This repository contains a collection of writeups for machines on the Hack The Box platform. Each writeup details the methodology used, tools applied, and personal reflections on the lessons learned.
- Vulnerability analysis
- Privilege escalation
- Reverse engineering
- Service exploitation
- Post-exploitation
- Evasion techniques
- All writeups are created for educational purposes only.
- Sensitive information or anything that violates the platform’s TOS has been omitted.
- Feedback and suggestions are welcome via Issues or Pull Requests.
Feel free to reach out for questions, suggestions, or collaborations:
- LinkedIn: www.linkedin.com/in/rodrigo-gallego-marín-b27007297
- Email: rodrigoga03@gmail.com