Routing Real SMS Messages from Twilio to Corellium via Cloudflare Workers
May 05, 2023

Routing Real SMS Messages from Twilio to Corellium via Cloudflare Workers

Learn how to use Corellium, Cloudflare workers, and Twilio to build an SMS handling system for mobile security purposes. Code samples and screenshots are included.
Leveraging Corellium and Cloudflare Workers for iOS Virtual Device Management
May 03, 2023

Leveraging Corellium and Cloudflare Workers for iOS Virtual Device Management

The need for quality iOS emulators continues to rise. Learn how to use Corellium with Cloudflare workers to make iOS virtual device management simple and scalable.
The Calls Are Coming from Inside the House
Apr 14, 2023

The Calls Are Coming from Inside the House

Learn how to set up SSH reverse tunneling in the Corellium app to help you with investigating phishing attacks on iOS. Code and rationale is provided.
Creating a Safe Browsing, Serverless API to scan iOS apps with Corellium & Frida on AWS Lambda
Mar 10, 2023

Creating a Safe Browsing, Serverless API to scan iOS apps with Corellium & Frida on AWS Lambda

Learn how to create a serverless Safe Browsing API that actually works for iOS apps to scan for security issues using Corellium, Python, and Frida on AWS Lambda.
Intro to Android mobile reverse engineering
Jan 05, 2023

Intro to Android mobile reverse engineering

A look at the tools, applications and analysis used to reverse engineer Android applications
Intro to iOS mobile reverse engineering
Jan 05, 2023

Intro to iOS mobile reverse engineering

A look at the tools, applications and analysis used to reverse engineer iOS applications
Certificate pinning explained
Nov 30, 2022

Certificate pinning explained

What is certificate pinning and how is it implemented for iOS and Android?
Exploiting Android local storage with Corellium
Oct 26, 2022

Exploiting Android local storage with Corellium

How to examine, detect and exploit sensitive information being stored by an Android application
Exploiting iOS local storage with Corellium
Oct 20, 2022

Exploiting iOS local storage with Corellium

How to examine, detect and exploit sensitive information being stored by an iOS application
Behind the scenes: Using Corellium to build Corellium models
Oct 12, 2022

Behind the scenes: Using Corellium to build Corellium models

An example of how we used our Corellium platform to debug one of our virtual iPhone models
Apple signing with Corellium
Oct 07, 2022

Apple signing with Corellium

Fixing Apple Signing Problems with Corellium iOS Virtual Machines
Mapping iOS persistence attack surface using Corellium
Aug 19, 2022

Mapping iOS persistence attack surface using Corellium

Learn how to create a map of a device’s attack surface to discover vulnerabilities that can be used for maintaining a foothold after reboot.