pubSubZero (@pubsubzero1) 's Twitter Profile
pubSubZero

@pubsubzero1

ID: 1276454607149907970

calendar_today26-06-2020 09:58:09

3,3K Tweet

261 Followers

3,3K Following

CastAwayTrader (@castawaytrader) 's Twitter Profile Photo

$ES my Impulse Master Indicator for @TradingView nailed the bottom yesterday, then nailed the top overnight and now signals a potential bottom #TradingView #tradingsignals

$ES my Impulse Master Indicator for @TradingView nailed the bottom yesterday, then nailed the top overnight and now signals a potential bottom
#TradingView #tradingsignals
Alexander Popov (@a13xp0p0v) 's Twitter Profile Photo

Big new feature in kernel-hardening-checker: now it supports checking the Linux kernel security parameters for RISC-V ⚡️ (in addition to X86_64, ARM64, X86_32, and ARM). I've spent many weekends on this. Thanks to bcoles for the contribution ⭐️ github.com/a13xp0p0v/kern…

Clandestine (@akaclandestine) 's Twitter Profile Photo

GitHub - ZeroMemoryEx/CVE-2025-26125: (0day) Local Privilege Escalation in IObit Malware Fighter github.com/ZeroMemoryEx/C…

Mohit Mishra (@chessman786) 's Twitter Profile Photo

Understanding Reader Writer Locks: Enhancing Concurrency In Multithreaded Applications While mutex locks are a common solution for protecting shared resources, they can be restrictive, especially when multiple threads could safely read data concurrently.

Understanding Reader Writer Locks: Enhancing Concurrency In Multithreaded Applications
While mutex locks are a common solution for protecting shared resources, they can be restrictive, especially when multiple threads could safely read data concurrently.
Harshleen Chawla (@harshleenchawl2) 's Twitter Profile Photo

Red Team Certification🔥 - Comprehensive Notes & Cheat Sheet for Top-Notch Red Team Certifications🚀 🔗github.com/0xn1k5/Red-Tea…

the tiny corp (@__tinygrad__) 's Twitter Profile Photo

107 TFLOPS on Mac M3 with a 9070XT attached. Our GEMM with the AMD_LLVM backend is now beating hipBLASLt on the card. And I love how portable LLVM is, this is just brew install llvm@19.

107 TFLOPS on Mac M3 with a 9070XT attached. Our GEMM with the AMD_LLVM backend is now beating hipBLASLt on the card. And I love how portable LLVM is, this is just brew install llvm@19.
trish (@_trish_xd) 's Twitter Profile Photo

Build a lexical analyzer in C - tokenizes into keywords, identifiers, integers & operators - handles delimiters and validates identifiers - recognizes all 32 C keywords - processes expressions like "int x=ab+bc+30+switch+ 0y" source code: github.com/dexter-xD/proj…

Build a lexical analyzer in C

- tokenizes into keywords, identifiers, integers & operators
- handles delimiters and validates identifiers 
- recognizes all 32 C keywords
- processes expressions like "int x=ab+bc+30+switch+ 0y"

source code: github.com/dexter-xD/proj…
Mohit Mishra (@chessman786) 's Twitter Profile Photo

How Your Code Runs: The Journey of a Program Through the CPU This blog post aims to explain the inner workings of the CPU by exploring its architecture, and execution flow, and illustrating these concepts with a practical code example.

How Your Code Runs: The Journey of a Program Through the CPU
This blog post aims to explain the inner workings of the CPU by exploring its architecture, and execution flow, and illustrating these concepts with a practical code example.
Japan Elliott Wave Research Institute (@ewrij225en) 's Twitter Profile Photo

With this, if SPX (orange line) moves in the same way, SPX can also be counted as a double zigzag. $SPX #SPX #SP500 #Elliottwave #JPN225 #NIKKEI

With this, if SPX (orange line) moves in the same way, SPX can also be counted as a double zigzag.
$SPX #SPX #SP500 #Elliottwave 
#JPN225 #NIKKEI
Linux Kernel Security (@linkersec) 's Twitter Profile Photo

[CVE-2025-37752] Two Bytes Of Madness: Pwning The Linux Kernel With A 0x0000 Written 262636 Bytes Out-Of-Bounds Great article by D3vil about exploiting a type confusion in the network scheduler subsystem and pwning all kernelCTF instances. syst3mfailure.io/two-bytes-of-m…

[CVE-2025-37752] Two Bytes Of Madness: Pwning The Linux Kernel With A 0x0000 Written 262636 Bytes Out-Of-Bounds

Great article by D3vil about exploiting a type confusion in the network scheduler subsystem and pwning all kernelCTF instances.

syst3mfailure.io/two-bytes-of-m…
Roy Carrilho (@ruicarrilho5) 's Twitter Profile Photo

Found an amazing guide that shows you how to code a TCP/IP stack from scratch! This is written in C, and goes over every nook and cranny of networks! You can learn a lot of both C and networks just by following this, enjoy!

Found an amazing guide that shows you how to code a TCP/IP stack from scratch! This is written in C, and goes over every nook and cranny of networks! You can learn a lot of both C and networks just by following this, enjoy!
the tiny corp (@__tinygrad__) 's Twitter Profile Photo

This is a comma 3X with more compute power than a HW4 Tesla. It's a 9070XT + ADT-UT3G dock connected to the USB port. Those are FP16 GEMM FLOPS, should be 389 TOPS of int8. Not a tech demo, shipping to openpilot soon. Excited to see how people mount a GPU in their car.

This is a <a href="/comma_ai/">comma</a> 3X with more compute power than a HW4 Tesla. It's a 9070XT + ADT-UT3G dock connected to the USB port.

Those are FP16 GEMM FLOPS, should be 389 TOPS of int8. Not a tech demo, shipping to openpilot soon. Excited to see how people mount a GPU in their car.
Smukx.E (@5mukx) 's Twitter Profile Photo

Introduction to windows shellcode development series. PART 1: securitycafe.ro/2015/10/30/int… PART 2: securitycafe.ro/2015/12/14/int… PART 3: securitycafe.ro/2016/02/15/int… #redteam #exploit #shellcode

Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode