Tech Nerd
If you have a channel, join this challenge: quotes this question and answer it in your channel Where do you see yourself 10 years from now? π₯ @selfmadecoder
Where do you see yourself 10 years from now? π₯
simply : a professional security researcher (
@AfroSec
π₯16β‘1
Finallyyy exams are over! π© Iβm so cooked this time fr fr π
But on the bright side,itβs done and dusted π
Now feels like the perfect time to lock in.
I might not be active for a while gotta dive back into the cyber world and cook up something cool for my future π¨βπ»β¨
So yeah catch yβall later!
Stay curious and happy hunting
@AfroSec
But on the bright side,
Now feels like the perfect time to lock in.
I might not be active for a while gotta dive back into the cyber world and cook up something cool for my future π¨βπ»β¨
So yeah catch yβall later!
Stay curious and happy hunting
@AfroSec
β€7π₯4πΎ2π€1
Forwarded from Buna Byte Cybersecurity
β¨ After the success of batch 1 we are back with 2nd batch, Join our 1-Month Practical Introduction to Ethical Hacking Boot-camp and gain real-world cybersecurity skills through hands-on challenges.
πββ‘οΈ Only limited spots available! Apply now and start your journey to becoming an ethical hacker.
π https://forms.gle/CLDiSWvgJ7dZjtWy9
@bunabytecs #BBCSIEH
πββ‘οΈ Only limited spots available! Apply now and start your journey to becoming an ethical hacker.
π https://forms.gle/CLDiSWvgJ7dZjtWy9
@bunabytecs #BBCSIEH
β€4π2π₯1
Forwarded from Buna Byte Cybersecurity
The Wait is Over π¨
BunaByte Junior Security Tester (BBJST) Registration is NOW OPENβοΈ
π What Youβll Learn
1οΈβ£ Introduction to Ethical Hacking & Cybersecurity Basics
2οΈβ£ Operating Systems (Linux, Windows) for Hackers
3οΈβ£ Network Security & Fundamentals
4οΈβ£ Web Hacking Techniques
5οΈβ£ System Hacking & Exploitation
6οΈβ£ Social Engineering Attacks & Defense
π Special Deal: Get an exclusive COUPON from our YouTube channel valid for ONLY 2 days! βοΈ
Donβt miss this chance to save big.
β‘ Seats are LIMITED they sell out fast. Once itβs full, itβs GONE.
β‘οΈ Secure your spot now:
π https://bunabyte.fillout.com/batch03
@bunabytecs
BunaByte Junior Security Tester (BBJST) Registration is NOW OPEN
Donβt miss this chance to save big.
@bunabytecs
Please open Telegram to view this post
VIEW IN TELEGRAM
π8π€©2β‘1π₯1
Forwarded from Buna Byte Cybersecurity
Only 3οΈβ£ Days Left! Donβt Miss Out!
β‘
Become a Buna Byte Junior Security Tester and kickstart your cybersecurity journey.π
What youβll get:
π‘ Hands-on hacking experience
π‘ Insider tips from industry pros
π‘ Certificate that stands out
Time is running outβ°
Registration closes in just 3 DAYS!
Secure your spot now before itβs too late limited seats available.
β
Donβt be the one who hears about it laterβ¦ be the one who gets ahead today.
https://bunabyte.fillout.com/batch03
@bunabytecs
Become a Buna Byte Junior Security Tester and kickstart your cybersecurity journey.
What youβll get:
Time is running out
Registration closes in just 3 DAYS!
Secure your spot now before itβs too late limited seats available.
https://bunabyte.fillout.com/batch03
@bunabytecs
Please open Telegram to view this post
VIEW IN TELEGRAM
β‘5π2π₯2β€1π1π1
so did yβall miss me ?, or did you secretly think I rage-quit cybersecurity and became a TikTok dancer or somthn else? π jk, I was in the trenches, fighting demons called misconfigurations, PowerShell errors, and kernel panics and lot more.
Hereβs the truth: my βbreakβ wasnβt really a break. It was like going on a side quest in a game where the boss fights are harder than the main mission. And oh boy, I died a LOT. Respawn button was working overtime.
