objective_see Profile Banner
Objective-See Foundation Profile
Objective-See Foundation

@objective_see

Followers
19K
Following
2K
Media
609
Statuses
5K

🍎 🛡️ 🛠️ Open-Source Tools 📚 "The Art of Mac Malware" books 🫂 "Objective by the Sea" conference Support us on https://t.co/tuGceSeyiC 🙏

Maui, Hawaii
Joined October 2011
Don't wanna be here? Send us removal request.
@objective_see
Objective-See Foundation
6 months
Stoked to announce 'Objective by the Sea' v8.0! . the world's only dedicated 🍏-security conference!. #OBTS v8.0:.📍 Ibiza, Spain.🗓️ Oct. 12–17, 2025.🔗 Hope to see you all there! ☀️🌴 #OBTS.
Tweet card summary image
objectivebythesea.org
The 🍏-security conference
3
31
100
@objective_see
Objective-See Foundation
9 days
Who's excited for the #OBTS v8 🍏-themed CTF?. Bring your hacking skills, solve some (Apple) juicy challenges, and win prizes! 🥇. Sign up here:. Big mahalo to @iamevltwin and @gutterchurl for putting this all together 🙏🏽
Tweet media one
2
8
27
@objective_see
Objective-See Foundation
9 days
RT @theevilbit: We will give a walkthrough of this at @objective_see #OBTS with @gergely_kalman.
0
4
0
@objective_see
Objective-See Foundation
14 days
RT @L0Psec: New RE Blog Post: RustyPages-Pt1. We RE a Rust dropper, that sets persistence and runs the downloaded….
Tweet card summary image
the-sequence.com
Kandji researchers discovered a Rust-based macOS malware, RustyPages. This post analyzes the dropper component, including its evasion tactics, persistence setup, and IOCs.
0
34
0
@objective_see
Objective-See Foundation
14 days
We've just added this sample, "RustyPages" to our public macOS malware collection!. (pw: infect3d) . #SharingIsCaring. (Credit to @L0Psec for the discovery/analysis! 🙏🏽).
Tweet card summary image
github.com
macOS Malware Collection. Contribute to objective-see/Malware development by creating an account on GitHub.
@patrickwardle
Patrick Wardle
14 days
Tweet media one
0
7
30
@objective_see
Objective-See Foundation
14 days
RT @CzajkowskiDarek: @adityaonx @codinganovel @adamwathan You can block outbound traffic from apps using LuLu from @objective_see.
0
1
0
@objective_see
Objective-See Foundation
17 days
70+ students applied for our #OBTS v8 scholarships (covering travel, lodging, training & tickets), but spots are limited. Now you can help! Sponsor a student ticket, so even more students can attend: . (🙏🏽 to @PwnieFan for the idea + first donated ticket).
0
5
12
@objective_see
Objective-See Foundation
17 days
🚨 The #OBTS v8 schedule just dropped:. Three days of trainings followed by three days of talks makes for almost a full week of Apple security content from the best of the best! 🍏🧠.
Tweet card summary image
objectivebythesea.org
Conference Schedule of Trainings, Talks, and more!
0
3
9
@objective_see
Objective-See Foundation
22 days
RT @patrickwardle: With "The Art of Mac Malware" Vol II now out, I’ve integrated its content into my #OBTS training: "The Art of Mac Malwar….
Tweet card summary image
objectivebythesea.org
Learn the tools & techniques to comprehensively detect and analyze the latest threats targeting macOS.
0
7
0
@objective_see
Objective-See Foundation
23 days
RT @patrickwardle: Just posted my @defcon slides (talk #2): "Binary Facades" . Mac malware may be compiled Mach-Os but can contain embedd….
Tweet card summary image
speakerdeck.com
When confronted with malicious macOS binaries, analysts typically reach for a disassembler and immerse themselves in the complexities of low-level assem…
0
35
0
@objective_see
Objective-See Foundation
23 days
RT @patrickwardle: Just posted my @defcon slides (talk #1): "Mastering Apple's Endpoint Security for Advanced macOS Malware Detection". Wri….
Tweet card summary image
speakerdeck.com
Five years after Apple radically empowered third-party security developers on macOS with the introduction of Endpoint Security, most developers grasp it…
0
58
0
@objective_see
Objective-See Foundation
23 days
RT @moonlock_lab: 1/7: Our fellow researcher @g0njxa shared juicy info with us: a real #ClickFix-style find! A fake "Installation Instruct….
0
16
0
@objective_see
Objective-See Foundation
23 days
RT @cybersyrupblog: @patrickwardle @defcon Patrick your workshop was amazing!! I can’t thank you enough for bringing such a high quality wo….
0
1
0
@objective_see
Objective-See Foundation
23 days
RT @patrickwardle: Was amazing to be part of this village at @defcon! A big mahalo to the #MalwareVillage organizers and volunteers who mad….
0
4
0
@objective_see
Objective-See Foundation
23 days
RT @kristophera: @patrickwardle amazing workshop @defcon today! Adverse circumstances but your preparation and good attitude pulled through….
0
3
0
@objective_see
Objective-See Foundation
23 days
RT @patrickwardle: And want to play along? 👾🔬. I've just added a sample to @objective_see's public macOS malware collection: https://t.co/….
Tweet card summary image
github.com
macOS Malware Collection. Contribute to objective-see/Malware development by creating an account on GitHub.
0
1
0
@objective_see
Objective-See Foundation
23 days
RT @patrickwardle: New macOS Stealer "Mac.C" by mentalpositive 🍎👾 . Read "Mac.c Stealer Takes on AMOS" (by @moonlock_com / @MacPaw). https….
Tweet card summary image
hackernoon.com
Moonlock analysed Mac.c stealer, a new rival to AMOS. Learn its tactics, code reuse, and "building in public" strategy.
0
19
0
@objective_see
Objective-See Foundation
26 days
RT @patrickwardle: Stoked to be talking nerdy (again) at @defcon!. Today (Saturday) 10am, Track 4: "Binary Facades: Reversing approaches to….
0
5
0
@objective_see
Objective-See Foundation
27 days
We're really looking forward to this talk at #OBTS v8 🤩.
@tsunek0h
tsunekoh
27 days
@blacktop__ @patrickwardle @kucher1n Lastly, I’ll be giving another talk on this topic from a slightly different angle at #OBTS v8.0. Please stay tuned for that as well!.🔗 (22/22).
0
0
16
@objective_see
Objective-See Foundation
27 days
RT @tsunek0h: My presentation “XUnprotect: Reverse Engineering macOS XProtect Remediator” at #BHUSA wrapped up yesterday. Thank you so much….
0
32
0