A comprehensive collection of penetration testing writeups and cybersecurity challenges
| π Metric | π’ Count |
|---|---|
| π― Total Machines | 13 |
| π Total Lines of Code | 1,479+ |
| π Platforms Covered | Hack The Box |
| π Difficulty Range | Very Easy β Easy |
| β Completion Rate | 100% |
Welcome to my cybersecurity learning journey! This repository serves as a comprehensive documentation of my hands-on experience with various penetration testing challenges and vulnerable machines.
Each write-up follows a structured methodology covering:
- π Enumeration: Systematic information gathering and reconnaissance
- πͺ Initial Access: Exploitation techniques and foothold establishment
- β¬οΈ Privilege Escalation: Methods to gain administrative control
- π§ Lessons Learned: Key security principles and vulnerability insights
- π οΈ Tools & Techniques: Practical application of security tools
| π― Machine | π Difficulty | πͺ Tier | π Lines | π Write-up |
|---|---|---|---|---|
| π± Meow | Very Easy | - | 105 | π Read |
| π¦ Fawn | Very Easy | - | 95 | π Read |
| π Dancing | Very Easy | Tier 2 | 132 | π Read |
| π Redeemer | Very Easy | Tier 3 | 124 | π Read |
| π₯ Explosion | Very Easy | Tier 4 | 75 | π Read |
| ποΈ Mongod | Very Easy | Tier 5 | 77 | π Read |
| π₯ Ignition | Very Easy | Tier 6 | 82 | π Read |
| π Synced | Very Easy | Tier 7 | 97 | π Read |
| π― Machine | π Difficulty | πͺ Tier | π Lines | π Write-up |
|---|---|---|---|---|
| π Appointment | Easy | Tier 1 | 83 | π Read |
| π Sequel | Easy | Tier 1 | 145 | π Read |
| ποΈ Archetype | Easy | Tier 2 | 223 | π Read |
| π Responder | Easy | Tier 4 | 59 | π Read |
| 3οΈβ£ Three | Easy | Tier 5 | 182 | π Read |
- Browse the table above to find a machine of interest
- Click on the "π Read" link to view the detailed write-up
- Each write-up includes step-by-step methodology and learning points
For beginners, I suggest following this progression:
π± Meow β π¦ Fawn β π Dancing β π Redeemer β π₯ Explosion
β
ποΈ Mongod β π₯ Ignition β π Synced
β
π
Appointment β π Sequel β ποΈ Archetype β π Responder β 3οΈβ£ Three
Passionate about ethical hacking, vulnerability research, and security education
While this repository primarily documents my personal learning journey, I welcome:
- π Bug reports for any errors in the write-ups
- π‘ Suggestions for improving documentation
- π Alternative approaches and techniques
- π Additional resources that complement the write-ups
Please open an issue or submit a pull request if you'd like to contribute!
β οΈ IMPORTANT: All activities documented in this repository were performed in controlled, legal environments specifically designed for education and training purposes (such as Hack The Box).The techniques and methods described should ONLY be used on systems you own or have explicit written permission to test. Unauthorized penetration testing is illegal and unethical.
The author is not responsible for any misuse of the information provided in these write-ups.
This project is licensed under the MIT License - see the LICENSE file for details.