Skip to content

momenbasel/htb-writeups

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Hack The Box Writeups - The Ultimate HTB Resource

The most comprehensive collection of Hack The Box writeups, walkthroughs, and cheatsheets on GitHub. 500+ machines, 400+ challenges, ProLabs, Sherlocks (DFIR), CTF events, penetration testing methodology, and OSCP/CPTS certification prep - all in one place.

  ___ ___  ___________    __      __         .__  __                                  
 /   |   \ \__    ___/   /  \    /  \________|__|/  |_  ____  __ ________  ______     
/    ~    \  |    |      \   \/\/   /\_  __ \|  \   __\/ __ \|  |  \____ \/  ___/     
\    Y    /  |    |       \        /  |  | \/|  ||  | \  ___/|  |  /  |_> >___ \      
 \___|_  /   |____|        \__/\  /   |__|   |__||__|  \___  >____/|   __/____  >     
       \/                       \/                         \/      |__|       \/      

Awesome Stars Forks Contributors License Last Commit

Why this repo? Unlike scattered blog posts and single-author collections, this is a structured, searchable index of the entire HTB ecosystem - machines from 2017 to 2026, every CTF event, every challenge category, every ProLab - cross-referenced by technique, difficulty, OS, and certification relevance. Whether you're preparing for OSCP, CPTS, CRTO, or just sharpening your skills, start here.

Browse the site for the best experience - interactive tools, search, and dark theme.


Interactive Tools

Tool Description
Machine Finder Search & Filter Find machines by difficulty, OS, technique, CVE, or certification. Table and card views with real-time filtering.
Knowledge Graph Visual Explorer Interactive D3.js force-directed graph mapping 70+ machines to 40+ techniques and 5 certifications.
Attack Paths Flowcharts Mermaid diagrams showing complete attack chains for 25+ machines - from recon to root.
Skill Trees Progression Maps Visual learning paths for AD attacks, web exploitation, Linux/Windows privesc, and cert preparation.

What's Inside

Section Description Count
Machines Boot2root walkthroughs (Easy to Insane) 300+
Challenges CTF-style challenges across 12 categories 400+
ProLabs Enterprise-grade lab walkthroughs with network topology diagrams 6
Sherlocks DFIR & Blue Team investigations 70+
CTF Events Official HTB CTF competition writeups 14 events
Endgames Multi-machine scenario walkthroughs 5
Fortresses Multi-flag single-host challenges 6
Resources Tools, cheatsheets, cert prep, methodology 10 guides

Machines

Writeups for retired HTB machines organized by difficulty. Each writeup includes enumeration, exploitation, and privilege escalation steps with full command output.

By Difficulty

Difficulty Path Machines
Easy machines/easy/ 120+
Medium machines/medium/ 112+
Hard machines/hard/ 60+
Insane machines/insane/ 25+

Recently Retired (2025-2026)

Machine OS Difficulty Key Techniques Date
DarkZero Windows Hard Cross-Forest Trust, AD Abuse Apr 2026
Snapped Linux Hard Nginx UI RCE, Static Site Exploitation Mar 2026
Browsed Linux Medium Browser Extension Exploitation, Headless Chrome Mar 2026
Previous Linux Medium NextJS Exploitation, Framework Abuse Jan 2026
Retire Windows Hard Active Directory, Kerberos Abuse Jan 2026
Fries Linux Hard Web Exploitation, Custom Exploitation Nov 2025
NanoCorp Linux Hard Custom Protocol, Binary Analysis Nov 2025
Hercules Linux Insane Multi-Stage Exploitation Oct 2025
Signed Windows Medium Code Signing Bypass, Certificate Abuse Oct 2025
University Windows Insane Multi-Vector Attack, Complex Chain Aug 2025
Dog Linux Easy Backdrop CMS, Web Exploitation Jul 2025
Mirage Windows Hard Active Directory, ADCS Jul 2025
Voleur Windows Medium Data Exfiltration, Custom Exploitation Jul 2025
RustyKey Windows Hard Rust Binary Exploitation Jun 2025
TombWatcher Windows Medium Custom Service Exploitation Jun 2025
Haze Windows Hard Splunk Enterprise Exploitation Jun 2025
Certificate Windows Hard ADCS, Certificate Template Abuse May 2025
Vintage Windows Hard Pure Active Directory, Kerberoasting Apr 2025

