# TryHackme

- [2026](https://0xb0b.gitbook.io/writeups/tryhackme/2026.md)
- [Matryoshka](https://0xb0b.gitbook.io/writeups/tryhackme/2026/matryoshka.md): Can you escape the Matryoshka Containment Unit? -by Nemo777 and stefan.apostol
- [Interceptor](https://0xb0b.gitbook.io/writeups/tryhackme/2026/interceptor.md): Use Burp or interception knowledge to modify the traffic and pwn the machine.
- [Recruit](https://0xb0b.gitbook.io/writeups/tryhackme/2026/recruit.md): Infiltrate Recruit's new portal. Map the site, hunt for flaws, and gain unauthorised access - by talat118
- [Operation Takeover](https://0xb0b.gitbook.io/writeups/tryhackme/2026/operation-takeover.md): Take control of the network one router at a time. - by munra
- [Plant Photographer](https://0xb0b.gitbook.io/writeups/tryhackme/2026/plant-photographer.md): Dig deeper and try to uncover the flag hidden behind the scenes. - by munra & h4sh3m00
- [Operation Endgame](https://0xb0b.gitbook.io/writeups/tryhackme/2026/operation-endgame.md): This challenge will focus on exploiting an Active Directory environment. - by h4sh3m00
- [Love at First Breach 2026 - Advanced Track](https://0xb0b.gitbook.io/writeups/tryhackme/2026/love-at-first-breach-2026-advanced-track.md): Advanced Track
- [CupidCards](https://0xb0b.gitbook.io/writeups/tryhackme/2026/love-at-first-breach-2026-advanced-track/cupidcards.md): Advanced Track
- [Chains of Love](https://0xb0b.gitbook.io/writeups/tryhackme/2026/love-at-first-breach-2026-advanced-track/chains-of-love.md): Advanced Track
- [Cloud Nine](https://0xb0b.gitbook.io/writeups/tryhackme/2026/love-at-first-breach-2026-advanced-track/cloud-nine.md): Advanced Track
- [Love at First Breach 2026 - Beginner's Track](https://0xb0b.gitbook.io/writeups/tryhackme/2026/love-at-first-breach-2026-beginners-track.md): Beginner's Track
- [Message to Garcia](https://0xb0b.gitbook.io/writeups/tryhackme/2026/message-to-garcia.md): Encryption and Key Management Challenge. - by melmols
- [Kernel Blackout](https://0xb0b.gitbook.io/writeups/tryhackme/2026/kernel-blackout.md): Blue pill: stay in user mode, trust the documented APIs, and never question what lies beneath. Red pill: drop into kernel mode and see how deep the rabbit hole goes. - by h4sh3m00
- [Azure: Tapper](https://0xb0b.gitbook.io/writeups/tryhackme/2026/azure-tapper.md): Azure challenge for cloud pentesters: Can you find the attack path and abuse it?  - by zieglers
- [2025](https://0xb0b.gitbook.io/writeups/tryhackme/2025.md)
- [Advent of Cyber '25 Side Quest](https://0xb0b.gitbook.io/writeups/tryhackme/2025/advent-of-cyber-25-side-quest.md): Explore a series of advanced challenges alongside the core Advent of Cyber event!
- [The Great Disappearing Act](https://0xb0b.gitbook.io/writeups/tryhackme/2025/advent-of-cyber-25-side-quest/the-great-disappearing-act.md): Can you help Hopper escape his wrongful imprisonment in HopSec asylum? - by melmols, Maxablancas, MartaStrzelec and DrGonz0
- [Hoppers Origins](https://0xb0b.gitbook.io/writeups/tryhackme/2025/advent-of-cyber-25-side-quest/hoppers-origins.md): From HopSec Island, Eggsploits whisper through TBFC - Origins of how SOC-mas became EAST-mas. - by am03bam4n
- [Carrotbane of My Existence](https://0xb0b.gitbook.io/writeups/tryhackme/2025/advent-of-cyber-25-side-quest/carrotbane-of-my-existence.md): Hopper’s uprising is just getting started. - by ar33zy & Maxablancas
- [BreachBlocker Unlocker](https://0xb0b.gitbook.io/writeups/tryhackme/2025/advent-of-cyber-25-side-quest/breachblocker-unlocker.md): Hopper needs your help to get the final key to the throne room. - by munra, melmols & Maxablancas
- [Attacking LLMs](https://0xb0b.gitbook.io/writeups/tryhackme/2025/attacking-llms.md): The capstone challenges featured in the Attacking LLMs section of the Web Application Red Teaming Path - by l000g1c, h4sh3m00, and Frh.
