Hack The Box Writeups - The Ultimate HTB Resource

April 15, 2026 ยท View on GitHub

The most comprehensive collection of Hack The Box writeups, walkthroughs, and cheatsheets on GitHub. 500+ machines, 400+ challenges, ProLabs, Sherlocks (DFIR), CTF events, penetration testing methodology, and OSCP/CPTS certification prep - all in one place.

  ___ ___  ___________    __      __         .__  __                                  
 /   |   \ \__    ___/   /  \    /  \________|__|/  |_  ____  __ ________  ______     
/    ~    \  |    |      \   \/\/   /\_  __ \|  \   __\/ __ \|  |  \____ \/  ___/     
\    Y    /  |    |       \        /  |  | \/|  ||  | \  ___/|  |  /  |_> >___ \      
 \___|_  /   |____|        \__/\  /   |__|   |__||__|  \___  >____/|   __/____  >     
       \/                       \/                         \/      |__|       \/      

Awesome Stars Forks Contributors License Last Commit

Why this repo? Unlike scattered blog posts and single-author collections, this is a structured, searchable index of the entire HTB ecosystem - machines from 2017 to 2026, every CTF event, every challenge category, every ProLab - cross-referenced by technique, difficulty, OS, and certification relevance. Whether you're preparing for OSCP, CPTS, CRTO, or just sharpening your skills, start here.

Browse the site for the best experience - interactive tools, search, and dark theme.


Interactive Tools

ToolDescription
Machine FinderSearch & FilterFind machines by difficulty, OS, technique, CVE, or certification. Table and card views with real-time filtering.
Knowledge GraphVisual ExplorerInteractive D3.js force-directed graph mapping 70+ machines to 40+ techniques and 5 certifications.
Attack PathsFlowchartsMermaid diagrams showing complete attack chains for 25+ machines - from recon to root.
Skill TreesProgression MapsVisual learning paths for AD attacks, web exploitation, Linux/Windows privesc, and cert preparation.

What's Inside

SectionDescriptionCount
MachinesBoot2root walkthroughs (Easy to Insane)300+
ChallengesCTF-style challenges across 12 categories400+
ProLabsEnterprise-grade lab walkthroughs with network topology diagrams6
SherlocksDFIR & Blue Team investigations70+
CTF EventsOfficial HTB CTF competition writeups14 events
EndgamesMulti-machine scenario walkthroughs5
FortressesMulti-flag single-host challenges6
ResourcesTools, cheatsheets, cert prep, methodology10 guides

Machines

Writeups for retired HTB machines organized by difficulty. Each writeup includes enumeration, exploitation, and privilege escalation steps with full command output.

By Difficulty

DifficultyPathMachines
Easymachines/easy/120+
Mediummachines/medium/112+
Hardmachines/hard/60+
Insanemachines/insane/25+

Recently Retired (2025-2026)

MachineOSDifficultyKey TechniquesDate
DarkZeroWindowsHardCross-Forest Trust, AD AbuseApr 2026
SnappedLinuxHardNginx UI RCE, Static Site ExploitationMar 2026
BrowsedLinuxMediumBrowser Extension Exploitation, Headless ChromeMar 2026
PreviousLinuxMediumNextJS Exploitation, Framework AbuseJan 2026
RetireWindowsHardActive Directory, Kerberos AbuseJan 2026
FriesLinuxHardWeb Exploitation, Custom ExploitationNov 2025
NanoCorpLinuxHardCustom Protocol, Binary AnalysisNov 2025
HerculesLinuxInsaneMulti-Stage ExploitationOct 2025
SignedWindowsMediumCode Signing Bypass, Certificate AbuseOct 2025
UniversityWindowsInsaneMulti-Vector Attack, Complex ChainAug 2025
DogLinuxEasyBackdrop CMS, Web ExploitationJul 2025
MirageWindowsHardActive Directory, ADCSJul 2025
VoleurWindowsMediumData Exfiltration, Custom ExploitationJul 2025
RustyKeyWindowsHardRust Binary ExploitationJun 2025
TombWatcherWindowsMediumCustom Service ExploitationJun 2025
HazeWindowsHardSplunk Enterprise ExploitationJun 2025
CertificateWindowsHardADCS, Certificate Template AbuseMay 2025
VintageWindowsHardPure Active Directory, KerberoastingApr 2025

