Device Info Query with CUDA | Xavier

Device Info Query In this post, I show how can query to device information with Cuda. In this post, I will use the NVDIA Jetson Xavier Device. However, the below code can run any compatible device with CUDA. Xavier Specification is:

CUDA Programming Model | Learn CUDA

This post series is the Solutions of the Professional CUDA C Programming written by John Cheng, Max Grossman and Ty McKercher Chapter 2: CUDA Programming Model In this section, we will learn to Writing a CUDA Program Executing kernel functions Organizing the Cuda threads with grids and blocks Measuring the…

Ghidra Installation on Ubuntu |18.04, 16.04, 14.04

Ghidra What is it? Ghidra is a software reverse engineering (SRE) suite of tools developed by NSA’s Research Directorate in support of the Cybersecurity mission. Also, Ghidra is open-source. Installation First you must the download Ghidra with this link https://ghidra-sre.org/ or you use bellow commad

Message Of The Day | Google CTF 2018

Google CTF 2018 Message Of The Day From the OffHub router, you jump onto the Google-Haus smart hub. This fully feature assistant of the future that uses machine learning on the blockchain to control all our IoT devices promises it all. It delivers the ability to print a Message-of-the-day. The…

Firmware | Google CTF 2018

Google CTF 2018 Firmware The code quality here is terrible. Even the temperature scale is measured in “Kevins”. Just bad Q/A all around here. If they choose to measure in Kevins rather than Kelvins, then it’s a sure bet that they can’t handle their memory properly. It looks like this…

Admin UI 3 | Google CTF 2018

Google CTF 2018 Admin UI 3 The code quality here is terrible. Even the temperature scale is measured in “Kevins”. Just bad Q/A all around here. If they choose to measure in Kevins rather than Kelvins, then it’s a sure bet that they can’t handle their memory properly. It looks…

Admin UI 2 | Google CTF 2018

Google CTF 2018 Admin UI 2 That first flag was a dud, but I think using a similar trick to get the full binary file might be needed here. There is a least one password in there somewhere. Maybe reversing this will give you access to the authenticated area, then…