- [Padelify](https://0xb0b.gitbook.io/writeups/tryhackme/2025/padelify.md): Use red-teaming techniques to bypass the WAF and obtain admin access to the web application. - by 1337rce
- [Farewell](https://0xb0b.gitbook.io/writeups/tryhackme/2025/farewell.md): Use red-teaming techniques to bypass the WAF and obtain admin access to the web application. - by 1337ce
- [Azure: Hoppity Hop](https://0xb0b.gitbook.io/writeups/tryhackme/2025/azure-hoppity-hop.md): Azure challenge for cloud pentesters: Can you find the attack path and exploit it? - by zieglers
- [Azure: Eyes Wide Shut](https://0xb0b.gitbook.io/writeups/tryhackme/2025/azure-eyes-wide-shut.md): Azure challenge for cloud pentesters: Can you find the attack path and abuse it? - by zieglers
- [Sequence](https://0xb0b.gitbook.io/writeups/tryhackme/2025/sequence.md): Chain multiple vulnerabilities to take control of a system. - by 1337rce
- [Pressed](https://0xb0b.gitbook.io/writeups/tryhackme/2025/pressed.md): A full-scale intrusion was recently detected within the network, raising critical alarms. - by hadrian3689
- [Voyage](https://0xb0b.gitbook.io/writeups/tryhackme/2025/voyage.md): Chain multiple vulnerabilities to gain control of a system. - by 1337rce
- [Extract](https://0xb0b.gitbook.io/writeups/tryhackme/2025/extract.md): Can you extract the secrets of the library? - by l000g1c
- [Contrabando](https://0xb0b.gitbook.io/writeups/tryhackme/2025/contrabando.md): Never tell me the odds. - by hadrian3689
- [Event Horizon](https://0xb0b.gitbook.io/writeups/tryhackme/2025/event-horizon.md): Unearth the secrets beyond the Event Horizon.  - by hadrian3689
- [Soupedecode 01](https://0xb0b.gitbook.io/writeups/tryhackme/2025/soupedecode-01.md): Test your enumeration skills on this boot-to-root machine. - by josemlwdf
- [Directory](https://0xb0b.gitbook.io/writeups/tryhackme/2025/directory.md): Do you have what it takes to crack this case? - by hadrian3689
- [CAPTCHApocalypse](https://0xb0b.gitbook.io/writeups/tryhackme/2025/captchapocalypse.md): When crypto interferes, automate. - by l000g1c
- [Hackfinity Battle Vault](https://0xb0b.gitbook.io/writeups/tryhackme/2025/hackfinity-battle-vault.md): From the Hackfinity Battle CTF event. -by munra, hadrian3689 and h4sh3m00
- [Security Footage](https://0xb0b.gitbook.io/writeups/tryhackme/2025/security-footage.md): Perform digital forensics on a network capture to recover footage from a camera. - ben, timtaylor and congon4tor
- [Ledger](https://0xb0b.gitbook.io/writeups/tryhackme/2025/ledger.md): This challenge simulates a real cyber-attack scenario where you must exploit an Active Directory. - by h4sh3m00
- [Moebius](https://0xb0b.gitbook.io/writeups/tryhackme/2025/moebius.md): A place where you start at some point, and you have to go back to it in the end. - by shamollash
- [Mayhem](https://0xb0b.gitbook.io/writeups/tryhackme/2025/mayhem.md): Can you find the secrets inside the sea of mayhem? - by hadrian3689
- [Robots](https://0xb0b.gitbook.io/writeups/tryhackme/2025/robots.md): A (small) tribute to I. Asimov. - by shamollash