By Operating System

By Technique

Active Directory - Kerberoasting, AS-REP Roasting, ADCS, DCSync, Pass-the-Hash, BloodHound
Machine Difficulty Specific AD Technique
DarkZero Hard Cross-Forest Trust Abuse
Vintage Hard Kerberoasting, Pure AD
Certificate Hard ADCS Certificate Template Abuse
Mirage Hard ADCS, Shadow Credentials
Haze Hard Splunk + AD Integration
Retire Hard Kerberos Delegation Abuse
Web Exploitation - SQLi, XSS, SSRF, SSTI, LFI/RFI, Deserialization
Machine Difficulty Specific Web Technique
Dog Easy Backdrop CMS RCE
Browsed Medium Browser Extension RCE
Previous Medium NextJS Framework Exploitation
Snapped Hard Nginx UI Admin Panel RCE
Fries Hard Custom Web App Exploitation
Binary Exploitation - Buffer Overflow, ROP, Heap Exploitation, Format Strings
Machine Difficulty Specific Technique
RustyKey Hard Rust Binary Exploitation
NanoCorp Hard Custom Protocol Exploitation
Cloud & Infrastructure - AWS, Azure, GCP, Docker, Kubernetes
Machine Difficulty Specific Technique
Hercules Insane Container Escape, Cloud Metadata

Challenges

CTF-style challenges organized by category. Each writeup includes the challenge description, approach, solution, and lessons learned.

Category Path Count Key Skills
Web challenges/web/ 75+ XSS, SQLi, SSTI, SSRF, Deserialization, JWT, GraphQL
Crypto challenges/crypto/ 93+ RSA, AES, ECC, Padding Oracle, PRNG, Lattice Attacks
Forensics challenges/forensics/ 33+ Memory Analysis, Disk Forensics, Network PCAP, Malware
Reversing challenges/reversing/ 44+ x86/x64, .NET, Python, Angr, Anti-Debug, VM
Pwn challenges/pwn/ 61+ Stack/Heap Overflow, ROP, SROP, Kernel, tcache
Mobile challenges/mobile/ 10+ Android APK, Frida, Smali, Certificate Pinning
Hardware challenges/hardware/ 11+ UART, SPI, Firmware, VHDL, RF Analysis
OSINT challenges/osint/ 12+ Geolocation, Social Media, DNS, Metadata
Misc challenges/misc/ 35+ Scripting, Logic, Encoding, Pickle, Pyjail
Stego challenges/stego/ 12+ Image, Audio, LSB, Steghide, ImageMagick
Blockchain challenges/blockchain/ 10+ Solidity, Smart Contracts, ERC-721, ECDSA
AI/ML challenges/ai-ml/ 5+ Adversarial ML, Prompt Injection, LLM Bypass

ProLabs

Enterprise-grade lab environments simulating real corporate networks. These writeups cover multi-machine attack paths, lateral movement, and domain dominance.

Lab Difficulty Machines Focus
Dante Beginner 14 Network Pentesting Fundamentals
Offshore Intermediate 21 Active Directory, Multi-Domain
RastaLabs Intermediate 15 Red Team Simulation, Phishing
Zephyr Intermediate 17 ADCS, DPAPI, Constrained Delegation
Cybernetics Advanced 20+ Advanced AD, Cross-Forest Attacks
APTLabs Advanced 20+ APT Simulation, Multi-Vector

Sherlocks

DFIR (Digital Forensics & Incident Response) investigation labs. Blue team scenarios where you investigate security incidents and answer forensic questions.

Category Path Focus
Easy sherlocks/easy/ Log Analysis, Basic DFIR
Medium sherlocks/medium/ Memory Forensics, Malware Triage
Hard sherlocks/hard/ APT Investigation, Complex IR

Featured Sherlocks

Name Difficulty Focus Area Writeup
Meerkat Easy Suricata IDS, Credential Stuffing, CVE-2022-25237 0xdf
Brutus Easy SSH Brute Force, auth.log Analysis 0xdf
Noted Easy Notepad++ Artifacts, Data Extortion 0xdf
Knock Knock Easy PCAP, FTP, Port Knocking, GonnaCry Ransomware 0xdf
Bumblebee Easy phpBB SQLite, Access Log Analysis 0xdf
Crown Jewel-1 Medium NTDS.dit Dump, Volume Shadow Copy Service CyberWired
Noxious Medium LLMNR Poisoning, Rogue Device Detection 0xdf
Subatomic Medium Electron Malware, Discord Hijacking 0xdf
Nubilum-1 Medium AWS CloudTrail, PoshC2, Cloud Forensics 0xdf
MisCloud Medium GCP Breach, Gitea Vulnerability CyberEthical
OpTinselTrace (1-5) Hard Full APT Campaign Investigation (Christmas 2023) GitHub
APTNightmare Hard Advanced Persistent Threat Investigation GitHub

See the full Sherlocks index for 70+ Sherlocks with writeup links.


