stuartjash Profile Banner
Stuart Ashenbrenner ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‡จ๐Ÿ‡ฆ Profile
Stuart Ashenbrenner ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‡จ๐Ÿ‡ฆ

@stuartjash

Followers
2K
Following
16K
Media
726
Statuses
7K

Principal macOS Security Researcher at @HuntressLabs | Creator of @Crash_Security | Reviewer at @bestthrillbooks | @MillennialGirlDad on @SubstackInc

Portland, OR
Joined March 2016
Don't wanna be here? Send us removal request.
@stuartjash
Stuart Ashenbrenner ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‡จ๐Ÿ‡ฆ
1 year
My slides (there are 123 of them ๐Ÿ‘€) for my presentation "The (mis)Education of macOS Security Internals" at @MacDevOpsYVR are available over on GitHub. Such a blast being here in Vancouver ๐Ÿ‡จ๐Ÿ‡ฆ https://t.co/TJzPRP6Upw
2
24
103
@stuartjash
Stuart Ashenbrenner ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‡จ๐Ÿ‡ฆ
14 hours
Last but def not least, @x71n3 for running the #WeTalks program. It was the honor of a lifetime to be a part of it, and Iโ€™m looking forward to it for many years to come. Everyone else who I met and connected with, donโ€™t hesitate to reach out ๐Ÿ’œ
0
2
7
@stuartjash
Stuart Ashenbrenner ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‡จ๐Ÿ‡ฆ
14 hours
Also a huge shoutout to @birchb0y for being such a dope co-presenter the last two years and for rocking a fleece onesie in that room.
2
2
13
@stuartjash
Stuart Ashenbrenner ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‡จ๐Ÿ‡ฆ
14 hours
#OBTS was such a blast. Itโ€™s so fun meeting all the newcomers and hanging out with all the people Iโ€™ve met at previous ones. Big mahalo to my adoptive parents, the OG mum & dad, @patrickwardle and @andyrozen for putting on an incredible conference, year after year.
1
3
18
@forensicdave
Doc Dave
5 days
Stuart (@stuartjash) and Alden (@birchb0y) (in a onesie! LOL) from @HuntressLabs gave a masterclass of a talk at #OBTS walking through novel NK/Chollima/BlueNoroff tradecraft targeting (especially #crypto users) OSX. Super talk!
1
6
20
@osint_barbie
xiu
2 days
5/ There were a lot of cool talks during those days! For example, @malwarezoo revealed a Gatekeeper flaw (CVE-2025-43296) that let revoked apps run again! ๐Ÿ˜ฑ @birchb0y & @stuartjash talk on BlueNoroffโ€™s malware targeting macOS. But the real MVP? The Blue's Clues costume ๐Ÿ˜‚
1
3
7
@forensicdave
Doc Dave
4 days
Olivia (@oliviagalluccii) from @datadoghq entertained #OBTS, showing us how macOS logs everything, diving into ULS, ESF, and TCC.db to hunt threats like Atomic Stealer & XCSSET, and using tools like Consolation3, eslogger, Mac Monitor to catch evil!
2
7
35
@stuartjash
Stuart Ashenbrenner ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‡จ๐Ÿ‡ฆ
4 days
Found an OG #OBTS picture from OBTSv1. Hard to believe this was seven years ago ๐Ÿคฏ amazed at how itโ€™s quadrupled(?) in size.
@stuartjash
Stuart Ashenbrenner ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‡จ๐Ÿ‡ฆ
7 years
Thankful that I got to spend a few amazing days in Maui with some amazing people at #OBTS. Thank you again @objective_see for all your work and your tools.
1
4
14
@0xmachos
mikey
5 days
Kicking off #OBTS v8.0 @patrickwardle on the @objective_see Foundation
1
5
14
@txhaflaire
Thijs Xhaflaire
5 days
Awesome presentation delivered by @osint_barbie and @@nazargryschuk!! @moonlock_com and the research team is a great team to collaborate with, really recommend getting in touch with them!
0
6
11
@0xmachos
mikey
5 days
@iamevltwin Back at it looking at BlueNoroffโ€™s malware with @stuartjash & @birchb0y from @HuntressLabs #OBTS
1
4
11
@_rdowd
Ryan Dowd
5 days
The boys from @HuntressLabs deliver the goods, in an informative (and child friendly) way! ๐Ÿถ Great analysis and breakdown of a targeted DPRK attack by @birchb0y and @stuartjash. #OBTS
1
5
21
@stuartjash
Stuart Ashenbrenner ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‡จ๐Ÿ‡ฆ
