Charles Muiruri
@icrackthecode
Followers
1K
Following
2K
Media
42
Statuses
3K
Reverse Engineering
Joined November 2015
2025 was an year full of lessons, mistakes, tough times and good memories. Happy blessed new year everyone.
0
0
4
2024 was a great year full of lessons. Wishing everyone a happy and blessed 2025!
0
1
4
For those who have been asking about the @AfricaHackon T-shirts and Hoodies, do get a pre-order via the link below. Those coming for the event physically can get it on Saturday. Others who will get delivered later. https://t.co/p4AQRxjn6W
1
4
16
2023 was an amazing year. It reminded me the importance of appreciating the simplest things in life. Happy new year everyone πππ.
0
0
6
https://t.co/hknHHCOUlu πΆ My talk from #defcon31 is up! If you missed it, or like to keep it around for reference have a look-see. π
5
24
103
Back to computers after a long break. Hope I remember how to type.
1
0
8
Hello network, I'm currently looking for a junior position as a Penetration Tester or Digital Forensics Expert. If you know of any companies seeking candidates in these roles, please inbox me and I am willing to relocate. Your support is greatly appreciated! Thank you π
4
28
67
Did some work on https://t.co/TjelqxwrYp which now works on macos (apple silicon)! I'm not a very good developer so pull requests are always welcome.
github.com
Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC - acama/xrop
1
25
96
Happy belated birthday @_theVIVI. Wishing you more health and success πππ
1
0
3
2022 was an amazing year. Meet lots of amazing people and learned a lot of lessons. Unlike previous years, this year I focused a lot on personal growth. I am grateful for 2022. Ready for 2023!! Happy new year everyone!!
0
0
8
I found a vulnerability that allowed me to unlock any @Google Pixel phone without knowing the passcode. This may be my most impactful bug so far. Google fixed the issue in the November 5, 2022 security patch. Update your devices! https://t.co/LUwSvEMF3w
bugs.xdavidhu.me
83
1K
5K
My latest blog post is up @TrenchantARC describing my Pwn2Own Miami 2022 winning entry. Thanks @thezdi ! https://t.co/K84RXYWs0i
3
44
161
My team at Trenchant (formerly Azimuth) is hiring! If youβre a baseband or cellular researcher and want to work alongside some of the most talented hackers in the industry, send me a DM.
0
10
34
I just released the source code of Paracosme: a zero-click remote memory corruption exploit I demonstrated at Pwn2Own 2022 Miami πππͺ² https://t.co/9cRawlIvZX
4
169
500
I am terribly saddened by the unexpected passing of Nicolas Brito @sipdbg aka modem at a young age. He was a discrete but extremely respected figure of the infosec underground who pioneered new heap exploitation techniques, and more recently kernel exploitation. R.I.P. my friend.
9
16
65
I lost a lot from a personal point of view but gained too at the same time. I managed to test out the digital nomad lifestyle for a few months and I think I love it and might do it longer in 2022. Career wise I learned a lot. Wishing everyone a happy and prosperous 2022.
1
0
3
Itβs about that time I do my yearly tweet. 2021 was probably the toughest year I have had so far full of different life challenges. I met lots of new friends who made my year amazing. 2021 taught a lot about myself.
1
0
6
πOur researchers @DamianoMelotti @max_r_b @doegox just finished their talk about reversing Google's Titan-M chip. Partial chip pinout, Ghidra loader, an open source API client, a fuzzer, 1st ever code exec exploit, slides & white paper now available here https://t.co/PGDdbydi1V
github.com
This repository contains the tools we used in our research on the Google Titan M chip - quarkslab/titanm
1
81
227