35 results for “topic:boot2root”
Writeups for HacktheBox 'boot2root' machines
A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
[180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you googles something for a CTF and landed here look at the scripts they're all fairly malleable. Sorry for the shitty naming conventions (not really). If you are a recruiter stop. I wont be able to rewrite half this shit in a formal interview ¯\_(ツ)_/¯
TryHackMe walkthroughs and CTF writeups created for self-practice and to help others understand web exploitation, privilege escalation, and real-world penetration testing techniques.
The source files of my completed TryHackMe challenges and walkthroughs with links to their respective rooms
Writeups/walkthroughs for TryHackMe PwnBoxes/Challenges/Rooms
write ups [boot2root|ctf|wargame]
share with the boot2root walkthrough of vulnhub
Resources for FSEC-SS Sharing Session
🔐 Become a root user and take advantage over the given system
An OSCP-like boot2root CTF challenge
An IT security challenge
Security Challenge
Security challenge here we need to pass root on a iso and resolve some challenges by pen-testing. 125/100
HTB SwagShop (10.10.10.140)
CTF Writeup for boot2root '19 held during Aparoksha 19
CASTOR - AI Pentest Assistant
HTB Kryptos (10.10.10.129)
My write-ups for various Hack the Box "boot2root" machines and challenges.
HackTheBox Machine Write-ups
Get root access
A Deatiled CTF wlkthoughs & Writeups
HTB FriendZone (10.10.10.123)
All my writeups for wizardseclabs machine
This is the box that i made to learn penetration testing and defense.👨🏻💻
Epitech Project - This repository contains walkthroughs for a series of boot2root Epitech challenges hosted on TryHackMe.
YATA is just another TODO app, it's a deliberately vulnerable application designed to challenge your vulnerability research skills. Your mission is to identify and exploit the system's weaknesses using standard vulnerability research methodologies.
"Walkthrough for Basic Pentesting 1 - a boot2root VM for cybersecurity practice."
This project is a CTF-style vulnerable virtual machine designed for hands-on penetration testing and cybersecurity training. Root the box by exploiting misconfigurations, weak credentials, and privilege escalation paths. Ideal for practicing ethical hacking skills in a controlled lab environment.