GitHub / Compcode1 1 Repository
Compcode1/ioc11-credential-harvesting-pdf
This case study examines an obfuscated phishing attempt embedded in a PDF file. The attack relied on user interaction to initiate a hidden redirect to a typosquatted phishing domain.
Language: Jupyter Notebook - Size: 22.5 KB - Last synced at: 2 days ago - Pushed at: 3 days ago - Stars: 0 - Forks: 0

Compcode1/ioc10-hidden-parameter-injection
This case study analyzed a fileless privilege escalation attack where the adversary exploited an undocumented administrative override parameter (admin_override=true) to bypass standard authentication and gain elevated access without triggering any alert or logging trail through normal access controls.
Language: Jupyter Notebook - Size: 23.4 KB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 0 - Forks: 0

Compcode1/ios9-scheduled-task
This case study documents an advanced persistence technique involving a scheduled task launching base64-encoded PowerShell, used to execute malicious commands without dropping traditional malware to disk.
Language: Jupyter Notebook - Size: 20.5 KB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 0 - Forks: 0

Compcode1/ios8-dns-beaconing
his case study investigates a covert beaconing pattern in which a compromised host periodically sent outbound DNS queries to Google's public resolver (8.8.8.8) at 30-minute intervals without receiving responses.
Language: Jupyter Notebook - Size: 7.81 KB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Compcode1/ioc7-credential-harvesting
This project exemplifies how quiet attacks on human behavior can be just as dangerous as malware-based intrusions.
Language: Jupyter Notebook - Size: 21.5 KB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Compcode1/ioc5-suspicious-task
This case study analyzed a low-complexity but real-world-relevant example of attacker persistence using the built-in Windows utility schtasks.exe.
Language: Jupyter Notebook - Size: 20.5 KB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Compcode1/ioc4-unsigned-executable
This case study focused on a low-profile intrusion attempt involving a standalone executable (patcher.exe) found in a writable but non-standard directory (C:\ProgramData\WinUpdate).
Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 0 - Forks: 0

Compcode1/ioc3-obfuscated-script-mshta
This case study analyzed a stealthy host-based compromise in which the attacker exploited the trusted Windows binary mshta.exe to execute a remotely hosted, obfuscated JavaScript payload. The attacker’s strategy was notable not for brute force or privilege escalation, but for quiet persistence and clever abuse of native system behavior.
Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0

Compcode1/ioc2-process-spawn-dll
In this second case study of the structured IOC triage series, we examined a subtle but dangerous host-based compromise involving the abuse of the Windows utility `rundll32.exe` to execute a malicious DLL payload.
Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0

Compcode1/ioc1-recon
This IOC captures a foundational stage in the cyber kill chain: reconnaissance — where the attacker has not yet breached the system, but is actively probing to discover what might be open, unguarded, or improperly exposed.
Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0

Compcode1/lolbin-triage
This repository documents real-world forensic triage cases involving the abuse of legitimate Windows binaries—also known as LOLBins—for malicious purposes.
Language: Jupyter Notebook - Size: 20.5 KB - Last synced at: 9 days ago - Pushed at: 9 days ago - Stars: 0 - Forks: 0

Compcode1/beaconing-detection
Detecting covert HTTPS beaconing from an internal host using network triage methods including firewall alerts, NetFlow analysis, and domain reputation tools.
Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: 15 days ago - Pushed at: 15 days ago - Stars: 0 - Forks: 0

Compcode1/lsass-memory-scraping
The case illustrates the power of structured host-based triage — beginning with logs and EDR, and moving through file inspection, RAM capture, and finally, network artifact confirmation.
Language: Jupyter Notebook - Size: 40 KB - Last synced at: 15 days ago - Pushed at: 15 days ago - Stars: 0 - Forks: 0

Compcode1/phishing-email-triage
This mock case study of a phishing-based credential theft attack illustrates how user deception, rather than malware, often opens the door to serious cloud compromises.
Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: 17 days ago - Pushed at: 17 days ago - Stars: 0 - Forks: 0

Compcode1/malicious-file-upload
This mock case study of a malicious file upload and web shell planting attack illustrates the anatomy of a modern application-layer intrusion and its full lifecycle across investigation, containment, and remediation.
Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: 17 days ago - Pushed at: 18 days ago - Stars: 0 - Forks: 0

