Skip to content

πŸ•΅οΈβ€β™‚οΈ Hands-on TryHackMe writeups! Clear walkthroughs, PoCs, and lessons learned from hacking rooms. Built for students, security learners, and pentesters sharpening their skills.

License

Notifications You must be signed in to change notification settings

Jery0843/TryHackMe

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

35 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ•΅οΈβ€β™‚οΈ TryHackMe Writeups

Welcome to my TryHackMe Writeups Vault β€” a collection of step-by-step walkthroughs from various rooms on TryHackMe. Each writeup is designed to be educational, entertaining, and easy to follow, so learners and pentesters alike can level up their skills. πŸš€


πŸ“š What’s Inside?

  • πŸ”Ž Recon & Enumeration β€” the detective work before the hack
  • πŸ’» Exploitation β€” breaking in with style (and payloads!)
  • πŸ“ˆ Privilege Escalation β€” going from zero β†’ hero
  • πŸ›‘οΈ Remediation β€” because defense is just as important as offense
  • ✍️ Lessons Learned β€” key takeaways from each room

πŸ“‚ Repo Structure

/
β”œβ”€ room-name-1/
β”‚  β”œβ”€ README.md        <- writeup (canonical)
β”‚  β”œβ”€ poc/             <- custom scripts or payloads
β”‚  └─ screenshots/
β”œβ”€ room-name-2/
β”œβ”€ LICENSE             <- MIT for code
β”œβ”€ LICENSE-DOCS.md     <- CC BY-SA 4.0 for docs/writeups
β”œβ”€ CONTRIBUTING.md
└─ README.md           <- this file

✍️ Writeup Template

Every room writeup follows this simple structure:

# <Room Name> β€” <Difficulty>

**Author:** @yourhandle  
**Date Completed:** YYYY-MM-DD  
**Tags:** windows, web, privilege-escalation, reverse-shell  

---

## TL;DR
Quick one-liner summary (e.g., "SQLi β†’ RCE β†’ kernel exploit β†’ root").

## About
Brief about the room and what it teaches.

## Recon & Enumeration
Commands + results + insights.

## Exploitation
Step-by-step process with payloads/screenshots.

## Privilege Escalation
How we escalated to root/Admin.

## Proof (if allowed)
Non-sensitive proof that the room is owned.

## Remediation & Defense
How to fix the vulnerabilities exploited.

## Lessons Learned
- Key learning point 1
- Key learning point 2

## References
Helpful links, blogs, CVEs.

πŸ› οΈ Contribution

Got improvements, better techniques, or a new writeup? Feel free to open a PR. Sharing knowledge helps the whole community! πŸ’‘


πŸ“œ License


πŸ’‘ Hack, learn, and share knowledge β€” because cybersecurity is a team sport. πŸ›‘οΈ

About

πŸ•΅οΈβ€β™‚οΈ Hands-on TryHackMe writeups! Clear walkthroughs, PoCs, and lessons learned from hacking rooms. Built for students, security learners, and pentesters sharpening their skills.

Resources

License

Stars

Watchers

Forks

Packages

No packages published