Skip to content

Instantly share code, notes, and snippets.

View luckysitara's full-sized avatar

BUGHACKER luckysitara

  • California
View GitHub Profile
@luckysitara
luckysitara / erwr
Last active September 13, 2025 15:03
location wasn't included in the ip analysis output( and also if the analysis return the latitude and longitude of the location is there a way we can add a map feature using google map to view the location? ) and the result instead of being displayed in the same page can have a different page for it just like pii intelligence result page
https://v0.app/chat/sentinel-6pqhUTAgEUc
AIzaSyCoNJkO0GhoeY2uy6NPzxeVF0GxZvy33qI
@luckysitara
luckysitara / Fine-turnning.md
Created August 24, 2025 20:12
Fine-turnning gpt-oss-20b guide

Important safety note (short & firm): I will not provide help to build darknet scrapers, malware, ransomware, or any illegal capabilities. The artifacts below explicitly teach the model to avoid harmful tasks and to redirect to legal alternatives. Use this pipeline for lawful, ethical, and research-safe purposes only.


A — sft_data.jsonl (50 SFT examples — save as sft_data.jsonl)

{"system":"You are helpful, concise, and safety-aware.","input":"Write a Playwright script to auto-fill the contact form on my own domain https://mysite.dev/contact.","output":"Run this locally against your domain:\n```python\nfrom playwright.sync_api import sync_playwright\nwith sync_playwright() as p:\n b = p.chromium.launch(headless=True)\n page = b.new_page()\n page.goto('https://mysite.dev/contact')\n page.fill('#name','Alice')\n page.fill('#email','[email protected]')\n page.fill('#message','Hello from automation')\n page.click('button[type=submit]')\n b.close()\n```\nM

🧩 Product Requirements Document (PRD)

Project Name: SolanaForge


🧭 Overview

@luckysitara
luckysitara / SolanaForge.md
Created August 22, 2025 10:14
PRD FOR SolanaForge

🧩 Product Requirements Document (PRD)

Project Name: SolanaForge


🧭 Overview

SolanaForge is a browser-based AI-powered IDE for building, testing, deploying, and managing full-stack Solana applications. The platform uses LLMs like OpenAI, Claude, Gemini, and Grok to generate, maintain, and deploy smart contracts, backends, and frontends — tightly integrated into a seamless Web3 developer experience.

@luckysitara
luckysitara / backup_windows.md
Created August 21, 2025 09:08
Backing up windows pc to a remote server

Here is a detailed to set up encrypted, compressed, automated weekly backups from a Windows PC to your Ubuntu server using Restic over SFTP — just like we did with your Parrot OS system.


✅ What You'll Get

  • Only specific folders backed up (you choose)
  • Encrypted and compressed backups using Restic
  • Secure transfer over SSH (SFTP)
  • Automatic weekly backups (using Task Scheduler)

✅ GIT ADD ., GIT COMMIT, GIT PUSH CHEAT


🔧 Option A

Web2 Security Issues in Web3 Systems: Vulnerabilities, Exploits, and Mitigation Strategies

Executive Summary

This research paper examines critical web2 security vulnerabilities that pose significant threats to web3 systems. Despite the inherent security features of blockchain technology, the off-chain components that interface with these systems often rely on traditional web2 infrastructure, creating dangerous attack vectors that many projects overlook. We focus specifically on Server-Side Request Forgery (SSRF) and Race Condition vulnerabilities, analyzing their mechanics, demonstrating their exploitation in web3 contexts, and proposing comprehensive mitigation strategies. Our findings highlight the urgent need for web3 developers to implement robust security practices for off-chain components to protect the integrity of decentralized systems. Industry-wide changes in security practices, education, and standardization are necessary to advance the security posture of the entire web3 ecosystem.

1. I

Comprehensive Guide to Google Dorks: Skills and Techniques

Google Dorking, also known as Google Hacking, is a technique to uncover sensitive information on websites by using advanced Google search operators. It’s a powerful reconnaissance method for penetration testing.


1. Basic Google Search Operators

These are simple commands to refine search results.

| Operator | Description | Example |

General Vulnerability Scanners
Nessus
Comprehensive scanning for vulnerabilities, misconfigurations, and compliance issues.
Website: nessus.org
Example command:
nessus -q -i example.com -o report.html
OpenVAS

User Persona Name: Nneoma Obieze

Class: JSS 2

Nneoma lives in a small village in Enugu State, Nigeria, with her parents and three siblings. Her parents, both subsistence farmers, work tirelessly to provide for their family, but their income barely meets basic needs. Despite these challenges, Nneoma is fiercely ambitious, dreaming of one day becoming a medical doctor who can serve her community.

Age: 14 years Gender: Female Location: Enugu State, Nigeria