Hi, I'm Wycliffe — a Cybersecurity Enthusiast & Ethical Hacker. I specialize in network security, penetration testing, and digital investigations. I build, break, and secure systems ethically.
Network discovery and security auditing. Maps the attack surface of any target environment.
Discover live hosts on network
Identify open ports & services
Detect service versions & OS
Map full network attack surface
🔑
HYDRA
Authentication testing tool to evaluate login strength and credential policies.
Target authentication endpoint
Test credential combinations
Identify weak login policies
Evaluate password hardening
🕸️
BURP SUITE
Web security testing platform. Intercepts and analyzes web traffic to find vulnerabilities.
Intercept HTTP/S requests
Analyze web application traffic
Identify XSS & SQLi vectors
Safely modify requests in lab
📡
ETTERCAP
Network analysis suite for understanding traffic flows and MITM concepts in labs.
Monitor live network traffic
Analyze packet flow patterns
Demonstrate MITM concepts
Controlled lab environments only
⚔️
METASPLOIT
Security framework for simulating attacks and understanding the full exploitation lifecycle.
Select controlled lab target
Identify & test vulnerabilities
Execute exploitation safely
Practice post-exploitation skills
📊
SPLUNK
Security information and event management. Centralizes log analysis for threat detection.
Ingest security event logs
Correlate threat indicators
Build detection dashboards
Investigate & respond to alerts
SECTION 04
ACTIVE PROJECTS
WEB SECURITY
🔐
Web App Penetration Testing Lab
Comprehensive penetration testing against OWASP Juice Shop and DVWA environments. Documented vulnerabilities, exploits, and remediation strategies.
OWASP
DVWA
BURPSUITE
SQLMAP
SOC OPERATIONS
🌐
SOC Lab — Splunk + Kali Linux
Full Security Operations Center simulation environment. Ingesting logs, building detection rules, simulating attacks, and responding to alerts in real time.
SPLUNK
KALI LINUX
SIEM
LOG ANALYSIS
AUTOMATION
📡
Network Scanning Automation Script
Python-based automation script integrating Nmap scanning capabilities with custom reporting pipelines. Identifies live hosts, open ports, and service versions automatically.
PYTHON
NMAP
AUTOMATION
BASH
INTELLIGENCE
🕵️
OSINT Investigation Case Study
Structured open-source intelligence investigation methodology. Includes public data collection, metadata extraction, social footprint analysis, and evidence documentation.
OSINT
MALTEGO
SHODAN
RECON
SECTION 05
ETHICS & MINDSET
🛡️
"I practice cybersecurity responsibly. All testing is conducted in legal environments — labs, CTFs, and authorized systems only. Knowledge without ethics is a weapon without a conscience."