T9 started as a small group of security enthusiasts who met in an online forum back in 2022. What began as casual discussions about system vulnerabilities quickly evolved into a more organized effort to develop tools that could identify security flaws in various systems.
Our name? It's nothing fancy - we were originally just 9 people who liked to tinker with tech. The "T" came from "Tech" or "Tinker" depending on who you ask (we still debate this over pizza during meetups).
Since January 2025, we've gone fully White Hat. We realized our skills could do more good when used ethically, so we now focus exclusively on Penetration Testing, Security Consulting, and Responsible Disclosure. No more gray area stuff - we leave that to the movies.
Today, T9 operates as a loose collective of security researchers and ethical hackers. We're not some shadowy organization with a secret headquarters (though that would be cool). We're just regular tech professionals who happen to be really good at finding ways systems can break - so they can be fixed before the bad guys find them.
Passante creates a Discord server for like-minded security enthusiasts. The original 9 members start collaborating on small projects.
Development of our first security tools begins. Mostly for our own use, but word starts to spread in certain circles.
The group expands beyond the original 9. We implement the tier system to maintain organization and quality control.
Official transition to White Hat practices. We establish clear ethical guidelines and begin offering legitimate security services.
.exe joins the leadership team, bringing enterprise security experience and helping to formalize our operations.
Operating as a respected security collective, developing tools and providing services to help organizations improve their security posture.
Our tier system isn't about creating a hierarchy - it's about organizing responsibilities and recognizing expertise. Each tier comes with different privileges and responsibilities.
The highest tier, reserved for Passante as the founder. Has final say on all strategic decisions, manages the overall direction of T9, and has access to all systems and projects. The face of T9 when needed, though prefers to stay behind the scenes.
Currently only .exe holds this position. Tier 1 members help shape T9's direction, manage day-to-day operations, approve new tools and methodologies, and have access to almost all systems. They represent T9 in professional settings and oversee the work of other tiers.
Experienced members who lead specific projects or areas of expertise. They have significant autonomy in their domains, mentor lower tiers, and contribute to tool development. They have access to most systems and can propose new initiatives.
Members with proven expertise in specific areas. They work on assigned projects, maintain existing tools, and have access to systems relevant to their specialties. Tuco is here, managing our server infrastructure.
Active contributors who have demonstrated reliability and skill. They assist with projects, test tools, and participate in security assessments under supervision. Limited system access based on their current projects.
Newer members or occasional contributors. They help with testing, documentation, and smaller tasks while learning from higher tiers. Minimal system access, always working under supervision of higher tiers.
Started T9 in 2022 and continues to guide its overall direction and ethical framework.
Joined in March 2025, bringing structure and enterprise experience to T9's operations.
Masters the art of network penetration with a focus on stealth and efficiency.
Specializes in breaking and building cryptographic systems with unparalleled precision.
Maintains and secures T9's server infrastructure, ensuring operational stability.
Discovers zero-day vulnerabilities with an intuitive understanding of system weaknesses.
Specializes in the human element of security, exposing weaknesses in human-system interactions.
Focuses on vulnerabilities in wireless communications and IoT ecosystems.
Navigates the complexities of cloud infrastructures to identify security gaps.