Skip to content
View w8mej's full-sized avatar

Block or report w8mej

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
w8mej/README.md

Hi πŸ‘‹, This is John Menerick

A cypherpunk cruising the digital highways.

Coding

πŸ’« About Me:

  • I'm currently working on Emergency Operations, Incident Response, Tor, US DoD, Distributed Emergency Communications, AI/ML infosec

  • I'm looking to collaborate on Open Source Projects, R&D information security, AI/ML infosec

  • I'm looking for help with Web3

  • I'm currently learning Oracle Cloud Infrastructure underlying tamper-evident ephemeral Zero-Trust workloads applied on AI compute with unstructured, distributed data sets

  • Fun fact : Simplification before optimization. Far too many times in R&D institutions does one optimize the widget that was never needed in the beginning. Start off on the foundation / principles. Then build or break from there. Design shouldn’t take too long. If design takes too long, the design is incorrect.

  • Contact me at [email protected] and Connect with me at https://keyoxide.org/[email protected]


🌐 Socials:

Streaming Status

Twitch Status YouTube Channel Views
Discord Instagram LinkedIn Stack Overflow Twitter

πŸ“² Connect with me

w8mej w8mej 286658/w8mej w8mej w8mej w8mej


Software Engineering Stats

SummarySoftwareEng VCS Coding history over time CodingActivityOverTime

aws ansible apache kafka android apple atom azure bash bitbucket bitbucket c cplusplus centos chrome cmake confluence css3 d3js debian discordjs django docker eslint express fedora firebase gcc gcp gentoo git github gitlab go google graphql html5 ifttt java javascript jenkins hudson jira jquery jupyter kotlin kubernetes linkedin linux mysql neo4j nginx nodejs npm opensuse oracle php postgresql python pytest pytorch r pi redhat redis rstudio rust salesforce selenium sqlite ssh swift tensorflow terraform tomcat typescript ubuntu unix vagrant vim visualstudio xcode

