Welcome to my personal collection of writeups for machines and challenges on Hack The Box. Each writeup includes my thought process, tools used, exploitation steps, and post-exploitation notes.
Periodically I will return to the laboratories and machines I have completed and make any changes or improvements to my solutions.
Each writeup is organized in its own directory
Important
These writeups are created for educational purposes only
. Demonstration of tools and various pentesting techniques does not encourage their use outside the legal field.
This repository should be used only for ethical purposes
: to protect your own systems, improve cybersecurity skills, or within the framework of official agreements.
The author is not responsible for direct or indirect damage resulting from the illegal use of the presented materials
Spotted a mistake? Have suggestions or want to discuss something?
I'm always open to feedback and collaboration!