AfroSec
606 subscribers
316 photos
22 videos
6 files
161 links
hello friend
am AfroSec | AASTU dropout | cybersecurity enthusiast | CRTOM | CRTA | passionate abt Red Teaming :)))

portifolio : soon....
file : @Afr0Files
Download Telegram
#random
istg cybersec taught me patience more than any thing ๐Ÿฅฒ

@AfroSec
๐Ÿ’ฏ10๐Ÿ™1๐Ÿ˜ญ1
life of a tech dude and gamer lol๐Ÿ˜‚

@AfroSec
๐Ÿคฃ10๐Ÿ˜5๐Ÿ”ฅ4
do u want some ๐Ÿ™ƒ?

@AfroSec
๐Ÿฅฐ7๐Ÿ˜3๐Ÿ˜ญ3
Forwarded from Robi makes stuff (Robi)
the central dick of ethiopia
๐Ÿคฃ18๐Ÿ˜4๐Ÿ˜ญ2
mimipenguin yk ths tool ? eski guess gn dont look up on google or AI

cool name tho :)

@AfroSec
๐Ÿค”4๐Ÿ”ฅ1
The Hacker News
Researchers uncovered SHADOW#REACTOR, a multi-stage campaign delivering Remcos RAT. It starts with an obfuscated VBS launcher, moves through PowerShell, and rebuilds fragmented text payloads in memory. The defining trait is text-only stagers and LOLBin abuseโ€ฆ
First time seeing text-based stagers in the wild ๐Ÿ˜ฎโ€๐Ÿ’จ These guys are creative as hell fr

their Attack chain was like :
> Obfuscated VBS โ†’ PowerShell โ†’ Text payload fragments โ†’ .NET Reactor loader โ†’ MSBuild.exe โ†’ Remcos RAT
> All in-memory reconstruction (fileless where possible)
> Self-healing downloaders that retry if payloads fail

The whole "access-as-a-service" economy is wild rn ๐Ÿ˜‚

They did slip up tho large .txt files being processed by powerShell would raise SOC eyebrows but their evasion game was strong good

Text-based payloads avoid signature detection
.NET Reactor obfuscation breaks static analysis
Living-off-the-land with MSBuild.exe
Memory-only execution avoids file scanning

Overall rating: 8.5/10 ๐Ÿ˜‚๐Ÿ˜‚
solid OPSEC, creative TTPs, but that PowerShell + .txt combo is a bit loud for sustained stealth ๐Ÿ™ƒ

@AfroSec
๐Ÿคฏ2โšก1๐Ÿค“1
when chatgpt got surprised ๐Ÿ˜‚

he thought am just dum this whole time (actually i am on specific stuff tho :) ) lol

@AfroSec
1๐Ÿ˜11๐Ÿคฃ5๐Ÿ˜ญ1
This media is not supported in your browser
VIEW IN TELEGRAM
แˆ›แˆˆแ‰ต แАแ‰ แˆญ ๐Ÿ‘Š

@AfroSec
๐Ÿ’ฏ6๐Ÿคฃ5
This media is not supported in your browser
VIEW IN TELEGRAM
Rest in Peace Netsanet Werkineh ๐Ÿ˜ข๐Ÿฅ€๐Ÿฅ€๐Ÿฅ€๐Ÿฅ€

@AfroSec
๐Ÿ’”12๐Ÿ˜ญ1
melkam timket everyone โค๏ธโค๏ธโค๏ธ

and boys we need to gear up๐Ÿ‹๐Ÿ‹๐Ÿ˜Ž๐Ÿ˜‰
In the meantime ladies, hereโ€™s a gentle reminder that you could be a target at any moment so be ready for the show lol ๐Ÿ˜„

@AfroSec
3โค10๐Ÿ˜5๐Ÿฆ„2
Forwarded from Florida๐Ÿ›ธ
I built my own AI News Pipeline (and why?..."readily made" apps weren't enough for me:(

I have seen many apps that claim to deliver customized news, but most of them are hidden systems where you can't control the logic, or they get the facts wrong..i wanted a system that acted as a high level content curator, so I built a custom ETL pipeline to solve this for myself

Here is what you won't find in most AI news apps:

-Parallel Data Architecture: this prevents AI hallucinations by splitting the data stream. the LLM handles the creative rewrite, while the original URLs are preserved in a separate path.
- Local LLM: by running the intelligence layer locally, i eliminated API costs,privacy concerns and third-party subscriptions.
- Smart Ranking & Filtering: delivering only the top 6 highest value stories

As a result,i no longer wake up to a mess of notifications...i just get a professional and summarized briefing of exactly what I need to know
โšก9๐Ÿ”ฅ4
what is happening on ticktok tho my fyp is full of 2016 throwback

@AfroSec
โค4
Rather Be (feat. Jess Glynne)
Clean Bandit
speaking of throwback โœจ

@AfroSec
โค2โšก2๐Ÿฅฐ1
Forwarded from Cyber Vanguard @ CTBE
Are you ready to join today and tomorrow's cybersecurity foot soldiers?

picoCTF-Africa 2026 is back! Bigger, better and upto 80 students to be awarded!

Join our picoCTF-Africa prep info session
๐Ÿ“… 24 January
โฐ 11 am Rwanda time ( convert time to your own country )
โ›“๏ธโ€๐Ÿ’ฅ  bit.ly/picoCTF2026

Registration for the CTF opens on 1 February 2026, so get ready.
Competition runs 9 - 19 March 2026

stay alert. protect your accounts. share this with a friend

https://www.instagram.com/p/DTxI73ZDAS2/?igsh=MWlzYWgwbTZ1c3UyMA==
โšก3
yup just like that ๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚

We listen, we don't judge โŒ
We see, we don't judge โœ…

@AfroSec
๐Ÿคฃ9๐Ÿ˜5
https://fearsoff.org/research/cloudflare-acme

so i was Just reading about logic bug in Cloudflare's ACME validation Found by Fearsoff .

when Cloudflare handles SSL cert challenges (/.well-known/acme-challenge/*), it turns off WAF so CAs can validate without interference but the old logic sometimes disabled WAF even for invalid tokens, letting malicious requests slip through to origin. smooth bypass path.

i also saw that Cloudflare posted about it Cloudflare blog

they patched it quick and they said that no evidence of exploitation so far,
( nah i dont believe that tho ๐Ÿ™„)

@AfroSec
1โšก1๐Ÿค”1๐Ÿคฏ1
End of Beginning
Djo
โค5โคโ€๐Ÿ”ฅ2
aight guys
one step forward always โœจ

today i took the CRTA exam and passed uk it was a bit tricky at some point but i handled it ๐Ÿ’ช

through this cert i learned:
โ€ข Red Teaming
โ€ข Pentesting
โ€ข MITRE ATT&CK
โ€ข Web & Network Attacks
โ€ข Enterprise Tech
โ€ข Windows Security
โ€ข Adversary Simulation
โ€ข Red Team Methodologies

but look you gotta have a researcher mindset. you gotta explore beyond the course and the syslabs.

tbh i subscribed to this for the sake of infra, ykโ€ฆ for pivot and stuff like that.
anyway let's celebrate small wins here ๐ŸŽ‰

thanks that you guys are here all the time.
like i said always one step forward

@AfroSec
3๐Ÿ”ฅ26๐ŸŽ‰3๐Ÿ†2โšก1
๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚ ere ere snt aynet gud ale


@AfroSec
1๐Ÿ˜ญ11๐Ÿคฃ4๐Ÿ˜2