πŸ–± Work Technology Stacks

1Password AWS Nitro AWS Nitro Enclave AWS Security Hub AWS WAF Aanval Accellion Acunetix Aircrack-ng Airlock Suite Airtable Akamai Cloud Security Akamai Enterprise Application Access Akamai Kona Site Defender Alibaba Cloud ActionTrail Alibaba Cloud Anti-DDoS Alibaba Cloud Anycast EIP Alibaba Cloud Bastionhost Alibaba Cloud Compliance and Certifications Alibaba Cloud Content Delivery Network Security Alibaba Cloud Data Encryption Service Alibaba Cloud Data Security Center Alibaba Cloud Key Management Service Alibaba Cloud Managed Security Service Alibaba Cloud Resource Access Management Alibaba Cloud SSL Certificates Service Alibaba Cloud Secure Media Workflow Alibaba Cloud Security Anti-Bot Service Alibaba Cloud Security Center Alibaba Cloud Security Privacy Protector Alibaba Cloud Security Vulnerability Discovery Service Alibaba Cloud Server Guard Alibaba Cloud Threat Detection Service Alibaba Cloud Web Application Firewall Anomali ThreatStream Antihack.me AppDynamics Database Monitoring AppScan AppSealing Appgate SDP Appknox Arbor Networks APS ArcSight ArcSight ESM Asana Atomicorp WAF Azure Active Directory Azure Active Directory for Office 365 Azure DDoS Protection Azure Firewall Azure Information Protection Azure Key Vault Azure Logic Apps Azure Monitor Azure Policy Azure Security Center Azure Sentinel Azure VPN Gateway BASE BackBox Linux Bash BeyondTrust PowerBroker BeyondTrust Retina Network Security Scanner Binary Defense Banjax BitLocker Bitbucket Bitdefender GravityZone Black Duck Blue Coat Systems Blueliv Threat Compass Botan Bouncy Castle Crypto API BountyFactory Bountysource Bugcrowd Bugzilla Burp Suite C/C++ Cacti Carbon Black Defense Carbon Black Response Centrify Zero Trust Security Check Point Infinity Check Point NGFW Checkmarx CircleCI Cisco Duo Security Cisco Firepower NGFW Cisco Security Cisco Stealthwatch Cisco Talos Cisco Umbrella Cisco Umbrella SIG ClickUp CloudPassage Halo Cloudflare Cloudflare Access Cloudflare SSL for secure certificates Clubhouse Cobalt Code Dx Code Vigilant Code42 CodeQL Codenomicon Comodo ModSecurity Confluence Contrast Security Core Impact Pro Core Security Corelight Coverity CrowdShield CrowdStrike Falcon CrowdStrike Falcon Insight Crypto++ Cryptool Cuckoo Sandbox Cyber Triage CyberArk CyberArk Privileged Access Security CylancePROTECT D3 Security Incident Response Platform Darktrace DataSunrise Database Security DbVisualizer Demisto Detectify Detectify Crowdsource DigiCert PKI Platform Digital Guardian Dogtag Certificate System Dome9 EJBCA Community ESET Endpoint Security EclecticIQ Platform Elastic Stack Elasticsearch Endgame Entrust PKI Management Exabeam Exchange Online Protection ExtraHop Reveal F-Secure Radar F5 BIG-IP F5 Networks Zero Trust Application Access Federacy Fidelis Cybersecurity Figma FileZilla Pro FireBounty FireEye FireEye Endpoint Security FireEye Helix FireEye Threat Intelligence Forcepoint Email Security Forcepoint Web Security Forcepoint Zero Trust Network Access Fortify Static Code Analyzer Fortify on Demand Fortinet Fortinet FortiDB Fortinet Zero Trust Network Access Gemalto Safenet Trusted Access GitGuardian GitHub GitLab GlobalSign Managed PKI Globalscape EFT GnuPG GnuPG Go Google Cloud BeyondCorp Remote Access Google GRR Graylog Greenbone Vulnerability Management Guardicore Centra Security Platform Guidance Encase HackenProof HackerOne Hacktrophy HexaTier Hybrid Analysis IBM Cloud Security Enforcer IBM Guardium Data Protection IBM QRadar IBM Security Guardium Icinga Idera SQL Compliance Manager Idera SQL Secure Illumio Adaptive Security Platform Immunity CANVAS Imperva Incapsula Imperva SecureSphere Database Security Infosec IQ InsightIDR IntSights IntelMQ Intigriti Intune Ipswitch MOVEit JAMF JFrog Xray JIRA Java Java Cryptography Architecture JavaScript Jenkins Jira John the Ripper Juniper Networks SRX Series Kali Kaspersky Anti Targeted Attack Platform Kaspersky Endpoint Security Kaspersky Incident Response KeePass Kentik Kentik Detect Keybase Keycloak for Identity and Access Management Keyfactor Command Kiuwan Code Security KnowBe4 Lacework LastPass Enterprise Let's Encrypt Libsodium Linear LogPoint LogRhythm NextGen SIEM Loki Scanner Lookout Mobile Security MISP Malpedia Maltego Malwarebytes ManageEngine DataSecurity Plus ManageEngine Key Manager Plus ManageEngine Log360 Mandiant Incident Response Mandiant Security Validation MantisBT McAfee Cloud Security McAfee Data Center Security Suite for Databases McAfee Endpoint Security McAfee MVISION Cloud McAfee Total Protection for Data Loss Prevention Menlo Security Isolation Platform Metasploit Framework Microsoft 365 Defender Microsoft Active Directory Certificate Services Microsoft Azure Active Directory Microsoft Cloud App Security Microsoft Compliance Manager Microsoft CryptoAPI/CryptoNG Microsoft Defender for Endpoint Microsoft Defender for Identity Microsoft Defender for Office 365 Microsoft IIS Microsoft Information Governance Microsoft Secure Score Microsoft Sentinel Microsoft Teams Microsoft Threat Protection Mimecast Mimecast Secure Email Gateway MobileIron Access ModSecurity module Modulo Risk Manager Monday.com Morphisec Guard NGINX NaCl Nagios Navicat for Database Administration Ncryptoki Nessus NetFlow Analyzer Netskope Security Cloud Netsparker NetworkMiner Netwrix Auditor Neustar DDoS Protection