
ROP Chain. How to Defend from ROP Attacks (Basic Example)
Learn how to protect your application from ever popular stack overflow exploits

Meet Apriorit at INCYBER Forum Europe 2026
Lille, France | March – April 31-2, 2026

Learn how to protect your application from ever popular stack overflow exploits

A short intro lesson for software reverse engineers considering classes restoration in Delphi. Learn how to get class methods and arguments.

This article is devoted to the implementation of a plugin for OllyDbg debugger to deal with debug blocking using function execution time

White paper to briefly describe nanomite technology for code protection and anti-debug protection with Debug Blocker for Windows applications.

This article is the brief description of the tools and methods, which are used for application architecture research

This article describes the protocol of data exchange that is the modification of the well-known OBEX protocol used in the GSM Samsung phones from the...

How can you recognize C++ FOR operator in Assembler code? See this reverse engineering example.

A research case about redirecting files so that the restricted processes still have permission to access and modify them.

How to get the HMODULE/HINSTANCE/HANDLE from static library in C++. An article by one of ApriorIT software developers. ApriorIT provides offshore syst...

Article "Reversing of insertions for ARM-based mobile phones (by the example of Samsung phone)" is result of research, conducted by ApriorIT reversers...
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.