Compcode1/v-management
This book is part of a larger structured series designed to prepare for the CompTIA Cybersecurity Analyst (CySA+) certification while simultaneously building job-ready knowledge for real-world cybersecurity roles.
Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: 25 days ago - Pushed at: 25 days ago - Stars: 0 - Forks: 0

Compcode1/vulnerability-management
This book is part of a larger structured series designed to prepare for the **CompTIA Cybersecurity Analyst (CySA+) certification** while simultaneously building **job-ready knowledge** for real-world cybersecurity roles.
Size: 0 Bytes - Last synced at: 26 days ago - Pushed at: 27 days ago - Stars: 0 - Forks: 0

Compcode1/security-operations
This book was created to provide a clear, structured, and deeply connected approach to mastering the CompTIA CySA+ (Cybersecurity Analyst) exam.
Language: Jupyter Notebook - Size: 89.8 KB - Last synced at: 27 days ago - Pushed at: 28 days ago - Stars: 0 - Forks: 0

Compcode1/windows-systems-cybersecurity
This project is designed to build familiarity with the internal structure of a Windows system. You’ll explore key components used by attackers, defenders, and analysts alike.
Language: Jupyter Notebook - Size: 48.8 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Compcode1/wireshark-https-tls
This project provided a focused investigation into a standard HTTPS connection using Wireshark, capturing and analyzing the TLS handshake between a client system and a web server (v10.events.data.microsoft.com).
Language: Jupyter Notebook - Size: 21.5 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Compcode1/nmap-tracert
Tracert works by sending packets with increasing TTL values, allowing us to discover each hop along the path to a target. We will use this behavior to analyze a real-world path and draw conclusions about the route's structure.
Language: Jupyter Notebook - Size: 24.4 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Compcode1/wireshark-flow-analysis
The goal of this project was to efficiently analyze how a website (Adidas.com) was accessed from the moment of the initial request to the establishment of an encrypted HTTPS session.
Language: Jupyter Notebook - Size: 22.5 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Compcode1/nmap-aggressive-scan
This project demonstrated the power of Nmap as a network discovery and reconnaissance tool, capable of revealing detailed information about a target host. We used the aggressive scan mode (-A), which combines several advanced features into a single comprehensive scan:
Language: Jupyter Notebook - Size: 26.4 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Compcode1/wireshark-ping-analysis
This project demonstrated how a basic ping test, when combined with Wireshark analysis, reveals rich layers of networking insight.
Language: Jupyter Notebook - Size: 22.5 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Compcode1/nmap-ssh-mapping
This project served as a deep investigation into the Secure Shell (SSH) protocol, specifically its handshake process, cryptographic algorithm negotiation, and how it compares structurally and functionally to the TLS (Transport Layer Security) handshake.
Language: Jupyter Notebook - Size: 28.3 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Compcode1/wireshark-flow-execution
This project is a continuation of our previous Wireshark flow analysis, where we developed an optimized methodology to track the resolution and connection process of a website.
Language: Jupyter Notebook - Size: 31.3 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Compcode1/wireshark-https-analysis
This project aimed to analyze an entire HTTPS session captured in Wireshark, starting from the DNS resolution to the full TCP & TLS handshake, followed by encrypted data transmission and proper connection termination.
Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Compcode1/wireshark-web-request
This project is a deep dive into tracking a single web request from start to finish, analyzing each stage at the packet level using Wireshark.
Language: Jupyter Notebook - Size: 50.8 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Compcode1/wireshark-user-manual
This manual covers **Wireshark’s usage, security applications, and deep packet interpretation** to **identify threats, analyze network behavior, and troubleshoot security incidents.**
Size: 46.9 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Compcode1/nmap-users-manual
An AI assisted self created Nmap users manual geared towards CySA+ level mastery.
Language: Jupyter Notebook - Size: 1000 Bytes - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Compcode1/local-host-security-scan
This project is a quick **Nmap scan** of the **localhost (127.0.0.1)** to identify open ports and active services running on the machine.
Language: Jupyter Notebook - Size: 19.5 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Compcode1/wireshark-nmap-email
This project analyzes the transmission of emails between two devices on the same network:
Language: Jupyter Notebook - Size: 27.3 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Compcode1/nmap-wireshark-ssh-scp
This project successfully demonstrated how SSH and SCP work together to securely transfer files, how to capture and analyze encrypted SSH traffic in Wireshark, and how to troubleshoot unexpected behaviors like session termination anomalies.
Size: 19.5 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Compcode1/wireshark-basic
This project focuses on capturing and analyzing basic network traffic using Wireshark. The primary goal is to understand how Wireshark captures and displays network packets while identifying key protocols.
Size: 0 Bytes - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Compcode1/nmap-encrypted-scanning
This project will analyze how encryption affects Nmap scans under different conditions.
Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Compcode1/nmap-web-server
his project explores network service detection and monitoring using Nmap and Python automation in a Jupyter Notebook environment.
Language: Jupyter Notebook - Size: 26.4 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Compcode1/nmap-host-changes
This project automates Nmap network scanning via Python scripting] while dynamically modifying device states and network activity to observe real-time changes.
Language: Jupyter Notebook - Size: 16.6 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Compcode1/nmap-automation
This project automates Nmap scans at scheduled intervals to analyze network activity over time.
Language: Python - Size: 0 Bytes - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Compcode1/nmap-python
This project explores how to integrate Nmap with Python to perform network scans, analyze device responses, and compare different scanning techniques.
Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Compcode1/nmap-macbook-analysis
This project was conducted to assess the security posture of a MacBook Air by leveraging Nmap scanning techniques. The goal was to analyze how different security configurations impact network visibility and exposure. By performing multiple scans under varying conditions, we were able to observe the role of macOS firewall settings and services.
Language: Jupyter Notebook - Size: 31.3 KB - Last synced at: about 2 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Compcode1/nmap-scan-analysis
In this project, I explore Nmap (Network Mapper), a powerful open-source network scanning tool used by cybersecurity professionals, network administrators, and ethical hackers.
Language: Jupyter Notebook - Size: 25.4 KB - Last synced at: about 2 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Compcode1/security-risk-assessment-report-1
By implementing MFA, strong password policies, and rigorous firewall maintenance with port filtering, the organization can address current vulnerabilities and prevent future data breaches.
Language: Jupyter Notebook - Size: 22.5 KB - Last synced at: about 2 months ago - Pushed at: 6 months ago - Stars: 1 - Forks: 0

