Forwarded from Yared OG
Ready to Design the Future of Cyber Awareness?
The Cyber Game Jam is back where creativity, coding, and cyber security collide
For 72 hours, innovators will collaborate to design and develop games that make digital safety fun, engaging, and impactful.
πΎ Who should join?
π¨ Game Designers
π» Developers & Programmers
π§ Storytellers & Writers
π΅ Sound & Visual Artists
π§© Cyber security Enthusiasts
Whether youβre a pro or a first-timer, this is your chance to learn, create, and compete in a high-energy environment where ideas turn into playable experiences.
π Date: October 24β26, 2025
π Duration: 48 Hours | 2 Days
π Place: Information Network Security Agency (INSA) Headquarters , Addis Ababa
Brought to you by Information Network Security Agency (INSA) in collaboration with Efuye Gela.
The Cyber Game Jam is back where creativity, coding, and cyber security collide
For 72 hours, innovators will collaborate to design and develop games that make digital safety fun, engaging, and impactful.
πΎ Who should join?
π¨ Game Designers
π» Developers & Programmers
π§ Storytellers & Writers
π΅ Sound & Visual Artists
π§© Cyber security Enthusiasts
Whether youβre a pro or a first-timer, this is your chance to learn, create, and compete in a high-energy environment where ideas turn into playable experiences.
π Date: October 24β26, 2025
π Duration: 48 Hours | 2 Days
π Place: Information Network Security Agency (INSA) Headquarters , Addis Ababa
Brought to you by Information Network Security Agency (INSA) in collaboration with Efuye Gela.
π₯2β‘1
Forwarded from Kirakos
Ketav π
Have you ever wished you tracked how much time you spend with books? Ketavβs got your back. Meet Ketav, a localβfirst EPUB reader that helps you build a better reading habit. It can:
- track your daily reading minutes (accurately, only while youβre actively reading),
- show streaks (current + longest) and weekly summaries at a glance,
- break down exactly which books an how much time you read in the last 7 days,
- Goal-oriented reading to help you keep consistency
- keep all data on your device (no cloud required)
Downloads:
Windows
Linux (debian)
Linux (Redhat)
Linux (any)
If you happen to find any bug while using it, consider reporting using channel DM or through @genuinely_curious
Have you ever wished you tracked how much time you spend with books? Ketavβs got your back. Meet Ketav, a localβfirst EPUB reader that helps you build a better reading habit. It can:
- track your daily reading minutes (accurately, only while youβre actively reading),
- show streaks (current + longest) and weekly summaries at a glance,
- break down exactly which books an how much time you read in the last 7 days,
- Goal-oriented reading to help you keep consistency
- keep all data on your device (no cloud required)
Downloads:
Windows
Linux (debian)
Linux (Redhat)
Linux (any)
If you happen to find any bug while using it, consider reporting using channel DM or through @genuinely_curious
π₯5β€1π1π1
Forwarded from Yekolo Temari (α¨αα α°ααͺ)
If your looking for any guides , books ,cheat sheets and all your go-to learning materials are available here : https://github.com/The-Art-of-Hacking/h4cker Enjoy :)
GitHub
GitHub - The-Art-of-Hacking/h4cker: This repository is maintained by Omar Santos (@santosomar) and includes thousands of resourcesβ¦
This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security,...
π2
YouTube
Multi-Cloud Red Team Analyst (MCRTA) Certification Review: Your Guide to Cloud Red Teaming
www.linkedin.com/in/masoud-hamada
Ready to start your Cloud Red Teaming journey? π Check out my review of the Multi-Cloud Red Team Analyst (MCRTA) certification by CWL!
In this video, Iβll cover:
β Why MCRTA is perfect for beginners in cloud security.
β β¦
Ready to start your Cloud Red Teaming journey? π Check out my review of the Multi-Cloud Red Team Analyst (MCRTA) certification by CWL!
In this video, Iβll cover:
β Why MCRTA is perfect for beginners in cloud security.
β β¦
cloud redteaming
Funny how the cloud made infra easyβ¦ and misconfigs easier π, IAM roles the new privilege escalation playground huh
Curious how yβall approach this π
@AfroSec
Funny how the cloud made infra easyβ¦ and misconfigs easier π, IAM roles the new privilege escalation playground huh
Curious how yβall approach this π
@AfroSec
β‘4π₯1
YouTube
NOC-umentary: Inside the Black Hat NOC
From the most hostile front line in cybersecurity comes a story only Palo Alto Networks can tell.
Inside the Black Hat NOC is the first full-length NOC-umentary, offering a rare look behind the scenes at one of the most targeted networks on the planet: theβ¦
Inside the Black Hat NOC is the first full-length NOC-umentary, offering a rare look behind the scenes at one of the most targeted networks on the planet: theβ¦
NOC
Behind the scenes of the BlackHat NOC ππ
These dudes put insane effort into that network infra like wayyy beyond imagination π₯
The hackers attending gotta be mad confident walking in there
Lowkey wish I was one of those engineers tho π«
@AfroSec
Behind the scenes of the BlackHat NOC ππ
These dudes put insane effort into that network infra like wayyy beyond imagination π₯
The hackers attending gotta be mad confident walking in there
Lowkey wish I was one of those engineers tho π«
@AfroSec
π₯4
i was just vibing, minding my own business β then boom someone drops a random link saying βwe saw your photo.β
bruh thatβs how phishing starts π
so i put on my hunting gear, spun up my tools, and started digging through the domains β one redirect led to another like a bad spy movie
looked like a full-on fake telegram login flow with their own backend api & localStorage trickery
couldnβt trace the main C2 yet, or they rent a cloud idk but the chase continues.
anyways, donβt click shady links, even if curiosity hits
if i catch them iβll update you all feeling like john hammond here loooool ππ
@AfroSec
bruh thatβs how phishing starts π
so i put on my hunting gear, spun up my tools, and started digging through the domains β one redirect led to another like a bad spy movie
looked like a full-on fake telegram login flow with their own backend api & localStorage trickery
couldnβt trace the main C2 yet, or they rent a cloud idk but the chase continues.
anyways, donβt click shady links, even if curiosity hits
if i catch them iβll update you all feeling like john hammond here loooool ππ
@AfroSec
π₯15π5β‘2π2