wilson kigotho (@sirkiggz) 's Twitter Profile
wilson kigotho

@sirkiggz

ID: 211882981

calendar_today04-11-2010 14:59:09

2,2K Tweet

38 Takipçi

399 Takip Edilen

cheruiyotkb (@cheruiyotkb) 's Twitter Profile Photo

What it takes to build and sustain wealth: 1️⃣ Financial literacy: Understand money management, investments, and financial instruments. 2️⃣ Consistent savings: Prioritize saving a portion of your income regularly. 3️⃣ Smart investments: Diversify your portfolio and understand

Winston Ighodaro (@officialwhyte22) 's Twitter Profile Photo

I analyzed a suspicious PDF email attachment and discovered it was embedded with a reverse shell payload exploiting CVE-2021-28550. When opened, the PDF dropped a backdoor to the temp directory and connected back to the attacker via port 443. I used pdfid and pdf-parser to

I analyzed a suspicious PDF email attachment and discovered it was embedded with a reverse shell payload exploiting CVE-2021-28550. When opened, the PDF dropped a backdoor to the temp directory and connected back to the attacker via port 443. I used pdfid and pdf-parser to
Abojani Investment 🇰🇪🇺🇬🇹🇿 (@theabojani) 's Twitter Profile Photo

MONEY & LIFE LESSONS 101 WITH ROBERT KIBAARA, HF GROUP CEO...🧵🧵 1. Network and build relationships: Connections are key to success in both your career and personal life. 2. Leverage time in investment: Start early. Time is your greatest ally when it comes to growing wealth.

MONEY & LIFE LESSONS 101 WITH ROBERT KIBAARA, HF GROUP CEO...🧵🧵

1. Network and build relationships: Connections are key to success in both your career and personal life. 

2. Leverage time in investment: Start early. Time is your greatest ally when it comes to growing wealth.
Edwin H. Dande (@ehdande) 's Twitter Profile Photo

NSSF should issue statements… The increased NSSF contributions should come with more transparency and accountability such as monthly statements showing contributions AND returns? Was looking at a payslip for someone making about Kshs. 30K and was shocked by the amount of

NSSF should issue statements…

The increased NSSF contributions should come with more transparency and accountability such as monthly statements showing contributions AND returns?

Was looking at a payslip for someone making about Kshs. 30K and was shocked by the amount of
Nana Sei Anyemedu (@redhatpentester) 's Twitter Profile Photo

WhatsApp End-to-End Encryption vs. Forensic Extraction Although WhatsApp uses end-to-end encryption to protect messages, calls, and shared media during transmission, this protection only applies while the data is moving between devices. Once the content reaches the device, it is

WhatsApp End-to-End Encryption vs. Forensic Extraction

Although WhatsApp uses end-to-end encryption to protect messages, calls, and shared media during transmission, this protection only applies while the data is moving between devices. Once the content reaches the device, it is
Nana Sei Anyemedu (@redhatpentester) 's Twitter Profile Photo

DFIR training hosts one of the most comprehensive curated collections of forensic practice materials bringing together high-quality datasets, lab images, and CTF challenges from trusted sources worldwide. The collection includes: 1. Full disk images for hands-on forensic

DFIR training  hosts one of the most comprehensive curated collections of forensic practice materials bringing together high-quality datasets, lab images, and CTF challenges from trusted sources worldwide. The collection includes:

1. Full disk images for hands-on forensic
Simons (@simon_ingari) 's Twitter Profile Photo

HR managers are tired of this phrase “Please find attached my resume.” Here are more fresh, professional and engaging alternatives to use in 2026 👇 1. "Please find my resume attached for your review. I look forward to the opportunity to discuss my qualifications further." 2.

Simons (@simon_ingari) 's Twitter Profile Photo

Stop saying this to recruiters in 2026. ❌ “Looking forward to hearing from you.” Say this instead 👇 1. I’d welcome the opportunity to discuss this further. 2. I’d be happy to provide any additional information if needed. 3. I’d appreciate the opportunity to continue the

DirectoryRanger (@directoryranger) 's Twitter Profile Photo

Active Directory Hardening Series Part 1 Disabling NTLMv1 techcommunity.microsoft.com/blog/coreinfra… Part 2 Removing SMBv1 techcommunity.microsoft.com/blog/coreinfra… Part 3 Enforcing LDAP Signing techcommunity.microsoft.com/blog/coreinfra… Part 4 Enforcing AES for Kerberos techcommunity.microsoft.com/blog/coreinfra…

