Md Ismail Šojal 🕷️ Profile picture
Cyber_Security_Re-searcher || Ai Re-searcher || AI-ML || Malware Analysis II Pwn || 0SINT || Project AI-StrikeSec || 0ld Accounts Suspended @0xSojalSec ||
Feb 23 7 tweets 3 min read
RIP fine-tuning ☠️

Forget fine-tuning. This Stanford + SambaNova paper just killed it.👀

LLMs self-improve… without fine-tuning. How?

What if your LLM could fine-tune itself… without ever touching weights?

It’s called 'Agentic Context Engineering (ACE)' and it proves you can make models smarter without touching a single weight.

Instead of retraining, ACE evolves the context itself.

The model writes, reflects, and edits its own prompt over and over until it becomes a self-improving system.

Think of it like the model keeping a growing notebook of what works.
Each failure becomes a strategy. Each success becomes a rule.

The results are absurd:

+10.6% better than GPT-4–powered agents on AppWorld.
+8.6% on finance reasoning.
86.9% lower cost and latency.
No labels. Just feedback.

Everyone’s been obsessed with “short, clean” prompts.

ACE flips that. It builds long, detailed evolving playbooks that never forget. And it works because LLMs don’t want simplicity, they want *context density.

If this scales, the next generation of AI won’t be fine-tuned.
It’ll be self-tuned.

The next AI era isn't fine-tuned… It's self-tuned

(0/1)Image How ACE works :

Agentic Context Engineering (ACE) enhances LLMs by dynamically evolving prompts through three roles:

into 3 roles:

Generator - runs the task
Reflector - critiques what went right or wrong
Curator - updates the context with only what matters

Each loop adds delta updates, small context changes that never overwrite old knowledge.

It’s literally the first agent framework that grows its own prompt.

(1/2)Image
Apr 13, 2023 4 tweets 5 min read
Top free #Cybersecurity and ethical #hacking certification⚔️📓

1./Introduction to IT & Cybersecurity (Cybrary) = cybrary.it/course/introdu…

2./Mobile App Security (Cybrary) = cybrary.it/course/mobile-…

3./Introduction to Cybersecurity (edx) = edx.org/course/introdu… 4./Introduction to Cyber Security (Future Learn) = futurelearn.com/courses/introd…

5./Introduction to Encryption and Cryptography (Future Learn) = futurelearn.com/courses/encryp…

6./Fundamentals of Red Hat Linux (edx) = edx.org/course/fundame…
Jan 9, 2023 4 tweets 4 min read
Training/Methodology #infosec #offensivesec⚔️🛡️

- OSINT Training and Workflow (dfir.training/osint)

- Website Investigation Workflow ()

- OSINT Resources & Tutorials (aware-online.com/en/)

- Learning Overpass API (osmlab.github.io/learnoverpass/…) - A 5-minute guide to creating a covert account for Internet Investigations (OSINT) (intelligencewithsteve.com/post/a-5-minut…)

- hat’s in a Company? Guide for investigate a company (kit.exposingtheinvisible.org/en/what/compan…)

- Osint : Comment naviguer en eaux troubles (daring-india-marten-972.medium.com/osint-comment-…)
Jan 9, 2023 6 tweets 7 min read
Several people asked me about the resources I recommend for learning GraphQL and GraphQL Hacking . Here is the list:

A Thread 🧵👇

GraphQL Basics: - GraphQL in 40 Minutes:
- GraphQL in-depth:
- Great Website all about GraphQL: howtographql.com
Dec 19, 2022 8 tweets 2 min read
Insecure CORS Configuration" vulnerabilities. 🛡️⚔️

[A thread 🧵]

#infosecurity #CyberSec #bugbountytips #cybersecurity [2/n]
What is Insecure CORS issue?

An insecure CORS configuration allows any website to trigger requests with user credentials to the target application and read the responses thus enabling attackers to perform privileged actions or to retrieve potential sensitive information
Nov 26, 2022 6 tweets 2 min read
List of 50 cybersecurity podcasts:
#infosec #cybersecurity #podcasts #infosecurity Image 1. Cyber Work
2. Click Here
3. Defrag This
4. Security Now
5. InfoSec Real
6. InfoSec Live
7. Simply Cyber
8. OWASP Podcast
9. We Talk Cyber
10. Risky Business
11. Malicious Life
12. Hacking Humans
13. What The Shell
14. Life of a CISO
15. H4unt3d Hacker
16. 2 Cyber Chicks