The Corellium Resource Library
The latest articles and news on mobile app security testing, IoT and research from Corellium and community contributors.
Steven Smiley •
Mar 28, 2025
Intro to Android Mobile Reverse Engineering
A look at the tools, applications, and analysis used to reverse engineer Android applications.
Chris Magistrado •
Feb 06, 2025
Mastering CTF Mobile Challenges with Corellium
Learn how to tackle mobile CTFs with Corellium using expert tips on debugging, reverse engineering, and dynamic analysis.
Brian Robison •
Jan 29, 2025
Corellium Virtual iOS Devices vs. Apple’s iOS Simulator and Physical Devices: The Ultimate Tool for Penetration Testing
Discover the advantages of Corellium’s virtual iOS devices for penetration testing. From instant access to jailbroken versions of any iOS release to the elimination of logistical challenges associated with physical devices, Corellium is revolutionizing mobile app security testing.
Brian Robison •
Jan 13, 2025
Wrestling the Mobile Security Hydra: Tackling Data Leaks, Zero-Days, and Jailbreak Challenges
Key takeaways from mobile security trends to strengthen your strategy—addressing data leaks, zero-days, and the challenges of disappearing public jailbreaks.
Corellium •
Aug 09, 2024
Corellium MATRIX™: The Mobile App Security Testing Tool You’ve Always Wanted
Unlock mobile app security testing with Corellium MATRIX™. Identify and eliminate data leakage, misconfigurations, and hardcoded credentials seamlessly.
Steven Smiley & Brian Robison •
Jul 31, 2024
Mobile App Vulnerabilities Exposed: Intro to Reverse Engineering
In this webinar, learn about exposing mobile app vulnerabilities and the techniques for reverse engineering mobile apps on Android and iOS with Corellium.
HackingForSoju •
Jun 29, 2024
Corellium Empowers MidnightSunCTF to Add iOS Exploitation Challenges
HackingForSoju, organizers of MidnightSunCTF, challenged competitors to conquer the PAC mitigation, leveraging Corellium's virtual iPhone 15.
Brian Robison •
Jun 24, 2024
Mobile App Vulnerabilities Exposed: Getting Our Hands Dirty Part 2
Learn how to use the Corellium Café mobile app to uncover mobile app vulnerabilities in Corellium’s virtualized environment. Watch our webinar.
Corellium •
May 16, 2024
Setting Up a Virtual Signal Device using Corellium
Want to use Signal without using your main phone number or device? This guide shows how to set up a virtual Signal device on Corellium, requiring a pre-configured Android device with OpenGApps.
Corellium •
May 16, 2024
Checking Suspicious Links in Corellium
Phishing scam alert? Learn how to inspect suspicious SMS links using Corellium's Network Monitor on your Android or jailbroken iOS device. This post covers inspecting the link directly, with a follow-up on using virtual devices with proxy tools.
Corellium •
May 16, 2024
Userspace Interaction with the Hypervisor
Want to bypass the OS and jump straight to the kernel debugger from your user-mode application? This blog reveals a specific opcode sequence that achieves this for EL0 user software, even though BRK is typically intercepted by the kernel.
Corellium •
May 16, 2024
How to Debug the Kernel
Corellium virtual devices allow you to inspect and modify the state of the whole system under user control. Discover how in this kernel debugging how to guide.
Subscribe to Stay Connected
Keep up to date with emails for the latest product news and technical articles.