Skip to content

k41r0s3/Hackviser

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

Hackviser — Scenario Writeups

A collection of detailed writeups for machines and scenarios from the HackViser platform.

Each writeup covers the full attack chain — recon, enumeration, exploitation, post-exploitation, and lessons learned.


Writeups

Machine Category Difficulty Tags
SentryNode Web Medium Flask, PyYAML RCE, Broken Auth, JWT

Structure

Hackviser/
└── Write-ups/
    └── MachineName/
        └── README.md

Methodology

Each writeup follows a structured approach:

  1. Recon — Port scanning, service enumeration
  2. Enumeration — Directory fuzzing, source analysis, information gathering
  3. Exploitation — Vulnerability identification and execution
  4. Post-Exploitation — Privilege escalation, persistence, flag collection
  5. Lessons Learned — Key takeaways and remediation advice

About

Written by k41r0s3 — penetration tester and CTF player.
All writeups are for educational purposes only and are written against authorized lab environments.


More writeups coming soon.

About

Detailed writeups for HackViser scenarios covering web exploitation, privilege escalation, and more.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors