𝘾𝙤𝙙𝙚 𝙉 𝘾𝙧𝙖𝙭 – Telegram
𝘾𝙤𝙙𝙚 𝙉 𝘾𝙧𝙖𝙭
513 subscribers
85 photos
3 videos
2 files
46 links
We are CODE N CRAX | ADWA CTF – Ethiopia’s first ever CTF challenge platform. 🏴‍☠️

Born from a love of hacking, problem solving, and sharing knowledge, we’re here to spark the next wave of cybersecurity talent in Ethiopia. 🔐🇪🇹

DM @codeNcrax_support
Download Telegram
🚨 Workshop Postponement Announcement🚨

Please note that the Digital Forensics & Cyber Investigation Workshop, Rescheduled for:

🗓 Wednesday, September 24
8:00 PM (Mata 2 LT)

postponed to next week due to an unexpected situation.

We truly appreciate your understanding and continued support.

#ISHubAAU #DigitalForensics #CyberInvestigation #WorkshopUpdate #NehimyaMesfin #EyerusalemBelay
😭53
#NEWS

🚨 Chrome users: a new zero-day is under active attack.

CVE-2025-10585 targets Chrome’s V8 engine—Chrome’s 6th zero-day of 2025.

Details → https://thehackernews.com/2025/09/google-patches-chrome-zero-day-cve-2025.html

Update now: 140.0.7339.185/.186 (Win/macOS), 140.0.7339.185 (Linux).

If you use Edge/Brave/Opera/Vivaldi, patch too.

Telegram | LinkedIn
2👀2👏1
⚠️ First-ever GPT-4 powered malware uncovered.

Researchers found “MalTerminal,” a prototype that can write its own ransomware or reverse shell—code dated before Nov 2023.

Hackers are also slipping hidden prompts into phishing emails to trick AI scanners and unleash Follina exploits.

Full story

Telegram | LinkedIn
🤯8🎉1
Hey fams 👋 I’m Yeabsira, and I’m excited to share something I’ve been working on in Cybersecurity especially in Reverse Engineering!

🚀 REX – Reverse Engineering Automation Tool

A powerful tool built to automate static malware analysis and make reverse engineering faster and easier.

Key Features:
🔍 Automated static binary analysis
📊 File metadata, entropy, strings, sections
🖥️ Simple GUI + CLI support
Fast & lightweight – built in C and Python

🔒 Designed for educational and research purposes only, safe to use and explore.

Check it out here: 👉 GitHub | LinkedIn
👏12🔥3
#NEWS

🚨 Cisco flaw already under attack: CVE-2025-20352 lets remote hackers crash systems or run code as root via SNMP.

Cisco IOS & IOS XE devices with SNMP enabled are at risk—Meraki MS390 & Catalyst 9300 included. Patch to IOS XE 17.15.4a now.

Full story: https://thehackernews.com/2025/09/cisco-warns-of-actively-exploited-snmp.html

Telegram | LinkedIn
2
🔎 Workshop Recap

Our Digital Forensics & Cyber Investigation workshop was a huge success! 🚀


A big thank you to Nehimya Mesfin for sharing his expert insights on tracing hackers, analyzing digital evidence.

The session was hosted by Eyerusalem Belay , who guided participants through interactive discussions and Q&A.

💡 Key Takeaway:Forensics is more than solving cybercrimes—it’s about combining technology, ethics, and critical thinking to protect and secure our digital world.

Thank you to everyone who joined and made this session truly impactful! 🙌
🔥21
🎥 Missed the session? Don’t worry! We have a video recording available for you to catch up.
🤝21
እንኳን ለብርሃነ መስቀሉ በሰላም አደረሳችሁ!
በአሉ የሰላም ፣ የፍቅር ፣ የመተሳሰብ እንዲሆንላችሁ ከልብ እንመኛለን።


መልካም በአል


Telegram | LinkedIn
10🔥1
🎉 To the burnouts and endless classes!💀

Melkam yetemert gize class lejemerachu hulu 🥂
🔥14
#AdwaCTF

Just getting started!! 🇪🇹

Telegram | LinkedIn
🔥19🎉10👍2
#AdwaCTF #Adwa_Night

👨‍💻 Get ready... a little fun is waiting for you at the end of this week! 🥁🥁

Telegram | LinkedIn
🔥103👏2
Forwarded from INSA Cyber Talent Center
የCTF ውድድር ጥሪ!

የኢንፎርሜሽን መረብ ደህንነት አስተዳደር (ኢመደአ)

6ኛው ሀገር አቀፍ የሳይበር ደህንነት ወርን ምክንያት በማድረግ የተዘጋጀ የCapture The Flag (CTF) ውድድር!!
የሳይበር ደህንነት ክህሎትዎን የሚፈትሹበት እና ከሌሎች የዘርፉ ባለሙያዎች ጋር የሚወዳደሩበት መድረክ !!

ይወዳደሩ! ይሸለሙ!

ለመመዝገብ፡- ከታች ያለውን QR ኮድ ስካን ያድርጉ
ቦታ የኢንፎርሜሽን መረብ ደህንነት አስተዳደር (ኢመደአ) በአካል
ቀን ጥቅምት 1/2018ዓ.ም
ከ ጠዋቱ 2፡ 30 በአካል