abelian-group-theory
×
malware
1901
bug-bounty
1153
cybersecurity
1147
ransomware
662
microsoft
555
exploit
503
security
499
google
484
supply-chain
440
rce
337
cve
293
apple
283
xss
273
facebook
267
phishing
228
node
196
reverse-engineering
152
web3
151
browser
136
writeup
135
hacking
131
aws
126
account-takeover
121
cloud
119
vulnerability
119
1
0
A technical deep dive into optimizing sandpile identity computation, presenting analysis of the Difference and Iterated Burning methods and applying linear algebra (Reduced Laplacian matrices) to understand sandpiles as an abelian group structure, enabling computation of 16384×16384 sandpiles in ~1 hour.