- [Billing](https://0xb0b.gitbook.io/writeups/tryhackme/2025/billing.md): Some mistakes can be costly. - by RunasRs
- [Crypto Failures](https://0xb0b.gitbook.io/writeups/tryhackme/2025/crypto-failures.md): Implementing your own military-grade encryption is usually not the best idea. - by shamollash
- [Rabbit Store](https://0xb0b.gitbook.io/writeups/tryhackme/2025/rabbit-store.md): Demonstrate your web application testing skills and the basics of Linux to escalate your privileges. - by iklak
- [Decryptify](https://0xb0b.gitbook.io/writeups/tryhackme/2025/decryptify.md): Use your exploitation skills to uncover encrypted keys and get RCE. - by 1337rce
- [You Got Mail](https://0xb0b.gitbook.io/writeups/tryhackme/2025/you-got-mail.md): Test your recon and phishing skills in order to complete your objective. - by tryhackme
- [Smol](https://0xb0b.gitbook.io/writeups/tryhackme/2025/smol.md): Test your enumeration skills on this boot-to-root machine. - by josemlwdf
- [Light](https://0xb0b.gitbook.io/writeups/tryhackme/2025/light.md): Welcome to the Light database application! - by hadrian3689
- [Lo-Fi](https://0xb0b.gitbook.io/writeups/tryhackme/2025/lo-fi.md): Want to hear some lo-fi beats, to relax or study to? We've got you covered! - by cmnatic
- [Silver Platter](https://0xb0b.gitbook.io/writeups/tryhackme/2025/silver-platter.md): Can you breach the server? - by TeneBrae93
- [2024](https://0xb0b.gitbook.io/writeups/tryhackme/2024.md)
- [Advent of Cyber '24 Side Quest](https://0xb0b.gitbook.io/writeups/tryhackme/2024/advent-of-cyber-24-side-quest.md): Explore a series of advanced challenges alongside the core Advent of Cyber event! - by munra, am03bam4n, hadrian3689, MartaStrzelec, elliegillard, h4sh3m00, rePl4stic and MonAha
- [T1: Operation Tiny Frostbite](https://0xb0b.gitbook.io/writeups/tryhackme/2024/advent-of-cyber-24-side-quest/t1-operation-tiny-frostbite.md): The first of our enemies is the Frostbite Fox.
- [T2: Yin and Yang](https://0xb0b.gitbook.io/writeups/tryhackme/2024/advent-of-cyber-24-side-quest/t2-yin-and-yang.md): Penguin Zero, the tech genius of the Frostlings Five infiltrated the company’s network. With a few keystrokes and a sly grin, he uploaded a malicious script into YIN and YANG, seizing control.
- [T3: Escaping the Blizzard](https://0xb0b.gitbook.io/writeups/tryhackme/2024/advent-of-cyber-24-side-quest/t3-escaping-the-blizzard.md): Beware of Blizzard Bear skills, he even managed to hack your old text-based service. Talk about a blast from the 90's!
- [T4: Krampus Festival](https://0xb0b.gitbook.io/writeups/tryhackme/2024/advent-of-cyber-24-side-quest/t4-krampus-festival.md): The Krampus is out to snatch your naughty elves. Will they end up all in his bag, or will you find a way to take control back?
- [T5: An Avalanche of Web Apps](https://0xb0b.gitbook.io/writeups/tryhackme/2024/advent-of-cyber-24-side-quest/t5-an-avalanche-of-web-apps.md): You got caught in the avalanche. I compromised most of your web applications without being detected. You can't compete with a leopard's speed.
