_r3ggi Profile Banner
Wojciech Reguła Profile
Wojciech Reguła

@_r3ggi

Followers
6K
Following
5K
Media
343
Statuses
2K

iOS/macOS app security researcher & blogger. 🍎 Black Hat / DEF CON / TyphoonCon speaker. Head of mobile appsec @SecuRingPL

Katowice, Poland
Joined August 2015
Don't wanna be here? Send us removal request.
@_r3ggi
Wojciech Reguła
2 years
If you are interested in expanding your knowledge about #iOS #application #security, be sure to check the iASE Course at: https://t.co/HVFMSp41su.    Here's a quick video about the content of the course 👇
3
13
67
@karmaz95
Karol Mazurek
14 days
Short post about LPE and TCC Bypass on macOS through third-party apps bundled with Sparkle framework - a reminder of why XPC services should validate their clients. https://t.co/uymrg3U72K
Tweet card summary image
afine.com
The article discusses vulnerabilities in the Sparkle framework on macOS, related to improper XPC client validation: CVE-2025-10015 and CVE-2025-10016.
3
34
94
@tsunek0h
tsunekoh
20 days
Binary Ninja plugins I developed during my XProtect Remediator research are now available in the Binary Ninja Plugin Manager! - Swift Analyzer - XProtect Remediator Analyzer - Missing Link Many thanks to @vector35 for suggesting it!
1
20
79
@elijahliststeve
Steve Shultz
15 hours
“I've taken that same anointing upon Ronald, speaking of Ronald Reagan, and I've put it upon my Donald .” @TheElijahList @ElijahStreamsTV
0
3
29
@forensicdave
Doc Dave
25 days
At #OBTS, Wojciech (@_r3ggi) from @SecuRingPL cleverly exposed different flaws in macOS location services, side-channels, leaky apps, and how attackers can track you without zero-days — and gave tips on how defenders can fight back.
0
4
16
@Mu55sy
Mussy
25 days
🍹 Day 2 — Evening wrap (six talks, brains buzzing) #OBTS 🍏 – 🧪 Beyond Static Labels — behavior-first grayware: deception • persistence • monetization • consent • payload; Adload (2016–2025) proves stickers lie, behavior tells. Rousana Charles – 🧭 Who Cares Where Waldo Is
0
3
13
@0xmachos
mikey
25 days
1
4
10
@polhovleon
Polhovleon
25 days
I do feel cooked about my Mac OS location after @_r3ggi talk on Objective by the Sea in Ibiza Thanks for amazing presentation
0
3
13
@Mu55sy
Mussy
25 days
🧭 LOST & FOUND (After-talk): Where’s Waldo on macOS? Wojciech Regula @_r3ggi — a mainstay and crowd favorite — just proved Waldo isn’t hiding… he’s cached. 📍 • Location Services = its own privacy subsystem, yet the location DB seams + side-channels can turn “non-precise”
0
4
7
@Mu55sy
Mussy
25 days
🧭 Turn-by-turn to “Waldo” (macOS edition) Start at Privacy Framework Blvd. ➜ take a right on Location DB Lane (weak gates) ➜ cruise past Side-Channel Ave. (non-precise turns precise) ➜ arrive at “yep, we found you” 📍 Wojciech Regula @_r3ggi — an #OBTS 🍏 consistent
0
4
8
@_r3ggi
Wojciech Reguła
26 days
At #OBTS this week — always excited to connect with fellow security professionals. If you want to chat about macOS or iOS application security / pentests, find me around the sessions or reach out here!
0
3
30
@clearbluejar
clearbluejar
1 month
This analysis was brought to you by the ipsw and ghidriff toolchain, plus some AI glue. I'll be dropping all the new research on automating Apple patch analysis at my talk "Reverse Engineering Apple Security Updates" at OBTS v8. Stop guessing, start knowing! #OBTSv8
0
5
20
@patch1t
Mickey Jin
2 months
For those missing the talk, Blog: https://t.co/XBvFMbsfi0 Slides:
Tweet card summary image
github.com
Mickey's Blogs. Contribute to jhftss/jhftss.github.io development by creating an account on GitHub.
@patch1t
Mickey Jin
3 months
Will share one of them at the Nullcon Berlin @nullcon
6
42
166
@Guluisacat
Zhongquan Li
3 months
New Blog: CVE-2025-24103 : General TCC Bypass https://t.co/8pBcq889at
1
21
119
@_r3ggi
Wojciech Reguła
6 months
Very interesting macOS SBX
@MsftSecIntel
Microsoft Threat Intelligence
6 months
Microsoft uncovered a vulnerability, tracked as CVE-2025-31191, in macOS that could allow specially crafted codes to escape the App Sandbox without user interaction and run unrestricted on systems.
1
0
15
@_r3ggi
Wojciech Reguła
7 months
Apple fixed 4 my vulnerabilities in macOS 15.4 ( https://t.co/jHkJ9SOPhZ). I believe that the libnetcore and Quick Look issues will also have CVEs assigned as they are not informative severity issues (e.g. full iOS/macOS parental control bypass). 🍎🔐
3
3
57
@_r3ggi
Wojciech Reguła
8 months
My full TCC bypass fixed 2 years ago finally has a CVE 😁 https://t.co/kCNFYvYxcr
2
1
60
@wtsdev
Watch This Space
8 months
special thanks to @_r3ggi for their previous work in this space. it really helped me a lot!
@wtsdev
Watch This Space
8 months
It's here. My write-up for CVE-2024-54471. Enjoy :) https://t.co/9yZIel9UVC
0
1
4
@_r3ggi
Wojciech Reguła
8 months
🧐
@theevilbit
Csaba Fitzl
8 months
Apple says that the bounty for a vuln which has an LPE+Full TCC bypass impact is the same as a full TCC bypass alone, because they pay after the most impactful part. 🙄🤯 The math appers to be: reward=MAXIMPACTAMOUNT(impact1, impact2, … ) 😐😐😐😐 IMO this is not right.
0
0
4
@gergely_kalman
Gergely Kalman
9 months
I'm considering taking a month off to write a filesystem training for #OBTS. Are any of you guys interested in that?
0
2
24
@thesubtlety
noah
9 months
OBTS v7 "Broken isolation: Draining your Credentials from Popular macOS Password Managers" by @_r3ggi Workstation compromise -> game over. https://t.co/xRDeMNos2z
0
6
11
@_r3ggi
Wojciech Reguła
9 months
🧐
@patch1t
Mickey Jin
9 months
New 0 day dropped: https://t.co/r8R2eYrUR5 Conclusion: 1. Don’t trust @thezdi , they are too late to handle our reports. One of my reports was submitted in 2024 Jan, but it is still not disclosed to the vendor. No reply from the ZDI yet! 2. Don’t trust the Parallels security!
0
0
3