originhq Profile Banner
Origin Profile
Origin

@originhq

Followers
629
Following
37
Media
5
Statuses
24

Endpoint capabilities for the era of semantic security. (formerly Prelude Research)

Joined February 2025
Don't wanna be here? Send us removal request.
@originhq
Origin
1 month
Signature-based detection has failed as adversaries mutate indicators and adapt tradecraft faster than defenses. Computer use agents embedded in daily workflows push this over the edge as dual-use insiders, indistinguishable from normal activity. https://t.co/sJYOf0Iz1u
Tweet card summary image
originhq.com
Enabling you to safely give AI agents the permissions they need, so they can give you the productivity you demand.
2
12
45
@originhq
Origin
1 month
We believe that: 1. The potential economic upsides of the productivity boosts that Computer Use Agents offer incentivize us to provide them with more access to our computers to increase the amount of context they can have. 2. They represent a new type of interpreter that
1
2
13
@originhq
Origin
1 month
In this simple example, we show that Claude Code can read the iMessage database on the latest version of macOS, even with a leading EDR running on the system, illustrating the impact of an adversary who can remotely control the agent. We do this using Terminator, an internal
5
29
148
@originhq
Origin
1 month
New on the blog: @michaelbarclay_ revives registry-based tradecraft using a telemetry gap in the hive restoration process. The blog also includes PoC code and detection guidance. 📃
Tweet card summary image
originhq.com
Enabling you to safely give AI agents the permissions they need, so they can give you the productivity you demand.
4
15
63
@originhq
Origin
2 months
New research from @jdu2600: a clean loader-lock escape using the PEB's PostProcessInitRoutine. Read the analysis and PoC code 📃
Tweet card summary image
originhq.com
Enabling you to safely give AI agents the permissions they need, so they can give you the productivity you demand.
2
36
92
@originhq
Origin
2 months
In @33y0re's latest post on Windows ARM64 Pointer Authentication, he dissects how PAC fortifies stack integrity and thwarts exploits at the hardware level. Explore the mechanics of this critical security layer and its role in modern Windows defenses. https://t.co/2NL7Iw4l6A
Tweet card summary image
originhq.com
Enabling you to safely give AI agents the permissions they need, so they can give you the productivity you demand.
0
10
37
@originhq
Origin
2 months
This method demonstrates how hardware-level telemetry, coupled with contextual reasoning, can surface malicious activity that signature-based approaches will always miss as malware authors innovate in response. 📃Full write-up →
0
11
22
@originhq
Origin
2 months
By tracing execution of private memory and reconstructing its provenance, our agent surfaced the broader chain: the encryptor escalated privileges, spawned a new instance of itself, and then created a third process that deleted the encryptor from disk. All three of these
1
0
4
@originhq
Origin
2 months
In an effort to avoid traditional static analysis of the import table and plain-text strings, the author of this encryptor constructed jump tables on the heap to invoke noteworthy Win32 APIs. This evasion attempt created an opportunity for detection elsewhere.
1
0
5
@originhq
Origin
2 months
1
0
9
@originhq
Origin
2 months
While testing our agent against malware observed in the wild, we detected a LockBit encryptor not via file signatures or static IOCs, but by observing out-of-context execution of private memory using hardware telemetry. 🧵
1
8
31
@originhq
Origin
3 months
Endpoint defense needs an architectural shift. With $16M in additional funding, we’re delivering runtime memory protection to the people defending the most important systems on earth. https://t.co/B4pos0Q1sP
Tweet card summary image
preludesecurity.com
Prelude will use the capital to commercialize runtime memory protection, expanding platform support and customer deployment.
2
5
21
@33y0re
Connor McGarr
3 months
Today I am releasing a new blog post on VSM "secure calls" + the SkBridge project to manually issue them!! This blog talks about how VTL 0 requests the services of VTL 1 and outlines common secure call patterns!!! Blog: https://t.co/xzB1s7HoPO SkBridge: https://t.co/0zO0E1L4Sy
3
100
258
@33y0re
Connor McGarr
4 months
I cleaned up the code I have been working on for the last few days into a tool I’m calling “Vtl1Mon”! Vtl1Mon traces VTL 1 enter (“secure call”) operations via ETW and also call stack/symbol enhances the events! https://t.co/1mAOyZxsxP
Tweet card summary image
github.com
Virtual Trust Level (VTL 1) secure call tracing. Contribute to connormcgarr/Vtl1Mon development by creating an account on GitHub.
4
54
154
@originhq
Origin
5 months
Join us in Islander E-I for @33y0re’s talk on KCFG AND KCET internals #BHUSA https://t.co/7s4lPsvI5Z
0
3
14
@originhq
Origin
5 months
See you tomorrow at #BHUSA https://t.co/jGqmKoXf30
0
1
11
@33y0re
Connor McGarr
7 months
I am excited to say my talk at @BlackHatEvents USA 2025 was accepted where I will be sharing my recent research on kernel-mode CET as well as KCFG on Windows!
8
30
155
@0xdab0
Max Harley
9 months
RUST WINDOWS DOCS MCP. If you've ever done Rust dev with the windows crate, you know it's painful because it makes up API calls, hallucinates types, and can't do feature flags. This MCP server just adds context. It doesn't auto hacks noobs, but it does its job pretty well
1
5
30
@33y0re
Connor McGarr
9 months
.@PreludeResearch is also now looking for software engineers in pursuit of the efforts mentioned in the previous tweet! Posting:
@33y0re
Connor McGarr
9 months
If you are passionate about Windows OS internals; detection, software, and reverse engineering; debugging; and solving interesting problems, come join us @PreludeResearch
0
1
7