CTF Events

Writeups from official Hack The Box competitive CTF events.

Event Year Path Highlights
Cyber Apocalypse 2025 ctf-events/cyber-apocalypse-2025/ Web, Crypto, Pwn, Forensics
Business CTF 2025 ctf-events/business-ctf-2025/ Enterprise Security Focus
University CTF 2025 ctf-events/university-ctf-2025/ Academic Team Competition
Cyber Apocalypse 2024 ctf-events/cyber-apocalypse-2024/ Hacker Royale Theme
Business CTF 2024 ctf-events/business-ctf-2024/ Corporate Scenario
University CTF 2024 ctf-events/university-ctf-2024/ Binary Badlands Theme

Endgames

Multi-machine, multi-stage scenarios that simulate real penetration testing engagements. See endgames/README.md for detailed walkthroughs.

Endgame Path Flags Focus
P.O.O. endgames/poo/ 5 MSSQL Linked Servers, IIS Enumeration
Xen endgames/xen/ 5+ Citrix Breakout, AD, Phishing
Hades endgames/hades/ 5+ AS-REP Roast, DPAPI, RBCD, DNS Spoofing
RPG endgames/rpg/ 6 Linux Exploitation, Multi-Host Pivoting
Ascension endgames/ascension/ 7 Blind SQLi, MSSQL Proxy, RBCD

Fortresses

Multi-flag single-host challenges created by partner companies. Like machines on steroids. See fortresses/README.md for detailed walkthroughs.

Fortress Creator Flags Focus
Jet Jet 11 Multi-service exploitation
Akerva Akerva 8 WordPress, SNMP, web chains
Context Context/Accenture 7 Web + infrastructure
Synacktiv Synacktiv Multiple Symfony, AppSec, infrastructure
AWS Amazon Web Services Multiple Cloud security, IAM, Lambda, S3
Faraday Faraday 7 General offensive security

Resources

Tools by Category

Enumeration & Reconnaissance
Tool Purpose Link
Nmap Port scanning & service detection nmap.org
RustScan Fast port scanner GitHub
Gobuster Directory/DNS/vhost brute-forcing GitHub
Feroxbuster Recursive content discovery GitHub
ffuf Fast web fuzzer GitHub
enum4linux-ng SMB/Samba enumeration GitHub
Web Exploitation
Tool Purpose Link
Burp Suite Web proxy & scanner portswigger.net
SQLMap SQL injection automation GitHub
Nuclei Template-based vuln scanner GitHub
Caido Modern web proxy caido.io
PayloadsAllTheThings Payload repository GitHub
Active Directory
Tool Purpose Link
BloodHound AD relationship mapping GitHub
Impacket Network protocol toolkit GitHub
Rubeus Kerberos abuse GitHub
Certipy ADCS exploitation GitHub
NetExec (nxc) Network execution toolkit GitHub
Ligolo-ng Tunneling/pivoting GitHub
Privilege Escalation
Tool Purpose Link
LinPEAS Linux privesc enumeration GitHub
WinPEAS Windows privesc enumeration GitHub
pspy Process monitoring (no root) GitHub
PowerUp Windows privesc PowerShell GitHub
GTFOBins Unix binary exploitation gtfobins.github.io
LOLBAS Windows living-off-the-land lolbas-project.github.io
Forensics & DFIR
Tool Purpose Link
Volatility 3 Memory forensics GitHub
Autopsy Disk forensics autopsy.com
Wireshark Network capture analysis wireshark.org
CyberChef Data transformation GitHub
Chainsaw Windows event log analysis GitHub
Reverse Engineering
Tool Purpose Link
Ghidra Binary analysis ghidra-sre.org
IDA Free Disassembler hex-rays.com
radare2 CLI reverse engineering GitHub
Binary Ninja Binary analysis platform binary.ninja
dnSpy .NET decompiler GitHub
Binary Exploitation
Tool Purpose Link
pwntools CTF exploit framework GitHub
ROPgadget ROP chain builder GitHub
GEF GDB enhanced features GitHub
one_gadget libc one-shot gadget GitHub
checksec Binary security checks GitHub

Certification Prep

Map your HTB journey to professional certifications.