Compcode1/pasta-stages
You’re part of the growing security team at a company for sneaker enthusiasts and collectors. The business is preparing to launch a mobile app that makes it easy for their customers to buy and sell shoes. You are performing a threat model of the application using the PASTA framework.
Language: Jupyter Notebook - Size: 21.5 KB - Last synced at: about 2 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Compcode1/usb-drive
You are part of the security team at Rhetorical Hospital and arrive to work one morning. On the ground of the parking lot, you find a USB stick with the hospital's logo printed on it. There’s no one else around who might have dropped it, so you decide to pick it up out of curiosity.
Language: Jupyter Notebook - Size: 19.5 KB - Last synced at: about 2 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Compcode1/vulnerability-assessment
The company stores information on a remote database server, since many of the employees work remotely from locations all around the world. Employees of the company regularly query, or request, data from the server to find potential customers. The database has been open to the public since the company's launch three years ago.
Language: Jupyter Notebook - Size: 20.5 KB - Last synced at: about 2 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Compcode1/incident-report
ASSIGNMENT: You are a cybersecurity analyst working at a company that specializes in providing IT services for clients. Several customers of clients reported that they were not able to access the client company website www.yummyrecipesforme.com, and saw the error “destination port unreachable” after waiting for the page to load.
Language: Jupyter Notebook - Size: 127 KB - Last synced at: about 2 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Compcode1/incident-report-2
The logs show that an unusually large number of SYN packets were sent to the web server from the attacker’s IP address (203.0.113.0). The web server struggled to keep up with the overwhelming SYN requests, as reflected in the increasing number of failed communications and error messages.
Language: Jupyter Notebook - Size: 23.4 KB - Last synced at: about 2 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Compcode1/incident-report-3
PROJECT INTRODUCTION I am are a cybersecurity analyst for yummyrecipesforme.com, a website that sells recipes and cookbooks. A former employee has decided to lure users to a fake website with malware.
Language: Jupyter Notebook - Size: 25.4 KB - Last synced at: about 2 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Compcode1/incident-report-4
This morning, the organization experienced a Distributed Denial of Service (DDoS) attack, where an overwhelming flood of ICMP packets targeted the network.
Language: Jupyter Notebook - Size: 17.6 KB - Last synced at: about 2 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Compcode1/risk-register
You've joined a new cybersecurity team at a commercial bank. The team is conducting a risk assessment of the bank's current operational environment. As part of the assessment, they are creating a risk register to help them focus on securing the most vulnerable risks.
Language: Jupyter Notebook - Size: 20.5 KB - Last synced at: about 2 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Compcode1/risk-assessment
First, you'll need to evaluate details about the incident. Then, you'll review the controls in place to prevent data leaks. Next, you'll identify ways to improve information privacy at the company. Finally, you'll justify why you think your recommendations will make data handling at the company more secure.
Language: Jupyter Notebook - Size: 19.5 KB - Last synced at: about 2 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Compcode1/access-control-worksheet
You’re the first cybersecurity professional hired by a growing business. Recently, a deposit was made from the business to an unknown bank account. The finance manager says they didn’t make a mistake. Fortunately, they were able to stop the payment. The owner has asked you to investigate what happened to prevent any future incidents.
Language: Jupyter Notebook - Size: 19.5 KB - Last synced at: about 2 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Compcode1/synthetic-metabolic-dataset
This project generates and analyzes a synthetic dataset of 10,000 adults, reflecting the age, BMI, waist circumference, fasting blood glucose, HDL, Triglyceride and high blood pressure distributions of the adult US population. I utilized the United Stated statistical trends as detailed by NHANES (CDC). By employing various novel algorithms to simul
Language: Jupyter Notebook - Size: 2.94 MB - Last synced at: about 2 months ago - Pushed at: 9 months ago - Stars: 2 - Forks: 0

