This repository contains detailed walkthroughs of retired machines from Hack The Box (HTB). Each walkthrough provides a step-by-step guide to compromising the machine, from initial enumeration to privilege escalation.
- Comprehensive walkthroughs for exploiting vulnerabilities and gaining access.
- Privilege escalation techniques, both horizontal and vertical.
- Analysis of tools and commands used in each phase.
- Clear and educational explanations to support learning.
- This repository does not include walkthroughs for active machines, following Hack The Box's rules.
- All content is intended for educational and ethical purposes.