OSCP (Offensive Security Certified Professional)

Recommended HTB Machines for OSCP Prep:

Machine Difficulty Key Skills
Lame Easy Samba RCE, Basic Exploitation
Legacy Easy MS08-067, Windows Exploitation
Blue Easy EternalBlue (MS17-010)
Optimum Easy HFS RCE, Windows Privesc
Shocker Easy Shellshock, Linux Basics
Nibbles Easy CMS Exploitation, File Upload
Bashed Easy PHP Webshell, Cron Abuse
Arctic Easy ColdFusion, Windows Exploitation
Grandpa Easy IIS WebDAV, Token Impersonation
Bastard Medium Drupal RCE, Windows Privesc
Cronos Medium DNS Zone Transfer, SQL Injection
SolidState Medium Apache James RCE, Cron Privesc
Node Medium API Exploitation, Kernel Exploit
Valentine Easy Heartbleed, tmux Hijack
Poison Medium LFI, VNC Tunneling
Sunday Easy Finger Enumeration, Shadow File
DevOops Medium XXE, Git Secrets
Jeeves Medium Jenkins RCE, KeePass Cracking
Conceal Hard IPSec VPN, SNMP, JuicyPotato
CPTS (Certified Penetration Testing Specialist)

Recommended HTB Machines for CPTS Prep:

Machine Difficulty Key Skills
Active Easy AD Basics, GPP Abuse, Kerberoasting
Forest Easy AS-REP Roasting, DCSync
Sauna Easy AS-REP Roasting, WinRM
Monteverde Medium Azure AD, Password Spraying
Resolute Medium DNS Admin DLL Injection
Cascade Medium LDAP Enumeration, .NET Reversing
Blackfield Hard AS-REP, Backup Operators Privesc
Vintage Hard Pure AD Exploitation
Certificate Hard ADCS Exploitation
Support Easy LDAP, .NET Binary Analysis
CRTO (Certified Red Team Operator)

Focus on ProLabs: RastaLabs and Zephyr are directly aligned with CRTO material.

Machine/Lab Type Key Skills
RastaLabs ProLab Phishing, C2, Lateral Movement
Zephyr ProLab ADCS, DPAPI, Constrained Delegation
Offshore ProLab Multi-Domain AD
Reel Hard Phishing, AppLocker Bypass
Mantis Hard AD, Kerberos, MS14-068

Cheatsheets

Cheatsheet Description
Linux Enumeration Post-exploitation Linux enumeration commands
Windows Enumeration Post-exploitation Windows enumeration commands
Active Directory AD attack methodology and commands
Web Application Web exploitation techniques and payloads
Privilege Escalation - Linux Linux privilege escalation vectors
Privilege Escalation - Windows Windows privilege escalation vectors
File Transfers Methods to transfer files between machines
Reverse Shells Reverse shell one-liners for all languages
Pivoting & Tunneling SSH tunneling, Chisel, Ligolo, SOCKS
Password Attacks Cracking, spraying, brute-forcing

Methodology

Guide Description
HTB Machine Approach How to systematically approach any HTB machine
Note-Taking Template Structured note-taking for writeups
Report Writing Professional pentest report template

Repository Structure

htb-writeups/
|-- machines/
|   |-- easy/                    # Easy difficulty machines
|   |-- medium/                  # Medium difficulty machines
|   |-- hard/                    # Hard difficulty machines
|   |-- insane/                  # Insane difficulty machines
|-- challenges/
|   |-- web/                     # Web exploitation challenges
|   |-- crypto/                  # Cryptography challenges
|   |-- forensics/               # Digital forensics challenges
|   |-- reversing/               # Reverse engineering challenges
|   |-- pwn/                     # Binary exploitation challenges
|   |-- mobile/                  # Mobile security challenges
|   |-- hardware/                # Hardware hacking challenges
|   |-- osint/                   # OSINT challenges
|   |-- misc/                    # Miscellaneous challenges
|   |-- stego/                   # Steganography challenges
|   |-- blockchain/              # Blockchain/smart contract challenges
|   |-- ai-ml/                   # AI/ML security challenges
|-- prolabs/
|   |-- dante/                   # Dante ProLab walkthrough
|   |-- offshore/                # Offshore ProLab walkthrough
|   |-- rastalabs/               # RastaLabs ProLab walkthrough
|   |-- zephyr/                  # Zephyr ProLab walkthrough
|   |-- cybernetics/             # Cybernetics ProLab walkthrough
|   |-- aptlabs/                 # APTLabs ProLab walkthrough
|-- sherlocks/
|   |-- easy/                    # Easy DFIR investigations
|   |-- medium/                  # Medium DFIR investigations
|   |-- hard/                    # Hard DFIR investigations
|-- ctf-events/                  # Official HTB CTF writeups
|-- endgames/                    # Multi-machine scenarios
|-- fortresses/                  # Fortress challenges
|-- resources/
|   |-- cheatsheets/             # Quick reference guides
|   |-- tools/                   # Tool guides and configs
|   |-- methodology/             # Approach guides and templates
|   |-- cert-prep/               # Certification preparation guides
|-- templates/                   # Writeup templates