- [The Sticker Shop](https://0xb0b.gitbook.io/writeups/tryhackme/2024/the-sticker-shop.md): Can you exploit the sticker shop in order to capture the flag? - by toxicat0r
- [Lookup](https://0xb0b.gitbook.io/writeups/tryhackme/2024/lookup.md): Test your enumeration skills on this boot-to-root machine. - by josemlwdf
- [Mouse Trap](https://0xb0b.gitbook.io/writeups/tryhackme/2024/mouse-trap.md): Follow Jom and Terry on their purple teaming adventures, emulating attacks and investigating the leftover artefacts.  - by ar33zy, DrGonz0 & Aashir.Masood
- [Hack Back](https://0xb0b.gitbook.io/writeups/tryhackme/2024/hack-back.md): Can you get to the bottom of what's wrong with the machine? - by Maxablancas,  h4sh3m8 & rePl4stic
- [SeeTwo](https://0xb0b.gitbook.io/writeups/tryhackme/2024/seetwo.md): Can you see who is in command and control? - by hadrian3689
- [Whiterose](https://0xb0b.gitbook.io/writeups/tryhackme/2024/whiterose.md): Yet another Mr. Robot themed challenge. - by ngn
- [Rabbit Hole](https://0xb0b.gitbook.io/writeups/tryhackme/2024/rabbit-hole.md): It's easy to fall into rabbit holes. - by shamollash
- [Mountaineer](https://0xb0b.gitbook.io/writeups/tryhackme/2024/mountaineer.md): Will you find the flags between all these mountains? - by nirza
- [Extracted](https://0xb0b.gitbook.io/writeups/tryhackme/2024/extracted.md): We need your help! - by hadrian3689 and  DrGonz0
- [Backtrack](https://0xb0b.gitbook.io/writeups/tryhackme/2024/backtrack.md): Daring to set foot where no one has. - by 0utc4st and YoloSaimo
- [Brains](https://0xb0b.gitbook.io/writeups/tryhackme/2024/brains.md): The city forgot to close its gate. - by Dex01, strategos and l000g1c
- [Pyrat](https://0xb0b.gitbook.io/writeups/tryhackme/2024/pyrat.md): Test your enumeration skills on this boot-to-root machine. - by josemlwdf
- [K2](https://0xb0b.gitbook.io/writeups/tryhackme/2024/k2.md): Are you able to make your way through the mountain? - by hadrian3689
- [Base Camp](https://0xb0b.gitbook.io/writeups/tryhackme/2024/k2/base-camp.md): K2 -Are you able to make your way through the mountain? - by hadrian3689
- [Middle Camp](https://0xb0b.gitbook.io/writeups/tryhackme/2024/k2/middle-camp.md): K2 - Are you able to make your way through the mountain? - by hadrian3689
- [The Summit](https://0xb0b.gitbook.io/writeups/tryhackme/2024/k2/the-summit.md): K2 - Are you able to make your way through the mountain? - by hadrian3689
- [The London Bridge](https://0xb0b.gitbook.io/writeups/tryhackme/2024/the-london-bridge.md): The London Bridge is falling down. - by Sharib
- [Cheese CTF](https://0xb0b.gitbook.io/writeups/tryhackme/2024/cheese-ctf.md): Inspired by the great cheese talk of THM! - by shadowabsorber and VainXploits
- [Breakme](https://0xb0b.gitbook.io/writeups/tryhackme/2024/breakme.md): Break this secure system and get the flags, if you can. - by TH3V1P3R
- [CERTain Doom](https://0xb0b.gitbook.io/writeups/tryhackme/2024/certain-doom.md): Bob has since joined the CERT team and developed a nifty new site. Is there more than meets the eye? - by hydragyrum
- [TryPwnMe One](https://0xb0b.gitbook.io/writeups/tryhackme/2024/trypwnme-one.md): A collection of Exploit Development challenges to practice the basic techniques of binary exploitation. - by rePl4stic
- [Hammer](https://0xb0b.gitbook.io/writeups/tryhackme/2024/hammer.md): Use your exploitation skills to bypass authentication mechanisms on a website and get RCE. - by 1337rce
- [U.A. High School](https://0xb0b.gitbook.io/writeups/tryhackme/2024/u.a.-high-school.md): Welcome to the web application of U.A., the Superhero Academy. - by Fede1781
- [IronShade](https://0xb0b.gitbook.io/writeups/tryhackme/2024/ironshade.md): Perform a compromise assessment on a Linux host and identify the attack footprints. - by Dex01
