Method (@method1cal) 's Twitter Profile
Method

@method1cal

automate everything; founder of @redstackio; 🇨🇦 🇬🇷

ID: 732433296420966400

linkhttps://redstack.io calendar_today17-05-2016 04:51:20

5,5K Tweet

1,1K Followers

1,1K Following

Method (@method1cal) 's Twitter Profile Photo

I apologize to the rest of the internet in advance for what we are building. InfoMind framework that integrates with #OpenClaw coming soon.

I apologize to the rest of the internet in advance for what we are building.

InfoMind framework that integrates with #OpenClaw coming soon.
Method (@method1cal) 's Twitter Profile Photo

InfoMind gives openclaw a mind that we can peer into. It tracks multi-context with awareness, meaning the bot chat can be interrupted, and still come back to complete that task. It has long term memory persistence, it has reflection, so it can make future decisions based on past

InfoMind gives openclaw a mind that we can peer into. It tracks multi-context with awareness, meaning the bot chat can be interrupted, and still come back to complete that task. It has long term memory persistence, it has reflection, so it can make future decisions based on past
SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

🎯 If you’re in red teaming, tool dev, or AI-powered ops, this one’s for you. You’ll learn how to build an MCP server, generate LLM-friendly APIs, and run C2 tasks through natural conversation. 📅 Feb 26 | 10:00 AM–12:00 PM ET 🔗 go.sans.org/00QLrf

🎯 If you’re in red teaming, tool dev, or AI-powered ops, this one’s for you.

You’ll learn how to build an MCP server, generate LLM-friendly APIs, and run C2 tasks through natural conversation.

📅 Feb 26 | 10:00 AM–12:00 PM ET
🔗 go.sans.org/00QLrf
Method (@method1cal) 's Twitter Profile Photo

am I being too hard on my #openclaw bot? I asked it to audit its persistent memory system named "infomind", which is it's own mind, allowing it to autonomously think and work without direction. I might be too strict, haha.

am I being too hard on my #openclaw bot? 

I asked it to audit its persistent memory system named "infomind", which is it's own mind, allowing it to autonomously think and work without direction. 

I might be too strict, haha.
Nicolas Krassas (@dinosn) 's Twitter Profile Photo

I reverse-engineered Intel ME so you don't have to: A decade of Ring -3 vulnerabilities that your EDR can't see sbytec.com/vulnerabilitie…

Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

Pre-built Jailbroken iOS 26 iPhone fully runs on VM✨ Full virtual iPhone ready-to-run jailbroken iPhone (rootless + Sileo + Filza + TrollStore vibes). Just download, Test tweaks, exploit PoCs, and debug without touching your daily driver.😗 16 GB+ RAM recommended

Pre-built Jailbroken iOS 26 iPhone fully runs on VM✨

Full virtual iPhone ready-to-run jailbroken iPhone (rootless + Sileo + Filza + TrollStore vibes).

Just download, Test tweaks, exploit PoCs, and debug without touching your daily driver.😗

16 GB+ RAM recommended
Qwen (@alibaba_qwen) 's Twitter Profile Photo

🚀 Introducing the Qwen 3.5 Small Model Series Qwen3.5-0.8B · Qwen3.5-2B · Qwen3.5-4B · Qwen3.5-9B ✨ More intelligence, less compute. These small models are built on the same Qwen3.5 foundation — native multimodal, improved architecture, scaled RL: • 0.8B / 2B → tiny, fast,

🚀 Introducing the Qwen 3.5 Small Model Series
Qwen3.5-0.8B · Qwen3.5-2B · Qwen3.5-4B · Qwen3.5-9B

✨ More intelligence, less compute.
These small models are built on the same Qwen3.5 foundation — native multimodal, improved architecture, scaled RL:
• 0.8B / 2B → tiny, fast,
Nicolas Krassas (@dinosn) 's Twitter Profile Photo

After 5 months of development, I'm releasing EvilWAF v2.4 - a MITM proxy that makes ANY tool bypass WAFs github.com/matrixleons/ev…

Alexander Panfilov (@kotekjedi_ml) 's Twitter Profile Photo

New paper: We deploy Claude Code in an autoresearch loop to discover novel jailbreaking algorithms – and it works. It beats 30+ existing GCG-like attacks (with AutoML hyperparameter tuning) This is a strong sign that incremental safety and security research can now be automated.

New paper: We deploy Claude Code in an autoresearch loop to discover novel jailbreaking algorithms – and it works. It beats 30+ existing GCG-like attacks (with AutoML hyperparameter tuning)

This is a strong sign that incremental safety and security research can now be automated.
Unsloth AI (@unslothai) 's Twitter Profile Photo

Kimi K2.6 can now run on CPU, GPU and SSD setups! 🔥 We shrank the 1T model to 340GB via Dynamic GGUFs where important layers are upcasted. Run at >40 tok/s on 350GB RAM/VRAM setups. Run full precision on 610 GB. Guide: unsloth.ai/docs/models/ki… GGUF: huggingface.co/unsloth/Kimi-K…

Kimi K2.6 can now run on CPU, GPU and SSD setups! 🔥

We shrank the 1T model to 340GB via Dynamic GGUFs where important layers are upcasted.

Run at >40 tok/s on 350GB RAM/VRAM setups.

Run full precision on 610 GB.

Guide: unsloth.ai/docs/models/ki…
GGUF: huggingface.co/unsloth/Kimi-K…
Nicolas Krassas (@dinosn) 's Twitter Profile Photo

Find zero-days while you sleep. DeepZero is an automated vulnerability research framework that parses, decompiles, and analyzes thousands of Windows kernel drivers for exploitable IOCTLs natively using AI agents. github.com/416rehman/Deep…