News & Tech Notes
News and technical information from Corellium and the community

David Manouchehri •
May 05, 2023
Routing Real SMS Messages from Twilio to Corellium via Cloudflare Workers
Learn how to use Corellium, Cloudflare workers, and Twilio to build an SMS handling system for mobile security purposes. Code samples and screenshots are included.

David Manouchehri •
May 03, 2023
Leveraging Corellium and Cloudflare Workers for iOS Virtual Device Management
The need for quality iOS emulators continues to rise. Learn how to use Corellium with Cloudflare workers to make iOS virtual device management simple and scalable.

David Manouchehri •
Apr 14, 2023
The Calls Are Coming from Inside the House
Learn how to set up SSH reverse tunneling in the Corellium app to help you with investigating phishing attacks on iOS. Code and rationale is provided.

David Manouchehri •
Mar 10, 2023
Creating a Safe Browsing, Serverless API to scan iOS apps with Corellium & Frida on AWS Lambda
Learn how to create a serverless Safe Browsing API that actually works for iOS apps to scan for security issues using Corellium, Python, and Frida on AWS Lambda.

Steven Smiley •
Jan 05, 2023
Intro to Android mobile reverse engineering
A look at the tools, applications and analysis used to reverse engineer Android applications

Steven Smiley •
Jan 05, 2023
Intro to iOS mobile reverse engineering
A look at the tools, applications and analysis used to reverse engineer iOS applications

Steven Smiley •
Nov 30, 2022
Certificate pinning explained
What is certificate pinning and how is it implemented for iOS and Android?

Steven Smiley •
Oct 26, 2022
Exploiting Android local storage with Corellium
How to examine, detect and exploit sensitive information being stored by an Android application

Steven Smiley •
Oct 20, 2022
Exploiting iOS local storage with Corellium
How to examine, detect and exploit sensitive information being stored by an iOS application

Alex Hude •
Oct 12, 2022
Behind the scenes: Using Corellium to build Corellium models
An example of how we used our Corellium platform to debug one of our virtual iPhone models

Steven Smiley •
Oct 07, 2022
Apple signing with Corellium
Fixing Apple Signing Problems with Corellium iOS Virtual Machines

Chris Williams •
Aug 19, 2022
Mapping iOS persistence attack surface using Corellium
Learn how to create a map of a device’s attack surface to discover vulnerabilities that can be used for maintaining a foothold after reboot.