Mykola Grymalyuk
@khronokernel
Stuff at Fruit Co. Formerly OpenCore Legacy Patcher.
Will be presenting my Hydroph0bia (CVE-2025-4275) research at OFFZONE (offzone.moscow) 2025 on Aug 21st. It will be 1 hr long main track talk about UEFI SecureBoot, the hole Insyde left in the H2O platform for a decade, and the things we all can do to prevent such holes.
Proud to announce that I’m interning at Apple this summer on the UIKit team!!
Hello friends. Check out this awesome and unique role that just opened up on my team in SEAR. Wanna secure Apple silicon, ROMs, iBoot, and more? jobs.apple.com/en-us/details/…
📣 Some good news on the training front: 🎉 we teamed up with @gergely_kalman and by bringing in our different expertise in the field will make this training even better 🎉 we should be ready by early 2026 🎉 we aim to deliver it in 3 public conferences 🎉 first two modules are…
MacDevOpsYVR wrapped up, had a great time! Blog post with slides and some PoCs: khronokernel.com/macos/2025/06/…
The slides to my talk "Finding Vulnerabilities in Apple Packages at Scale", which I gave at @MacDevOpsYVR and @securityfest are available on my website: theevilbit.github.io/talks/
The embargo (12:00 UTC 2025-06-10) is over, let's start a thread on Hydroph0bia (CVE-2025-4275), a trivial SecureBoot and FW updater signature bypass in almost any Insyde H2O-based UEFI firmware used since 2012 and still in use today. English writeup: coderush.me/hydroph0bia-pa…
Straight from Apple's #WWDC25 Platform State of the Union: macOS Tahoe is the FINAL supported release for Intel Macs. RIP macOS Intel Support 2006-2026 🪦💐
The embargo for this vulnerability (CVE-2025-4275) ends tomorrow. I've prepared a blog post in English (on parked-long-ago-but-left-untouched coderush.me) and in Russian (on habr.com/ru/). I plan to write several more posts about it after I see the fixes.
Found a nice little SecureBoot bypass in a sizable bunch of UEFI firmwares, will share the details when able. Meanwhile, this is the SHA2-256 of the PoC tool to trigger it: 530584749f90d187ac20f77c6d4bb2e09ec1c852090962dfab01c4274a8a6d2d
Rest in peace iOS 19, iOS 20, iOS 21, iOS 22, iOS 23, iOS 24, iOS 25, iPadOS 19, iPadOS 20, iPadOS 21, iPadOS 22, iPadOS 23, iPadOS 24, iPadOS 25, macOS 16, macOS 17, macOS 18, macOS 19, macOS 20, macOS 21, macOS 22, macOS 23, macOS 24, macOS 25, watchOS 12, watchOS 13,
Little road trip to @MacDevOpsYVR, see y’all there to talk nerd shit!


Secure Boot focused role within SEAR at Apple. Come join a highly impactful team working on some of the most fun problems in this space! jobs.apple.com/en-us/details/…
Still searching for a full time job. Please spread the word
My second CVE! 🎉 CVE-2025-31195: A macOS Sandbox escape, already fixed on macOS Sequoia 15.4: support.apple.com/en-us/122373
wts.dev/posts/tcc-who/ It's a write-up a year in the... waiting. Enjoy everyone!
🎉 My submission for Black Hat USA (@BlackHatEvents #BHUSA) has been accepted! I will talk about reverse engineering results of XProtect Remediator (XPR). XPR doesn’t just scan files using YARA rules and delete malware — it does a lot more! It uses a creative mechanism that…