20 days
Had a blast talking about public speaking and building slides ๐ŸŽจ thank you for having me ๐Ÿ’œ
@x71n3
christine ๐ŸŒธ๐Ÿ’๐ŸŒบ๐ŸŒท๐ŸŒน๐Ÿชป๐Ÿƒ๐ŸŒฑ๐ŸŒฟ๐Ÿชดโœจ
21 days
Mahalo to our wonderful mentors and mentees for making this happen!!! And special thanks to @patrickwardle, @jbradley89 and @stuartjash for presenting to our first ever cohort ๐Ÿฅฐ I canโ€™t wait to see everyoneโ€™s presentations at #OBTSv8 in a couple of weeks!
0
0
3
@x71n3
christine ๐ŸŒธ๐Ÿ’๐ŸŒบ๐ŸŒท๐ŸŒน๐Ÿชป๐Ÿƒ๐ŸŒฑ๐ŸŒฟ๐Ÿชดโœจ
21 days
Mahalo to our wonderful mentors and mentees for making this happen!!! And special thanks to @patrickwardle, @jbradley89 and @stuartjash for presenting to our first ever cohort ๐Ÿฅฐ I canโ€™t wait to see everyoneโ€™s presentations at #OBTSv8 in a couple of weeks!
@objective_see
Objective-See Foundation
21 days
For #OBTS v8 we launched โ€œWeTalksโ€ ๐ŸŽค A mentoring program pairing first-time speakers w/ mentors + group sessions from seasoned #OBTS speakers Sharing the sessions, as they're worth a watch for any speaker: https://t.co/ozbrb0uwLf Mahalo to @x71n3 & @andyrozen for organizing!
1
3
9
@objective_see
Objective-See Foundation
21 days
For #OBTS v8 we launched โ€œWeTalksโ€ ๐ŸŽค A mentoring program pairing first-time speakers w/ mentors + group sessions from seasoned #OBTS speakers Sharing the sessions, as they're worth a watch for any speaker: https://t.co/ozbrb0uwLf Mahalo to @x71n3 & @andyrozen for organizing!
Tweet card summary image
youtube.com
WeTalks is an initiative of the Objective-We program, created to help speakers improve their public speaking skills as they prepare to present at the #OBTS (...
0
6
22
@OliviaGalluccii
Olivia Gallucci โœจ
2 months
I'm thrilled to share my latest blog post on Mach-Os, its role on macOS, and how it works with Apple's Code Signing and ARM's Pointer Authentication Codes (PAC). If you want to learn about Mach-Os in more depth, consider reading this post! https://t.co/XNQ76UzJJ4 #InfoSec
2
22
97
@L0Psec
L0Psec
2 months
New RE Blog Post: RustyPages-Pt1 https://t.co/I2QdHgtRuy We RE a Rust dropper, that sets persistence and runs the downloaded next stage, queries @patrickwardle's tools, and quiets notifications. We included relevant IOCs as we continue our analysis of the loader for Part 2. :)
Tweet card summary image
the-sequence.com
Kandji researchers discovered a Rust-based macOS malware, RustyPages. This post analyzes the dropper component, including its evasion tactics, persistence setup, and IOCs.
1
34
107
@patrickwardle
Patrick Wardle
2 months
With "The Art of Mac Malware" Vol II now out, Iโ€™ve integrated its content into my #OBTS training: "The Art of Mac Malware: Detection & Analysis" ๐ŸŽ๐Ÿ›๐Ÿ”ฌ So if you want to learn the tools & techniques to uncover & analyze the latest macOS threats, sign up!
Tweet card summary image
objectivebythesea.org
Learn the tools & techniques to comprehensively detect and analyze the latest threats targeting macOS.
0
7
36
@tsunek0h
tsunekoh
2 months
My presentation โ€œXUnprotect: Reverse Engineering macOS XProtect Remediatorโ€ at #BHUSA wrapped up yesterday. Thank you so much to everyone who attended. For those who couldnโ€™t make it to #BHUSA, Iโ€™ll be sharing the key points from my research in this thread. (1/22)
2
33
162
@stuartjash
Stuart Ashenbrenner ๐Ÿ‡บ๐Ÿ‡ธ ๐Ÿ‡จ๐Ÿ‡ฆ
3 months
So stoked to be speaking alongside @birchb0y at #OBTS v8 this year. The caliber of speakers on this dais are stellar. Can't wait to hang out in Spain with the Mac security community. Don't miss our Blue's Clues themed talk - featuring Steve and Blue ๐Ÿพ
@objective_see
Objective-See Foundation
3 months
๐Ÿ“ข Just dropped: the full #OBTS v8 talk lineup! https://t.co/WnHCvCdWqm And for the first time we'll have 3 full days of presentations! ๐Ÿคฉ Congrats to the selected speakers and mahalo to all who submitted. With ~100 submissions, selecting the final talks was a daunting task! ๐Ÿ˜ซ
0
4
32