By Operating System

By Technique

Active Directory - Kerberoasting, AS-REP Roasting, ADCS, DCSync, Pass-the-Hash, BloodHound
MachineDifficultySpecific AD Technique
DarkZeroHardCross-Forest Trust Abuse
VintageHardKerberoasting, Pure AD
CertificateHardADCS Certificate Template Abuse
MirageHardADCS, Shadow Credentials
HazeHardSplunk + AD Integration
RetireHardKerberos Delegation Abuse
Web Exploitation - SQLi, XSS, SSRF, SSTI, LFI/RFI, Deserialization
MachineDifficultySpecific Web Technique
DogEasyBackdrop CMS RCE
BrowsedMediumBrowser Extension RCE
PreviousMediumNextJS Framework Exploitation
SnappedHardNginx UI Admin Panel RCE
FriesHardCustom Web App Exploitation
Binary Exploitation - Buffer Overflow, ROP, Heap Exploitation, Format Strings
MachineDifficultySpecific Technique
RustyKeyHardRust Binary Exploitation
NanoCorpHardCustom Protocol Exploitation
Cloud & Infrastructure - AWS, Azure, GCP, Docker, Kubernetes
MachineDifficultySpecific Technique
HerculesInsaneContainer Escape, Cloud Metadata

Challenges

CTF-style challenges organized by category. Each writeup includes the challenge description, approach, solution, and lessons learned.

CategoryPathCountKey Skills
Webchallenges/web/75+XSS, SQLi, SSTI, SSRF, Deserialization, JWT, GraphQL
Cryptochallenges/crypto/93+RSA, AES, ECC, Padding Oracle, PRNG, Lattice Attacks
Forensicschallenges/forensics/33+Memory Analysis, Disk Forensics, Network PCAP, Malware
Reversingchallenges/reversing/44+x86/x64, .NET, Python, Angr, Anti-Debug, VM
Pwnchallenges/pwn/61+Stack/Heap Overflow, ROP, SROP, Kernel, tcache
Mobilechallenges/mobile/10+Android APK, Frida, Smali, Certificate Pinning
Hardwarechallenges/hardware/11+UART, SPI, Firmware, VHDL, RF Analysis
OSINTchallenges/osint/12+Geolocation, Social Media, DNS, Metadata
Miscchallenges/misc/35+Scripting, Logic, Encoding, Pickle, Pyjail
Stegochallenges/stego/12+Image, Audio, LSB, Steghide, ImageMagick
Blockchainchallenges/blockchain/10+Solidity, Smart Contracts, ERC-721, ECDSA
AI/MLchallenges/ai-ml/5+Adversarial ML, Prompt Injection, LLM Bypass

ProLabs

Enterprise-grade lab environments simulating real corporate networks. These writeups cover multi-machine attack paths, lateral movement, and domain dominance.

LabDifficultyMachinesFocus
DanteBeginner14Network Pentesting Fundamentals
OffshoreIntermediate21Active Directory, Multi-Domain
RastaLabsIntermediate15Red Team Simulation, Phishing
ZephyrIntermediate17ADCS, DPAPI, Constrained Delegation
CyberneticsAdvanced20+Advanced AD, Cross-Forest Attacks
APTLabsAdvanced20+APT Simulation, Multi-Vector

Sherlocks

DFIR (Digital Forensics & Incident Response) investigation labs. Blue team scenarios where you investigate security incidents and answer forensic questions.

CategoryPathFocus
Easysherlocks/easy/Log Analysis, Basic DFIR
Mediumsherlocks/medium/Memory Forensics, Malware Triage
Hardsherlocks/hard/APT Investigation, Complex IR
NameDifficultyFocus AreaWriteup
MeerkatEasySuricata IDS, Credential Stuffing, CVE-2022-252370xdf
BrutusEasySSH Brute Force, auth.log Analysis0xdf
NotedEasyNotepad++ Artifacts, Data Extortion0xdf
Knock KnockEasyPCAP, FTP, Port Knocking, GonnaCry Ransomware0xdf
BumblebeeEasyphpBB SQLite, Access Log Analysis0xdf
Crown Jewel-1MediumNTDS.dit Dump, Volume Shadow Copy ServiceCyberWired
NoxiousMediumLLMNR Poisoning, Rogue Device Detection0xdf
SubatomicMediumElectron Malware, Discord Hijacking0xdf
Nubilum-1MediumAWS CloudTrail, PoshC2, Cloud Forensics0xdf
MisCloudMediumGCP Breach, Gitea VulnerabilityCyberEthical
OpTinselTrace (1-5)HardFull APT Campaign Investigation (Christmas 2023)GitHub
APTNightmareHardAdvanced Persistent Threat InvestigationGitHub

See the full Sherlocks index for 70+ Sherlocks with writeup links.


