Forwarded from Dawit Beza
Are you an African who dreams of building Google-level software engineering skills?
Applications are now open for A2SV G7 Education!
This is your moment to learn, grow, and prepare for the top tech companies you’ve always aspired to join.
At A2SV Education, you’ll join a vibrant community that challenges you to think bigger, code smarter, and create real impact across Africa 🌍.
⏱️ It only takes 7 minutes to apply. Take your shot at joining A2SV G7 Education today!
👉 Apply now: https://form.typeform.com/to/wOWdCFrZ
📣 Spread the word! Tag a friend, share this post, and help us reach more brilliant African minds ready to transform their future through A2SV.
Together, we empower Africa’s next generation of world-class engineers and tech entrepreneurs! 💪 💻
#A2SV #Education #Generation7 #TopTech #ApplicationsAreOpen #SoftwareEngineering #AfricaTech
Applications are now open for A2SV G7 Education!
This is your moment to learn, grow, and prepare for the top tech companies you’ve always aspired to join.
At A2SV Education, you’ll join a vibrant community that challenges you to think bigger, code smarter, and create real impact across Africa 🌍.
⏱️ It only takes 7 minutes to apply. Take your shot at joining A2SV G7 Education today!
👉 Apply now: https://form.typeform.com/to/wOWdCFrZ
📣 Spread the word! Tag a friend, share this post, and help us reach more brilliant African minds ready to transform their future through A2SV.
Together, we empower Africa’s next generation of world-class engineers and tech entrepreneurs! 💪 💻
#A2SV #Education #Generation7 #TopTech #ApplicationsAreOpen #SoftwareEngineering #AfricaTech
Typeform
A2SV G7 Education Application Form
Turn data collection into an experience with Typeform. Create beautiful online forms, surveys, quizzes, and so much more. Try it for FREE.
❤4
Forwarded from The Hacker News
🔴 The next big breach won’t start with a stolen password.
It’ll come from your own AI.
Agentic AIs are the new “confused deputies” — doing what attackers tell them, with the access you gave them.
The scariest part? You trained the threat ↓ https://thehackernews.com/2025/10/preparing-for-digital-battlefield-of.html
It’ll come from your own AI.
Agentic AIs are the new “confused deputies” — doing what attackers tell them, with the access you gave them.
The scariest part? You trained the threat ↓ https://thehackernews.com/2025/10/preparing-for-digital-battlefield-of.html
❤2
https://freeforstudents.org/row
Free for students , u can get free tools , software development packs for free and other paid things with discount using ur university id
Free for students , u can get free tools , software development packs for free and other paid things with discount using ur university id
❤8
kid cyber
notebooklm just added a video review .....has anyone tried it ?
the pictures it uses , the text , the sound gets improved tbh i got 8 min video and it is actually nice give it a try and DROP UR THOUGHTS , for subjects that doesn't have calculation it helps a lot
🔥5
Forwarded from The Hacker News
⚠️ Researchers have found 7 new ways to hack ChatGPT (GPT-4o and GPT-5), including zero-click attacks that can steal chat history and even poison your AI's memory.
OpenAI fixed some of them... but not all of them.
Details here → https://thehackernews.com/2025/11/researchers-find-chatgpt.html
OpenAI fixed some of them... but not all of them.
Details here → https://thehackernews.com/2025/11/researchers-find-chatgpt.html
❤2
Forwarded from AASTU CSC (Abrham M)
Hey cyber enthusiasts 👋
Are you ready for full of learning, fun, and challenges?
In collaboration with AASTU, INSA, and AASTU Cyber Security Club (CSC)
Come and be part of an interactive Cybersecurity Workshop, Panel Discussion, Quiz, and Games, all designed to help you explore the digital world safely and sharpen your cybersecurity skills.
💡 What’s waiting for you?
• Workshop – Learn the fundamentals of cybersecurity and explore real-world techniques.
• Panel Discussion – Hear from experts about current cyber threats and how to defend against them.
• Quiz & Games – Challenge your knowledge, compete with friends, and win awesome prizes.
• Networking – Meet cybersecurity professionals, enthusiasts, and new friends who share your passion.
👩💻 Who can join?
Everyone! Whether you’re a beginner, a tech student, or simply curious about cybersecurity, this event is for you.
🎁 Why you shouldn’t miss it:
You’ll learn from experts, participate in hands-on activities, test your skills, and have fun all in one event.
Fill out the form below to secure your spot. Seats are limited:
https://forms.gle/4K6Ae54Q7Lc2Nnn28
@AASTU_CYBERCLUB
Are you ready for full of learning, fun, and challenges?
In collaboration with AASTU, INSA, and AASTU Cyber Security Club (CSC)
Come and be part of an interactive Cybersecurity Workshop, Panel Discussion, Quiz, and Games, all designed to help you explore the digital world safely and sharpen your cybersecurity skills.
Date: Wednesday, November 12, 2025
Time: 7:30 local time
Location: AASTU
💡 What’s waiting for you?
• Workshop – Learn the fundamentals of cybersecurity and explore real-world techniques.
• Panel Discussion – Hear from experts about current cyber threats and how to defend against them.
• Quiz & Games – Challenge your knowledge, compete with friends, and win awesome prizes.
• Networking – Meet cybersecurity professionals, enthusiasts, and new friends who share your passion.
👩💻 Who can join?
Everyone! Whether you’re a beginner, a tech student, or simply curious about cybersecurity, this event is for you.
