Adam (@adammmm12310) 's Twitter Profile
Adam

@adammmm12310

ID: 1886803774850916353

calendar_today04-02-2025 15:47:40

205 Tweet

73 Followers

4,4K Following

Visual Inference Lab (@visinf) 's Twitter Profile Photo

We are presenting 3 papers at #CVPR2025! Scene-Centric Unsupervised Panoptic Segmentation by Oliver Hahn, Christoph Reich, Nikita Araslanov, Daniel Cremers, Christian Rupprecht, and Stefan Roth Sunday, 8:30 AM, ExHall D, Poster 330 Project Page: visinf.github.io/cups

Kevin2600 (@kevin2600) 's Twitter Profile Photo

github.com/HW-whistleblowโ€ฆ whistleblower of Huawei Pangu LLM - Basically, Huawei copycat the Qwen and used political power to silence all dissenting voices.. what a shame, but this is quite normal inside the wall ๐Ÿ˜”

zhassulan zhussupov (@cocomelonckz) 's Twitter Profile Photo

cocomelonc.github.io/macos/2025/07/โ€ฆ next one from my blog. ASM code tested on Intel, C code tested on Intel and ARM (M1) #malware #hacking #programming #blackhat #redteam #blueteam #maldev #research #assembly #intel #arm #cybercrime #cybersecurity #apt

Taiwei Shi (@taiwei_shi) 's Twitter Profile Photo

Our paper on ๐’๐ญ๐จ๐œ๐ก๐š๐ฌ๐ญ๐ข๐œ ๐„๐ซ๐ซ๐จ๐ซ ๐€๐ฌ๐œ๐ž๐ง๐ญ (๐’๐„๐€) has been accepted to #COLM2025! ๐ŸŽ‰ We introduce a scalable framework for uncovering LLM knowledge gaps with remarkable efficiency. Read more ๐Ÿ‘‡ ๐Ÿ“„ Paper: arxiv.org/abs/2503.23361 ๐Ÿ’ป Code: github.com/limenlp/SEA

Our paper on ๐’๐ญ๐จ๐œ๐ก๐š๐ฌ๐ญ๐ข๐œ ๐„๐ซ๐ซ๐จ๐ซ ๐€๐ฌ๐œ๐ž๐ง๐ญ (๐’๐„๐€) has been accepted to #COLM2025! ๐ŸŽ‰

We introduce a scalable framework for uncovering LLM knowledge gaps with remarkable efficiency. Read more ๐Ÿ‘‡

๐Ÿ“„ Paper: arxiv.org/abs/2503.23361 
๐Ÿ’ป Code: github.com/limenlp/SEA
Yanming Wan (@yanming_wan) 's Twitter Profile Photo

Personalization methods for LLMs often rely on extensive user history. We introduce Curiosity-driven User-modeling Reward as Intrinsic Objective (CURIO) to encourage actively learning about the user within multi-turn dialogs. ๐Ÿ“œ arxiv.org/abs/2504.03206 ๐ŸŒŽ sites.google.com/cs.washington.โ€ฆ

Hyeonjeong Ha (@hyeonjeong_ai) 's Twitter Profile Photo

Excited to share our work on Energy-Based Transformers, led by my amazing labmate Alexi Gladstoneโ€”a new frontier in unlocking generalized reasoning across modalities without rewards. Grateful to be part of this journey! โšก๏ธ ๐Ÿง  Think longer. Verify better. Generalize further.

HackingHub (@hackinghub_io) 's Twitter Profile Photo

Donโ€™t miss out on services hiding behind non-standard ports! Use httpprobe to scan them: โŒจ๏ธ cat subs.txt | httpprobe -p http:81 -p https:8443 Recon goes beyond port 80 & 443.

Donโ€™t miss out on services hiding behind non-standard ports!

Use httpprobe to scan them:
โŒจ๏ธ cat subs.txt | httpprobe -p http:81 -p https:8443

Recon goes beyond port 80 & 443.
Yuyang Hu (@yuyanghu_666) 's Twitter Profile Photo

Excited to announce my work during Google AI internship is now on arXiv! Grateful for my incredible hosts and collaborators: mauricio delbracio, Peyman Milanfar, Kangfu Mei, Mojtaba Sahraee-Ardakan and Ulugbek S. Kamilov. Please check out the paper here: [arxiv.org/abs/2507.05604].

Blackstorm Security (@blackstormsecbr) 's Twitter Profile Photo

How to download iOS 26 Beta and install it on iPhone without a Beta Profile: onejailbreak.com/blog/how-to-inโ€ฆ #ios #iphone #mobile #cybersecurity

Francesco Bertolotti (@f14bertolotti) 's Twitter Profile Photo

I am surprised this works well. These authors propose symmetric LoRA updates (made with AA' instead of AB). The results seem good, and they also have a theoretical grounding for their method. If you are working with LoRA this is worth a try. ๐Ÿ”—arxiv.org/pdf/2507.05566

I am surprised this works well. These authors propose symmetric LoRA updates (made with AA' instead of AB). The results seem good, and they also have a theoretical grounding for their method. If you are working with LoRA this is worth a try.

