sandpile-models
×
malware
1901
cybersecurity
1147
bug-bounty
1144
ransomware
662
microsoft
553
security
499
exploit
499
google
481
supply-chain
440
rce
336
cve
292
apple
282
facebook
260
xss
232
phishing
228
node
196
web3
151
reverse-engineering
150
browser
136
writeup
131
hacking
131
aws
125
vulnerability
119
cloud
117
account-takeover
117
1
0
A technical deep dive into optimizing sandpile identity computation, presenting analysis of the Difference and Iterated Burning methods and applying linear algebra (Reduced Laplacian matrices) to understand sandpiles as an abelian group structure, enabling computation of 16384×16384 sandpiles in ~1 hour.