Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/zishanadthandar/writeups
CTF and Bug Bounty Hunting WriteUps.
https://github.com/zishanadthandar/writeups
activedirectory activedirectorysecurity bufferoverflow bugbounty bugbounty-writeups capture-the-flag ctf ctf-challenges ctf-tools ctf-writeups cybersecurity ethical-hacking ethicalhacking linux pentesting pentesting-tool pentesting-tools privilegeescalation webexploitation windows
Last synced: 2 months ago
JSON representation
CTF and Bug Bounty Hunting WriteUps.
- Host: GitHub
- URL: https://github.com/zishanadthandar/writeups
- Owner: ZishanAdThandar
- Created: 2023-08-18T00:05:16.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-09-16T17:44:39.000Z (5 months ago)
- Last Synced: 2024-09-17T13:49:56.649Z (5 months ago)
- Topics: activedirectory, activedirectorysecurity, bufferoverflow, bugbounty, bugbounty-writeups, capture-the-flag, ctf, ctf-challenges, ctf-tools, ctf-writeups, cybersecurity, ethical-hacking, ethicalhacking, linux, pentesting, pentesting-tool, pentesting-tools, privilegeescalation, webexploitation, windows
- Language: CSS
- Homepage: https://zishanadthandar.github.io/WriteUps/
- Size: 1.99 MB
- Stars: 16
- Watchers: 1
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
Awesome Lists containing this project
README
# Cyber Security WriteUps
**Welcome to my collection of Bug Bounty, Hack The Box (HTB), TryHackMe, and other CTF writeups! This repository serves as a comprehensive resource for cybersecurity enthusiasts, pentesters, bug bounty hunters, and learners who are eager to explore and understand various challenges and vulnerabilities. Each writeup is crafted with detailed steps, explanations, and insights, aiming to provide a clear understanding of the methodologies used to solve challenges and identify vulnerabilities. Whether you're a beginner or an advanced user, you'll find valuable content to enhance your skills. The writeups cover a range of topics, including web exploitation, privilege escalation, Active Directory, buffer overflow, bug bounty vulnerabilities, and more.**
[![LinkTree](https://img.shields.io/badge/Link-Tree-bbd343)](https://zishanadthandar.github.io/linktree/)
[![YouTube](https://img.shields.io/youtube/channel/subscribers/UChgqXa2j7ZKkHX2Y76tSxoA)](https://youtube.com/@hackerstation)
[![Sponser](https://img.shields.io/github/sponsors/ZishanAdThandar)](https://github.com/sponsors/ZishanAdThandar)
[![ZishanAdThandar's WriteUps Repo stars](https://img.shields.io/github/stars/ZishanAdThandar/WriteUps)](https://github.com/ZishanAdThandar/WriteUps)![Banner InfoSec Writeups](./banner.png)
## Contents
- [Bug Bounty PoC](#bug-bounty)
- [CTF](#ctf)
- [TryHackMe](#tryhackme)
- [VulnHub](#vulnhub)
- [HackTheBox](#hackthebox)
- [PortSwiggerLab](#portswiggerlab)
- [About Me](#about-me)## Bug Bounty
1. [Hunting methodology and experience of my First Stored XSS on Edmodo.com](/bugbounty/1.md)
1. [Just 5 minute to get my 2nd stored XSS on Edmodo.com](/bugbounty/2.md)## CTF
### TryHackMe
- Getting Started: [Tutorial](/CTF/tryhackme.com/tutorial.md)
- Easy Machines: [Vuln University (Vulnversity)](/CTF/tryhackme.com/vulnversity.md), [Blue](/CTF/tryhackme.com/blue.md), [Kenobi](/CTF/tryhackme.com/kenobi.md)
- Advanced Exploitation Machines: [Daily Bugle](/CTF/tryhackme.com/dailybugle.md), [Overpass 2 Hacked](/CTF/tryhackme.com/overpass2hacked.md)
- Active Directory: [Attacktive Directory](/CTF/tryhackme.com/attacktivedirectory.md)
- Tools: [FFUF](/CTF/tryhackme.com/ffuf.md)
- Web: [OWASP Top 10](/CTF/tryhackme.com/owasptop10.md)
- Cryptography: [Crack the hash](/CTF/tryhackme.com/crackthehash.md), [The Impossible Challenge](/CTF/tryhackme.com/theimpossiblechallenge.md)### VulnHub
- [HackLAB: Vulnix](/CTF/vulnhub.com/hacklab-vulnix.md), [Kioptrix: Level 1.2](/CTF/vulnhub.com/kioptrix12.md), [FristiLeaks: 1.3](/CTF/vulnhub.com/fristileaks13.md), [Escalate My Privileges: 1](/CTF/vulnhub.com/escalate-my-privileges-1.md)### HackTheBox
- Easy HTB
- Linux: [Lame 10.10.10.3 Linux](./CTF/hackthebox.com/0001lame.md)
- Windows: [Legacy 10.10.10.4 Windows](./CTF/hackthebox.com/0002legacy.md), [Devel 10.10.10.5 Windows](./CTF/hackthebox.com/0003devel.md)
- Medium HTB
- Linux: [Popcorn 10.10.10.6 Linux ](./CTF/hackthebox.com/0004popcorn.md)## About Me
| Platform | Link |
|-----------|-------|
| LinkedIn | [LinkedIn.com/in/ZishanAdThandar](https://www.linkedin.com/in/ZishanAdThandar) |
| YouTube | [YouTube.com/ZishanAdThandar](https://youtube.com/ZishanAdThandar) |
| LinkTree | [ZishanAdThandar.github.io/linktree](https://ZishanAdThandar.github.io/linktree) |
| Twitter | [twitter.com/ZishanAdThandar](https://x.com/ZishanAdThandar) |
| Telegram | [ZishanAdThandar.t.me](https://ZishanAdThandar.t.me) |
| GitHub | [GitHub.com/ZishanAdThandar](https://github.com/ZishanAdThandar) |
| Portfolio | [ZishanAdThandar.github.io](https://ZishanAdThandar.github.io) |
| Resume | [ZishanAdThandar.github.io/CV.pdf](https://ZishanAdThandar.github.io/CV.pdf) |[![TryHackMe](https://tryhackme-badges.s3.amazonaws.com/ZishanAdThandar.png)](https://tryhackme.com/p/ZishanAdThandar)
[![HackTheBox](https://www.hackthebox.com/badge/image/4477)](https://app.hackthebox.com/profile/4477)# Be a Sponsor
1. [https://github.com/sponsors/ZishanAdThandar](https://github.com/sponsors/ZishanAdThandar)
2. [https://ZishanAdThandar.github.io/sponsor/](https://ZishanAdThandar.github.io/sponsor/)