- [Block](https://0xb0b.gitbook.io/writeups/tryhackme/2024/block.md): Encryption? What encryption? - by hadrian3689
- [Injectics](https://0xb0b.gitbook.io/writeups/tryhackme/2024/injectics.md): Use your injection skills to take control of a web app. - by 1337rce & l000g1c
- [DX2: Hell's Kitchen](https://0xb0b.gitbook.io/writeups/tryhackme/2024/dx2-hells-kitchen.md): Can you help compromise a civilian machine that we believe is connected to the NSF? -by Aquinas
- [New York Flankees](https://0xb0b.gitbook.io/writeups/tryhackme/2024/new-york-flankees.md): Can you, the rogue adventurer, break through Stefan's defences to take control of his blog! - by ioctl & tgreenMWR
- [NanoCherryCTF](https://0xb0b.gitbook.io/writeups/tryhackme/2024/nanocherryctf.md): Explore a double-sided site and escalate to root! - by dsneddon00
- [Publisher](https://0xb0b.gitbook.io/writeups/tryhackme/2024/publisher.md): Test your enumeration skills on this boot-to-root machine. -by josemlwdf
- [W1seGuy](https://0xb0b.gitbook.io/writeups/tryhackme/2024/w1seguy.md): A w1se guy 0nce said, the answer is usually as plain as day. - by hadrian3689 and DrGonz0
- [mKingdom](https://0xb0b.gitbook.io/writeups/tryhackme/2024/mkingdom.md): Beginner-friendly box inspired by a certain mustache man. - by uartuo
- [Airplane](https://0xb0b.gitbook.io/writeups/tryhackme/2024/airplane.md): Are you ready to fly? - by blgsvnomer
- [Include](https://0xb0b.gitbook.io/writeups/tryhackme/2024/include.md): Use your server exploitation skills to take control of a web app. - by  1337rce and l000g1c
- [CyberLens](https://0xb0b.gitbook.io/writeups/tryhackme/2024/cyberlens.md): Can you exploit the CyberLens web server and discover the hidden flags? - by TeneBrae93 and tgreenMWR
- [Profiles](https://0xb0b.gitbook.io/writeups/tryhackme/2024/profiles.md): No profile? No problem. - by hadrian3689
- [Whats Your Name?](https://0xb0b.gitbook.io/writeups/tryhackme/2024/whats-your-name.md): Utilise your client-side exploitation skills to take control of a web app. - by 1337rce & l000g1c
- [Capture Returns](https://0xb0b.gitbook.io/writeups/tryhackme/2024/capture-returns.md): The developers have improved their login form since last time. Can you bypass it? - by toxicat0r
- [TryHack3M](https://0xb0b.gitbook.io/writeups/tryhackme/2024/tryhack3m.md): TryHackMe has just reached THREE MILLION users! 🎉
- [TryHack3M: Burg3r Bytes](https://0xb0b.gitbook.io/writeups/tryhackme/2024/tryhack3m/tryhack3m-burg3r-bytes.md): They say these burgers are worth every penny. Can you buy one? - by cmnatic, munra and melmols
- [TryHack3M: Bricks Heist](https://0xb0b.gitbook.io/writeups/tryhackme/2024/tryhack3m/tryhack3m-bricks-heist.md): Crack the code, command the exploit! Dive into the heart of the system with just an RCE CVE as your key. - by umairalizafar, ujohn and l000g1c
- [TryHack3M: Sch3Ma D3Mon](https://0xb0b.gitbook.io/writeups/tryhackme/2024/tryhack3m/tryhack3m-sch3ma-d3mon.md): A guided challenge to learn about SQL injection exploits. -by  strategos, MaxRobertson and arebel
- [TryHack3M: Subscribe](https://0xb0b.gitbook.io/writeups/tryhackme/2024/tryhack3m/tryhack3m-subscribe.md): Can you help Hack3M reach 3M subscribers? - by ar33zy, Dex01 and 1337rce
- [Creative](https://0xb0b.gitbook.io/writeups/tryhackme/2024/creative.md): Exploit a vulnerable web application and some misconfigurations to gain root privileges. - by ssaadakhtarr
- [Bypass](https://0xb0b.gitbook.io/writeups/tryhackme/2024/bypass.md): Use your defence evasion skills to take control of a secure network. - by 1337rce
- [Clocky](https://0xb0b.gitbook.io/writeups/tryhackme/2024/clocky.md): Time is an illusion. - by toxicat0r
- [El Bandito](https://0xb0b.gitbook.io/writeups/tryhackme/2024/el-bandito.md): Can you help capture El Bandito before he leaves the galaxy? - by l4m3r8