Steven Lim (@0x534c) 's Twitter Profile Photo

🥷Microsoft Incident Response Ninja Hub (Updated 28 Dec 2025) 🛡️ Dive into: - Expert-led guides & best practices - Threat hunting & cloud forensics tips - Ransomware & APT case studies - One-page investigation playbooks - KQL techniques & recovery strategies

🥷Microsoft Incident Response Ninja Hub
(Updated 28 Dec 2025)

🛡️ Dive into:
- Expert-led guides & best practices
- Threat hunting & cloud forensics tips
- Ransomware & APT case studies
- One-page investigation playbooks
- KQL techniques & recovery strategies
Wilberforce Theophilus (@eze_wilberforce) 's Twitter Profile Photo

Two major deals happened almost at the same time. Two men fighting for control One man borrowed 750 million dollars. Another sold his stake in a company for 750 million dollars. That is not coincidence. You do not borrow an extra 750 million dollars unless a rare

Two major deals happened almost at the same time.

Two men fighting for control 

One man borrowed 750 million dollars.

Another sold his stake in a company for 750 million dollars.

That is not coincidence.

You do not borrow an extra 750 million dollars unless a rare
TOP G (@menscoach1) 's Twitter Profile Photo

Rules for 2026: 1. If you are not invited, don’t go. 2.If a woman isn’t interested, don’t chase her. 3. No double texting respect your time and pride. 4.Cut off anyone who messes with your peace and mental health. 5. If a woman wants to leave, let her go. 6. Reduce or

Simons (@simon_ingari) 's Twitter Profile Photo

HOW TO INTRODUCE YOURSELF IN A JOB INTERVIEW In a job interview, your self-introduction should be clear, confident, and relevant to the position. Here’s a basic structure to follow: ⸻ 1. Greet and thank the interviewer: “Good morning, and thank you for the opportunity to be

IT Guy (@t3chfalcon) 's Twitter Profile Photo

Something to be aware of: Most office photocopiers and multifunction printers have internal hard drives. They don’t just copy paper they create digital images of documents that are scanned, printed, or faxed from Tax returns to IDs and even Medical records. When companies

Save A Man (@save_a_man) 's Twitter Profile Photo

Natural and healthy routine for every man to live a healthy life. 1. Drink water early in the morning. Do it for your kidneys. 2. Eat at least two eggs every day. Do it for your brain and hormones. 3. Practice Kegel exercises and take a walk to boost your stamina and improve

Nana Sei Anyemedu (@redhatpentester) 's Twitter Profile Photo

The CASE OF ANGELA MERKEL The image visually represents a lesson learned from the surveillance of Angela Merkel’s phone by the National Security Agency. Physical phone hardening is a reaction to digital vulnerability, not a guarantee of safety. When the Angela Merkel’s phone

Peter Agboola (@baba_omoloro) 's Twitter Profile Photo

Do you know you can send mail and the receiver won’t be able to forward copy, print, or download the mail? You can even use expiration date and passcode to add further security. HOW? Open Gmail, compose, click on Hamburger buttons and choose "Confidential Mode".

Arslan❤️💫 (@arslan_hn) 's Twitter Profile Photo

MY FRIEND IS STILL PAYING FOR GMAIL STORAGE. I told him to do this before. He went from 14.9/15 GB to 6 GB in a single afternoon. Hope this helps you ↓

Julian Derry (@julian_derry_) 's Twitter Profile Photo

A Deep Dive into Mobile Forensics I recently completed a full mobile forensic analysis on an iPhone 13 Pro and it was a powerful reminder of how much a device actually remembers. This was an advanced logical extraction with verified image integrity. Even without diving into

A Deep Dive into Mobile Forensics

I recently completed a full mobile forensic analysis on an iPhone 13 Pro and it was a powerful reminder of how much a device actually remembers.

This was an advanced logical extraction with verified image integrity. Even without diving into
Gabbytech || Cyber_Security (@gabriel_coder01) 's Twitter Profile Photo

5 SIEM rules I actually use every day in production (and why they work) I triage 200+ alerts daily in my remote SOC role. These 5 rules have cut my false positives by ~40% and caught real threats. Thread 👇 #SOC #BlueTeam #SIEM