kriwareAI Profile Banner
kriwareAI Profile
kriwareAI

@kriwareAI

Followers
27
Following
7
Media
5
Statuses
258

Al Prompter. Just posting AI stuff here, main account: @kriwarez.

Spain
Joined June 2024
Don't wanna be here? Send us removal request.
@kriwarez
Cristian Cantos
3 days
Nueva entrega de la newsletter semanal de IA 🧠 Esta semana (8–14 dic): nuevos modelos, grandes alianzas, avances técnicos y decisiones que marcarán el futuro del sector. Más información aquí 👇👇👇👇👇
0
1
1
@kriwarez
Cristian Cantos
17 days
🚀 Semana movida en IA: 🔐 Brecha de datos en OpenAI. 🧠 Claude Opus 4.5 supera a ingenieros. ⚙️ Google lanza TPU v7 “Ironwood”. 🇺🇸 EE.UU. activa la “Misión Génesis”… ➕ más noticias en la newsletter Todo el resumen en Prompt & Code 👇👇👇👇
0
1
3
@kriwareAI
kriwareAI
2 months
Big thanks to @wondercraft_ai for making content creation this effortless!
0
0
1
@kriwareAI
kriwareAI
2 months
Happy Halloween! 🎃👻
1
1
2
@kriwareAI
kriwareAI
2 months
Also made one in Spanish, my native language. Gracias, AI 🇪🇸
0
1
2
@kriwareAI
kriwareAI
2 months
I’ve always been obsessed with the cinematic trailers from World of Warcraft — the epic vibe, the music, the visuals… And now, thanks to AI, I can actually step inside one. Be the hero of my own Blizzard-style trailer. Gamer nostalgia + AI magic = the perfect combo
1
3
5
@kriwareAI
kriwareAI
5 months
Some tests this weekend, keeping consistency between shots is the real challenge, but some pretty cool stuff came out Image: FLUX.1 [pro] and gpt-image-1 Video: @Kling_ai Voice: @elevenlabsio Music: @udiomusic Script: @ChatGPTapp
0
1
1
@kriwareAI
kriwareAI
9 months
The article details a path traversal vulnerability in Adobe Acrobat Reader for Android, which, when combined with dynamic code loading, allows remote code execution. https://t.co/znu4jwDiZ1 #android #cve
Tweet card summary image
hulkvision.github.io
# Summary While testing Adobe Acrobat reader app , the app has a feature which allows user to open pdfs directly from http/https url. This feature was vulnerable to path traversal vulnerability....
0
0
0
@kriwareAI
kriwareAI
9 months
A practical walkthrough of reversing AES crypto functions using Ghidra to analyze key scheduling and encryption logic. https://t.co/ai5WD9Bgm9 #AES #crypto #re
0
0
0
@kriwareAI
kriwareAI
9 months
Deep dive into how syscalls work in the Windows kernel, exploring structures, debugging, and reversing techniques. https://t.co/ySvZR0izKn #WindowsKernel
0
0
0
@kriwareAI
kriwareAI
9 months
Introductory guide on fuzzing using LibAFL, covering setup, techniques, and examples to discover software vulnerabilities. https://t.co/VaAiSpQ2FA #Fuzzing #LibAFL
Tweet card summary image
epi052.gitlab.io
Part one of a series covering fuzzer development using LibAFL
0
0
0
@kriwareAI
kriwareAI
9 months
How detect CVE-2025-29927, analyze your application's reliance on middleware-based authorization and test for unauthorized access by manipulating the x-middleware-subrequest header.​ https://t.co/Vaz3cy764O #nextjs #detection
patrowl.io
Betailing the GX text vulnerability, with an in-depth analysis and comprehensive research to make the study more thorough and exhaustive.
0
0
0
@kriwareAI
kriwareAI
9 months
DeFiHackLabs is a repository that provides proof-of-concept demonstrations of past DeFi hacking incidents using Foundry. https://t.co/2QaaJdTpwD #web3 #labs #blockchain
0
0
1
@kriwareAI
kriwareAI
9 months
Researchers have developed the 'Diamond Ticket' attack, allowing attackers with access to the KRBTGT key to decrypt and modify legitimate Ticket Granting Tickets (TGTs). https://t.co/jtqd1NCpCH #ActiveDirectory #windows
Tweet card summary image
trustedsec.com
1.2 Difference Between Golden and Diamond Tickets Both Golden and Diamond Tickets require access to the KRBTGT key. The reason for this is, while Golden…
0
0
0
@kriwareAI
kriwareAI
9 months
A critical vulnerability (CVE-2025-29927) in Next.js middleware allows attackers to bypass authorization checks by manipulating the x-middleware-subrequest header. https://t.co/6jk8VkuchV #cve #nextjs
zhero-web-sec.github.io
CVE-2025-29927
0
0
0
@kriwareAI
kriwareAI
9 months
tmp.0ut Volume 4 is the latest edition of the zine, featuring articles on topics such as ELF internals, kernel modules, reverse engineering, and hacker culture. https://t.co/81cg1wYlfw #elf #reversing
0
0
0
@kriwareAI
kriwareAI
9 months
This article explores the utility of frida-trace for hooking and tracing numerous methods in mobile applications, especially when dealing with obfuscated codebases. https://t.co/VxhtHop3t8 #frida #mobile
0
0
0
@kriwareAI
kriwareAI
9 months
PowerShell-Hunter is a collection of PowerShell-based tools designed to assist defenders in detecting and investigating malicious activity within Windows environments. https://t.co/mDgakHQb9c #ThreatHunting #PowerShell
Tweet card summary image
github.com
PowerShell tools to help defenders hunt smarter, hunt harder. - MHaggis/PowerShell-Hunter
0
0
0