- [Hack Smarter Security](https://0xb0b.gitbook.io/writeups/tryhackme/2024/hack-smarter-security.md): Can you hack the hackers? - by TeneBrae93 and  tgreenMWR
- [Summit](https://0xb0b.gitbook.io/writeups/tryhackme/2024/summit.md): Can you chase a simulated adversary up the Pyramid of Pain until they finally back down? -by odacavoTHM
- [Chrome](https://0xb0b.gitbook.io/writeups/tryhackme/2024/chrome.md): Let us place all of our trust in a password manager. - by hadrian3689
- [Exfilibur](https://0xb0b.gitbook.io/writeups/tryhackme/2024/exfilibur.md): You’ve been asked to exploit all the vulnerabilities present. - by l4m3r8
- [Breaking RSA](https://0xb0b.gitbook.io/writeups/tryhackme/2024/breaking-rsa.md): Hop in and break poorly implemented RSA using Fermat's factorization algorithm. - by hackerinthehouse
- [Kitty](https://0xb0b.gitbook.io/writeups/tryhackme/2024/kitty.md): Map? Where we are going, we don't need maps. - by hadrian3689
- [Reset](https://0xb0b.gitbook.io/writeups/tryhackme/2024/reset.md): This challenge simulates a cyber-attack scenario where you must exploit an Active Directory environment. - by l4m3r8
- [Umbrella](https://0xb0b.gitbook.io/writeups/tryhackme/2024/umbrella.md): Breach Umbrella Corp's time-tracking server by exploiting misconfigurations around containerisation. - by brunofight
- [WhyHackMe](https://0xb0b.gitbook.io/writeups/tryhackme/2024/whyhackme.md): Dive into the depths of security and analysis with WhyHackMe. - by suds4131
- [Dodge](https://0xb0b.gitbook.io/writeups/tryhackme/2024/dodge.md): Test your pivoting and network evasion skills. - by 1337rce and  l000g1c
- [2023](https://0xb0b.gitbook.io/writeups/tryhackme/2023.md)
- [Advent of Cyber '23 Side Quest](https://0xb0b.gitbook.io/writeups/tryhackme/2023/advent-of-cyber-23-side-quest.md): Explore a series of advanced challenges alongside the core Advent of Cyber event! - by am03bam4n and hadrian3689 and MartaStrzelec and andrea526
- [The Return of the Yeti](https://0xb0b.gitbook.io/writeups/tryhackme/2023/advent-of-cyber-23-side-quest/the-return-of-the-yeti.md): The Yeti needs a plan for 2023. Help him out! - by munra and ujohn
- [Snowy ARMageddon](https://0xb0b.gitbook.io/writeups/tryhackme/2023/advent-of-cyber-23-side-quest/snowy-armageddon.md): Assist the Yeti in breaching the cyber police perimeter! - by andrea526
- [Frosteau Busy with Vim](https://0xb0b.gitbook.io/writeups/tryhackme/2023/advent-of-cyber-23-side-quest/frosteau-busy-with-vim.md): Stay frosty! - by am03bam4n
- [The Bandit Surfer](https://0xb0b.gitbook.io/writeups/tryhackme/2023/advent-of-cyber-23-side-quest/the-bandit-surfer.md): The Bandit Yeti is surfing to town. - by hadrian3689
- [Stealth](https://0xb0b.gitbook.io/writeups/tryhackme/2023/stealth.md): Use your evasion skills to pwn a Windows target with an updated defence mechanism. - by 1337rce
- [AVenger](https://0xb0b.gitbook.io/writeups/tryhackme/2023/avenger.md): You’ve been asked to exploit all the vulnerabilities present. - by andrea526
- [Dreaming](https://0xb0b.gitbook.io/writeups/tryhackme/2023/dreaming.md): Solve the riddle that dreams have woven. - by tokyo and  b1d0ws
- [DockMagic](https://0xb0b.gitbook.io/writeups/tryhackme/2023/dockmagic.md): In a land of magic, a wizard escaped from his confinement and embarks on a new adventure. - by Utkar5hM
- [Hijack](https://0xb0b.gitbook.io/writeups/tryhackme/2023/hijack.md): Misconfigs conquered, identities claimed. - by amine04
- [Bandit](https://0xb0b.gitbook.io/writeups/tryhackme/2023/bandit.md): You’ve been asked to exploit all the vulnerabilities on multiple systems. - by l4m3r8 and andrea526
- [Compiled](https://0xb0b.gitbook.io/writeups/tryhackme/2023/compiled.md): Strings can only help you so far. - by nerrorsec
