All Articles_
AeyeGuard: a reliable and capable static code analyzer command line powered by a local LLM
Introduction In modern software development, Static Application Security Testing (SAST) plays a vital role in identifying vulnerabilities before...
Comparison between different types of recurrent neural networks
Introduction Sequential data is everywhere in our digital world—from the words you're reading right now to stock prices fluctuating over time, from...
Chat with your docs #1: Simple RAG with Chroma & Ollama for AI
Introduction Retrieval-Augmented Generation (RAG) represents a significant advancement in the field of artificial intelligence, combining the...
Chat with your data #2: Agentic Application for querying databases using SQL
Introduction As AI-powered conversational agents evolve, their integration with structured databases has become a crucial innovation. The ability to...
Chat with your data #1: Agentic Application for querying pandas DataFrames
Introduction With the rise of large language models (LLMs) and their integration into various domains, one of the most exciting use cases is...
Numerical Integration with CUDA: Accelerating Calculations on GPU
Introduction Integrating a function can be a computationally intensive task, especially when dealing with a high number of subintervals for better...
High-Performance Computing for Two-Variable Partial Derivatives with CUDA
Introduction In scientific computing and engineering, calculating derivatives is a fundamental operation. When dealing with functions of multiple...
High-Performance CUDA for Discrete Single Variable Derivative Computation
Introduction In the realm of scientific computing and numerical analysis, the computation of derivatives is a fundamental operation. Whether it's...
Decompilation of Malware Using Windows API for Autostart
Creating and sharing actual malware code, including assembly snippets that demonstrate how to use Windows API calls for malicious purposes such as...
Reverse Engineering #5 – C++ Calls on Mac OS X ARM 64 | Default Calling Convention
In the dynamic and frequently contested world of cybersecurity, proficiency in reverse engineering is a vital ability, essential for comprehending...
Wolfram Alpha Plugin for ChatGPT: Solving Differential Equations
In the previous post it was seen that ChatGPT 4 had struggled to find the general solution of a differential equation, giving twice wrong solutions...
ChatGPT 4 Solving Ordinary Differential Equations
I submitted to ChatGPT 4 several ordinary differential equations with different levels of complexity and always ChatGPT 4 proposed correct...
Reverse Engineering #4 – C++ Calling Convention in MAC OS X Intel 64-Bits
In the ever-changing and often competitive realm of cybersecurity, mastering reverse engineering is a crucial skill, indispensable for understanding...
Reverse Engineering #3 – C++ Calling Convention on Windows x64
In the fluctuating and frequently competitive world of cyber security, the ability to reverse engineer is an essential skill, vital for...
Reverse Engineering #2 – Default Calling Convention in C++ & Rust on Linux x64
In the dynamic and often adversarial realm of cyber defense, reverse engineering stands as a fundamental skill set, crucial for understanding and...
Reverse Engineering #1 – Arithmetic Operations in C++ & Rust on Linux
Today, it is not very common to meet programmers working in assembly language (also called assembler language) because high-level languages are much...
Neural ODEs: Advancements in Deep Learning for Continuous Data
Deep learning has revolutionized the field of artificial intelligence, enabling machines to perform tasks that were once thought impossible....
The Promise of Quantum Computing and Its Revolutionary Potential
Quantum computation is a cutting-edge field that is poised to revolutionize computing and transform many industries. Unlike classical computing,...

















