Coder Social home page Coder Social logo

Hi 👋, This is John Menerick

A cypherpunk cruising the digital highways.

Coding

💫 About Me:

  • I'm currently working on Emergency Operations, Incident Response, Tor, US DoD, Distributed Emergency Communications, AI/ML infosec

  • I'm looking to collaborate on Open Source Projects, R&D information security, AI/ML infosec

  • I'm looking for help with Web3

  • I'm currently learning Oracle Cloud Infrastructure underlying tamper-evident ephemeral Zero-Trust workloads applied on AI compute with unstructured, distributed data sets

  • Fun fact : Simplification before optimization. Far too many times in R&D institutions does one optimize the widget that was never needed in the beginning. Start off on the foundation / principles. Then build or break from there. Design shouldn’t take too long. If design takes too long, the design is incorrect.

  • Contact me at [email protected] and Connect with me at https://keyoxide.org/[email protected]


🌐 Socials:

Streaming Status

Twitch Status YouTube Channel Views
Discord Instagram LinkedIn Stack Overflow Twitter

📲 Connect with me

w8mej w8mej 286658/w8mej w8mej w8mej w8mej


Software Engineering Stats

SummarySoftwareEng VCS Coding history over time CodingActivityOverTime

aws ansible apache kafka android apple atom azure bash bitbucket bitbucket c cplusplus centos chrome cmake confluence css3 d3js debian discordjs django docker eslint express fedora firebase gcc gcp gentoo git github gitlab go google graphql html5 ifttt java javascript jenkins hudson jira jquery jupyter kotlin kubernetes linkedin linux mysql neo4j nginx nodejs npm opensuse oracle php postgresql python pytest pytorch r pi redhat redis rstudio rust salesforce selenium sqlite ssh swift tensorflow terraform tomcat typescript ubuntu unix vagrant vim visualstudio xcode

