A guide to Grok3 and its capabilities | Dark Hacker News