Welcome to my TryHackMe Writeups Vault β a collection of step-by-step walkthroughs from various rooms on TryHackMe. Each writeup is designed to be educational, entertaining, and easy to follow, so learners and pentesters alike can level up their skills. π
- π Recon & Enumeration β the detective work before the hack
- π» Exploitation β breaking in with style (and payloads!)
- π Privilege Escalation β going from zero β hero
- π‘οΈ Remediation β because defense is just as important as offense
- βοΈ Lessons Learned β key takeaways from each room
/
ββ room-name-1/
β ββ README.md <- writeup (canonical)
β ββ poc/ <- custom scripts or payloads
β ββ screenshots/
ββ room-name-2/
ββ LICENSE <- MIT for code
ββ LICENSE-DOCS.md <- CC BY-SA 4.0 for docs/writeups
ββ CONTRIBUTING.md
ββ README.md <- this file
Every room writeup follows this simple structure:
# <Room Name> β <Difficulty>
**Author:** @yourhandle
**Date Completed:** YYYY-MM-DD
**Tags:** windows, web, privilege-escalation, reverse-shell
---
## TL;DR
Quick one-liner summary (e.g., "SQLi β RCE β kernel exploit β root").
## About
Brief about the room and what it teaches.
## Recon & Enumeration
Commands + results + insights.
## Exploitation
Step-by-step process with payloads/screenshots.
## Privilege Escalation
How we escalated to root/Admin.
## Proof (if allowed)
Non-sensitive proof that the room is owned.
## Remediation & Defense
How to fix the vulnerabilities exploited.
## Lessons Learned
- Key learning point 1
- Key learning point 2
## References
Helpful links, blogs, CVEs.
Got improvements, better techniques, or a new writeup? Feel free to open a PR. Sharing knowledge helps the whole community! π‘
- Code / scripts: MIT License
- Writeups / docs: CC BY-SA 4.0
π‘ Hack, learn, and share knowledge β because cybersecurity is a team sport. π‘οΈ