AfroSec – Telegram
AfroSec
590 subscribers
307 photos
21 videos
6 files
153 links
hello friend
am AfroSec | AASTU dropout | cybersecurity enthusiast | passionate abt Red Teaming :)))

portifolio : soon....
file : @Afr0Files
Download Telegram
Forwarded from Genesis (ISRAƎL)
Risk is always better than regret
🔥6
እንኳን ለብርሃነ ልደቱ በሰላም አደረሳችሁ !

@AfroSec
320🥰2
hey yall how is holiday goinn' ?

@AfroSec
👌81
This media is not supported in your browser
VIEW IN TELEGRAM
can we make it anonymous seriously like by changing the bios chip firmware and stuff like that ?

@AfroSec
2🤔2
Some people think that when I quit uni I just went dumb, quit life, and rot in bed. Bruh can u relax ?😂
every time I open my PC and connect to the internet, I’m learning
let’s be honest ena malet in uni most of us only read modules for exams and forget them right after,🙄
In tech ? every hour, every minute, you’re googling, low-key abusing AI lol 😅

anyways if anyone who think like this please ከድርጊታችሁ ተቆጠቡ😂

@AfroSec
😁16🤣5👍3
Forwarded from AXUM SEC
CVE-2025-53770: When SharePoint Zero-Days Proved Perimeter
Security Isn’t Enough
In July 2025, attackers actively exploited a critical SharePoint zero-day to gain unauthenticated RCE, deploy web shells, steal machine keys, and persist even after patching.

The hard truth?
Patching closes the door, but it doesn’t tell you who already walked in.
Modern attacks blend into normal operations and stay quiet. Defending against them takes more than alerts it takes continuous validation and real exposure visibility.
That’s where AxumSec comes in.
Because modern threats don’t wait and security shouldn’t either.

💬 What cyber risk do you think organizations still underestimate?

🔗 https://preregister.axumsec.com
🔥3
my shaylaaa 🙃

@AfroSec
🥰107😁2
#random
istg cybersec taught me patience more than any thing 🥲

@AfroSec
💯10🙏1😭1
life of a tech dude and gamer lol😂

@AfroSec
🤣10😁5🔥3
do u want some 🙃?

@AfroSec
🥰7😁3😭3
Forwarded from Robi makes stuff (Robi)
the central dick of ethiopia
🤣18😁4😭2
mimipenguin yk ths tool ? eski guess gn dont look up on google or AI

cool name tho :)

@AfroSec
🤔4🔥1
The Hacker News
Researchers uncovered SHADOW#REACTOR, a multi-stage campaign delivering Remcos RAT. It starts with an obfuscated VBS launcher, moves through PowerShell, and rebuilds fragmented text payloads in memory. The defining trait is text-only stagers and LOLBin abuse…
First time seeing text-based stagers in the wild 😮‍💨 These guys are creative as hell fr

their Attack chain was like :
> Obfuscated VBS → PowerShell → Text payload fragments → .NET Reactor loader → MSBuild.exe → Remcos RAT
> All in-memory reconstruction (fileless where possible)
> Self-healing downloaders that retry if payloads fail

The whole "access-as-a-service" economy is wild rn 😂

They did slip up tho large .txt files being processed by powerShell would raise SOC eyebrows but their evasion game was strong good

Text-based payloads avoid signature detection
.NET Reactor obfuscation breaks static analysis
Living-off-the-land with MSBuild.exe
Memory-only execution avoids file scanning

Overall rating: 8.5/10 😂😂
solid OPSEC, creative TTPs, but that PowerShell + .txt combo is a bit loud for sustained stealth 🙃

@AfroSec
🤯21🤓1
when chatgpt got surprised 😂

he thought am just dum this whole time (actually i am on specific stuff tho :) ) lol

@AfroSec
1😁9🤣5😭1