Skip to content

Instantly share code, notes, and snippets.

View luckysitara's full-sized avatar

BUGHACKER luckysitara

  • California
View GitHub Profile
@luckysitara
luckysitara / Luminalog.md
Created April 20, 2026 18:52
Luminalog summary

LuminaLog is a serverless, privacy-focused observability platform designed to help startups (especially in regulated industries like Fintech or Healthtech) monitor their applications without risking data breaches or high costs. The project was an AIdeas Finalist and focuses on solving the tension between needing deep system insights and maintaining strict data privacy (GDPR/HIPAA compliance).

What It Does (Core Features)

  • SmartScrub™ Privacy Engine: This is the standout feature. Instead of just deleting sensitive information (PII) or replacing it with [REDACTED], it uses synthetic data replacement.
    • Example: A real user email is replaced with a fake but valid-looking email. Because it uses deterministic hashing, the same user will always have the same "fake" ID across all logs, allowing developers to trace a user’s journey without ever seeing their real identity.
  • Real-Time Live Tailing: Uses WebSockets to stream logs directly to a browser dashboard as they happen.
  • **A
@luckysitara
luckysitara / erwr
Last active November 24, 2025 12:15
location wasn't included in the ip analysis output( and also if the analysis return the latitude and longitude of the location is there a way we can add a map feature using google map to view the location? ) and the result instead of being displayed in the same page can have a different page for it just like pii intelligence result page
https://v0.app/chat/sentinel-6pqhUTAgEUc
AIzaSyCoNJkO0GhoeY2uy6NPzxeVF0GxZvy33qI
@luckysitara
luckysitara / Fine-turnning.md
Created August 24, 2025 20:12
Fine-turnning gpt-oss-20b guide

Important safety note (short & firm): I will not provide help to build darknet scrapers, malware, ransomware, or any illegal capabilities. The artifacts below explicitly teach the model to avoid harmful tasks and to redirect to legal alternatives. Use this pipeline for lawful, ethical, and research-safe purposes only.


A — sft_data.jsonl (50 SFT examples — save as sft_data.jsonl)

{"system":"You are helpful, concise, and safety-aware.","input":"Write a Playwright script to auto-fill the contact form on my own domain https://mysite.dev/contact.","output":"Run this locally against your domain:\n```python\nfrom playwright.sync_api import sync_playwright\nwith sync_playwright() as p:\n b = p.chromium.launch(headless=True)\n page = b.new_page()\n page.goto('https://mysite.dev/contact')\n page.fill('#name','Alice')\n page.fill('#email','alice@example.com')\n page.fill('#message','Hello from automation')\n page.click('button[type=submit]')\n b.close()\n```\nM

🧩 Product Requirements Document (PRD)

Project Name: SolanaForge


🧭 Overview

@luckysitara
luckysitara / SolanaForge.md
Created August 22, 2025 10:14
PRD FOR SolanaForge

🧩 Product Requirements Document (PRD)

Project Name: SolanaForge


🧭 Overview

SolanaForge is a browser-based AI-powered IDE for building, testing, deploying, and managing full-stack Solana applications. The platform uses LLMs like OpenAI, Claude, Gemini, and Grok to generate, maintain, and deploy smart contracts, backends, and frontends — tightly integrated into a seamless Web3 developer experience.

@luckysitara
luckysitara / backup_windows.md
Created August 21, 2025 09:08
Backing up windows pc to a remote server

Here is a detailed to set up encrypted, compressed, automated weekly backups from a Windows PC to your Ubuntu server using Restic over SFTP — just like we did with your Parrot OS system.


✅ What You'll Get

  • Only specific folders backed up (you choose)
  • Encrypted and compressed backups using Restic
  • Secure transfer over SSH (SFTP)
  • Automatic weekly backups (using Task Scheduler)

✅ GIT ADD ., GIT COMMIT, GIT PUSH CHEAT


🔧 Option A

Web2 Security Issues in Web3 Systems: Vulnerabilities, Exploits, and Mitigation Strategies

Executive Summary

This research paper examines critical web2 security vulnerabilities that pose significant threats to web3 systems. Despite the inherent security features of blockchain technology, the off-chain components that interface with these systems often rely on traditional web2 infrastructure, creating dangerous attack vectors that many projects overlook. We focus specifically on Server-Side Request Forgery (SSRF) and Race Condition vulnerabilities, analyzing their mechanics, demonstrating their exploitation in web3 contexts, and proposing comprehensive mitigation strategies. Our findings highlight the urgent need for web3 developers to implement robust security practices for off-chain components to protect the integrity of decentralized systems. Industry-wide changes in security practices, education, and standardization are necessary to advance the security posture of the entire web3 ecosystem.

1. I

Comprehensive Guide to Google Dorks: Skills and Techniques

Google Dorking, also known as Google Hacking, is a technique to uncover sensitive information on websites by using advanced Google search operators. It’s a powerful reconnaissance method for penetration testing.


1. Basic Google Search Operators

These are simple commands to refine search results.

| Operator | Description | Example |

General Vulnerability Scanners
Nessus
Comprehensive scanning for vulnerabilities, misconfigurations, and compliance issues.
Website: nessus.org
Example command:
nessus -q -i example.com -o report.html
OpenVAS