How to Use This Repository

For Beginners

  1. Start with Easy machines - they teach fundamentals
  2. Follow the Machine Approach Guide for a systematic method
  3. Use the OSCP Prep list if you're studying for certs
  4. Try the machine yourself FIRST, then check the writeup

For Intermediate Players

  1. Focus on Medium/Hard machines by technique (AD, Web, etc.)
  2. Work through a ProLab (start with Dante)
  3. Attempt Sherlock challenges for blue team skills
  4. Participate in CTF events using past writeups as training

For Advanced Players

  1. Target Insane machines and Hard challenges
  2. Complete Cybernetics or APTLabs ProLabs
  3. Write and contribute your own writeups
  4. Develop custom tools and methodologies

Contributing

We welcome contributions! See CONTRIBUTING.md for detailed guidelines.

Quick start:

  1. Fork the repository
  2. Use the appropriate template for your writeup
  3. Place it in the correct category folder
  4. Submit a Pull Request

Writeup Requirements:

  • Only retired machines/challenges (no active content)
  • Include all steps: enumeration, exploitation, privilege escalation
  • Add screenshots or command output for key steps
  • Use the provided templates for consistency
  • No spoilers for active content

Disclaimer

These writeups are for educational purposes only. All content covers retired machines and challenges that are no longer active on the Hack The Box platform. Sharing solutions for active machines violates HTB's Terms of Service.

Always practice ethical hacking. Only test systems you have explicit authorization to test.


Writeup Sources

Machine writeups in this repo link to multiple independent authors for diverse perspectives. Here are the primary sources:

Author / Source URL Coverage
0xdf 0xdf.gitlab.io 500+ machines - gold standard, exhaustive detail
IppSec youtube.com/ippsec 430+ video walkthroughs with live debugging
HackingArticles hackingarticles.in 40+ machines - Raj Chandel, classic era (2017-2022)
Rana Khalil rana-khalil.gitbook.io 26+ machines - OSCP-focused, no Metasploit
snowscan snowscan.io 20+ machines - detailed, consistent quality
0xRick 0xrick.github.io 10+ machines - clean blog writeups
Medium / InfoSecWriteups medium.com 45+ machines - diverse community authors

Related Resources

Resource Description
HackTricks Comprehensive pentesting reference
PayloadsAllTheThings Payload and bypass collection
The Hacker Recipes Structured attack recipes
GTFOBins Unix binary exploitation reference
LOLBAS Windows living-off-the-land binaries
WADComs Windows/AD command reference
RevShells Reverse shell generator
CyberChef Data transformation toolkit
SecLists Wordlists for security testing
IppSec.rocks Searchable index of IppSec's HTB videos

License

This project is licensed under the MIT License - see LICENSE for details.


If this helped you pop a box or pass a cert, drop a star - it helps others find it too.

Star this repo


Keywords: hack the box writeups, HTB walkthrough, hackthebox machines, HTB challenges, OSCP prep machines, CPTS certification, penetration testing writeups, CTF writeups, active directory hacking, privilege escalation, web exploitation, binary exploitation, digital forensics, incident response, red team, blue team, cybersecurity training, ethical hacking, infosec resources, security cheatsheets

About

The most comprehensive Hack The Box writeup collection - 500+ machines, 400+ challenges, interactive knowledge graph, skill trees, attack path diagrams, ProLabs, Sherlocks, OSCP/CPTS/CRTO prep. Browse: momenbasel.github.io/htb-writeups

Topics

Resources

License

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages