R.ICON (@r_icon_megaddog) 's Twitter Profile
R.ICON

@r_icon_megaddog

LOVE | Tech Enthusiast | Cybersecurity| Basketball hooper | Christ Above all| Driven by Loyalty and Integrity | COYG | Martial Arts, Karatéka

ID: 1758871838250131456

calendar_today17-02-2024 15:12:23

14,14K Tweet

629 Followers

1,1K Following

Moe (@moneyacademyke) 's Twitter Profile Photo

State House Nairobi spent Sh1.3 billion in January alone, averaging Sh43 million a day. It has now overspent its budget by Sh2.7 billion in just seven months of the 2025/26 financial year.

SURE 🎷 (@obinobrian) 's Twitter Profile Photo

Hello Hon. Aden Duale, EGH tutaingia mwezi mtukufu wa Ramadan ukiwa na 11 billion ya SHA? How will you enter a sacred Mosque without shoes knowing that you’ve stolen 11 billion ya wagojwa? Address us utuambie pesa iko wapi.. I’ll be on your case until you address the issue. 3 options;

Katiba Institute (@katibainstitute) 's Twitter Profile Photo

I Deserve to Know: We have written to the Nairobi City County Secretary, under Article 35 of the Constitution and the Access to Information Act, to request full disclosure on the reported “partnership” between the National Government and Nairobi City County in the performance of

I Deserve to Know:

We have written to the Nairobi City County Secretary, under Article 35 of the Constitution and the Access to Information Act, to request full disclosure on the reported “partnership” between the National Government and Nairobi City County in the performance of
Moritz (@m_r_tz) 's Twitter Profile Photo

Happening right now (open till Sat, 2/21/26)! A week-long CTF dedicated exclusively to reverse engineering. Hosted by crackmes.one, inspired by the legendary Flare-On Challenge. crackmesone.ctfd.io

Caido (@caidoio) 's Twitter Profile Photo

🚀 New official plugin in the Caido Store! Introducing "Nomad IP" Rotate your source IP addresses, using AWS API Gateway to avoid IP-based blocking during tests. Check out more details: github.com/caido-communit…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🛑 Citizen Lab found Cellebrite tools used on a Kenyan activist’s phone while it was in police custody. Boniface Mwangi’s Samsung device was accessed in July 2025 and later returned without password protection. Full extraction could include messages, files, and passwords. The

🛑 Citizen Lab found Cellebrite tools used on a Kenyan activist’s phone while it was in police custody.

Boniface Mwangi’s Samsung device was accessed in July 2025 and later returned without password protection. Full extraction could include messages, files, and passwords.

The
Sholla Ard 🇰🇪 (@sholard_mancity) 's Twitter Profile Photo

I have been following the case of the Russian man who secretly recorded women in Ghana and Kenya. Russia has reportedly told Ghana it does not extradite its citizens. The UK refused to extradite a soldier accused of killing a Kenyan woman. The U.S. rarely extradites its own.

I have been following the case of the Russian man who secretly recorded women in Ghana and Kenya.

Russia has reportedly told Ghana it does not extradite its citizens.
The UK refused to extradite a soldier accused of killing a Kenyan woman.
The U.S. rarely extradites its own.
Caido (@caidoio) 's Twitter Profile Photo

🚀 New official plugin in the Caido Store! Introducing "Tor" Route traffic through Tor by configuring a SOCKS upstream proxy for your requests. Check out more details: github.com/caido-communit…

CTFRoom (@ctf_room) 's Twitter Profile Photo

Packed binaries hide their real code behind compression and encryption. Unpacking exposes the true entry point, the real logic, and the payload inside. #ReverseEngineering #MalwareUnpacking #PackedBinary #BinaryAnalysis #MalwareAnalysis #CyberSecurity #InfoSec #CTFROOM

Packed binaries hide their real code behind compression and encryption.
Unpacking exposes the true entry point, the real logic, and the payload inside.

#ReverseEngineering #MalwareUnpacking #PackedBinary #BinaryAnalysis #MalwareAnalysis #CyberSecurity #InfoSec #CTFROOM
CTFRoom (@ctf_room) 's Twitter Profile Photo

Malware hides commands, keys, and infrastructure in encrypted configuration files. Extracting the config turns code into actionable threat intelligence. Find the config. Expose the network. Reveal the attacker. #MalwareAnalysis #MalwareConfig #ReverseEngineering

Malware hides commands, keys, and infrastructure in encrypted configuration files.
Extracting the config turns code into actionable threat intelligence.
Find the config.
Expose the network.
Reveal the attacker.

#MalwareAnalysis #MalwareConfig #ReverseEngineering