
Discovering and Mitigating Security Vulnerabilities in Routers: A Practical Guide
Learn about the risks of vulnerable routers, common attack vectors, and ways to detect and mitigate vulnerabilities in router firmware.
Learn about the risks of vulnerable routers, common attack vectors, and ways to detect and mitigate vulnerabilities in router firmware.
Explore step-by-step instructions on how to make an Android application debuggable without changing its APK file.
Explore what static and dynamic analysis tools and techniques can be used for software reverse engineering automation.
Learn how LLVM works and how to create an obfuscating pass with it.
In this article, we share our experience in dynamic fuzzing to identify security bugs in such popular image viewers as ACDSee, FastStone Image Viewer...
This article is about discovering vulnerabilities even in closed source software by applying fuzzing testing.
This article covers the implementation of forensic features in SIEM solutions and the key requirements to ensure admissibility of data in court.
Learn how to protect your application from ever popular stack overflow exploits
A short intro lesson for software reverse engineers considering classes restoration in Delphi. Learn how to get class methods and arguments.
This article is devoted to the implementation of a plugin for OllyDbg debugger to deal with debug blocking using function execution time
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.