AfroSec
606 subscribers
316 photos
22 videos
6 files
161 links
hello friend
am AfroSec | AASTU dropout | cybersecurity enthusiast | CRTOM | CRTA | passionate abt Red Teaming :)))

portifolio : soon....
file : @Afr0Files
Download Telegram
Forwarded from AXUM SEC
CVE-2025-53770: When SharePoint Zero-Days Proved Perimeter
Security Isnโ€™t Enough
In July 2025, attackers actively exploited a critical SharePoint zero-day to gain unauthenticated RCE, deploy web shells, steal machine keys, and persist even after patching.

The hard truth?
Patching closes the door, but it doesnโ€™t tell you who already walked in.
Modern attacks blend into normal operations and stay quiet. Defending against them takes more than alerts it takes continuous validation and real exposure visibility.
Thatโ€™s where AxumSec comes in.
Because modern threats donโ€™t wait and security shouldnโ€™t either.

๐Ÿ’ฌ What cyber risk do you think organizations still underestimate?

๐Ÿ”— https://preregister.axumsec.com
๐Ÿ”ฅ3
my shaylaaa ๐Ÿ™ƒ

@AfroSec
๐Ÿฅฐ10โค7๐Ÿ˜2
#random
istg cybersec taught me patience more than any thing ๐Ÿฅฒ

@AfroSec
๐Ÿ’ฏ10๐Ÿ™1๐Ÿ˜ญ1
life of a tech dude and gamer lol๐Ÿ˜‚

@AfroSec
๐Ÿคฃ10๐Ÿ˜5๐Ÿ”ฅ4
do u want some ๐Ÿ™ƒ?

@AfroSec
๐Ÿฅฐ7๐Ÿ˜3๐Ÿ˜ญ3
Forwarded from Robi makes stuff (Robi)
the central dick of ethiopia
๐Ÿคฃ18๐Ÿ˜4๐Ÿ˜ญ2
mimipenguin yk ths tool ? eski guess gn dont look up on google or AI

cool name tho :)

@AfroSec
๐Ÿค”4๐Ÿ”ฅ1
The Hacker News
Researchers uncovered SHADOW#REACTOR, a multi-stage campaign delivering Remcos RAT. It starts with an obfuscated VBS launcher, moves through PowerShell, and rebuilds fragmented text payloads in memory. The defining trait is text-only stagers and LOLBin abuseโ€ฆ
First time seeing text-based stagers in the wild ๐Ÿ˜ฎโ€๐Ÿ’จ These guys are creative as hell fr

their Attack chain was like :
> Obfuscated VBS โ†’ PowerShell โ†’ Text payload fragments โ†’ .NET Reactor loader โ†’ MSBuild.exe โ†’ Remcos RAT
> All in-memory reconstruction (fileless where possible)
> Self-healing downloaders that retry if payloads fail

The whole "access-as-a-service" economy is wild rn ๐Ÿ˜‚

They did slip up tho large .txt files being processed by powerShell would raise SOC eyebrows but their evasion game was strong good

Text-based payloads avoid signature detection
.NET Reactor obfuscation breaks static analysis
Living-off-the-land with MSBuild.exe
Memory-only execution avoids file scanning

Overall rating: 8.5/10 ๐Ÿ˜‚๐Ÿ˜‚
solid OPSEC, creative TTPs, but that PowerShell + .txt combo is a bit loud for sustained stealth ๐Ÿ™ƒ

@AfroSec
๐Ÿคฏ2โšก1๐Ÿค“1
when chatgpt got surprised ๐Ÿ˜‚

he thought am just dum this whole time (actually i am on specific stuff tho :) ) lol

@AfroSec
1๐Ÿ˜11๐Ÿคฃ5๐Ÿ˜ญ1
This media is not supported in your browser
VIEW IN TELEGRAM
แˆ›แˆˆแ‰ต แАแ‰ แˆญ ๐Ÿ‘Š

@AfroSec
๐Ÿ’ฏ6๐Ÿคฃ5
This media is not supported in your browser
VIEW IN TELEGRAM
Rest in Peace Netsanet Werkineh ๐Ÿ˜ข๐Ÿฅ€๐Ÿฅ€๐Ÿฅ€๐Ÿฅ€

@AfroSec
๐Ÿ’”12๐Ÿ˜ญ1
melkam timket everyone โค๏ธโค๏ธโค๏ธ

and boys we need to gear up๐Ÿ‹๐Ÿ‹๐Ÿ˜Ž๐Ÿ˜‰
In the meantime ladies, hereโ€™s a gentle reminder that you could be a target at any moment so be ready for the show lol ๐Ÿ˜„

@AfroSec
3โค10๐Ÿ˜5๐Ÿฆ„2
Forwarded from Florida๐Ÿ›ธ
I built my own AI News Pipeline (and why?..."readily made" apps weren't enough for me:(

I have seen many apps that claim to deliver customized news, but most of them are hidden systems where you can't control the logic, or they get the facts wrong..i wanted a system that acted as a high level content curator, so I built a custom ETL pipeline to solve this for myself

Here is what you won't find in most AI news apps:

-Parallel Data Architecture: this prevents AI hallucinations by splitting the data stream. the LLM handles the creative rewrite, while the original URLs are preserved in a separate path.
- Local LLM: by running the intelligence layer locally, i eliminated API costs,privacy concerns and third-party subscriptions.
- Smart Ranking & Filtering: delivering only the top 6 highest value stories

As a result,i no longer wake up to a mess of notifications...i just get a professional and summarized briefing of exactly what I need to know
โšก9๐Ÿ”ฅ4
what is happening on ticktok tho my fyp is full of 2016 throwback

@AfroSec
โค4
Rather Be (feat. Jess Glynne)
Clean Bandit
speaking of throwback โœจ

@AfroSec
โค2โšก2๐Ÿฅฐ1
Forwarded from Cyber Vanguard @ CTBE
Are you ready to join today and tomorrow's cybersecurity foot soldiers?

picoCTF-Africa 2026 is back! Bigger, better and upto 80 students to be awarded!

Join our picoCTF-Africa prep info session
๐Ÿ“… 24 January
โฐ 11 am Rwanda time ( convert time to your own country )
โ›“๏ธโ€๐Ÿ’ฅ  bit.ly/picoCTF2026

Registration for the CTF opens on 1 February 2026, so get ready.
Competition runs 9 - 19 March 2026

stay alert. protect your accounts. share this with a friend

https://www.instagram.com/p/DTxI73ZDAS2/?igsh=MWlzYWgwbTZ1c3UyMA==
โšก3
yup just like that ๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚

We listen, we don't judge โŒ
We see, we don't judge โœ…

@AfroSec
๐Ÿคฃ9๐Ÿ˜5
https://fearsoff.org/research/cloudflare-acme

so i was Just reading about logic bug in Cloudflare's ACME validation Found by Fearsoff .

when Cloudflare handles SSL cert challenges (/.well-known/acme-challenge/*), it turns off WAF so CAs can validate without interference but the old logic sometimes disabled WAF even for invalid tokens, letting malicious requests slip through to origin. smooth bypass path.

i also saw that Cloudflare posted about it Cloudflare blog

they patched it quick and they said that no evidence of exploitation so far,
( nah i dont believe that tho ๐Ÿ™„)

@AfroSec
1โšก1๐Ÿค”1๐Ÿคฏ1