🖱 Work Technology Stacks

1Password AWS Nitro AWS Nitro Enclave AWS Security Hub AWS WAF Aanval Accellion Acunetix Aircrack-ng Airlock Suite Airtable Akamai Cloud Security Akamai Enterprise Application Access Akamai Kona Site Defender Alibaba Cloud ActionTrail Alibaba Cloud Anti-DDoS Alibaba Cloud Anycast EIP Alibaba Cloud Bastionhost Alibaba Cloud Compliance and Certifications Alibaba Cloud Content Delivery Network Security Alibaba Cloud Data Encryption Service Alibaba Cloud Data Security Center Alibaba Cloud Key Management Service Alibaba Cloud Managed Security Service Alibaba Cloud Resource Access Management Alibaba Cloud SSL Certificates Service Alibaba Cloud Secure Media Workflow Alibaba Cloud Security Anti-Bot Service Alibaba Cloud Security Center Alibaba Cloud Security Privacy Protector Alibaba Cloud Security Vulnerability Discovery Service Alibaba Cloud Server Guard Alibaba Cloud Threat Detection Service Alibaba Cloud Web Application Firewall Anomali ThreatStream Antihack.me AppDynamics Database Monitoring AppScan AppSealing Appgate SDP Appknox Arbor Networks APS ArcSight ArcSight ESM Asana Atomicorp WAF Azure Active Directory Azure Active Directory for Office 365 Azure DDoS Protection Azure Firewall Azure Information Protection Azure Key Vault Azure Logic Apps Azure Monitor Azure Policy Azure Security Center Azure Sentinel Azure VPN Gateway BASE BackBox Linux Bash BeyondTrust PowerBroker BeyondTrust Retina Network Security Scanner Binary Defense Banjax BitLocker Bitbucket Bitdefender GravityZone Black Duck Blue Coat Systems Blueliv Threat Compass Botan Bouncy Castle Crypto API BountyFactory Bountysource Bugcrowd Bugzilla Burp Suite C/C++ Cacti Carbon Black Defense Carbon Black Response Centrify Zero Trust Security Check Point Infinity Check Point NGFW Checkmarx CircleCI Cisco Duo Security Cisco Firepower NGFW Cisco Security Cisco Stealthwatch Cisco Talos Cisco Umbrella Cisco Umbrella SIG ClickUp CloudPassage Halo Cloudflare Cloudflare Access Cloudflare SSL for secure certificates Clubhouse Cobalt Code Dx Code Vigilant Code42 CodeQL Codenomicon Comodo ModSecurity Confluence Contrast Security Core Impact Pro Core Security Corelight Coverity CrowdShield CrowdStrike Falcon CrowdStrike Falcon Insight Crypto++ Cryptool Cuckoo Sandbox Cyber Triage CyberArk CyberArk Privileged Access Security CylancePROTECT D3 Security Incident Response Platform Darktrace DataSunrise Database Security DbVisualizer Demisto Detectify Detectify Crowdsource DigiCert PKI Platform Digital Guardian Dogtag Certificate System Dome9 EJBCA Community ESET Endpoint Security EclecticIQ Platform Elastic Stack Elasticsearch Endgame Entrust PKI Management Exabeam Exchange Online Protection ExtraHop Reveal F-Secure Radar F5 BIG-IP F5 Networks Zero Trust Application Access Federacy Fidelis Cybersecurity Figma FileZilla Pro FireBounty FireEye FireEye Endpoint Security FireEye Helix FireEye Threat Intelligence Forcepoint Email Security Forcepoint Web Security Forcepoint Zero Trust Network Access Fortify Static Code Analyzer Fortify on Demand Fortinet Fortinet FortiDB Fortinet Zero Trust Network Access Gemalto Safenet Trusted Access GitGuardian GitHub GitLab GlobalSign Managed PKI Globalscape EFT GnuPG GnuPG Go Google Cloud BeyondCorp Remote Access Google GRR Graylog Greenbone Vulnerability Management Guardicore Centra Security Platform Guidance Encase HackenProof HackerOne Hacktrophy HexaTier Hybrid Analysis IBM Cloud Security Enforcer IBM Guardium Data Protection IBM QRadar IBM Security Guardium Icinga Idera SQL Compliance Manager Idera SQL Secure Illumio Adaptive Security Platform Immunity CANVAS Imperva Incapsula Imperva SecureSphere Database Security Infosec IQ InsightIDR IntSights IntelMQ Intigriti Intune Ipswitch MOVEit JAMF JFrog Xray JIRA Java Java Cryptography Architecture JavaScript Jenkins Jira John the Ripper Juniper Networks SRX Series Kali Kaspersky Anti Targeted Attack Platform Kaspersky Endpoint Security Kaspersky Incident Response KeePass Kentik Kentik Detect Keybase Keycloak for Identity and Access Management Keyfactor Command Kiuwan Code Security KnowBe4 Lacework LastPass Enterprise Let's Encrypt Libsodium Linear LogPoint LogRhythm NextGen SIEM Loki Scanner Lookout Mobile Security MISP Malpedia Maltego Malwarebytes ManageEngine DataSecurity Plus ManageEngine Key Manager Plus ManageEngine Log360 Mandiant Incident Response Mandiant Security Validation MantisBT McAfee Cloud Security McAfee Data Center Security Suite for Databases McAfee Endpoint Security McAfee MVISION Cloud McAfee Total Protection for Data Loss Prevention Menlo Security Isolation Platform Metasploit Framework Microsoft 365 Defender Microsoft Active Directory Certificate Services Microsoft Azure Active Directory Microsoft Cloud App Security Microsoft