Skip to content

Instantly share code, notes, and snippets.

View luckysitara's full-sized avatar

BUGHACKER luckysitara

  • California
View GitHub Profile

AI-Powered Algorithmic Trading with Python

ODSC London 2023 Half-Day Training

Dr. Yves J. Hilpisch
CEO The Python Quants | The AI Machine
Adjunct Professor of Computational Finance

@luckysitara
luckysitara / solpay.md
Last active November 19, 2024 20:30
My experience

Building Solpay: A Personal Journey into Decentralized Payments

In the world of blockchain, one challenge remains persistent: making cryptocurrency payments as simple and intuitive as traditional methods. This challenge inspired me to build Solpay, a decentralized payment gateway that bridges the gap between crypto and fiat systems while addressing the needs of small businesses and everyday users.


The Problem: Simplifying Payments

During my early explorations in blockchain development, I noticed a recurring issue—users and merchants struggled with cryptocurrency payments. Buyers had to manually swap tokens, often losing value to fees or slippage, while merchants faced difficulties integrating crypto payments with existing systems.

@luckysitara
luckysitara / CS.md
Last active November 19, 2024 21:34
Cyber gist

Fields and Specializations in Cybersecurity

Cybersecurity encompasses a wide range of fields, each with its unique focus on protecting digital assets, networks, and data. Below is a breakdown of the primary areas and their responsibilities.


1. Network Security

What They Do:
Protect and monitor computer networks from unauthorized access, misuse, or attacks.

  • Tasks:

Network Engineer Roadmap

Network engineering involves designing, implementing, and maintaining networks to ensure their optimal performance and security. This roadmap outlines the steps, skills, certifications, and resources to excel in this field.


1. Understand the Basics

Before diving into advanced topics, you must understand foundational concepts.

@luckysitara
luckysitara / pathway.ipynb
Last active December 1, 2024 11:12
;athway.ipynb
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

Blackbox Penetration Testing Methodology

This document provides a comprehensive guide to conducting a blackbox penetration test. Blackbox testing simulates an external attack with no prior knowledge of the target's internal systems.


1. Planning and Preparation

  • Define the Scope:
    • Identify systems, applications, and networks to be tested.

Blackbox Penetration Testing Methodology with Sample Commands

This guide outlines a detailed blackbox pentesting methodology with Bash script samples, focusing on reconnaissance, scanning, exploitation, and post-exploitation. Tools like Nessus, Subfinder, Nmap, Nikto, SQLmap, XSStrike, and Metasploit are utilized.


1. Planning and Preparation

User Stories for an AI-Powered Educational Platform

This document outlines detailed user stories for Admins, Students, and Teachers using the platform.


1. Admin User Stories

1.1 User Management

  • Title:
Step 1: Stop Using Your Phone Immediately
Deleted files aren’t immediately erased from the phone’s storage; they are marked as “free space” and can be overwritten by new data. Avoid installing apps, taking new photos, or saving files to the device.
Step 2: Check Built-in Recovery Options
Recycle Bin or Trash: Many Vivo phones have a trash folder in the Gallery or File Manager where deleted files are stored temporarily (usually for 30 days).
Open the Gallery app.
Go to Albums > Recently Deleted or a similar folder.
Restore the files if available.
Cloud Backup: If you had a VivoCloud, Google Photos, or other cloud backup services enabled, your photos might be stored there.
Log into the respective cloud service and check.
Step 3: Use Data Recovery Software

User Persona Name: Nneoma Obieze

Class: JSS 2

Nneoma lives in a small village in Enugu State, Nigeria, with her parents and three siblings. Her parents, both subsistence farmers, work tirelessly to provide for their family, but their income barely meets basic needs. Despite these challenges, Nneoma is fiercely ambitious, dreaming of one day becoming a medical doctor who can serve her community.

Age: 14 years Gender: Female Location: Enugu State, Nigeria