AfroSec
606 subscribers
316 photos
22 videos
6 files
161 links
hello friend
am AfroSec | AASTU dropout | cybersecurity enthusiast | CRTOM | CRTA | passionate abt Red Teaming :)))

portifolio : soon....
file : @Afr0Files
Download Telegram
Forwarded from Buna Byte Cybersecurity
bunabyte.com is live❤️.

We’re building this with the community.
Content, labs, and services are coming soon—step by step, done right.

@bunabytecs bunabyte.com
5🔥21
Forwarded from Tilet solution (Nebyat B Δ)
stop trying to be cool. be nerdy and obsessive about the things you love. enthusiasm will get you farther than indifference
💯13
u havent failed until u quit 🙃

just sayin 🙌

@AfroSec
❤‍🔥11🙏1
ladies and gents we have an update lol 😅
2026 will be mine ngl i feel it 💪💪🔥


@AfroSec
🎉243🥰1🙉1
AfroSec
ladies and gents we have an update lol 😅 2026 will be mine ngl i feel it 💪💪🔥 @AfroSec
btw I dropped out this year from the start but I forgot to announce it enji

@AfroSec
😁15🤣2
Forwarded from Florida🛸
I’ve been deep diving into n8n for the past 4 months, and honestly it’s become the glue for almost all my AI and data experiments.

For those who haven't come across it yet, n8n is basically a flexible automation tool. it’s a bridge that helps your data move and it lets you connect your favorite apps, AI models, and databases using a visual node based interface. I actually spent some time trying to make Google Cloud Workflows work for my setup too, but i eventually went all in on n8n.
The biggest reason why i chose n8n over Google Cloud Workflows is the pre-built nodes and speed. in n8n, if i want to connect a Telegram bot to OpenAI and then dump the data into a database, i just add the nodes and link them together visually. in Google Cloud Workflows, i’d be writing lines of text based configuration files and manually handling API authentications for every single service. n8n lets me spend more time building the actual "AI logic" and less time fighting with documentation. So use Google Cloud Workflows to coordinate and manage internal Google services (like Bigquery) with high-scale, enterprise-level reliability, and you're comfortable writing code to keep things lightweight.

Use n8n when you want to prototype fast, connect dozens of different SaaS tools, or build complex AI agents without getting stuck in a technical setup
5
enema i have to be zeroday reseller fr 😂 betam awach new eko

@AfroSec
😁4🤣2
🩸 CRTOM — done.

Started my red team cert path with Red Team Operations Management.
Not about popping shells yet — this one’s about how real ops are planned, scoped, and run.

Foundations first:
🧠 attacker mindset
📋 engagement flow
🎯 operational thinking

@AfroSec
232🏆2
#random

the caffeine hit is not talkable fr 😂

@AfroSec
😁8
Forwarded from Genesis (ISRAƎL)
Risk is always better than regret
🔥6
እንኳን ለብርሃነ ልደቱ በሰላም አደረሳችሁ !

@AfroSec
320🥰2
hey yall how is holiday goinn' ?

@AfroSec
👌81
This media is not supported in your browser
VIEW IN TELEGRAM
can we make it anonymous seriously like by changing the bios chip firmware and stuff like that ?

@AfroSec
2🤔2
Some people think that when I quit uni I just went dumb, quit life, and rot in bed. Bruh can u relax ?😂
every time I open my PC and connect to the internet, I’m learning
let’s be honest ena malet in uni most of us only read modules for exams and forget them right after,🙄
In tech ? every hour, every minute, you’re googling, low-key abusing AI lol 😅

anyways if anyone who think like this please ከድርጊታችሁ ተቆጠቡ😂

@AfroSec
😁16🤣5👍3
Forwarded from AXUM SEC
CVE-2025-53770: When SharePoint Zero-Days Proved Perimeter
Security Isn’t Enough
In July 2025, attackers actively exploited a critical SharePoint zero-day to gain unauthenticated RCE, deploy web shells, steal machine keys, and persist even after patching.

The hard truth?
Patching closes the door, but it doesn’t tell you who already walked in.
Modern attacks blend into normal operations and stay quiet. Defending against them takes more than alerts it takes continuous validation and real exposure visibility.
That’s where AxumSec comes in.
Because modern threats don’t wait and security shouldn’t either.

💬 What cyber risk do you think organizations still underestimate?

🔗 https://preregister.axumsec.com
🔥3
my shaylaaa 🙃

@AfroSec
🥰107😁2