| // sh.mts: javascript shorthand | |
| // #region array tools | |
| /** id function (returns first argument) */ | |
| export const id=<T,>(x: T): T=>x | |
| /** create an array filled with n copies of x */ | |
| export const af=<T,>(n: number, x: T): T[]=>Array(n).fill(x) // TODO: make this 'afl' or 'fil' (aa?) | |
| /** loop i from 0..n, calling f(i) */ | |
| export const ii=(n: number, f: (i: number)=>void)=>{for(let i=0;i<n;i++)f(i)} | |
| /** map f over [0..n] */ |
Scalable Vector Extensions (SVE) is ARM’s latest SIMD extension to their instruction set, which was announced back in 2016. A follow-up SVE2 extension was announced in 2019, designed to incorporate all functionality from ARM’s current primary SIMD extension, NEON (aka ASIMD).
Despite being announced 5 years ago, there is currently no generally available CPU which supports any form of SVE (which excludes the [Fugaku supercomputer](https://www.fujitsu.com/global/about/innovation/
You might want to read this to get an introduction to armel vs armhf.
If the below is too much, you can try Ubuntu-ARMv7-Qemu but note it contains non-free blobs.
First, cross-compile user programs with GCC-ARM toolchain. Then install qemu-arm-static so that you can run ARM executables directly on linux
If there's no qemu-arm-static in the package list, install qemu-user-static instead
| /** File: rpn-calculator.cpp | |
| * Author: Caio Rodrigues - caiorss <DOT> rodrigues <AT> gmail <DOT> com | |
| * Brief: Reverse Polish Notation Calculator | |
| * Description: A simple reverse polish notation command line calculator | |
| * implemented in modern C++. | |
| * Site: https://caiorss.github.io/C-Cpp-Notes/sample-modern-cpp-programs.htm | |
| ***************************************************************************/ | |
| #include <iostream> | |
| #include <cmath> | |
| #include <map> |
I recently built a small agent-based model using Python and wanted to visualize the model in action. But as much as Python is an ideal tool for scientific computation (numpy, scipy, matplotlib), it's not as good for dynamic visualization (pygame?).
You know what's a very mature and flexible tool for drawing graphics? The DOM! For simple graphics you can use HTML and CSS; for more complicated stuff you can use Canvas, SVG, or WebGL. There are countless frameworks, libraries, and tutorials to help you draw exactly what you need. In my case, this was the animation I wanted:
(Each row represents a "worker" in my model, and each rectangle represents a "task.")
0 - Memory Allocation
1 - Arrays
2 - Pointer Basics
2 - Same code to ASM via godbolt/GCC
3 - C-Bits Bitwise Operators and binary operations.
Learn about Bit Order | Endianess (MSB/LSB) https://github.com/Acry/Byte_Drawer
| #!/usr/bin/env bash | |
| # --slave /usr/bin/$1 $1 /usr/bin/$1-\${version} \\ | |
| function register_clang_version { | |
| local version=$1 | |
| local priority=$2 | |
| update-alternatives \ | |
| --install /usr/bin/llvm-config llvm-config /usr/bin/llvm-config-${version} ${priority} \ |
GitHub repositories can disclose all sorts of potentially valuable information for bug bounty hunters. The targets do not always have to be open source for there to be issues. Organization members and their open source projects can sometimes accidentally expose information that could be used against the target company. in this article I will give you a brief overview that should help you get started targeting GitHub repositories for vulnerabilities and for general recon.
You can just do your research on github.com, but I would suggest cloning all the target's repositories so that you can run your tests locally. I would highly recommend @mazen160's GitHubCloner. Just run the script and you should be good to go.
$ python githubcloner.py --org organization -o /tmp/output