| # Kernel sysctl configuration file for Red Hat Linux | |
| # | |
| # For binary values, 0 is disabled, 1 is enabled. See sysctl(8) and | |
| # sysctl.conf(5) for more details. | |
| # Controls source route verification | |
| net.ipv4.conf.default.rp_filter = 1 | |
| # Do not accept source routing | |
| net.ipv4.conf.default.accept_source_route = 0 |
| """ | |
| The most atomic way to train and inference a GPT in pure, dependency-free Python. | |
| This file is the complete algorithm. | |
| Everything else is just efficiency. | |
| @karpathy | |
| """ | |
| import os # os.path.exists | |
| import math # math.log, math.exp |
| #!/bin/bash | |
| # Author: kenshin17 | |
| # OS: Centos 7 | |
| # Description: Script install NDP Proxy Daemon, active full subnet ipv6. | |
| IPv6SUBNET="xxxx:xxxx:xxxx:xxxx::/64" | |
| echo "######################## CONFIG SYSCTL #########################" | |
| echo "net.ipv6.conf.all.accept_ra = 2" >> /etc/sysctl.conf | |
| echo "net.ipv6.conf.eth0.accept_ra = 2" >> /etc/sysctl.conf |
| #!/usr/bin/env bash | |
| # Default values for percentages | |
| DEFAULT_WIRED_LIMIT_PERCENT=85 | |
| DEFAULT_WIRED_LWM_PERCENT=75 | |
| # Read input parameters or use default values | |
| WIRED_LIMIT_PERCENT=${1:-$DEFAULT_WIRED_LIMIT_PERCENT} | |
| WIRED_LWM_PERCENT=${2:-$DEFAULT_WIRED_LWM_PERCENT} |
| // | |
| // ContentView.swift | |
| // Airdrop Demo | |
| // | |
| // Created by Daniel Kuntz on 7/30/23. | |
| // | |
| import SwiftUI | |
| struct ContentView: View { |
| ⸻ | |
| Performance Hints for Web Backend APIs & Databases | |
| Adapted from Abseil’s Performance Hints (Jeff Dean & Sanjay Ghemawat) | |
| ⸻ | |
| 1) Think About Performance Early — Especially Hot Paths |
hi, i'm daniel. i'm a 16-year-old high school senior. in my free time, i hack billion dollar companies and build cool stuff.
about a month ago, a couple of friends and I found serious critical vulnerabilities on Mintlify, an AI documentation platform used by some of the top companies in the world.
i found a critical cross-site scripting vulnerability that, if abused, would let an attacker to inject malicious scripts into the documentation of numerous companies and steal credentials from users with a single link open.
(go read my friends' writeups (after this one))
how to hack discord, vercel, and more with one easy trick (eva)
Redacted by Counsel: A supply chain postmortem (MDL)
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code.