ETHICAL HACKER // SOC ANALYST // SECURITY RESEARCHER

WYCLIFFE MWANIKI

Hi, I'm Wycliffe — a Cybersecurity Enthusiast & Ethical Hacker. I specialize in network security, penetration testing, and digital investigations. I build, break, and secure systems ethically.

operator@wm-cyber:~$
50+
CTF CHALLENGES
12+
TOOLS MASTERED
4+
LIVE PROJECTS
CURIOSITY LEVEL

SECTION 02

SKILLS & EXPERTISE

LEVEL 01 // FOUNDATION
NETWORKING
TCP/IP & DNS90%
Packet Analysis80%
Network Architecture75%
TCP/IP
DNS
DHCP
ROUTING
WIRESHARK
LEVEL 02 // DEVELOPMENT
PROGRAMMING
Python85%
Bash Scripting78%
Web Technologies65%
PYTHON
BASH
HTML
JAVASCRIPT
AUTOMATION
LEVEL 03 // INTELLIGENCE
OSINT
Information Gathering82%
Metadata Analysis74%
Social Footprinting70%
MALTEGO
SHODAN
THEHARVESTOR
RECON-NG
LEVEL 04 // COMPETITION
CTF CHALLENGES
Web Exploitation76%
Reverse Engineering65%
Privilege Escalation72%
HACKTHEBOX
TRYHACKME
PICOCTF
BINARY EXPLOIT
LEVEL 05 // ADVANCED
PENETRATION TESTING
Reconnaissance88%
Vulnerability Assessment80%
Exploitation & Reporting75%
NMAP
METASPLOIT
BURPSUITE
KALI LINUX
PENTEST REPORTS

SECTION 03

TOOLS & WORKFLOWS

🗺️
NMAP
Network discovery and security auditing. Maps the attack surface of any target environment.
Discover live hosts on network
Identify open ports & services
Detect service versions & OS
Map full network attack surface
🔑
HYDRA
Authentication testing tool to evaluate login strength and credential policies.
Target authentication endpoint
Test credential combinations
Identify weak login policies
Evaluate password hardening
🕸️
BURP SUITE
Web security testing platform. Intercepts and analyzes web traffic to find vulnerabilities.
Intercept HTTP/S requests
Analyze web application traffic
Identify XSS & SQLi vectors
Safely modify requests in lab
📡
ETTERCAP
Network analysis suite for understanding traffic flows and MITM concepts in labs.
Monitor live network traffic
Analyze packet flow patterns
Demonstrate MITM concepts
Controlled lab environments only
⚔️
METASPLOIT
Security framework for simulating attacks and understanding the full exploitation lifecycle.
Select controlled lab target
Identify & test vulnerabilities
Execute exploitation safely
Practice post-exploitation skills
📊
SPLUNK
Security information and event management. Centralizes log analysis for threat detection.
Ingest security event logs
Correlate threat indicators
Build detection dashboards
Investigate & respond to alerts

SECTION 04

ACTIVE PROJECTS

WEB SECURITY
🔐
Web App Penetration Testing Lab
Comprehensive penetration testing against OWASP Juice Shop and DVWA environments. Documented vulnerabilities, exploits, and remediation strategies.
OWASP
DVWA
BURPSUITE
SQLMAP
SOC OPERATIONS
🌐
SOC Lab — Splunk + Kali Linux
Full Security Operations Center simulation environment. Ingesting logs, building detection rules, simulating attacks, and responding to alerts in real time.
SPLUNK
KALI LINUX
SIEM
LOG ANALYSIS
AUTOMATION
📡
Network Scanning Automation Script
Python-based automation script integrating Nmap scanning capabilities with custom reporting pipelines. Identifies live hosts, open ports, and service versions automatically.
PYTHON
NMAP
AUTOMATION
BASH
INTELLIGENCE
🕵️
OSINT Investigation Case Study
Structured open-source intelligence investigation methodology. Includes public data collection, metadata extraction, social footprint analysis, and evidence documentation.
OSINT
MALTEGO
SHODAN
RECON

SECTION 05

ETHICS & MINDSET

🛡️
"I practice cybersecurity responsibly. All testing is conducted in legal environments — labs, CTFs, and authorized systems only. Knowledge without ethics is a weapon without a conscience."
CTF PLATFORMS ONLY
AUTHORIZED SYSTEMS
LAB ENVIRONMENTS
RESPONSIBLE DISCLOSURE
LEGAL COMPLIANCE

SECTION 06

ESTABLISH CONTACT

LET'S COLLABORATE
Available for CTF teams, security research, internship opportunities, and cybersecurity discussions.
⬡ CONNECT WITH ME