| """ | |
| The most atomic way to train and inference a GPT in pure, dependency-free Python. | |
| This file is the complete algorithm. | |
| Everything else is just efficiency. | |
| @karpathy | |
| """ | |
| import os # os.path.exists | |
| import math # math.log, math.exp |
| #!/bin/bash | |
| # Author: kenshin17 | |
| # OS: Centos 7 | |
| # Description: Script install NDP Proxy Daemon, active full subnet ipv6. | |
| IPv6SUBNET="xxxx:xxxx:xxxx:xxxx::/64" | |
| echo "######################## CONFIG SYSCTL #########################" | |
| echo "net.ipv6.conf.all.accept_ra = 2" >> /etc/sysctl.conf | |
| echo "net.ipv6.conf.eth0.accept_ra = 2" >> /etc/sysctl.conf |
| #!/usr/bin/env bash | |
| # Default values for percentages | |
| DEFAULT_WIRED_LIMIT_PERCENT=85 | |
| DEFAULT_WIRED_LWM_PERCENT=75 | |
| # Read input parameters or use default values | |
| WIRED_LIMIT_PERCENT=${1:-$DEFAULT_WIRED_LIMIT_PERCENT} | |
| WIRED_LWM_PERCENT=${2:-$DEFAULT_WIRED_LWM_PERCENT} |
| // | |
| // ContentView.swift | |
| // Airdrop Demo | |
| // | |
| // Created by Daniel Kuntz on 7/30/23. | |
| // | |
| import SwiftUI | |
| struct ContentView: View { |
| ⸻ | |
| Performance Hints for Web Backend APIs & Databases | |
| Adapted from Abseil’s Performance Hints (Jeff Dean & Sanjay Ghemawat) | |
| ⸻ | |
| 1) Think About Performance Early — Especially Hot Paths |
hi, i'm daniel. i'm a 16-year-old high school senior. in my free time, i hack billion dollar companies and build cool stuff.
about a month ago, a couple of friends and I found serious critical vulnerabilities on Mintlify, an AI documentation platform used by some of the top companies in the world.
i found a critical cross-site scripting vulnerability that, if abused, would let an attacker to inject malicious scripts into the documentation of numerous companies and steal credentials from users with a single link open.
(go read my friends' writeups (after this one))
how to hack discord, vercel, and more with one easy trick (eva)
Redacted by Counsel: A supply chain postmortem (MDL)
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code.
Today we will be using the Web browser (Google Chrome for Testing 125) as a local HTTP over TCP socket server.
WICG Direct Sockets specifies an API
that provides TCPSocket, UDPSocket, and TCPServerSocket.
In Chromium based browsers, for example Chrome, this capability is exposed in an Isolated Web Apps (IWA).
Previously we have created an IWA that we launch from arbitrary Web sites
with open(),