Skip to content
View ryanmroth's full-sized avatar

Organizations

@layer8secure

Block or report ryanmroth

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ryanmroth/README.md

Hey, I'm Ryan 👋

Hacker | Researcher | Malware Analyst | Developer | Designer

Chief Architect at Layer 8 Security · Greater Philadelphia

Security researcher and pentester who speaks both exploit code and boardroom. I break things, then explain why it matters.


📡 Connect

Website LinkedIn X HackTheBox


🔬 What I Do

$ cat /etc/skills
- Strategic Planning
- Leadership & People Development
- Offensive Security
- Malware Analysis
- Digital Forensics
- Incident Response
- Vulnerability Research

🛠️ Languages & Tools

Python TypeScript NextJS HTML5 CSS3 Markdown TailwindCSS

Kali Burp Suite SublimeText Wireshark Vercel X64dbg Terraform


📜 Certs

CISSP OSCP PMRP


📝 Latest Research


Profile Views

Pinned Loading

  1. freshid freshid Public

    Randomize system hostname and machine-id on Linux at boot. Useful for pentesting, privacy, or any scenario requiring a fresh identity each boot.

    Shell 11 6

  2. Orbit-Fox_SSRF_CVE-2025-10874 Orbit-Fox_SSRF_CVE-2025-10874 Public

    Demonstrates SSRF with null byte injection bypass for CVE-2025-10874

    Python

  3. layer8secure/extron-smp-inject layer8secure/extron-smp-inject Public

    A tool to exploit OS command injection vulnerabilities in Extron SMP devices.

    Python 1