Hereβs what went down:
β Active Directory Attacks β Sounds fun, right? Wrong. First, I spent two days just trying to understand why AD trusts look like a toxic relationship diagram fr guys ππ.
β Security Engineering β I thought this would make me feel like Tony Stark building Iron Man suits. Turns out, itβs more like trying to make a bulletproof vest out of bubble wrap while hackers are throwing nukes at you. Every time I closed one attack surface, five more popped up like, *βSurprise, mother*\*\*\*!β\*
β Mentoring at Bunabyte β Amazing experience, but yo, I now understand why teachers drink so much coffee. Someone asked me, *βWhatβs a buffer overflow?β* and before I could answer, another one said, *βCan it overflow into real life?β* Bruh. π (joking :)) )
β Building Tools β mtsm, listenβ¦ writing tools sounds cool in theory. In reality? Itβs like:
* Install dependency βοΈ
* Install another dependency βοΈ
* Fix the dependency that broke the first one β
* Cry in binary.
At some point, I was convinced my scripts were plotting against me. Like, how do you work at 2AM perfectly and then crash at 9AM when I need to demo ?
β Red Teaming β This was the spicy part. Iβve been breaching networks, escalating privileges, and exfiltrating flags. But ALSOβ¦ breaking my own setup 50 times. I swear, if I had a dollar for every time my Kali VM froze mid-exploit, Iβd have enough to buy my own zero-day. π
And let me not even start on Windows Defenderβ¦ That dude really thinks heβs the main character. Blocking my payloads like, *βNot today, criminal!β* Bruh, chill, this is a LAB π.
Obstacles? Oh, I had plenty:
* Accidentally nuked my own lab because I thought
* Lost Wi-Fi mid-CTF and started questioning my life choices.
At one point, I was like: *βGod, if hacking is easy, please send me a sign.β* Internet went out. SIGN RECEIVED BOOM.
but , I made it through. The syntax errors, the virtual machine crashes, the existential crises at 3AM while staring at Burp Suiteβ¦ all worth it. Because now, Iβm BACK, and Iβm bringing ALL that energy right here.
this channel is about to turn into a knowledge battlefield. Expect:
π₯ hacking tips (both red & blue team)
π₯ Security engineering lessons from the trenches
π₯ Custom tools & automation hacks
π₯ Memes for survival (because without memes, weβd cry)
Letβs laugh, learn, and LEVEL UP together. Because if I can survive a month of debugging PowerShell scripts, you can survive anything. πͺ
Stay tuned, because this comeback ainβt just a postβ¦ itβs a MOVEMENT (am not politician tho π)
@AfroSec
Hereβs the truth: my βbreakβ wasnβt really a break. It was like going on a side quest in a game where the boss fights are harder than the main mission. And oh boy, I died a LOT. Respawn button was working overtime.
Hereβs what went down:
β Active Directory Attacks β Sounds fun, right? Wrong. First, I spent two days just trying to understand why AD trusts look like a toxic relationship diagram fr guys ππ.
β Security Engineering β I thought this would make me feel like Tony Stark building Iron Man suits. Turns out, itβs more like trying to make a bulletproof vest out of bubble wrap while hackers are throwing nukes at you. Every time I closed one attack surface, five more popped up like, *βSurprise, mother*\*\*\*!β\*
β Mentoring at Bunabyte β Amazing experience, but yo, I now understand why teachers drink so much coffee. Someone asked me, *βWhatβs a buffer overflow?β* and before I could answer, another one said, *βCan it overflow into real life?β* Bruh. π (joking :)) )
β Building Tools β mtsm, listenβ¦ writing tools sounds cool in theory. In reality? Itβs like:
* Install dependency βοΈ
* Install another dependency βοΈ
* Fix the dependency that broke the first one β
* Cry in binary.
At some point, I was convinced my scripts were plotting against me. Like, how do you work at 2AM perfectly and then crash at 9AM when I need to demo ?
