All Articles_
CveGuardian: cross-referencing CVEs and project dependencies
Introduction CveGuardian is a sophisticated real-time CVE monitoring and management system designed to empower developers and security teams with...
NablaVis: an interactive educational tool to visualize three applications of Stokes’ Theorem
Why Stokes' Theorem Is More Than a Formula Stokes' Theorem transcends mere mathematical formulae by elegantly connecting fundamental concepts of...
DepScanity: Deterministic Dependency Security for .NET, Node, and Containers
Introduction DepScanity revolutionizes dependency security management by serving as a lightweight, CLI-first Software Composition Analysis (SCA)...
AeyeGuard_mcp: a reliable and capable http mcp local service static code analyzer powered by a local LLM written in Python
Introduction Traditional SAST (Static Application Security Testing) tools have long struggled with detecting complex vulnerabilities due to their...
AeyeGuard_cmd: a reliable and capable command line static code analyzer powered by a local LLM
Introduction In modern software development, Static Application Security Testing (SAST) plays a vital role in identifying vulnerabilities before...
Comparison between different types of recurrent neural networks
Introduction Sequential data is everywhere in our digital world—from the words you're reading right now to stock prices fluctuating over time, from...
Chat with your docs #1: Simple RAG with Chroma & Ollama for AI
Introduction Retrieval-Augmented Generation (RAG) represents a significant advancement in the field of artificial intelligence, combining the...
Chat with your data #2: Agentic Application for querying databases using SQL
Introduction As AI-powered conversational agents evolve, their integration with structured databases has become a crucial innovation. The ability to...
Chat with your data #1: Agentic Application for querying pandas DataFrames
Introduction With the rise of large language models (LLMs) and their integration into various domains, one of the most exciting use cases is...
Numerical Integration with CUDA: Accelerating Calculations on GPU
Introduction Integrating a function can be a computationally intensive task, especially when dealing with a high number of subintervals for better...
High-Performance Computing for Two-Variable Partial Derivatives with CUDA
Introduction In scientific computing and engineering, calculating derivatives is a fundamental operation. When dealing with functions of multiple...
High-Performance CUDA for Discrete Single Variable Derivative Computation
Introduction In the realm of scientific computing and numerical analysis, the computation of derivatives is a fundamental operation. Whether it's...
Decompilation of Malware Using Windows API for Autostart
Creating and sharing actual malware code, including assembly snippets that demonstrate how to use Windows API calls for malicious purposes such as...
Reverse Engineering #5 – C++ Calls on Mac OS X ARM 64 | Default Calling Convention
In the dynamic and frequently contested world of cybersecurity, proficiency in reverse engineering is a vital ability, essential for comprehending...
Wolfram Alpha Plugin for ChatGPT: Solving Differential Equations
In the previous post it was seen that ChatGPT 4 had struggled to find the general solution of a differential equation, giving twice wrong solutions...
ChatGPT 4 Solving Ordinary Differential Equations
I submitted to ChatGPT 4 several ordinary differential equations with different levels of complexity and always ChatGPT 4 proposed correct...
Reverse Engineering #4 – C++ Calling Convention in MAC OS X Intel 64-Bits
In the ever-changing and often competitive realm of cybersecurity, mastering reverse engineering is a crucial skill, indispensable for understanding...
Reverse Engineering #3 – C++ Calling Convention on Windows x64
In the fluctuating and frequently competitive world of cyber security, the ability to reverse engineer is an essential skill, vital for...

