Nexpose Nmap Notion OCI API Gateway OCI Identity and Access Management OPNsense OSQuery OSSEC OWASP Core Rule Set OWASP Vulnerability Management Tool OWASP ZAP Office 365 Advanced Threat Protection Office 365 Cloud App Security Office 365 Data Loss Prevention Okta Okta Identity Cloud Okta Verify Omada Identity Suite One Identity Manager One Identity Safeguard OneLogin Open Bug Bounty OpenCA PKI OpenPGP OpenSSL OpenVAS OpenXPKI Operational Security: Oracle Advanced Security Oracle Audit Vault Oracle Audit Vault and Database Firewall Oracle Cloud Guard Oracle Cloud Infrastructure Audit Oracle Cloud Infrastructure Compliance Oracle Cloud Infrastructure Console Oracle Cloud Infrastructure DNS Oracle Cloud Infrastructure Data Safe Oracle Cloud Infrastructure Edge Services Oracle Cloud Infrastructure Email Delivery Oracle Cloud Infrastructure Events Oracle Cloud Infrastructure Functions Oracle Cloud Infrastructure Health Checks Oracle Cloud Infrastructure Key Management Oracle Cloud Infrastructure Load Balancing Oracle Cloud Infrastructure Logging Oracle Cloud Infrastructure Monitoring Oracle Cloud Infrastructure Notifications Oracle Cloud Infrastructure Vault Oracle Cloud Infrastructure Web Application Firewall Oracle Data Masking and Subsetting Oracle Data Redaction Oracle Data Safe Oracle Database Encryption Wizard Oracle Database Firewall Oracle Database Lifecycle Management Pack Oracle Database Security Assessment Tool Oracle Database Vault Oracle Enterprise Manager for Database Security Management Oracle GoldenGate Oracle Identity Governance Oracle Identity Governance Suite Oracle Identity Management Oracle Key Vault Oracle Label Security Oracle Real Application Security Oracle SQL Developer Oracle Secure Backup Oracle Total Recall Oracle Transparent Data Encryption PE-sieve PFSense PRTG Network Monitor Paessler PRTG Network Monitor Palo Alto Networks Palo Alto Networks Next-Generation Firewalls Palo Alto Networks Prisma Access Parrot Security OS PhishMe Pivotal Tracker Plixer Scrutinizer PlugBounty Postman PowerShell Preempt Security Prisma Cloud Proofpoint Email Protection Proofpoint Meta Proofpoint Targeted Attack Protection PyCrypto Python Qualys Cloud Platform Qualys Vulnerability Management Qualys Web Application Scanning QualysGuard Compliance R RHash RIPS Technologies RSA Archer RSA Archer Suite RSA BSAFE RSA Identity Governance and Lifecycle RSA SecurID Radware DefensePro Recorded Future Red Canary Red Hat Certificate System Red Hat Insights Redgate SQL Monitor Redmine Resilient Incident Response Platform Rita Riverbed SteelCentral RockNSM Root Bounty SANS Security Awareness SCP SELKS SELinux SQL SQL Power Architect SQL Sentry SQLmap STIX SafeHats Sagan Sangfor EasyConnect Saviynt Security Manager Sectigo Certificate Manager Secuna Secunia PSI Secure Code Warrior Semgrep SentinelOne Sentry ServiceNow Governance Risk and Compliance SharePoint Online and OneDrive for Business Security Siemplify Sigma Signal Silent Circle Silverfort Unified Identity Protection Slack Snorby Snort SnortALog Snyk SolarWinds Database Security Monitor SolarWinds NetFlow Traffic Analyzer SolarWinds Security Event Manager SonarQube Sophos Intercept X Sophos XG Firewall Splunk Squil Stoq Framework StrongKey StrongAuth Sumo Logic Swimlane Symantec CloudSOC Symantec Data Loss Prevention Symantec Endpoint Encryption Symantec Endpoint Protection Mobile Symantec Managed PKI Service Symantec Zero Trust Access Synack Synopsys Code Sight Tenable.sc TheHive Themis ThreatConnect Threema Thycotic Secret Server Travis CI Trello Trend Micro Apex One Trend Micro Cloud One Trend Micro Zero Trust Security Tripwire TrueCrypt Trustwave Trustwave DbProtect Tufin Orchestration Suite Untangle NG Firewall VMware NSX VMware Workspace ONE VRT VRTK VanDyke SecureFX Varonis Data Security Platform Venafi Trust Protection Platform VeraCrypt Veracode Viper Framework VirusTotal Vulnerability Lab Wallix AdminBastion Wandera WatchGuard Firebox Wazuh WebKnight WhiteSource Wickr Wire Wireshark Wiz WolfSSL Wombat Security Technologies XCA - X Certificate and Key Management YARA Guard Yara YesWeHack Yubico YubiKey Zabbix ZeroFOX Zerocopter Zimperium zIPS Zscaler Internet Access pfSense

πŸ’» Tech Stack:

android ansible apache apple atom aws azure bash bitbucket bootstrap c centos chrome cmake confluence cplusplus css3 d3js debian discordjs django docker eslint express fedora firebase gcc gcp gentoo git github gitlab go google graphql html5 ifttt java javascript jenkins jira jquery jupyter kafka kotlin kubernetes linkedin linux mysql neo4j nginx nodejs npm opensuse oracle php pi postgresql pytest python pytorch r redhat redis rstudio rust salesforce selenium sqlite ssh swift tensorflow terraform tomcat typescript ubuntu unix vagrant vim visualstudio xcode

Portfolio

Portfolio

πŸ“Š GitHub Stats:



w8mej

Pinned Loading

  1. gyoisamurai/GyoiThon gyoisamurai/GyoiThon Public

    GyoiThon is a growing penetration test tool using Machine Learning.

    Python 744 285

  2. TheTorProject/lepidopter TheTorProject/lepidopter Public

    lepidopter: raspberry pi image for conducting OONI network measurements

    Python 48 20

  3. Threat_Modeling_Bank Threat_Modeling_Bank Public

    A curated threat modeling library collection

    21 4

  4. ThreatPlays ThreatPlays Public

    Sharing Threat Hunting runbooks

    24 7