AfroSec
606 subscribers
316 photos
22 videos
6 files
161 links
hello friend
am AfroSec | AASTU dropout | cybersecurity enthusiast | CRTOM | CRTA | passionate abt Red Teaming :)))

portifolio : soon....
file : @Afr0Files
Download Telegram
AfroSec
ladies and gents we have an update lol πŸ˜… 2026 will be mine ngl i feel it πŸ’ͺπŸ’ͺπŸ”₯ @AfroSec
btw I dropped out this year from the start but I forgot to announce it enji

@AfroSec
😁15🀣2
Forwarded from FloridaπŸ›Έ
I’ve been deep diving into n8n for the past 4 months, and honestly it’s become the glue for almost all my AI and data experiments.

For those who haven't come across it yet, n8n is basically a flexible automation tool. it’s a bridge that helps your data move and it lets you connect your favorite apps, AI models, and databases using a visual node based interface. I actually spent some time trying to make Google Cloud Workflows work for my setup too, but i eventually went all in on n8n.
The biggest reason why i chose n8n over Google Cloud Workflows is the pre-built nodes and speed. in n8n, if i want to connect a Telegram bot to OpenAI and then dump the data into a database, i just add the nodes and link them together visually. in Google Cloud Workflows, i’d be writing lines of text based configuration files and manually handling API authentications for every single service. n8n lets me spend more time building the actual "AI logic" and less time fighting with documentation. So use Google Cloud Workflows to coordinate and manage internal Google services (like Bigquery) with high-scale, enterprise-level reliability, and you're comfortable writing code to keep things lightweight.

Use n8n when you want to prototype fast, connect dozens of different SaaS tools, or build complex AI agents without getting stuck in a technical setup
❀5
enema i have to be zeroday reseller fr πŸ˜‚ betam awach new eko

@AfroSec
😁4🀣2
🩸 CRTOM β€” done.

Started my red team cert path with Red Team Operations Management.
Not about popping shells yet β€” this one’s about how real ops are planned, scoped, and run.

Foundations first:
🧠 attacker mindset
πŸ“‹ engagement flow
🎯 operational thinking

@AfroSec
⚑23❀2πŸ†2
#random

the caffeine hit is not talkable fr πŸ˜‚

@AfroSec
😁8
Forwarded from Genesis (ISRAƎL)
Risk is always better than regret
πŸ”₯6
αŠ₯αŠ•αŠ³αŠ• ለα‰₯αˆ­αˆƒαŠ αˆα‹°α‰± α‰ αˆ°αˆ‹αˆ αŠ α‹°αˆ¨αˆ³α‰½αˆ !

@AfroSec
3❀20πŸ₯°2
hey yall how is holiday goinn' ?

@AfroSec
πŸ‘Œ8❀1
This media is not supported in your browser
VIEW IN TELEGRAM
can we make it anonymous seriously like by changing the bios chip firmware and stuff like that ?

@AfroSec
✍2πŸ€”2
Some people think that when I quit uni I just went dumb, quit life, and rot in bed. Bruh can u relax ?πŸ˜‚
every time I open my PC and connect to the internet, I’m learning
let’s be honest ena malet in uni most of us only read modules for exams and forget them right after,πŸ™„
In tech ? every hour, every minute, you’re googling, low-key abusing AI lol πŸ˜…

anyways if anyone who think like this please αŠ¨α‹΅αˆ­αŒŠα‰³α‰½αˆ α‰°α‰†αŒ α‰‘πŸ˜‚

@AfroSec
😁16🀣5πŸ‘3
Forwarded from AXUM SEC
CVE-2025-53770: When SharePoint Zero-Days Proved Perimeter
Security Isn’t Enough
In July 2025, attackers actively exploited a critical SharePoint zero-day to gain unauthenticated RCE, deploy web shells, steal machine keys, and persist even after patching.

The hard truth?
Patching closes the door, but it doesn’t tell you who already walked in.
Modern attacks blend into normal operations and stay quiet. Defending against them takes more than alerts it takes continuous validation and real exposure visibility.
That’s where AxumSec comes in.
Because modern threats don’t wait and security shouldn’t either.

πŸ’¬ What cyber risk do you think organizations still underestimate?

πŸ”— https://preregister.axumsec.com
πŸ”₯3
my shaylaaa πŸ™ƒ

@AfroSec
πŸ₯°10❀7😁2
#random
istg cybersec taught me patience more than any thing πŸ₯²

@AfroSec
πŸ’―10πŸ™1😭1
life of a tech dude and gamer lolπŸ˜‚

@AfroSec
🀣10😁5πŸ”₯4
do u want some πŸ™ƒ?

@AfroSec
πŸ₯°7😁3😭3