// Cybersecurity Portfolio

RyanCyber Docs

PENETRATION TESTING · DOCUMENTATION · SECURITY RESEARCH

A centralized hub for cybersecurity practicals, technical documentation, and professional security services. Every vulnerability studied. Every system hardened.

ryan@cyberlab:~$
ryan@cyberlab:~$
0Practicals Done
0Tools Documented
0CTF Challenges
0Services Offered

Security Services

Professional cybersecurity services tailored for individuals, SMEs, and organizations.

🔍

Penetration Testing

Authorized simulated attacks on your systems to identify exploitable vulnerabilities before real attackers do.

Web AppsNetworksAPIs
🛡️

Vulnerability Assessment

Systematic scanning and analysis of your infrastructure to uncover security gaps and misconfigurations.

NMAPNessusOpenVAS
🔐

Security Hardening

Configuring and securing systems, firewalls, and servers to reduce attack surfaces and exposure.

LinuxWindowsFirewall
📋

Security Documentation

Creating clear, professional security reports, policies, procedures, and technical guides for your team.

ReportsPoliciesSOPs

Incident Response

Rapid identification, containment, and recovery support when a security breach or incident occurs.

DFIRForensicsRecovery
🎓

Security Training

Hands-on cybersecurity awareness training and technical mentoring for individuals and teams.

AwarenessPhishingMentoring

Cybersecurity Practicals

Hands-on lab exercises, CTF writeups, and penetration testing practicals.

Network Security2025-01-15

NMAP Scanning & Enumeration Lab

Complete network reconnaissance using NMAP — service detection, OS fingerprinting, and script scanning on a vulnerable VM.

Web Security2025-02-03

SQL Injection on DVWA

Exploiting blind and error-based SQL injection on the Damn Vulnerable Web Application with full documentation.

Exploitation2025-02-20

Metasploit Framework Basics

Using Metasploit to exploit Metasploitable2 — msfconsole, payloads, sessions, and post-exploitation modules.

Forensics2025-03-10

Memory Forensics with Volatility

Analyzing a memory dump to extract running processes, network connections, and malware artifacts using Volatility3.

CTF2025-03-22

TryHackMe: Blue Room Writeup

Full walkthrough of exploiting EternalBlue (MS17-010) on a Windows target — from enumeration to privilege escalation.

Wireless2025-04-05

WPA2 Handshake Capture & Crack

Capturing 4-way handshakes using Aircrack-ng suite and performing dictionary attacks in a controlled lab environment.


Technical Documentation

Guides, tool references, cheat sheets, and security research notes.

Guide2025-01-08

Kali Linux Setup & Hardening Guide

Step-by-step setup of a secure Kali Linux pentesting environment including custom configurations and tool installation.

Cheat Sheet2025-01-25

Linux Privilege Escalation Checklist

Comprehensive checklist covering SUID, sudo misconfigurations, cron jobs, writable paths, and kernel exploits.

Research2025-02-14

OWASP Top 10 Deep Dive

Personal research and lab-based exploration of all OWASP Top 10 vulnerabilities with proof-of-concept examples.


Upload Files

Add new practicals, reports, or documentation to the hub.

📁

DROP FILES OR CLICK TO UPLOAD

Supports PDF, DOCX, TXT, MD, PNG, JPG — Max 50MB per file


Contact Ryan

Interested in working together or have a security concern? Reach out.

Let's Secure Your World

Available for freelance engagements, collaborations, and consultations. All inquiries are handled with strict confidentiality.

📧 ryanfop4@gmail.com
🔗 linkedin.com/in/Ryan Brian
🐱 github.com/ryanfop4-png
📍 Nairobi, Kenya