3 Mobile App Security Testing Challenges and How to Overcome Them
Apr 28, 2023

3 Mobile App Security Testing Challenges and How to Overcome Them

Mobile app security testing is full of tedious tasks, but it’s vital to find vulnerabilities before bad actors do. Read about challenges and how to overcome them.
The Calls Are Coming from Inside the House
Apr 14, 2023

The Calls Are Coming from Inside the House

Learn how to set up SSH reverse tunneling in the Corellium app to help you with investigating phishing attacks on iOS. Code and rationale is provided.
Mobile Vulnerabilities Exposed: Change What's Possible in Mobile App Security Testing
Apr 04, 2023

Mobile Vulnerabilities Exposed: Change What's Possible in Mobile App Security Testing

Physical devices are tedious to manage and device emulation is insufficient. Learn a better way to conduct mobile app security testing with Arm virtualization.
Creating a Safe Browsing, Serverless API to scan iOS apps with Corellium & Frida on AWS Lambda
Mar 10, 2023

Creating a Safe Browsing, Serverless API to scan iOS apps with Corellium & Frida on AWS Lambda

Learn how to create a serverless Safe Browsing API that actually works for iOS apps to scan for security issues using Corellium, Python, and Frida on AWS Lambda.
Intro to Android mobile reverse engineering
Jan 05, 2023

Intro to Android mobile reverse engineering

A look at the tools, applications and analysis used to reverse engineer Android applications.
Intro to iOS mobile reverse engineering
Jan 05, 2023

Intro to iOS mobile reverse engineering

A look at the tools, applications and analysis used to reverse engineer iOS applications
Decoding SSL Pinning: An In-Depth Analysis with Corellium
Nov 30, 2022

Decoding SSL Pinning: An In-Depth Analysis with Corellium

What is SSL certificate pinning and how is it implemented for iOS and Android?
Exploiting Android local storage with Corellium
Oct 26, 2022

Exploiting Android local storage with Corellium

How to examine, detect and exploit sensitive information being stored by an Android application
Exploiting iOS local storage with Corellium
Oct 20, 2022

Exploiting iOS local storage with Corellium

How to examine, detect and exploit sensitive information being stored by an iOS application
Behind the scenes: Using Corellium to build Corellium models
Oct 12, 2022

Behind the scenes: Using Corellium to build Corellium models

An example of how we used our Corellium platform to debug one of our virtual iPhone models
Apple signing with Corellium
Oct 07, 2022

Apple signing with Corellium

Fixing Apple Signing Problems with Corellium iOS Virtual Machines
Mapping iOS persistence attack surface using Corellium
Aug 19, 2022

Mapping iOS persistence attack surface using Corellium

Learn how to create a map of a device’s attack surface to discover vulnerabilities that can be used for maintaining a foothold after reboot.