β Red Teaming β This was the spicy part. Iβve been breaching networks, escalating privileges, and exfiltrating flags. But ALSOβ¦ breaking my own setup 50 times. I swear, if I had a dollar for every time my Kali VM froze mid-exploit, Iβd have enough to buy my own zero-day. π
And let me not even start on Windows Defenderβ¦ That dude really thinks heβs the main character. Blocking my payloads like, *βNot today, criminal!β* Bruh, chill, this is a LAB π.
Obstacles? Oh, I had plenty:
* Accidentally nuked my own lab because I thought
rm -rf was a good idea.* Lost Wi-Fi mid-CTF and started questioning my life choices.
At one point, I was like: *βGod, if hacking is easy, please send me a sign.β* Internet went out. SIGN RECEIVED BOOM.
but , I made it through. The syntax errors, the virtual machine crashes, the existential crises at 3AM while staring at Burp Suiteβ¦ all worth it. Because now, Iβm BACK, and Iβm bringing ALL that energy right here.
this channel is about to turn into a knowledge battlefield. Expect:
π₯ hacking tips (both red & blue team)
π₯ Security engineering lessons from the trenches
π₯ Custom tools & automation hacks
π₯ Memes for survival (because without memes, weβd cry)
Letβs laugh, learn, and LEVEL UP together. Because if I can survive a month of debugging PowerShell scripts, you can survive anything. πͺ
Stay tuned, because this comeback ainβt just a postβ¦ itβs a MOVEMENT (am not politician tho π)
@AfroSec
π₯19π€5πΎ4
if you're into malware development or analysis, check out @vxunderground . It hosts a huge collection of malware samples (organized by threat actor, family, and other indicators) plus a stash of maldev research papers that are gold for learning how real threats work.
β οΈ only interact with samples in isolated, offline sandboxes
resource center : vx-resource
@AfroSec
β οΈ only interact with samples in isolated, offline sandboxes
resource center : vx-resource
@AfroSec
β4π₯2π¨βπ»1
As someone who sporadically attempts bug bounty engagements, I sometimes forget to test some core functionalities. So, I made a checklist based on the Web Security Testing Guide (WSTG) and built this site for productivity purposes. I originally created it for myself, but yesterday I decided to make it available for the community as well.
the site may have a few glitches but done is better than perfect π (also, Iβm not a front-end dev tho ).
If youβre a bug hunter, check it out:
https://bugcheck.vercel.app
@AfroSec
the site may have a few glitches but done is better than perfect π (also, Iβm not a front-end dev tho ).
If youβre a bug hunter, check it out:
https://bugcheck.vercel.app
@AfroSec
π₯8β‘4π2π1
Nodejs_Secure_Coding.pdf
8.6 MB
β€2π¨βπ»2β1
Forwarded from Yekolo Temari (α¨αα α°ααͺ)
Get ready for Ethiopia CyberShield Showdown Week, featuring bootcamps, red-team exploits, incident response simulations, and a high-stakes Capture the Flag (CTF). Join us to learn, compete, and connect with a chance to win prizes, merch, and recognition.
π Event Details
πΉ Online Bootcamp: Sept 17 to 18 | 8:00 PM to 10:00 PM
πΉ In-Person CTF: Sept 19 to 21 | 9:00 AM to 5:00 PM
π Capstone, ALX Tech Lideta Hub, Lideta
π Register now: https://luma.com/jyu7twze
#ALXEthiopia #CyberShieldShowdown #CTF2025 #Cybersecurity #ALXAfrica #dohardthings #lifeatalx #yekolotemari
π Event Details
πΉ Online Bootcamp: Sept 17 to 18 | 8:00 PM to 10:00 PM
πΉ In-Person CTF: Sept 19 to 21 | 9:00 AM to 5:00 PM
π Capstone, ALX Tech Lideta Hub, Lideta
π Register now: https://luma.com/jyu7twze
#ALXEthiopia #CyberShieldShowdown #CTF2025 #Cybersecurity #ALXAfrica #dohardthings #lifeatalx #yekolotemari
β€1