Corellium with AI
Feb 09, 2024

Corellium with AI

Automate Complex Tasks by Giving GPT-4 Control over Corellium’s API.
Corellium CoreSight Tracing Demo
Feb 05, 2024

Corellium CoreSight Tracing Demo

Join Corellium for a CoreSight Tracing demo. Explore capabilities that provide insightful analysis on program flow/coverage, system calls, and more for user space processes.
Understanding Terraform and Corellium: A Perfect Match for Virtual Device Management
Dec 20, 2023

Understanding Terraform and Corellium: A Perfect Match for Virtual Device Management

Discover how combining Corellium with the power and flexibility of Terraform can streamline virtual device management for development and testing teams.
Using Corellium Kernel Hooks to Disable Exploit Mitigations
Nov 06, 2023

Using Corellium Kernel Hooks to Disable Exploit Mitigations

In this technical article, we'll take a look at a vulnerability in XNU, the kernel used by iOS and macOS, and explore how Corellium kernel hooks can help to disable exploit mitigations.
Exploring UNIX pipes for iOS kernel exploit primitives
Nov 06, 2023

Exploring UNIX pipes for iOS kernel exploit primitives

Explore the use of UNIX pipes for iOS kernel exploit primitives in this insightful technical article. Learn how Corellium's magic can be used to practice and develop exploits without relying on vulnerabilities.
iOS Reverse Engineering Tactics and Techniques in Practice
Nov 01, 2023

iOS Reverse Engineering Tactics and Techniques in Practice

Dive into iOS reverse engineering tools and techniques with experts from Corellium. Discover techniques, live demonstrations, and insights for mobile app security.
Mobile Malware and Threat Research Without Limits
Oct 30, 2023

Mobile Malware and Threat Research Without Limits

In this article, we look at several types of mobile malware — of increasing sophistication — and discuss opportunities for research and analysis using virtual devices.
Deep Dive into Reverse Engineering on Android
Sep 14, 2023

Deep Dive into Reverse Engineering on Android

Learn the tools and tactics needed to optimize your approach to Android reverse engineering. Watch our expert webinar or read the recap and case study.
Brute Forcing PINs with Frida: Mobile Penetration Testing
Sep 07, 2023

Brute Forcing PINs with Frida: Mobile Penetration Testing

Walk through mobile penetration testing on a 2FA application that resulted in the creation of a Frida script to brute force hardcoded values.
Taking Off with Golang: An Introduction to the Corellium API Bindings for Go
Aug 28, 2023

Taking Off with Golang: An Introduction to the Corellium API Bindings for Go

Corellium simulated changing the accelerometer of an iPhone using Corellium API bindings for Golang, an example of simulating the real world with Corellium and Golang for iOS.
Building What's Next: The Future of R&D for Mobile, IoT, and Beyond
Aug 23, 2023

Building What's Next: The Future of R&D for Mobile, IoT, and Beyond

The mobile and IoT attack surface is expanding but today’s software R&D and testing tools can’t keep pace. Device virtualization, however, is redefining the future.
Next-Gen Devices Require Next-Gen R&D: Reinventing IoT Device Development
Aug 22, 2023

Next-Gen Devices Require Next-Gen R&D: Reinventing IoT Device Development

IoT device development, where time-to-market and security concerns lie in opposition, needs reinventing. Learn why virtualization from Corellium is the solution for next-gen R&D.