# 2023

- [Advent of Cyber '23 Side Quest](https://0xb0b.gitbook.io/writeups/tryhackme/2023/advent-of-cyber-23-side-quest.md): Explore a series of advanced challenges alongside the core Advent of Cyber event! - by am03bam4n and hadrian3689 and MartaStrzelec and andrea526
- [The Return of the Yeti](https://0xb0b.gitbook.io/writeups/tryhackme/2023/advent-of-cyber-23-side-quest/the-return-of-the-yeti.md): The Yeti needs a plan for 2023. Help him out! - by munra and ujohn
- [Snowy ARMageddon](https://0xb0b.gitbook.io/writeups/tryhackme/2023/advent-of-cyber-23-side-quest/snowy-armageddon.md): Assist the Yeti in breaching the cyber police perimeter! - by andrea526
- [Frosteau Busy with Vim](https://0xb0b.gitbook.io/writeups/tryhackme/2023/advent-of-cyber-23-side-quest/frosteau-busy-with-vim.md): Stay frosty! - by am03bam4n
- [The Bandit Surfer](https://0xb0b.gitbook.io/writeups/tryhackme/2023/advent-of-cyber-23-side-quest/the-bandit-surfer.md): The Bandit Yeti is surfing to town. - by hadrian3689
- [Stealth](https://0xb0b.gitbook.io/writeups/tryhackme/2023/stealth.md): Use your evasion skills to pwn a Windows target with an updated defence mechanism. - by 1337rce
- [AVenger](https://0xb0b.gitbook.io/writeups/tryhackme/2023/avenger.md): You’ve been asked to exploit all the vulnerabilities present. - by andrea526
- [Dreaming](https://0xb0b.gitbook.io/writeups/tryhackme/2023/dreaming.md): Solve the riddle that dreams have woven. - by tokyo and  b1d0ws
- [DockMagic](https://0xb0b.gitbook.io/writeups/tryhackme/2023/dockmagic.md): In a land of magic, a wizard escaped from his confinement and embarks on a new adventure. - by Utkar5hM
- [Hijack](https://0xb0b.gitbook.io/writeups/tryhackme/2023/hijack.md): Misconfigs conquered, identities claimed. - by amine04
- [Bandit](https://0xb0b.gitbook.io/writeups/tryhackme/2023/bandit.md): You’ve been asked to exploit all the vulnerabilities on multiple systems. - by l4m3r8 and andrea526
- [Compiled](https://0xb0b.gitbook.io/writeups/tryhackme/2023/compiled.md): Strings can only help you so far. - by nerrorsec
- [Super Secret TIp](https://0xb0b.gitbook.io/writeups/tryhackme/2023/super-secret-tip.md): Are you only good at one thing? You better be a matrix! - by ayhamalali
- [Athena](https://0xb0b.gitbook.io/writeups/tryhackme/2023/athena.md): Break all security and compromise the machine. - by MatheuZSec
- [Mother's Secret](https://0xb0b.gitbook.io/writeups/tryhackme/2023/mothers-secret.md): Exploit flaws found in Mother's code to reveal its secrets. - by melmols
- [Expose](https://0xb0b.gitbook.io/writeups/tryhackme/2023/expose.md): Use your red teaming knowledge to pwn a Linux machine. - by 1337rce
- [Lesson learned?](https://0xb0b.gitbook.io/writeups/tryhackme/2023/lesson-learned.md): Have you learned your lesson? - by Tib3rius
- [Grep](https://0xb0b.gitbook.io/writeups/tryhackme/2023/grep.md): A challenge that tests your reconnaissance and OSINT skills. - by l000g1c
- [Crylo](https://0xb0b.gitbook.io/writeups/tryhackme/2023/crylo.md): Learn about the CryptoJS library and JavaScript-based client-side encryption and decryption. - by AnoF
- [Forgotten Implant](https://0xb0b.gitbook.io/writeups/tryhackme/2023/forgotten-implant.md): With almost no attack surface, you must use a forgotten C2 implant to get initial access. - by IngoKleiber
- [Red](https://0xb0b.gitbook.io/writeups/tryhackme/2023/red.md): A classic battle for the ages. - by hadrian3689
- [Cat Pictures 2](https://0xb0b.gitbook.io/writeups/tryhackme/2023/cat-pictures-2.md): Now with more Cat Pictures! - by gamercat
- [Flip](https://0xb0b.gitbook.io/writeups/tryhackme/2023/flip.md): Hey, do a flip! - by hadrian3689
- [Intranet](https://0xb0b.gitbook.io/writeups/tryhackme/2023/intranet.md): Welcome to the intranet! - by toxicat0r
- [Race Conditions](https://0xb0b.gitbook.io/writeups/tryhackme/2023/race-conditions.md): Knock knock! Race condition. Who's there? - by vealending
- [Valley](https://0xb0b.gitbook.io/writeups/tryhackme/2023/valley.md): Can you find your way into the Valley? - by valley
- [Weasel](https://0xb0b.gitbook.io/writeups/tryhackme/2023/weasel.md): I think the data science team has been a bit fast and loose with their project resources. - by huskyhacks
- [Prioritise](https://0xb0b.gitbook.io/writeups/tryhackme/2023/prioritise.md): In this challenge you will explore some less common SQL Injection techniques. - by congon4tor
- [Capture](https://0xb0b.gitbook.io/writeups/tryhackme/2023/capture.md): Can you bypass the login form? - by toxicat0r
- [Obscure](https://0xb0b.gitbook.io/writeups/tryhackme/2023/obscure.md): A CTF room focused on web and binary exploitation - by Zeeshan1234


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://0xb0b.gitbook.io/writeups/tryhackme/2023.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
