ajish (uhjish)

uhjish

Geek Repo

Location:Baltimore, MD

Home Page:http://aji.sh

Github PK Tool:Github PK Tool

ajish's starred repositories

the-algorithm

Source code for Twitter's Recommendation Algorithm

Language:ScalaLicense:AGPL-3.0Stargazers:62123Issues:342Issues:1095

the-algorithm-ml

Source code for Twitter's Recommendation Algorithm

Language:PythonLicense:AGPL-3.0Stargazers:10064Issues:100Issues:41

nostr

a truly censorship-resistant alternative to Twitter that has a chance of working

tigerbeetle

The financial transactions database designed for mission critical safety and performance.

Language:ZigLicense:Apache-2.0Stargazers:9878Issues:82Issues:529

Eve

Better tools for thought

Language:TypeScriptLicense:Apache-2.0Stargazers:7165Issues:195Issues:559

materialize

The Cloud Operational Data Store: use SQL to transform, deliver, and act on fast-changing data.

Language:RustLicense:NOASSERTIONStargazers:5735Issues:76Issues:0

stat_rethinking_2022

Statistical Rethinking course winter 2022

timely-dataflow

A modular implementation of timely dataflow in Rust

Language:RustLicense:MITStargazers:3263Issues:86Issues:176

differential-dataflow

An implementation of differential dataflow using timely dataflow on Rust.

Language:RustLicense:MITStargazers:2555Issues:49Issues:157

nips

Nostr Implementation Possibilities

Language:PythonLicense:NOASSERTIONStargazers:1913Issues:90Issues:1532

OSSEM

Open Source Security Events Metadata (OSSEM)

Language:PythonLicense:MITStargazers:1232Issues:107Issues:39

secrets-patterns-db

Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.

Language:PythonLicense:CC-BY-SA-4.0Stargazers:1026Issues:13Issues:9

untitledgoosetool

Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azure Active Directory (AzureAD), Azure, and M365 environments.

Language:PythonLicense:CC0-1.0Stargazers:907Issues:18Issues:45

CEH-Exam-Questions

Planning To Take Certified Ethical Hacker (CEH)? Here are github repo with 125 questions and answers to help you prep for the test

Shared

Shared Blogs and Notebooks

Language:Jupyter NotebookStargazers:464Issues:30Issues:1

rfcs

Specifications for Interledger and related protocols

Language:JavaScriptLicense:NOASSERTIONStargazers:430Issues:70Issues:248

Blacksmith

Building environments to replicate small networks and deploy applications

Language:PowerShellLicense:GPL-3.0Stargazers:316Issues:16Issues:20

awesome-detection-rules

This is a collection of threat detection rules / rules engines that I have come across.

PyPowerShellXray

Python script to decode common encoded PowerShell scripts

Sigma-Rules

A repository of my own Sigma detection rules.

security-analysis-tool

Security Analysis Tool (SAT) analyzes customer's Databricks account and workspace security configurations and provides recommendations that help them follow Databrick's security best practices. When a customer runs SAT, it will compare their workspace configurations against a set of security best practices and delivers a report.

Language:PythonLicense:NOASSERTIONStargazers:84Issues:7Issues:42

MSRC

Scripts for interacting with MSRC portal data

Language:HTMLStargazers:76Issues:13Issues:0

KustQueryLanguage_kql

Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting

Language:BatchfileStargazers:54Issues:4Issues:0

Bluehat2018GraphWorkshop

Bluehat 2018 Graphs for Security Workshop

Naiad

The Naiad system provides fast incremental and iterative computation for data-parallel workloads

Language:C#License:Apache-2.0Stargazers:23Issues:11Issues:0

visualfirewall

VisualFirewall/IDS is a research-grade Firewall and IDS visualization tool that aims to provide a highly-informative interface of network activities that relate to system security. The program is designed with novice system security administrators in mind who need easy to learn representations of security information, but also need the power of forensic analysis on past attacks.

Language:JavaLicense:MITStargazers:15Issues:6Issues:0

incident-investigation-using-graphistry

Visual analytics using Databricks & Graphistry for cybersecurity investigations

Language:PythonLicense:NOASSERTIONStargazers:3Issues:0Issues:0

LiveResponse

M365 MDATP Live Response sample scripts

Language:PowerShellLicense:MITStargazers:1Issues:0Issues:0