CTF Events

Writeups from official Hack The Box competitive CTF events.

EventYearPathHighlights
Cyber Apocalypse2025ctf-events/cyber-apocalypse-2025/Web, Crypto, Pwn, Forensics
Business CTF2025ctf-events/business-ctf-2025/Enterprise Security Focus
University CTF2025ctf-events/university-ctf-2025/Academic Team Competition
Cyber Apocalypse2024ctf-events/cyber-apocalypse-2024/Hacker Royale Theme
Business CTF2024ctf-events/business-ctf-2024/Corporate Scenario
University CTF2024ctf-events/university-ctf-2024/Binary Badlands Theme

Endgames

Multi-machine, multi-stage scenarios that simulate real penetration testing engagements. See endgames/README.md for detailed walkthroughs.

EndgamePathFlagsFocus
P.O.O.endgames/poo/5MSSQL Linked Servers, IIS Enumeration
Xenendgames/xen/5+Citrix Breakout, AD, Phishing
Hadesendgames/hades/5+AS-REP Roast, DPAPI, RBCD, DNS Spoofing
RPGendgames/rpg/6Linux Exploitation, Multi-Host Pivoting
Ascensionendgames/ascension/7Blind SQLi, MSSQL Proxy, RBCD

Fortresses

Multi-flag single-host challenges created by partner companies. Like machines on steroids. See fortresses/README.md for detailed walkthroughs.

FortressCreatorFlagsFocus
JetJet11Multi-service exploitation
AkervaAkerva8WordPress, SNMP, web chains
ContextContext/Accenture7Web + infrastructure
SynacktivSynacktivMultipleSymfony, AppSec, infrastructure
AWSAmazon Web ServicesMultipleCloud security, IAM, Lambda, S3
FaradayFaraday7General offensive security

Resources

Tools by Category

Enumeration & Reconnaissance
ToolPurposeLink
NmapPort scanning & service detectionnmap.org
RustScanFast port scannerGitHub
GobusterDirectory/DNS/vhost brute-forcingGitHub
FeroxbusterRecursive content discoveryGitHub
ffufFast web fuzzerGitHub
enum4linux-ngSMB/Samba enumerationGitHub
Web Exploitation
ToolPurposeLink
Burp SuiteWeb proxy & scannerportswigger.net
SQLMapSQL injection automationGitHub
NucleiTemplate-based vuln scannerGitHub
CaidoModern web proxycaido.io
PayloadsAllTheThingsPayload repositoryGitHub
Active Directory
ToolPurposeLink
BloodHoundAD relationship mappingGitHub
ImpacketNetwork protocol toolkitGitHub
RubeusKerberos abuseGitHub
CertipyADCS exploitationGitHub
NetExec (nxc)Network execution toolkitGitHub
Ligolo-ngTunneling/pivotingGitHub
Privilege Escalation
ToolPurposeLink
LinPEASLinux privesc enumerationGitHub
WinPEASWindows privesc enumerationGitHub
pspyProcess monitoring (no root)GitHub
PowerUpWindows privesc PowerShellGitHub
GTFOBinsUnix binary exploitationgtfobins.github.io
LOLBASWindows living-off-the-landlolbas-project.github.io
Forensics & DFIR
ToolPurposeLink
Volatility 3Memory forensicsGitHub
AutopsyDisk forensicsautopsy.com
WiresharkNetwork capture analysiswireshark.org
CyberChefData transformationGitHub
ChainsawWindows event log analysisGitHub
Reverse Engineering
ToolPurposeLink
GhidraBinary analysisghidra-sre.org
IDA FreeDisassemblerhex-rays.com
radare2CLI reverse engineeringGitHub
Binary NinjaBinary analysis platformbinary.ninja
dnSpy.NET decompilerGitHub
Binary Exploitation
ToolPurposeLink
pwntoolsCTF exploit frameworkGitHub
ROPgadgetROP chain builderGitHub
GEFGDB enhanced featuresGitHub
one_gadgetlibc one-shot gadgetGitHub
checksecBinary security checksGitHub

Certification Prep

Map your HTB journey to professional certifications.

