AfroSec
606 subscribers
316 photos
22 videos
6 files
161 links
hello friend
am AfroSec | AASTU dropout | cybersecurity enthusiast | CRTOM | CRTA | passionate abt Red Teaming :)))

portifolio : soon....
file : @Afr0Files
Download Telegram
#latenightmeme
πŸ˜‚πŸ˜‚

@AfroSec
🀣11😁2πŸ”₯1
coffee is the only way to save the night πŸ˜„πŸ‘Œ

@AfroSec
πŸ₯°8πŸ”₯2
Forwarded from Bug Sphere
πŸ‡ͺπŸ‡Ή Bug-Sphere Waitlist is Live!
A new hub for Ethiopia’s hackers, researchers, and security pros.
πŸ”’ Designed for collaboration, fair rewards, and real impact in securing organizations.
πŸš€ Join the waitlist today and be part of the movement!

πŸ”— https://bug-sphere.com/waitlist
Please open Telegram to view this post
VIEW IN TELEGRAM
⚑1
πŸ˜‚πŸ˜‚

@AfroSec
🀣5😁2🀝1
😍😍

lets go cook somthn πŸ˜‰


@AfroSec
πŸ”₯12πŸ₯°2
Domain_Fronting.pdf
6.1 MB
Domain fronting is a technique used to hide the true destination of network traffic. It exploits how some protocols, like HTTPS, handle TLS (Transport Layer Security) and HTTP headers, particularly when interacting with content delivery networks (CDNs).

Example:
SNI: cdn.cloudflare.com (allowed)
HTTP Host header:
malicious.example.com (your real server)


Firewalls, network monitors, or DPI (Deep Packet Inspection) only see the 'front' domain (the allowed one), while the real destination remains hidden.

Common uses:
1. Command & Control (C2) communication
2. Data exfiltration


I just read this PPT and it offers really good insights. I haven’t finished it yet, but I’m sure it’s worth reading.

@AfroSec
⚑3πŸ”₯2πŸ‘Œ1
Forwarded from π˜Ύπ™€π™™π™š 𝙉 π˜Ύπ™§π™–π™­ (π—¬π—˜π—”π—•π—¦π—œπ—₯𝗔)
Hey fams πŸ‘‹ I’m Yeabsira, and I’m excited to share something I’ve been working on in Cybersecurity especially in Reverse Engineering!

πŸš€ REX – Reverse Engineering Automation Tool

A powerful tool built to automate static malware analysis and make reverse engineering faster and easier.

Key Features:
πŸ” Automated static binary analysis
πŸ“Š File metadata, entropy, strings, sections
πŸ–₯️ Simple GUI + CLI support
⚑ Fast & lightweight – built in C and Python

πŸ”’ Designed for educational and research purposes only, safe to use and explore.

Check it out here: πŸ‘‰ GitHub | LinkedIn
πŸ”₯4❀2πŸ‘1
πŸ™ƒπŸ™ƒπŸ™ƒ

@AfroSec
πŸ₯°8❀5πŸ’‹5πŸ€—2
Happy Demera Be’al✨✨✨
May this special day bring you light, warmth, and togetherness.

αˆ°αŠ“α‹­ α‰ α‹“αˆˆ αˆ˜αˆ΅α‰€αˆ α‹­αŠ΅αŠ• αˆˆαŠ΅αˆαŠ­αˆ™β€οΈ

love y'all ❀️❀️❀️
@AfroSec
❀13❀‍πŸ”₯3πŸ€—2
❀️❀️

@AfroSec
❀4πŸ”₯4❀‍πŸ”₯1
look what i got for ya 😍

@AfroSec
❀6πŸ₯°2
nighty night fam 😊😊

@AfroSec
πŸ₯°4❀2
Holiday mood on… with just a sprinkle of work and good food πŸ‘ŒπŸ˜…
If they catch me with my PC open, I’m finished fr πŸ˜‚

@AfroSec
😁9πŸ‘Œ1
Automating Android Component Testing with new APK Inspector tool
-What are exported components?
-Setup and testing APK Inspector
-Improve automation and execute ADB commands interactively
-Run it on Android
-What are Intent Redirection Vulnerabilities?
https://www.mobile-hacker.com/2025/09/18/automating-android-app-component-testing-with-new-apk-inspector/
πŸ”₯4