π§ A personal collection of writeups for retired Hack The Box machines, created for educational purposes and to document techniques used during each lab.
Each writeup includes:
- π οΈ Reconnaissance steps (Nmap, Gobuster, WhatWeb, etc.)
- βοΈ Enumeration & exploitation process
- π Privilege escalation techniques
- π§Ό Cleanup steps when applicable
- πΈ Annotated screenshots with redacted sensitive data
All machines included here are retired, and any sensitive information (such as flags, hashes, passwords, encoded payloads, or tokens) has been redacted or blurred in accordance with Hack The Box Terms of Service.
These writeups are meant for learning, sharing methodology, and improving cybersecurity skills. Please use them responsibly.
This repository is for educational purposes only. Use of any techniques or scripts mentioned here outside of legal environments is strictly prohibited. I am not responsible for any misuse.
π GitHub: @J1Ejota
π¬ Contact: Check my GitHub profile
This repository is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
You are free to:
- Share β copy and redistribute the material in any medium or format
- Adapt β remix, transform, and build upon the material for any purpose, even commercially
As long as you give appropriate credit to the author:
@J1Ejota
π Full license text: https://creativecommons.org/licenses/by/4.0/