OSCP (Offensive Security Certified Professional)

Recommended HTB Machines for OSCP Prep:

MachineDifficultyKey Skills
LameEasySamba RCE, Basic Exploitation
LegacyEasyMS08-067, Windows Exploitation
BlueEasyEternalBlue (MS17-010)
OptimumEasyHFS RCE, Windows Privesc
ShockerEasyShellshock, Linux Basics
NibblesEasyCMS Exploitation, File Upload
BashedEasyPHP Webshell, Cron Abuse
ArcticEasyColdFusion, Windows Exploitation
GrandpaEasyIIS WebDAV, Token Impersonation
BastardMediumDrupal RCE, Windows Privesc
CronosMediumDNS Zone Transfer, SQL Injection
SolidStateMediumApache James RCE, Cron Privesc
NodeMediumAPI Exploitation, Kernel Exploit
ValentineEasyHeartbleed, tmux Hijack
PoisonMediumLFI, VNC Tunneling
SundayEasyFinger Enumeration, Shadow File
DevOopsMediumXXE, Git Secrets
JeevesMediumJenkins RCE, KeePass Cracking
ConcealHardIPSec VPN, SNMP, JuicyPotato
CPTS (Certified Penetration Testing Specialist)

Recommended HTB Machines for CPTS Prep:

MachineDifficultyKey Skills
ActiveEasyAD Basics, GPP Abuse, Kerberoasting
ForestEasyAS-REP Roasting, DCSync
SaunaEasyAS-REP Roasting, WinRM
MonteverdeMediumAzure AD, Password Spraying
ResoluteMediumDNS Admin DLL Injection
CascadeMediumLDAP Enumeration, .NET Reversing
BlackfieldHardAS-REP, Backup Operators Privesc
VintageHardPure AD Exploitation
CertificateHardADCS Exploitation
SupportEasyLDAP, .NET Binary Analysis
CRTO (Certified Red Team Operator)

Focus on ProLabs: RastaLabs and Zephyr are directly aligned with CRTO material.

Machine/LabTypeKey Skills
RastaLabsProLabPhishing, C2, Lateral Movement
ZephyrProLabADCS, DPAPI, Constrained Delegation
OffshoreProLabMulti-Domain AD
ReelHardPhishing, AppLocker Bypass
MantisHardAD, Kerberos, MS14-068

Cheatsheets

CheatsheetDescription
Linux EnumerationPost-exploitation Linux enumeration commands
Windows EnumerationPost-exploitation Windows enumeration commands
Active DirectoryAD attack methodology and commands
Web ApplicationWeb exploitation techniques and payloads
Privilege Escalation - LinuxLinux privilege escalation vectors
Privilege Escalation - WindowsWindows privilege escalation vectors
File TransfersMethods to transfer files between machines
Reverse ShellsReverse shell one-liners for all languages
Pivoting & TunnelingSSH tunneling, Chisel, Ligolo, SOCKS
Password AttacksCracking, spraying, brute-forcing

Methodology

GuideDescription
HTB Machine ApproachHow to systematically approach any HTB machine
Note-Taking TemplateStructured note-taking for writeups
Report WritingProfessional pentest report template