Compcode1/security-audit-botium-toys
This internal IT audit at Botium Toys has highlighted several critical gaps in the organization’s cybersecurity posture and compliance practices.
Language: Jupyter Notebook - Size: 24.4 KB - Last synced at: about 2 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Compcode1/energy-output-prediction
Develop a predictive model to forecast the hourly electrical energy output of a Combined Cycle Power Plant (CCPP) based on ambient environmental conditions.
Language: Jupyter Notebook - Size: 185 KB - Last synced at: about 2 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Compcode1/stock-revenue-analysis
Python Project for Data Science/ Final Assignment
Language: Jupyter Notebook - Size: 192 KB - Last synced at: about 2 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Compcode1/final-assignment
Language: Jupyter Notebook - Size: 18.6 KB - Last synced at: about 2 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

Compcode1/depression-screening-ml
The goal of this project was to build a machine learning model capable of accurately predicting depression in a population where the incidence rate is 15%.
Language: Jupyter Notebook - Size: 173 KB - Last synced at: about 2 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0

Compcode1/depression-dataset
The goal of this small project was to expand a medical dataset by adding a new column named Depression based on predefined medical and exam score conditions. The expanded dataset was then saved as a new CSV file for further analysis.
Size: 2.02 MB - Last synced at: about 2 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0

Compcode1/liver-disease-predictions-ml
The goal of this project was to develop a machine learning model to predict Liver Disease (Liver Dx) using health-related features, leveraging the powerful XGBoost algorithm.
Language: Jupyter Notebook - Size: 164 KB - Last synced at: about 2 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0

Compcode1/chronic-kidney-disease-predictions-ml
The goal of this project was to develop a machine learning model using XGBoost to predict Chronic Kidney Disease (CKD) based on various health-related features.
Language: Jupyter Notebook - Size: 103 KB - Last synced at: about 2 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0

Compcode1/trauma-predictions2-ml
In this project I built predictive models (XGBoost and Random Forest) to determine the likelihood of trauma based on medical records. Created a probabilistically constructed Trauma target variable using various health-related conditions. Preprocessed the data via one-hot encoding and trained models with different configurations.
Language: Jupyter Notebook - Size: 142 KB - Last synced at: about 2 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 0

