T9

White Hat Hacker Collective

Our Story

About T9

T9 started as a small group of security enthusiasts who met in an online forum back in 2022. What began as casual discussions about system vulnerabilities quickly evolved into a more organized effort to develop tools that could identify security flaws in various systems.

Our name? It's nothing fancy - we were originally just 9 people who liked to tinker with tech. The "T" came from "Tech" or "Tinker" depending on who you ask (we still debate this over pizza during meetups).

Since January 2025, we've gone fully White Hat. We realized our skills could do more good when used ethically, so we now focus exclusively on Penetration Testing, Security Consulting, and Responsible Disclosure. No more gray area stuff - we leave that to the movies.

Today, T9 operates as a loose collective of security researchers and ethical hackers. We're not some shadowy organization with a secret headquarters (though that would be cool). We're just regular tech professionals who happen to be really good at finding ways systems can break - so they can be fixed before the bad guys find them.

Our Journey

Late 2022

The Beginning

Passante creates a Discord server for like-minded security enthusiasts. The original 9 members start collaborating on small projects.

Mid 2023

First Tools

Development of our first security tools begins. Mostly for our own use, but word starts to spread in certain circles.

Early 2024

Growing Pains

The group expands beyond the original 9. We implement the tier system to maintain organization and quality control.

January 2025

White Hat Declaration

Official transition to White Hat practices. We establish clear ethical guidelines and begin offering legitimate security services.

March 2025

.exe Joins Leadership

.exe joins the leadership team, bringing enterprise security experience and helping to formalize our operations.

Present

Where We Are Now

Operating as a respected security collective, developing tools and providing services to help organizations improve their security posture.

The Tier System

Our tier system isn't about creating a hierarchy - it's about organizing responsibilities and recognizing expertise. Each tier comes with different privileges and responsibilities.

Tier 0 - Founder

The highest tier, reserved for Passante as the founder. Has final say on all strategic decisions, manages the overall direction of T9, and has access to all systems and projects. The face of T9 when needed, though prefers to stay behind the scenes.

Tier 1 - Leadership

Currently only .exe holds this position. Tier 1 members help shape T9's direction, manage day-to-day operations, approve new tools and methodologies, and have access to almost all systems. They represent T9 in professional settings and oversee the work of other tiers.

Tier 2 - Senior Members

Experienced members who lead specific projects or areas of expertise. They have significant autonomy in their domains, mentor lower tiers, and contribute to tool development. They have access to most systems and can propose new initiatives.

Tier 3 - Specialists

Members with proven expertise in specific areas. They work on assigned projects, maintain existing tools, and have access to systems relevant to their specialties. Tuco is here, managing our server infrastructure.

Tier 4 - Regular Members

Active contributors who have demonstrated reliability and skill. They assist with projects, test tools, and participate in security assessments under supervision. Limited system access based on their current projects.

Tier 5 - Associates

Newer members or occasional contributors. They help with testing, documentation, and smaller tasks while learning from higher tiers. Minimal system access, always working under supervision of higher tiers.

The Inner Circle

T0
P

Passante

Founder & Visionary

Started T9 in 2022 and continues to guide its overall direction and ethical framework.

T1
.exe

.exe

Operations Director

Joined in March 2025, bringing structure and enterprise experience to T9's operations.

T2
P

Phantom

Network Infiltration Specialist

Masters the art of network penetration with a focus on stealth and efficiency.

T2
C

Cipher

Cryptography Expert

Specializes in breaking and building cryptographic systems with unparalleled precision.

T3
T

Tuco

Server Infrastructure Manager

Maintains and secures T9's server infrastructure, ensuring operational stability.

T3
O

Oracle

Vulnerability Researcher

Discovers zero-day vulnerabilities with an intuitive understanding of system weaknesses.

T3
S

Specter

Social Engineering Expert

Specializes in the human element of security, exposing weaknesses in human-system interactions.

T4
P

Pulse

Wireless Security Specialist

Focuses on vulnerabilities in wireless communications and IoT ecosystems.

T4
V

Vortex

Cloud Security Expert

Navigates the complexities of cloud infrastructures to identify security gaps.