Repository Structure

htb-writeups/
|-- machines/
|   |-- easy/                    # Easy difficulty machines
|   |-- medium/                  # Medium difficulty machines
|   |-- hard/                    # Hard difficulty machines
|   |-- insane/                  # Insane difficulty machines
|-- challenges/
|   |-- web/                     # Web exploitation challenges
|   |-- crypto/                  # Cryptography challenges
|   |-- forensics/               # Digital forensics challenges
|   |-- reversing/               # Reverse engineering challenges
|   |-- pwn/                     # Binary exploitation challenges
|   |-- mobile/                  # Mobile security challenges
|   |-- hardware/                # Hardware hacking challenges
|   |-- osint/                   # OSINT challenges
|   |-- misc/                    # Miscellaneous challenges
|   |-- stego/                   # Steganography challenges
|   |-- blockchain/              # Blockchain/smart contract challenges
|   |-- ai-ml/                   # AI/ML security challenges
|-- prolabs/
|   |-- dante/                   # Dante ProLab walkthrough
|   |-- offshore/                # Offshore ProLab walkthrough
|   |-- rastalabs/               # RastaLabs ProLab walkthrough
|   |-- zephyr/                  # Zephyr ProLab walkthrough
|   |-- cybernetics/             # Cybernetics ProLab walkthrough
|   |-- aptlabs/                 # APTLabs ProLab walkthrough
|-- sherlocks/
|   |-- easy/                    # Easy DFIR investigations
|   |-- medium/                  # Medium DFIR investigations
|   |-- hard/                    # Hard DFIR investigations
|-- ctf-events/                  # Official HTB CTF writeups
|-- endgames/                    # Multi-machine scenarios
|-- fortresses/                  # Fortress challenges
|-- resources/
|   |-- cheatsheets/             # Quick reference guides
|   |-- tools/                   # Tool guides and configs
|   |-- methodology/             # Approach guides and templates
|   |-- cert-prep/               # Certification preparation guides
|-- templates/                   # Writeup templates

How to Use This Repository

For Beginners

  1. Start with Easy machines - they teach fundamentals
  2. Follow the Machine Approach Guide for a systematic method
  3. Use the OSCP Prep list if you're studying for certs
  4. Try the machine yourself FIRST, then check the writeup

For Intermediate Players

  1. Focus on Medium/Hard machines by technique (AD, Web, etc.)
  2. Work through a ProLab (start with Dante)
  3. Attempt Sherlock challenges for blue team skills
  4. Participate in CTF events using past writeups as training

For Advanced Players

  1. Target Insane machines and Hard challenges
  2. Complete Cybernetics or APTLabs ProLabs
  3. Write and contribute your own writeups
  4. Develop custom tools and methodologies

Contributing

We welcome contributions! See CONTRIBUTING.md for detailed guidelines.

Quick start:

  1. Fork the repository
  2. Use the appropriate template for your writeup
  3. Place it in the correct category folder
  4. Submit a Pull Request

Writeup Requirements:

  • Only retired machines/challenges (no active content)
  • Include all steps: enumeration, exploitation, privilege escalation
  • Add screenshots or command output for key steps
  • Use the provided templates for consistency
  • No spoilers for active content

Disclaimer

These writeups are for educational purposes only. All content covers retired machines and challenges that are no longer active on the Hack The Box platform. Sharing solutions for active machines violates HTB's Terms of Service.

Always practice ethical hacking. Only test systems you have explicit authorization to test.


Writeup Sources

Machine writeups in this repo link to multiple independent authors for diverse perspectives. Here are the primary sources:

Author / SourceURLCoverage
0xdf0xdf.gitlab.io500+ machines - gold standard, exhaustive detail
IppSecyoutube.com/ippsec430+ video walkthroughs with live debugging
HackingArticleshackingarticles.in40+ machines - Raj Chandel, classic era (2017-2022)
Rana Khalilrana-khalil.gitbook.io26+ machines - OSCP-focused, no Metasploit
snowscansnowscan.io20+ machines - detailed, consistent quality
0xRick0xrick.github.io10+ machines - clean blog writeups
Medium / InfoSecWriteupsmedium.com45+ machines - diverse community authors

ResourceDescription
HackTricksComprehensive pentesting reference
PayloadsAllTheThingsPayload and bypass collection
The Hacker RecipesStructured attack recipes
GTFOBinsUnix binary exploitation reference
LOLBASWindows living-off-the-land binaries
WADComsWindows/AD command reference
RevShellsReverse shell generator
CyberChefData transformation toolkit
SecListsWordlists for security testing
IppSec.rocksSearchable index of IppSec's HTB videos

License

This project is licensed under the MIT License - see LICENSE for details.


If this helped you pop a box or pass a cert, drop a star - it helps others find it too.

Star this repo


Keywords: hack the box writeups, HTB walkthrough, hackthebox machines, HTB challenges, OSCP prep machines, CPTS certification, penetration testing writeups, CTF writeups, active directory hacking, privilege escalation, web exploitation, binary exploitation, digital forensics, incident response, red team, blue team, cybersecurity training, ethical hacking, infosec resources, security cheatsheets