Research from the Origin team.

Technical posts on endpoint AI, operating system internals, and attack and defense in AI-augmented environments. Written for practitioners by practitioners.

Codex on the Wire: One Flag Away From a Network ServiceDavid Kaplan · 2026-04-28Talking to the Agent Next Door: Adversarial Advantages of On-Device Agent ProtocolsDavid Kaplan · 2026-04-13Post Start Command-Line SubstitutionJohn Uhlmann · 2026-04-06All Your Claude Are Belong To Us: Reversing Claude Code's Remote Control ProtocolTyler Holmwood · 2026-04-01How we hijacked a browser through Claude's Chrome extensionMatt Hand · 2026-03-30Privilege Escalation via Confused Deputies in Coding AgentsDavid Kaplan · 2026-03-23ODR: Internals of Microsoft's New Native MCP RegistrationResearch Team · 2026-03-17Semantically Packaged Tradecraft: Credential DumpingDavid Kaplan · 2026-03-11Brainworm - Hiding in Your Context WindowMitchell Turner · 2026-03-04Introducing Marco, a Tool for Inter-Binary Control Flow MappingMatt Hand · 2026-02-25Process Preluding: Child Process Injection Before The Story BeginsJohn Uhlmann · 2026-02-17Introducing Praxis: An Adversarial Framework for Exploring Computer Use Agents on EndpointDavid Kaplan · 2026-02-10Semantic Protocol Confusion: When My LLM Thinks It's a Web BrowserDavid Kaplan · 2026-01-25Check Your Privilege: The Curious Case of ETW's SecurityTrace FlagConnor McGarr · 2026-01-19cua-kit: Attacking the Intelligent EndpointMatt Hand · 2026-01-15Rehabilitating Registry Tradecraft with RegRestoreKeyMichael Barclay · 2025-11-13Escaping Loader Locks with PostProcessInitRoutineJohn Uhlmann · 2025-10-29Windows ARM64 Internals: Deconstructing Pointer AuthenticationConnor McGarr · 2025-10-13Unexpectedly Out-Of-Context: Detecting a LockBit SampleMichael Barclay · 2025-10-08Introducing Runtime Memory ProtectionResearch Team · 2025-08-01