts, compares it to other types of sec...

The article is about how you can install a service (a daemon) outside on a virtual machine as silently as possible while it’s turned off.

In this article, we explain our approach to developing Windows drivers using a QEMU virtual device.

In this article, we analyze the causes of these recent EOS casino hacks and see if they could have been avoided.

Learn whether FPGAs are a good fit for accelerating Artificial Intelligence (AI) applications and what are the pros and cons of using FPGAs for AI.

The ATT&CK matrix is a huge collection of effective cyber attack mechanisms, tactics, techniques, and procedures
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.