- [Super Secret TIp](https://0xb0b.gitbook.io/writeups/tryhackme/2023/super-secret-tip.md): Are you only good at one thing? You better be a matrix! - by ayhamalali
- [Athena](https://0xb0b.gitbook.io/writeups/tryhackme/2023/athena.md): Break all security and compromise the machine. - by MatheuZSec
- [Mother's Secret](https://0xb0b.gitbook.io/writeups/tryhackme/2023/mothers-secret.md): Exploit flaws found in Mother's code to reveal its secrets. - by melmols
- [Expose](https://0xb0b.gitbook.io/writeups/tryhackme/2023/expose.md): Use your red teaming knowledge to pwn a Linux machine. - by 1337rce
- [Lesson learned?](https://0xb0b.gitbook.io/writeups/tryhackme/2023/lesson-learned.md): Have you learned your lesson? - by Tib3rius
- [Grep](https://0xb0b.gitbook.io/writeups/tryhackme/2023/grep.md): A challenge that tests your reconnaissance and OSINT skills. - by l000g1c
- [Crylo](https://0xb0b.gitbook.io/writeups/tryhackme/2023/crylo.md): Learn about the CryptoJS library and JavaScript-based client-side encryption and decryption. - by AnoF
- [Forgotten Implant](https://0xb0b.gitbook.io/writeups/tryhackme/2023/forgotten-implant.md): With almost no attack surface, you must use a forgotten C2 implant to get initial access. - by IngoKleiber
- [Red](https://0xb0b.gitbook.io/writeups/tryhackme/2023/red.md): A classic battle for the ages. - by hadrian3689
- [Cat Pictures 2](https://0xb0b.gitbook.io/writeups/tryhackme/2023/cat-pictures-2.md): Now with more Cat Pictures! - by gamercat
- [Flip](https://0xb0b.gitbook.io/writeups/tryhackme/2023/flip.md): Hey, do a flip! - by hadrian3689
- [Intranet](https://0xb0b.gitbook.io/writeups/tryhackme/2023/intranet.md): Welcome to the intranet! - by toxicat0r
- [Race Conditions](https://0xb0b.gitbook.io/writeups/tryhackme/2023/race-conditions.md): Knock knock! Race condition. Who's there? - by vealending
- [Valley](https://0xb0b.gitbook.io/writeups/tryhackme/2023/valley.md): Can you find your way into the Valley? - by valley
- [Weasel](https://0xb0b.gitbook.io/writeups/tryhackme/2023/weasel.md): I think the data science team has been a bit fast and loose with their project resources. - by huskyhacks
- [Prioritise](https://0xb0b.gitbook.io/writeups/tryhackme/2023/prioritise.md): In this challenge you will explore some less common SQL Injection techniques. - by congon4tor
- [Capture](https://0xb0b.gitbook.io/writeups/tryhackme/2023/capture.md): Can you bypass the login form? - by toxicat0r
- [Obscure](https://0xb0b.gitbook.io/writeups/tryhackme/2023/obscure.md): A CTF room focused on web and binary exploitation - by Zeeshan1234
- [Red Team Capstone Challenge](https://0xb0b.gitbook.io/writeups/tryhackme/red-team-capstone-challenge.md): This room is the capstone challenge for the red team learning pathway. - by am03bam4n
- [OSINT](https://0xb0b.gitbook.io/writeups/tryhackme/red-team-capstone-challenge/osint.md)
- [Perimeter Breach](https://0xb0b.gitbook.io/writeups/tryhackme/red-team-capstone-challenge/perimeter-breach.md)
- [Initial Compromise of Active Directory](https://0xb0b.gitbook.io/writeups/tryhackme/red-team-capstone-challenge/initial-compromise-of-active-directory.md)
- [Full Compromise of CORP Domain](https://0xb0b.gitbook.io/writeups/tryhackme/red-team-capstone-challenge/full-compromise-of-corp-domain.md)
- [Full Compromise of Parent Domain](https://0xb0b.gitbook.io/writeups/tryhackme/red-team-capstone-challenge/full-compromise-of-parent-domain.md)
- [Full Compromise of BANK Domain](https://0xb0b.gitbook.io/writeups/tryhackme/red-team-capstone-challenge/full-compromise-of-bank-domain.md)
- [Compromise of SWIFT and Payment Transfer](https://0xb0b.gitbook.io/writeups/tryhackme/red-team-capstone-challenge/compromise-of-swift-and-payment-transfer.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://0xb0b.gitbook.io/writeups/tryhackme.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
