SkillAgentSearch skills...

Hackthebox

My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.

Install / Use

/learn @jon-brandy/Hackthebox

README

<p align="center" width="100"> <img src="https://github.com/jon-brandy/hackthebox/blob/2e16911adec5955f0648267f8efe6c51d29cc5a2/Untitled120_20231005002555.png" width="500"> </p> <details> <summary> Sherlocks</summary>

NOTES: NO TIMELINE ACTIVITIES TABLE CREATION FOR EVERY CHALLS & ONLY BRIEF ANALYSIS FOR MALWARE CASES

| No. | Cases | Lessons Learned | | :-- | ---------------------------------------------------------------------------------------------------------------------------------- | :-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------: | | 1. | Meerkat | Credential stuffing detection, Bonitasoft CVE exploitation, Packet filtering, Custom column value analysis | | 2. | Bumblebee | SQLite3 file analysis, Epoch timestamp conversion, NGINX access.log parsing | | 3. | Lockpick | Static malware analysis with Ghidra, Reverse engineering C-based malware, Python scripting for reversing encryption logic, JSON parsing automation | | 4. | Constellation | Discord URL forensic analysis, URL unfurling techniques | | 5. | OpTinselTrace-4 | Threat hunting and attacker IP identification, Port scanning detection, Printer hacking network forensics | | 6. | Litter | PCAP network traffic analysis, DNS tunneling identification | | 7. | Logjammer | Windows Event Log analysis using Event Viewer | | 8. | Heartbreaker-Continuum | PEStudio and Ghidra for code size identification, VirusTotal for file metadata, Hex editor for obfuscated strings offsets, MITRE ATT&CK technique identification | | 9. | Hyperfiletable | Parsing raw MFT data with analyzeMFT, Using MFTExplorer for ZoneID and file size analysis

View on GitHub
GitHub Stars177
CategoryDevelopment
Updated2d ago
Forks29

Languages

Python

Security Score

100/100

Audited on Apr 4, 2026

No findings