🎁 Why you shouldn’t miss it:
You’ll learn from experts, participate in hands-on activities, test your skills, and have fun all in one event.
Fill out the form below to secure your spot. Seats are limited:
https://forms.gle/4K6Ae54Q7Lc2Nnn28
@AASTU_CYBERCLUB
❤3
Forwarded from AASTU CSC (ㅤ)
🔥 Saturday CYberNight is BACK!🔥
Yo fam after a long break, our SaturdayCYber Night sessions are finally making a comeback tomorrow night at 8:30 PM (EAT)😎
And guess what? We’re kicking it off *big* this time — with a special guest joining us, a real hacker & red team engineer who’s been deep in the trenches of offensive security. Expect raw stories, mindset talk, and some serious red team wisdom.
Bring your snacks, your curiosity, and your questions — it’s gonna be one of those nights again 💀
#Cybersecurity #RedTeam #HackerTalk
@AASTU_Cyberclub
Yo fam after a long break, our SaturdayCYber Night sessions are finally making a comeback tomorrow night at 8:30 PM (EAT)😎
And guess what? We’re kicking it off *big* this time — with a special guest joining us, a real hacker & red team engineer who’s been deep in the trenches of offensive security. Expect raw stories, mindset talk, and some serious red team wisdom.
📍 Where: Here on Telegram
🕗 When: Saturday, 8:30 PM EAT
Bring your snacks, your curiosity, and your questions — it’s gonna be one of those nights again 💀
#Cybersecurity #RedTeam #HackerTalk
@AASTU_Cyberclub
❤5
https://news.1rj.ru/str/Senivoo1/125
this is actually a nice project
this is actually a nice project
Telegram
SENIVO
Our readers’ page is looking better than ever! 🌟
We’re currently rolling out new features to enhance your book experience, including:
❤️ Favorites — Save and revisit your most-loved reads easily.
✍️ Author Profiles — Explore more about your favorite authors…
We’re currently rolling out new features to enhance your book experience, including:
❤️ Favorites — Save and revisit your most-loved reads easily.
✍️ Author Profiles — Explore more about your favorite authors…
❤4
Forwarded from Ge'ez Tech® ግዕዝ ቴክ
⚡️ Course Highlights
✔️Aspiring Penetration Testers
✔️SOC Analysts moving to Offensive Security
✔️System/Network Admins hardening their environments
✔️Anyone ready to Think Like an Adversary
Register Now: https://course.geezsecurity.com/course/gtcrt
ለበለጠ መረጃ👇👇
Contact Us
#GTCRT @geeztechgroup
Please open Telegram to view this post
VIEW IN TELEGRAM
❤3
https://youtu.be/sTkHcix2mlU?si=DOleC7XeBIb5Z399
just chilling in youtube after long hours of study for exam and i got this kid 16 year old self-taught developer .......starting from such young age is actually a good thing what was i doing at the age of 16😭
just chilling in youtube after long hours of study for exam and i got this kid 16 year old self-taught developer .......starting from such young age is actually a good thing what was i doing at the age of 16😭
YouTube
I Built My First App at 16
At 16, I built my first app — YScroll 🎉
It’s a mobile application that helps you take control of your time by limiting how much YouTube Shorts you watch.
In this video, I take you behind the scenes of how I designed, built YScroll — from idea to product.…
It’s a mobile application that helps you take control of your time by limiting how much YouTube Shorts you watch.
In this video, I take you behind the scenes of how I designed, built YScroll — from idea to product.…
😭8
I think this works in coding too
In chess: "if u see a good move look for a better one"
In chess: "if u see a good move look for a better one"
❤10🔥2
Forwarded from SeeFun.Dev (Sifen)
Ever notice how some websites don’t tell you whether your email or password is wrong when you try to log in? They just say "Invalid credentials" with no details.That’s actually a security feature.
It’s called User Enumeration Protection.
If a site tells you “email not found,” attackers can test millions of emails and instantly know who has an account. So instead, websites use a generic message to keep your info safe.
@sifendev
It’s called User Enumeration Protection.
If a site tells you “email not found,” attackers can test millions of emails and instantly know who has an account. So instead, websites use a generic message to keep your info safe.
@sifendev
💯4❤3
Working on bruteforce tool using python to understand how does it actually work ..will share it once it is done
🔥4
kid cyber
Working on bruteforce tool using python to understand how does it actually work ..will share it once it is done
here simple bruetforce tool we just provide username, password list, url , and string that show up when invalid credentials are provided.
and the dictionary is for form fields which the server expects we will provide for post method later
we have to inspect and look at the form fieldset it might say user instead of username so we have to check that out otherwise it won't work
and the response.decode part that function returns raw byte so to compare it with the above string we have to decode it (we can use just response.text too)
last one the password list file have to be in the same directory/folder with the tool
disclaimer: try only in intentionally vulnerable website (like i used metasploitable2 dvwa vulnweb)
any comment on it
and the dictionary is for form fields which the server expects we will provide for post method later
we have to inspect and look at the form fieldset it might say user instead of username so we have to check that out otherwise it won't work
and the response.decode part that function returns raw byte so to compare it with the above string we have to decode it (we can use just response.text too)
last one the password list file have to be in the same directory/folder with the tool
disclaimer: try only in intentionally vulnerable website (like i used metasploitable2 dvwa vulnweb)
any comment on it
🔥5❤2👍1