icrackthecode's profile picture. Reverse Engineering

Charles Muiruri

@icrackthecode

Reverse Engineering

2024 was a great year full of lessons. Wishing everyone a happy and blessed 2025!


Repost di Charles Muiruri

For those who have been asking about the @AfricaHackon T-shirts and Hoodies, do get a pre-order via the link below. Those coming for the event physically can get it on Saturday. Others who will get delivered later. bit.ly/AHmerchpreorder

BRIGHTZEED's tweet image. For those who have been asking about the @AfricaHackon T-shirts and Hoodies, do get a pre-order via the link below.
Those coming for the event physically can get it on Saturday. Others who will get delivered later.
bit.ly/AHmerchpreorder

2023 was an amazing year. It reminded me the importance of appreciating the simplest things in life. Happy new year everyone 🎉🎉🎉.


Repost di Charles Muiruri

youtu.be/t4SHqKyDmH8 📶 My talk from #defcon31 is up! If you missed it, or like to keep it around for reference have a look-see. 👀

hackerpinup's tweet card. DEF CON 31 War Stories - Nuthin But A G Thang Evolution of Cellular...

youtube.com

YouTube

DEF CON 31 War Stories - Nuthin But A G Thang Evolution of Cellular...


Back to computers after a long break. Hope I remember how to type.


Repost di Charles Muiruri

Hello network, I'm currently looking for a junior position as a Penetration Tester or Digital Forensics Expert. If you know of any companies seeking candidates in these roles, please inbox me and I am willing to relocate. Your support is greatly appreciated! Thank you 🙂


Repost di Charles Muiruri

Did some work on github.com/acama/xrop which now works on macos (apple silicon)! I'm not a very good developer so pull requests are always welcome.


Happy belated birthday @_theVIVI. Wishing you more health and success 🎉🎉🎉


2022 was an amazing year. Meet lots of amazing people and learned a lot of lessons. Unlike previous years, this year I focused a lot on personal growth. I am grateful for 2022. Ready for 2023!! Happy new year everyone!!


What a final!! The G.O.A.T did it!!


Repost di Charles Muiruri

I found a vulnerability that allowed me to unlock any @Google Pixel phone without knowing the passcode. This may be my most impactful bug so far. Google fixed the issue in the November 5, 2022 security patch. Update your devices! bugs.xdavidhu.me/google/2022/11…


Repost di Charles Muiruri

My latest blog post is up @TrenchantARC describing my Pwn2Own Miami 2022 winning entry. Thanks @thezdi ! trenchant.io/two-lines-of-j…


Repost di Charles Muiruri

My team at Trenchant (formerly Azimuth) is hiring! If you’re a baseband or cellular researcher and want to work alongside some of the most talented hackers in the industry, send me a DM.


Repost di Charles Muiruri

I just released the source code of Paracosme: a zero-click remote memory corruption exploit I demonstrated at Pwn2Own 2022 Miami 🐛🐜🪲 github.com/0vercl0k/parac…


Repost di Charles Muiruri

I am terribly saddened by the unexpected passing of Nicolas Brito @sipdbg aka modem at a young age. He was a discrete but extremely respected figure of the infosec underground who pioneered new heap exploitation techniques, and more recently kernel exploitation. R.I.P. my friend.


Enroute to @offensive_con. See you all in Berlin.


Repost di Charles Muiruri

👏Our researchers @DamianoMelotti @max_r_b @doegox just finished their talk about reversing Google's Titan-M chip. Partial chip pinout, Ghidra loader, an open source API client, a fuzzer, 1st ever code exec exploit, slides & white paper now available here github.com/quarkslab/tita…


Repost di Charles Muiruri

Check out @bdmcbri ‘s blog post about his winning pwn2own hack of Parallels earlier this year: trenchant.io/pwn2own-2021-p…


Loading...

Something went wrong.


Something went wrong.