๐Ÿ”—arxiv.org/pdf/2507.05566
Nirit Weiss-Blatt, PhD (@drtechlash) 's Twitter Profile Photo

๐ŸšจThe UK AISI identified four methodological flaws in AI "scheming" studies (deceptive alignment) conducted by Anthropic, MTER, Apollo Research, and others: "We call researchers studying AI 'scheming' to minimise their reliance on anecdotes, design research with appropriate

๐ŸšจThe UK AISI identified four methodological flaws in AI "scheming" studies (deceptive alignment) conducted by Anthropic, MTER, Apollo Research, and others:

"We call researchers studying AI 'scheming' to minimise their reliance on anecdotes, design research with appropriate
gmh5225.eth (@gmhzxy) 's Twitter Profile Photo

hyper-reV: A powerful memory introspection & reverse engineering hypervisor leveraging Hyper-V. Read/write guest memory, SLAT hooks, and hide pages, all while evading detection. Supports Intel/AMD, tested on Win10/11. Check it out: github.com/noahware/hyperโ€ฆ #HyperV

Denis Laskov ๐Ÿ‡ฎ๐Ÿ‡ฑ (@it4sec) 's Twitter Profile Photo

Hacking modern ARM processors: Practical side-channel attacks on Cortex-A72 to recover AES. ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐Ÿงฒ๐Ÿ‘‚๐Ÿ“Ÿ๐Ÿ”— More details on: LinkedIn: linkedin.com/posts/dlaskov_โ€ฆ Substack: it4sec.substack.com/p/hacking-modeโ€ฆ

Hacking modern ARM processors: Practical side-channel attacks on Cortex-A72 to recover AES. ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐Ÿงฒ๐Ÿ‘‚๐Ÿ“Ÿ๐Ÿ”—

More details on:
LinkedIn: linkedin.com/posts/dlaskov_โ€ฆ
Substack: it4sec.substack.com/p/hacking-modeโ€ฆ
Denis Laskov ๐Ÿ‡ฎ๐Ÿ‡ฑ (@it4sec) 's Twitter Profile Photo

Hacking smart TVs via the HbbTV protocol: injecting URLs through unencrypted broadcasts. ๐Ÿ“บ๐Ÿง แŠ|แŠ๐Ÿ˜ˆ๐ŸงŸ More details on: LinkedIn: linkedin.com/posts/dlaskov_โ€ฆ Substack: it4sec.substack.com/p/hacking-smarโ€ฆ

Hacking smart TVs via the HbbTV protocol: injecting URLs through unencrypted broadcasts. ๐Ÿ“บ๐Ÿง แŠ|แŠ๐Ÿ˜ˆ๐ŸงŸ

More details on: 
LinkedIn: linkedin.com/posts/dlaskov_โ€ฆ
Substack: it4sec.substack.com/p/hacking-smarโ€ฆ
Daily Dose of Data Science (@dailydoseofds_) 's Twitter Profile Photo

China's new open-source LLM beats Claude 4 Sonnet! Alibaba dropped a 30B agentic LLM that achieves state-of-the-art performance on Humanity's last exam and various other agentic search benchmarks. The best part - only 3.3B activated per token! 100% open-source.

China's new open-source LLM beats Claude 4 Sonnet!

Alibaba dropped a 30B agentic LLM that achieves state-of-the-art performance on Humanity's last exam and various other agentic search benchmarks.

The best part - only 3.3B activated per token!

100% open-source.
0b1d1 (@_0b1d1) 's Twitter Profile Photo

๐Ÿ” Top Cybersecurity Search Engines for Analysts & Researchers Discover powerful search engines designed for security monitoring, digital footprint analysis, and infrastructure discovery. Ideal for professionals conducting lawful security research and exposure assessments.

๐Ÿ” Top Cybersecurity Search Engines for Analysts & Researchers

Discover powerful search engines designed for security monitoring, digital footprint analysis, and infrastructure discovery. Ideal for professionals conducting lawful security research and exposure assessments.
VAIDIK PANDYA (@h4x0r_fr34k) 's Twitter Profile Photo

Post 8/30 : Log files and leaks 1. Gather list of subdomain subfinder -d <target>.tld -o subdomains.txt 2, Then you can use this One-liner while read host; do echo "$host/app.log" echo "$host/error.log" echo "$host/access.log" echo "$host/debug.log" echo

Post 8/30 : Log files and leaks

1. Gather list of subdomain
subfinder -d &lt;target&gt;.tld -o subdomains.txt

2, Then you can use this One-liner 

while read host; do
  echo "$host/app.log"
  echo "$host/error.log"
  echo "$host/access.log"
  echo "$host/debug.log"
  echo
M1n@Cris (@minacris_) 's Twitter Profile Photo

KeyloggerScreenshot Tool for comprehensive surveillance: record keystrokes, screenshots, mouse clicks & audio. Try: github.com/Kill0geR/Keyloโ€ฆ Iโ€™m excited to announce FREE GIVEAWAYS For - iCloud Bypass (Activation Lock Removal) -MDM Removal (School/Work Unlock) -Carrier

KeyloggerScreenshot  

Tool for comprehensive surveillance: record keystrokes, screenshots, mouse clicks &amp; audio.  

Try: 

github.com/Kill0geR/Keyloโ€ฆ

Iโ€™m excited to announce FREE GIVEAWAYS For

- iCloud Bypass (Activation Lock Removal)

-MDM Removal (School/Work Unlock)

-Carrier
Denis Laskov ๐Ÿ‡ฎ๐Ÿ‡ฑ (@it4sec) 's Twitter Profile Photo

Exploitation of Common Industrial Protocol (CIP): what it is, where to find it, and how to hack it! ๐Ÿญ๐Ÿฆพ๐Ÿ–ง๐Ÿฅท๐Ÿผโ˜ ๏ธ More details on: LinkedIn: linkedin.com/posts/dlaskov_โ€ฆ Substack: it4sec.substack.com/p/exploitationโ€ฆ

Exploitation of Common Industrial Protocol (CIP): what it is, where to find it, and how to hack it! ๐Ÿญ๐Ÿฆพ๐Ÿ–ง๐Ÿฅท๐Ÿผโ˜ ๏ธ

More details on:
LinkedIn: linkedin.com/posts/dlaskov_โ€ฆ
Substack: it4sec.substack.com/p/exploitationโ€ฆ