Compliance Manager Microsoft CryptoAPI/CryptoNG Microsoft Defender for Endpoint Microsoft Defender for Identity Microsoft Defender for Office 365 Microsoft IIS Microsoft Information Governance Microsoft Secure Score Microsoft Sentinel Microsoft Teams Microsoft Threat Protection Mimecast Mimecast Secure Email Gateway MobileIron Access ModSecurity module Modulo Risk Manager Monday.com Morphisec Guard NGINX NaCl Nagios Navicat for Database Administration Ncryptoki Nessus NetFlow Analyzer Netskope Security Cloud Netsparker NetworkMiner Netwrix Auditor Neustar DDoS Protection Nexpose Nmap Notion OCI API Gateway OCI Identity and Access Management OPNsense OSQuery OSSEC OWASP Core Rule Set OWASP Vulnerability Management Tool OWASP ZAP Office 365 Advanced Threat Protection Office 365 Cloud App Security Office 365 Data Loss Prevention Okta Okta Identity Cloud Okta Verify Omada Identity Suite One Identity Manager One Identity Safeguard OneLogin Open Bug Bounty OpenCA PKI OpenPGP OpenSSL OpenVAS OpenXPKI Operational Security: Oracle Advanced Security Oracle Audit Vault Oracle Audit Vault and Database Firewall Oracle Cloud Guard Oracle Cloud Infrastructure Audit Oracle Cloud Infrastructure Compliance Oracle Cloud Infrastructure Console Oracle Cloud Infrastructure DNS Oracle Cloud Infrastructure Data Safe Oracle Cloud Infrastructure Edge Services Oracle Cloud Infrastructure Email Delivery Oracle Cloud Infrastructure Events Oracle Cloud Infrastructure Functions Oracle Cloud Infrastructure Health Checks Oracle Cloud Infrastructure Key Management Oracle Cloud Infrastructure Load Balancing Oracle Cloud Infrastructure Logging Oracle Cloud Infrastructure Monitoring Oracle Cloud Infrastructure Notifications Oracle Cloud Infrastructure Vault Oracle Cloud Infrastructure Web Application Firewall Oracle Data Masking and Subsetting Oracle Data Redaction Oracle Data Safe Oracle Database Encryption Wizard Oracle Database Firewall Oracle Database Lifecycle Management Pack Oracle Database Security Assessment Tool Oracle Database Vault Oracle Enterprise Manager for Database Security Management Oracle GoldenGate Oracle Identity Governance Oracle Identity Governance Suite Oracle Identity Management Oracle Key Vault Oracle Label Security Oracle Real Application Security Oracle SQL Developer Oracle Secure Backup Oracle Total Recall Oracle Transparent Data Encryption PE-sieve PFSense PRTG Network Monitor Paessler PRTG Network Monitor Palo Alto Networks Palo Alto Networks Next-Generation Firewalls Palo Alto Networks Prisma Access Parrot Security OS PhishMe Pivotal Tracker Plixer Scrutinizer PlugBounty Postman PowerShell Preempt Security Prisma Cloud Proofpoint Email Protection Proofpoint Meta Proofpoint Targeted Attack Protection PyCrypto Python Qualys Cloud Platform Qualys Vulnerability Management Qualys Web Application Scanning QualysGuard Compliance R RHash RIPS Technologies RSA Archer RSA Archer Suite RSA BSAFE RSA Identity Governance and Lifecycle RSA SecurID Radware DefensePro Recorded Future Red Canary Red Hat Certificate System Red Hat Insights Redgate SQL Monitor Redmine Resilient Incident Response Platform Rita Riverbed SteelCentral RockNSM Root Bounty SANS Security Awareness SCP SELKS SELinux SQL SQL Power Architect SQL Sentry SQLmap STIX SafeHats Sagan Sangfor EasyConnect Saviynt Security Manager Sectigo Certificate Manager Secuna Secunia PSI Secure Code Warrior Semgrep SentinelOne Sentry ServiceNow Governance Risk and Compliance SharePoint Online and OneDrive for Business Security Siemplify Sigma Signal Silent Circle Silverfort Unified Identity Protection Slack Snorby Snort SnortALog Snyk SolarWinds Database Security Monitor SolarWinds NetFlow Traffic Analyzer SolarWinds Security Event Manager SonarQube Sophos Intercept X Sophos XG Firewall Splunk Squil Stoq Framework StrongKey StrongAuth Sumo Logic Swimlane Symantec CloudSOC Symantec Data Loss Prevention Symantec Endpoint Encryption Symantec Endpoint Protection Mobile Symantec Managed PKI Service Symantec Zero Trust Access Synack Synopsys Code Sight Tenable.sc TheHive Themis ThreatConnect Threema Thycotic Secret Server Travis CI Trello Trend Micro Apex One Trend Micro Cloud One Trend Micro Zero Trust Security Tripwire TrueCrypt Trustwave Trustwave DbProtect Tufin Orchestration Suite Untangle NG Firewall VMware NSX VMware Workspace ONE VRT VRTK VanDyke SecureFX Varonis Data Security Platform Venafi Trust Protection Platform VeraCrypt Veracode Viper Framework VirusTotal Vulnerability Lab Wallix AdminBastion Wandera WatchGuard Firebox Wazuh WebKnight WhiteSource Wickr Wire Wireshark Wiz WolfSSL Wombat Security Technologies XCA - X Certificate and Key Management YARA Guard Yara YesWeHack Yubico YubiKey Zabbix ZeroFOX Zerocopter Zimperium zIPS Zscaler Internet Access pfSense

