Origin
@originhq
Followers
629
Following
37
Media
5
Statuses
24
Endpoint capabilities for the era of semantic security. (formerly Prelude Research)
Joined February 2025
Announcing our whitepaper on the future of endpoint security. https://t.co/NogsQiku9B
preludesecurity.com
A research preview of our user-mode Windows agent that comprehensively catches malicious code execution.
6
88
287
Signature-based detection has failed as adversaries mutate indicators and adapt tradecraft faster than defenses. Computer use agents embedded in daily workflows push this over the edge as dual-use insiders, indistinguishable from normal activity. https://t.co/sJYOf0Iz1u
originhq.com
Enabling you to safely give AI agents the permissions they need, so they can give you the productivity you demand.
2
12
45
We believe that: 1. The potential economic upsides of the productivity boosts that Computer Use Agents offer incentivize us to provide them with more access to our computers to increase the amount of context they can have. 2. They represent a new type of interpreter that
1
2
13
In this simple example, we show that Claude Code can read the iMessage database on the latest version of macOS, even with a leading EDR running on the system, illustrating the impact of an adversary who can remotely control the agent. We do this using Terminator, an internal
5
29
148
New on the blog: @michaelbarclay_ revives registry-based tradecraft using a telemetry gap in the hive restoration process. The blog also includes PoC code and detection guidance. 📃
originhq.com
Enabling you to safely give AI agents the permissions they need, so they can give you the productivity you demand.
4
15
63
New research from @jdu2600: a clean loader-lock escape using the PEB's PostProcessInitRoutine. Read the analysis and PoC code 📃
originhq.com
Enabling you to safely give AI agents the permissions they need, so they can give you the productivity you demand.
2
36
92
In @33y0re's latest post on Windows ARM64 Pointer Authentication, he dissects how PAC fortifies stack integrity and thwarts exploits at the hardware level. Explore the mechanics of this critical security layer and its role in modern Windows defenses. https://t.co/2NL7Iw4l6A
originhq.com
Enabling you to safely give AI agents the permissions they need, so they can give you the productivity you demand.
0
10
37
This method demonstrates how hardware-level telemetry, coupled with contextual reasoning, can surface malicious activity that signature-based approaches will always miss as malware authors innovate in response. 📃Full write-up →
0
11
22
By tracing execution of private memory and reconstructing its provenance, our agent surfaced the broader chain: the encryptor escalated privileges, spawned a new instance of itself, and then created a third process that deleted the encryptor from disk. All three of these
1
0
4
In an effort to avoid traditional static analysis of the import table and plain-text strings, the author of this encryptor constructed jump tables on the heap to invoke noteworthy Win32 APIs. This evasion attempt created an opportunity for detection elsewhere.
1
0
5
While testing our agent against malware observed in the wild, we detected a LockBit encryptor not via file signatures or static IOCs, but by observing out-of-context execution of private memory using hardware telemetry. 🧵
1
8
31
Endpoint defense needs an architectural shift. With $16M in additional funding, we’re delivering runtime memory protection to the people defending the most important systems on earth. https://t.co/B4pos0Q1sP
preludesecurity.com
Prelude will use the capital to commercialize runtime memory protection, expanding platform support and customer deployment.
2
5
21
Today I am releasing a new blog post on VSM "secure calls" + the SkBridge project to manually issue them!! This blog talks about how VTL 0 requests the services of VTL 1 and outlines common secure call patterns!!! Blog: https://t.co/xzB1s7HoPO SkBridge: https://t.co/0zO0E1L4Sy
3
100
258
I cleaned up the code I have been working on for the last few days into a tool I’m calling “Vtl1Mon”! Vtl1Mon traces VTL 1 enter (“secure call”) operations via ETW and also call stack/symbol enhances the events! https://t.co/1mAOyZxsxP
github.com
Virtual Trust Level (VTL 1) secure call tracing. Contribute to connormcgarr/Vtl1Mon development by creating an account on GitHub.
4
54
154
Join us in Islander E-I for @33y0re’s talk on KCFG AND KCET internals #BHUSA
https://t.co/7s4lPsvI5Z
0
3
14
I am excited to say my talk at @BlackHatEvents USA 2025 was accepted where I will be sharing my recent research on kernel-mode CET as well as KCFG on Windows!
8
30
155
RUST WINDOWS DOCS MCP. If you've ever done Rust dev with the windows crate, you know it's painful because it makes up API calls, hallucinates types, and can't do feature flags. This MCP server just adds context. It doesn't auto hacks noobs, but it does its job pretty well
1
5
30
.@PreludeResearch is also now looking for software engineers in pursuit of the efforts mentioned in the previous tweet! Posting:
If you are passionate about Windows OS internals; detection, software, and reverse engineering; debugging; and solving interesting problems, come join us @PreludeResearch
0
1
7