kriwareAI
@kriwareAI
Followers
27
Following
7
Media
5
Statuses
258
Al Prompter. Just posting AI stuff here, main account: @kriwarez.
Spain
Joined June 2024
Nueva entrega de la newsletter semanal de IA 🧠 Esta semana (8–14 dic): nuevos modelos, grandes alianzas, avances técnicos y decisiones que marcarán el futuro del sector. Más información aquí 👇👇👇👇👇
0
1
1
🚀 Semana movida en IA: 🔐 Brecha de datos en OpenAI. 🧠 Claude Opus 4.5 supera a ingenieros. ⚙️ Google lanza TPU v7 “Ironwood”. 🇺🇸 EE.UU. activa la “Misión Génesis”… ➕ más noticias en la newsletter Todo el resumen en Prompt & Code 👇👇👇👇
0
1
3
Big thanks to @wondercraft_ai for making content creation this effortless!
0
0
1
I’ve always been obsessed with the cinematic trailers from World of Warcraft — the epic vibe, the music, the visuals… And now, thanks to AI, I can actually step inside one. Be the hero of my own Blizzard-style trailer. Gamer nostalgia + AI magic = the perfect combo
1
3
5
Some tests this weekend, keeping consistency between shots is the real challenge, but some pretty cool stuff came out Image: FLUX.1 [pro] and gpt-image-1 Video: @Kling_ai Voice: @elevenlabsio Music: @udiomusic Script: @ChatGPTapp
0
1
1
The article details a path traversal vulnerability in Adobe Acrobat Reader for Android, which, when combined with dynamic code loading, allows remote code execution. https://t.co/znu4jwDiZ1
#android #cve
hulkvision.github.io
# Summary While testing Adobe Acrobat reader app , the app has a feature which allows user to open pdfs directly from http/https url. This feature was vulnerable to path traversal vulnerability....
0
0
0
A practical walkthrough of reversing AES crypto functions using Ghidra to analyze key scheduling and encryption logic. https://t.co/ai5WD9Bgm9
#AES #crypto #re
0
0
0
Deep dive into how syscalls work in the Windows kernel, exploring structures, debugging, and reversing techniques. https://t.co/ySvZR0izKn
#WindowsKernel
0
0
0
Introductory guide on fuzzing using LibAFL, covering setup, techniques, and examples to discover software vulnerabilities. https://t.co/VaAiSpQ2FA
#Fuzzing #LibAFL
epi052.gitlab.io
Part one of a series covering fuzzer development using LibAFL
0
0
0
How detect CVE-2025-29927, analyze your application's reliance on middleware-based authorization and test for unauthorized access by manipulating the x-middleware-subrequest header. https://t.co/Vaz3cy764O
#nextjs #detection
patrowl.io
Betailing the GX text vulnerability, with an in-depth analysis and comprehensive research to make the study more thorough and exhaustive.
0
0
0
This article delves into the Android Activity lifecycle, examining state transitions and callbacks from creation to destruction. https://t.co/V0Mbmttg50
#android
8ksec.io
Introduction The Android Activity lifecycle is a sequence of state changes and callbacks that every Android Activity goes through from creation to destruction.Understanding the Android Activity...
0
0
0
DeFiHackLabs is a repository that provides proof-of-concept demonstrations of past DeFi hacking incidents using Foundry. https://t.co/2QaaJdTpwD
#web3 #labs #blockchain
0
0
1
Researchers have developed the 'Diamond Ticket' attack, allowing attackers with access to the KRBTGT key to decrypt and modify legitimate Ticket Granting Tickets (TGTs). https://t.co/jtqd1NCpCH
#ActiveDirectory #windows
trustedsec.com
1.2 Difference Between Golden and Diamond Tickets Both Golden and Diamond Tickets require access to the KRBTGT key. The reason for this is, while Golden…
0
0
0
A critical vulnerability (CVE-2025-29927) in Next.js middleware allows attackers to bypass authorization checks by manipulating the x-middleware-subrequest header. https://t.co/6jk8VkuchV
#cve #nextjs
zhero-web-sec.github.io
CVE-2025-29927
0
0
0
Poc NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File https://t.co/0itbPhGFXy
#poc #ntlm #cve
github.com
CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File - 0x6rss/CVE-2025-24071_PoC
0
0
1
tmp.0ut Volume 4 is the latest edition of the zine, featuring articles on topics such as ELF internals, kernel modules, reverse engineering, and hacker culture. https://t.co/81cg1wYlfw
#elf #reversing
0
0
0
This article explores the utility of frida-trace for hooking and tracing numerous methods in mobile applications, especially when dealing with obfuscated codebases. https://t.co/VxhtHop3t8
#frida #mobile
0
0
0
PowerShell-Hunter is a collection of PowerShell-based tools designed to assist defenders in detecting and investigating malicious activity within Windows environments. https://t.co/mDgakHQb9c
#ThreatHunting #PowerShell
github.com
PowerShell tools to help defenders hunt smarter, hunt harder. - MHaggis/PowerShell-Hunter
0
0
0