Skip to content

Instantly share code, notes, and snippets.

View ShabbirHasan1's full-sized avatar

Xor Byte ShabbirHasan1

View GitHub Profile
@ShabbirHasan1
ShabbirHasan1 / microgpt.py
Created February 12, 2026 09:21 — forked from karpathy/microgpt.py
microgpt
"""
The most atomic way to train and inference a GPT in pure, dependency-free Python.
This file is the complete algorithm.
Everything else is just efficiency.
@karpathy
"""
import os # os.path.exists
import math # math.log, math.exp
@ShabbirHasan1
ShabbirHasan1 / install-ndppd-active-ipv6-subnet.sh
Created January 30, 2026 18:48 — forked from kenshin17/install-ndppd-active-ipv6-subnet.sh
Script install NDP Proxy Daemon, active full subnet ipv6.
#!/bin/bash
# Author: kenshin17
# OS: Centos 7
# Description: Script install NDP Proxy Daemon, active full subnet ipv6.
IPv6SUBNET="xxxx:xxxx:xxxx:xxxx::/64"
echo "######################## CONFIG SYSCTL #########################"
echo "net.ipv6.conf.all.accept_ra = 2" >> /etc/sysctl.conf
echo "net.ipv6.conf.eth0.accept_ra = 2" >> /etc/sysctl.conf
@ShabbirHasan1
ShabbirHasan1 / mlx_memory.sh
Created December 27, 2025 18:31 — forked from ivanfioravanti/mlx_memory.sh
Script to set MLX memory limits
#!/usr/bin/env bash
# Default values for percentages
DEFAULT_WIRED_LIMIT_PERCENT=85
DEFAULT_WIRED_LWM_PERCENT=75
# Read input parameters or use default values
WIRED_LIMIT_PERCENT=${1:-$DEFAULT_WIRED_LIMIT_PERCENT}
WIRED_LWM_PERCENT=${2:-$DEFAULT_WIRED_LWM_PERCENT}
@ShabbirHasan1
ShabbirHasan1 / ContentView.swift
Created December 24, 2025 15:10 — forked from dkun7944/ContentView.swift
AirDrop iOS 17 Swift.Shader Animation
//
// ContentView.swift
// Airdrop Demo
//
// Created by Daniel Kuntz on 7/30/23.
//
import SwiftUI
struct ContentView: View {
Performance Hints for Web Backend APIs & Databases
Adapted from Abseil’s Performance Hints (Jeff Dean & Sanjay Ghemawat)
1) Think About Performance Early — Especially Hot Paths
@ShabbirHasan1
ShabbirHasan1 / writeup.md
Created December 19, 2025 18:59 — forked from hackermondev/writeup.md
How we pwned X (Twitter), Vercel, Cursor, Discord, and hundreds of companies through a supply-chain attack

hi, i'm daniel. i'm a 16-year-old high school senior. in my free time, i hack billion dollar companies and build cool stuff.

about a month ago, a couple of friends and I found serious critical vulnerabilities on Mintlify, an AI documentation platform used by some of the top companies in the world.

i found a critical cross-site scripting vulnerability that, if abused, would let an attacker to inject malicious scripts into the documentation of numerous companies and steal credentials from users with a single link open.

(go read my friends' writeups (after this one))
how to hack discord, vercel, and more with one easy trick (eva)
Redacted by Counsel: A supply chain postmortem (MDL)

@ShabbirHasan1
ShabbirHasan1 / _deobfuscating-unminifying-obfuscated-web-app-code.md
Created December 11, 2025 14:41 — forked from 0xdevalias/_deobfuscating-unminifying-obfuscated-web-app-code.md
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code
@ShabbirHasan1
ShabbirHasan1 / http_over_tcp_browser_server.md
Created November 27, 2025 11:18 — forked from guest271314/http_over_tcp_browser_server.md
How to use the browser as an HTTP over TCP socket server

Today we will be using the Web browser (Google Chrome for Testing 125) as a local HTTP over TCP socket server.

WICG Direct Sockets specifies an API that provides TCPSocket, UDPSocket, and TCPServerSocket.

In Chromium based browsers, for example Chrome, this capability is exposed in an Isolated Web Apps (IWA).

Previously we have created an IWA that we launch from arbitrary Web sites with open(),