0xJosepPermX — Season 5 HTB Machine WriteupClassic Linux machine, we start by runnin an nmap scan to see running services. The result showcases open ports 22 and 80.1d ago
Yusif YagubzadehTryHackMe: Linux Privilege EscalationToday we will take look at TryHackMe: Linux Privilege Escalation. This is a one of the beginner friendly rooms to get into Linux Privilege…Feb 13
Mohammed DiefWindows privilege escalation: Abusing npm’s design patterns to escalate your permissionsTrying to get back to bug bounty today I ended up deciding to hack on GitHub bug bounty program again, I didn’t regret it that much cause…2h ago2h ago
Musyoka IanHabitual parrot CTF walkthroughHello guys and welcome back to another walkthrough. This time we’ll be tackling habitual from parrot CTF. A really fun box that helped me…2d ago2d ago
0xJosepPermX — Season 5 HTB Machine WriteupClassic Linux machine, we start by runnin an nmap scan to see running services. The result showcases open ports 22 and 80.1d ago
Yusif YagubzadehTryHackMe: Linux Privilege EscalationToday we will take look at TryHackMe: Linux Privilege Escalation. This is a one of the beginner friendly rooms to get into Linux Privilege…Feb 13
Mohammed DiefWindows privilege escalation: Abusing npm’s design patterns to escalate your permissionsTrying to get back to bug bounty today I ended up deciding to hack on GitHub bug bounty program again, I didn’t regret it that much cause…2h ago
Musyoka IanHabitual parrot CTF walkthroughHello guys and welcome back to another walkthrough. This time we’ll be tackling habitual from parrot CTF. A really fun box that helped me…2d ago
James JarvisWindows Privilege Escalation | TryHackMeAnother day, another room. Today I am undertaking the Windows Privilege Escalation room.Nov 10, 2023
Cyber MagicDC:8 | VULNHUB | WRITEUPThis DC:8 vulnhub writeup tries to show us to think outside the box with the enumeration and getting the shell.3d ago
Kumarjit dronmKingdom (THM) writeupCurious about breaking into a digital fortress? TryHackMe offers interactive CTF challenges that mirror real-world cybersecurity scenarios…Jun 15