Compcode1/darwin-analysis
A text processing project analyzing Charles Darwin's use of persuasive language in On the Origin of Species. This analysis explores the frequency and distribution of rhetorical techniques, such as evidence, emphasis, and refutation, across different chapters.
Language: Jupyter Notebook - Size: 509 KB - Last synced at: about 2 months ago - Pushed at: 8 months ago - Stars: 0 - Forks: 0

Compcode1/weather-project
The purpose of this project is to analyze a weather dataset to determine if it plausibly represents a specific region of the world, based on its temperature patterns and rainfall frequency.
Language: Jupyter Notebook - Size: 2.16 MB - Last synced at: about 2 months ago - Pushed at: 8 months ago - Stars: 0 - Forks: 0

Compcode1/nfl-analysis
The objective of this analysis was to explore potential correlations between player attributes (such as average age and weight across different positions) and key team performance metrics from the 2023 NFL season.
Language: Jupyter Notebook - Size: 57.6 KB - Last synced at: about 2 months ago - Pushed at: 8 months ago - Stars: 0 - Forks: 0

Compcode1/linear-regression-postgresql
In this project, I use linear regression to explore the relationship between BMI, age, and the average number of positive risk factors for metabolic syndrome. By analyzing the slopes and R2 values from the regression models, I will determine how strongly BMI and age (Age vs. BMI) influence the number of risk factors.
Language: Jupyter Notebook - Size: 215 KB - Last synced at: about 2 months ago - Pushed at: 9 months ago - Stars: 0 - Forks: 0

Compcode1/analysis-synthetic-dataset-optimization-techniques
This project focuses on the critical analysis of synthetic health metrics and the optimization of advanced algorithms used for data processing and analysis.
Language: Jupyter Notebook - Size: 17.6 KB - Last synced at: about 2 months ago - Pushed at: 11 months ago - Stars: 0 - Forks: 0

Compcode1/risk-reduction-potentials
This small project demonstrated the value of leveraging metabolic profiles and related calculations in a synthetic dataset. This type of analysis greatly expands upon the binary Metabolic Syndrome classification.
Language: Jupyter Notebook - Size: 37.1 KB - Last synced at: about 2 months ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0

Compcode1/metabolic-health-calculator
An algorithm that advances the use of Metabolic Syndrome metrics in individual health risk calculation.
Language: Jupyter Notebook - Size: 26.4 KB - Last synced at: about 2 months ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0

Compcode1/dexa-math
This basic calculator will be used for further DEXA variable exploration and expanded programs.
Language: Jupyter Notebook - Size: 3.91 KB - Last synced at: about 2 months ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0

Compcode1/slq-exercise-dataset-analysis
The initial SLQ analysis findings indicate that this dataset is unreliable and unworthy of further analysis.
Language: Jupyter Notebook - Size: 153 KB - Last synced at: about 2 months ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0

Compcode1/diabetes-dataset-analysis
Without addressing the cause of the extreme deviation in smoking prevalence, the reliability of the entire dataset is compromised.
Language: Jupyter Notebook - Size: 2.31 MB - Last synced at: about 2 months ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0

Compcode1/advanced-data-engineering
Implementing advanced data engineering techniques, including dictionaries, sets, and binary search, to achieve significant improvements in time and memory efficiency.
Language: Jupyter Notebook - Size: 14.6 KB - Last synced at: about 2 months ago - Pushed at: 11 months ago - Stars: 0 - Forks: 0

Compcode1/project-sql
In this SQL project, I analyzed customer and product data to provide insights that can guide restocking decisions, marketing strategies, and customer acquisition spending
Size: 21.5 KB - Last synced at: about 2 months ago - Pushed at: 9 months ago - Stars: 0 - Forks: 0

Compcode1/synthetic-data-metabolic-math
This repository contains two primary files used in combination to generate and analyze synthetic metabolic data.
Language: Jupyter Notebook - Size: 1.3 MB - Last synced at: about 2 months ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0

Compcode1/explore-dataset
The primary focus of this project is to explore the relationship between five selected variables and the severity of heart disease.
Language: Jupyter Notebook - Size: 182 KB - Last synced at: about 2 months ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0
