Because everyone keeps posting about Arty A7 35T while I only have the 100T. This is basically just a guide for linux on litex [https://github.com/litex-hub/linux-on-litex-vexriscv].
- Arty A7 100T FPGA
- Micro USB Cable
- and a PC
Because everyone keeps posting about Arty A7 35T while I only have the 100T. This is basically just a guide for linux on litex [https://github.com/litex-hub/linux-on-litex-vexriscv].
# This is a modified version of TRL's `SFTTrainer` example (https://github.com/huggingface/trl/blob/main/examples/scripts/sft_trainer.py), | |
# adapted to run with DeepSpeed ZeRO-3 and Mistral-7B-V1.0. The settings below were run on 1 node of 8 x A100 (80GB) GPUs. | |
# | |
# Usage: | |
# - Install the latest transformers & accelerate versions: `pip install -U transformers accelerate` | |
# - Install deepspeed: `pip install deepspeed==0.9.5` | |
# - Install TRL from main: pip install git+https://github.com/huggingface/trl.git | |
# - Clone the repo: git clone github.com/huggingface/trl.git | |
# - Copy this Gist into trl/examples/scripts | |
# - Run from root of trl repo with: accelerate launch --config_file=examples/accelerate_configs/deepspeed_zero3.yaml --gradient_accumulation_steps 8 examples/scripts/sft_trainer.py |
This is dev environment setup for RIMI.
Optional: We use VS Code (https://code.visualstudio.com/download) for the IDE.
Penetrating Testing/Assessment Workflow & other fun infosec stuff
https://github.com/jivoi/pentest
My feeble attempt to organize (in a somewhat logical fashion) the vast amount of information, tools, resources, tip and tricks surrounding penetration testing, vulnerability assessment, and information security as a whole*
echo options hid_apple fnmode=2 | sudo tee -a /etc/modprobe.d/hid_apple.conf | |
sudo update-initramfs -u -k all | |
sudo reboot # optional |
We demonstrate the HTTPS connection between two Raspberry Pi. The HTTPS client is using our cryptochip that will do the handshake and connect to the ordinary HTTPS server. This shows that our cryptochip works flawlessly and compatible with other widely used crypto library.
Server started, CA certificate, server certificate and key loaded.
TCPDUMP Enabel non root for wireshark
sudo groupadd pcap && sudo usermod -a -G pcap $USER && sudo chgrp pcap /usr/bin/tcpdump && sudo chmod 750 /usr/bin/tcpdump && sudo setcap cap_net_raw,cap_net_admin=eip /usr/bin/tcpdump
sudo groupadd pcap; sudo usermod -a -G pcap $USER; sudo chgrp pcap /usr/bin/tcpdump; sudo chmod 750 /usr/bin/tcpdump; sudo setcap cap_net_raw,cap_net_admin=eip /usr/bin/tcpdump
sudo tshark -i lo -f "tcp port 4433" | |
sudo tshark -i eth0 -f "host 192.168.0.10" | |
https://wiki.wireshark.org/CaptureFilters |