
Testing Malware Detection Systems: ROP Chain Exploit Example
This article covers virus detection system testing and is written for quality assurance specialists with no experience in testing malware detection sy...
Meet Apriorit Team at Automotive Testing Expo Europe 2025
Halls 8 & 10, Messe Stuttgart, Germany | May 20-22
This article covers virus detection system testing and is written for quality assurance specialists with no experience in testing malware detection sy...
Learn about zero-day attacks and zero-day exploits, including four main techniques used in detecting and preventing them.
An overview of main mobile information security issues, with some suggestions on how to deal with them
A sample Android app implementing Android KeyStore and its alternatives for previous versions
The method of accessing third-party app private data like skype messages on Android - with sample code
Get a brief overview of the 3 most widespread web app vulnerabilities: security Misconfiguration; broken session and authentication problems; and Cros...
This article includes description of simple unhooker that restores original System Service Table hooked by unknown rootkits, which hide some services...
Article describes a small tool (sources included) to get various data on applications installed on Android device
This article describes a way to create Android applications which cannot be removed or stopped by users; only admin who knows a special password can d...
This article describes how to root android device using ADB. Learn how android root exploit works and get to know main principles of android rooting.
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.