Brandon Dalton (@partyd0lphin) 's Twitter Profile
Brandon Dalton

@partyd0lphin

🌉 Senior macOS Researcher @CrowdStrike

ID: 633109376

linkhttps://swiftly-detecting.notion.site/ calendar_today11-07-2012 18:23:54

379 Tweet

850 Followers

184 Following

Jonny Johnson (@jsecurity101) 's Twitter Profile Photo

A feature in EtwInspector v2 will be that when you are querying providers you can pass in a string, and it will query certain ETW properties and return the providers that have a match. This will be big for anyone trying to do more advanced enumeration across ETW providers

A feature in EtwInspector v2 will be that when you are querying providers you can pass in a string, and it will query certain ETW properties and return the providers that have a match. This will be big for anyone trying to do more advanced enumeration across ETW providers
Mickey Jin (@patch1t) 's Twitter Profile Photo

Exploit to escape the app sandbox: 1. Drop the exploit.aar from a sandboxed app 2. open exploit.aar (quarantined) 3. open evil.zip from $TMPDIR 4. open ~/Downloads/poc.app (not quarantined) (Step 3 is killed on the latest macOS, but should work on Sonoma)

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft uncovered a vulnerability, tracked as CVE-2025-31191, in macOS that could allow specially crafted codes to escape the App Sandbox without user interaction and run unrestricted on systems. msft.it/6017SRCif

Dillon Franke (@dillon_franke) 's Twitter Profile Photo

Thrilled to announce my new Project Zero blog post is LIVE! 🎉 I detail my knowledge-driven fuzzing process to find sandbox escape vulnerabilities in CoreAudio on MacOS. I'll talk about this and the exploitation process next week offensivecon! googleprojectzero.blogspot.com/2025/05/breaki…

Ivan Krstić (@radian) 's Twitter Profile Photo

🔺iPhone models announced today include Memory Integrity Enforcement, the culmination of an unprecedented design and engineering effort that we believe represents the most significant upgrade to memory safety in the history of consumer operating systems. security.apple.com/blog/memory-in…

Jaron Bradley (@jbradley89) 's Twitter Profile Photo

Checkout our blog post on “ChillyHell”. A modular backdoor for macOS that was signed and notarized by a threat actor tracked as UNC4487. jamf.com/blog/chillyhel…

Olivia Gallucci ✨ (@oliviagalluccii) 's Twitter Profile Photo

By pure coincidence, my #OBTS presentation *ALSO* discusses Mac Monitor! I used to it learn about the ES API, and the tool made everything much more accessible to me. :) Admittedly, I’m using the outdated version; it truly is a stellar project. Thank you for creating and

Mussy (@mu55sy) 's Twitter Profile Photo

📦 UNBOXING: Next-Gen Mac Monitor — live at #OBTS 🍏 Brandon Dalton Brandon Dalton First look: smells like fresh ES events and SwiftUI gloss. 😮‍💨✨ Inside the box: •Plug-and-play access to Apple Endpoint Security stream (no agent spelunking) •Dynamic subscriptions, filters,

📦 UNBOXING: Next-Gen Mac Monitor — live at #OBTS 🍏 Brandon Dalton <a href="/PartyD0lphin/">Brandon Dalton</a> 

First look: smells like fresh ES events and SwiftUI gloss. 😮‍💨✨
Inside the box:
•Plug-and-play access to Apple Endpoint Security stream (no agent spelunking)
•Dynamic subscriptions, filters,
Doc Dave (@forensicdave) 's Twitter Profile Photo

Brandon (Brandon Dalton) from @crowdstrike talked about many improvements and features in his most awesome opensource tool (Mac Monitor) - ( aka Procmon for OSX ) - & even pushed out version 2 in real-time at #OBTS! Check it out if you haven’t already! github.com/Brandon7CC/mac…

Brandon (<a href="/PartyD0lphin/">Brandon Dalton</a>) from @crowdstrike talked about many improvements and features in his most awesome opensource tool (Mac Monitor) - ( aka Procmon for OSX ) - &amp; even pushed out version 2 in real-time at #OBTS! Check it out if you haven’t already! github.com/Brandon7CC/mac…
Doc Dave (@forensicdave) 's Twitter Profile Photo

Christine christine 🌸💐🌺🌷🌹🪻🍃🌱🌿🪴✨ and JBO (Jonathan Bar Or (JBO) 🇮🇱🇺🇸🇺🇦🎗️ ) (& Alexia Wilson) from Microsoft showed #OBTS how Spotlight just got too bright. 😬 They found a macOS TCC bypass (#CVE-2025-31199) that abuses Spotlight to get your private data - locally and remotely - and showed how to detect!

Christine <a href="/x71n3/">christine 🌸💐🌺🌷🌹🪻🍃🌱🌿🪴✨</a> and JBO (<a href="/yo_yo_yo_jbo/">Jonathan Bar Or (JBO) 🇮🇱🇺🇸🇺🇦🎗️</a> ) (&amp; Alexia Wilson) from <a href="/Microsoft/">Microsoft</a> showed #OBTS how Spotlight just got too bright. 😬
They found a macOS TCC bypass (#CVE-2025-31199) that abuses Spotlight to get your private data - locally and remotely - and showed how to detect!
Jonathan Bar Or (JBO) 🇮🇱🇺🇸🇺🇦🎗️ (@yo_yo_yo_jbo) 's Twitter Profile Photo

#OBTS v8 was so fun. Met many folks I interacted with in the past, and a lot of new folks, everyone very smart and passionate. Special thanks to Patrick Wardle for bringing the community together. 🍎