💻 Tech Stack:

android ansible apache apple atom aws azure bash bitbucket bootstrap c centos chrome cmake confluence cplusplus css3 d3js debian discordjs django docker eslint express fedora firebase gcc gcp gentoo git github gitlab go google graphql html5 ifttt java javascript jenkins jira jquery jupyter kafka kotlin kubernetes linkedin linux mysql neo4j nginx nodejs npm opensuse oracle php pi postgresql pytest python pytorch r redhat redis rstudio rust salesforce selenium sqlite ssh swift tensorflow terraform tomcat typescript ubuntu unix vagrant vim visualstudio xcode

Portfolio

Portfolio

📊 GitHub Stats:



w8mej

John Menerick's Projects

afl_datasets icon afl_datasets

A work in progress repository for curated and created AFL-enabled fuzzing datasets for various programs, protocols, and file formats.

credentials icon credentials

This repository contains my public keys & identities' configurations for secure operations, communication and digital signature verification. Use these for encrypted messaging or verifying my digital signatures. Sensitive data like private keys and valid credentials are not included & need to be changed prior to implementation for security reasons.

fuzzy icon fuzzy

A faster version of AFL-Fuzz used for DARPA Cyber Grand Challenge with optimized scheduler code

gitbackdoor icon gitbackdoor

Simple repository to demonstrate inconsistent behaviors

hacker_ezines icon hacker_ezines

A collection of electronic hacker magazines carefully curated over the years from multiple sources

infosec-blueprints icon infosec-blueprints

Essential playbooks & runbooks for cybersecurity operations. A dynamic resource for security pros to navigate digital threats, with best practices, incident management protocols, and community-driven updates. Elevate your security strategy and response with our AI-driven guides.

k8s_infosec icon k8s_infosec

A simple walkthrough for those who wish to take their kubernetes knowledge to the next level by creating and deploying a hardened, simple kubernetes infrastructure

lepidopter icon lepidopter

lepidopter: raspberry pi image for conducting OONI network measurements

ooni-probe icon ooni-probe

ooni-probe: network measurement writing framework aimed at detecting network interference.

pwnedpasswordcheck icon pwnedpasswordcheck

Quick and dirty script to sanity check your password dumps against HaveIBeenPwned. Not Production ready but enough to sanity check.

python_template icon python_template

Imagine a Python project that decided to go on a neon-lit joyride through a dystopian future. That's us. We code with one hand on the keyboard and the other holding a digital katana.

shell_template icon shell_template

Introducing Shell Template: The Only Shell Project Template That Thinks It's Cyberpunk! 🤖🎤 Are you tired of staring at dull, lifeless command lines all day? Do you wish your shell script could crack Clube-Mate instead of just running commands? Look no further!

shell_terraform icon shell_terraform

A futuristic, cyberpunk-themed Terraform project template. Dive into the neon-lit landscape of automated infrastructure, where cutting-edge cloud technology meets the gritty, neon-soaked world of cyberpunk. This project provides a Terraform template for setting up and managing cloud infrastructure with a touch of cyberpunk flair.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.