1337 Sheets
1337 or Elite, The Cybersecurity write-ups for the true cyber e1ite! Offsec, Hack The Box, and more🕵️♂️ Whether you're diving into the latest exploits or sharpening your skills 🛠️.
Hack The Box - Season 10 HTB DevArea Writeup - Medium- Weekly - March 28th, 2026
Hack The Box - Season 10 HTB Kobold Writeup - Easy- Weekly - March 21th, 2026
Hack The Box - Season 10 HTB VariaType Writeup - Medium- Weekly - March 15th, 2026
Hack The Box - Season 10 HTB CCTV Writeup - Easy- Weekly - March 07th, 2026
Latest
Offsec - Solstice - Jun 26th 2023
Main Page Book List We are still setting up the library! Try later on!
Offsec - Slort - Apr 22nd 2023
Target given: [LAB_IP] Nmap on target: sudo nmap -sC -sV -v -p- [LAB_IP] (-sC Common scripts; -sV service Versions; -v verbose (start seeing data to research results sooner)
Offsec - Shakabrah - Jun 17th, 2023
Enumeration Target IP given is: [LAB_IP] Got OpenVAS working just for fun via docker. Only able to check the services and their versions for CVE's. No deep
Offsec - Sar - Nov 4th 2023
Given IP [LAB_IP] Netdiscover under normal non given circumstances rustscan [LAB_IP] 22/tcp open ssh syn-ack 80/tcp open http syn-ack nmap -sC -sV -p22,80 [LAB_IP]
TryHackMe - RootMe - Oct 30th 2023
Target is: (Given) Recon nmap [TARGET_IP] --top-ports 4000 -T5 --open -oN openPorts.txt PORT STATE SERVICE 22/tcp open ssh 80/tcp open http nmap -sC -sV [TARGET_IP]
pyLoader
Nov 10 2023 Target: [LAB_IP] Prep Open Resources General Mind Map: https://xmind.app/m/QsNUEz/ Confirm docker is installed and set rustscan as an alias or add to
Offsec - Potato - June 4th 2023
Potato company At the moment, there is nothing. This site is under construction. To make you wait, here is a photo of a potato: Login User: Password: Go to the
Offsec - OnSystemShellDredd - Feb 27th 2023
Started the OSCP playground box to get warmed up again on boxes. Connected hacking boxes with learning music via sheet music. At first, it's based on sheet music
Offsec - MyCMSMS - Nov 4th 2023
Given Target: [LAB_IP] rustscan [LAB_IP] PORT STATE SERVICE REASON 22/tcp open ssh syn-ack 80/tcp open http syn-ack 3306/tcp open mysql syn-ack 33060/tcp open mysqlx
Offsec - Levram - Nov 1st 2023
Given IP target: [LAB_IP] Recon rustscan -a [LAB_IP] PORT STATE SERVICE REASON 22/tcp open ssh syn-ack 8000/tcp open http-alt syn-ack Making rustscan more efficient sudo docker
TryHackMe - Kenobi - Oct 29th 2023
Target IP - [TARGET_IP] (Given) Recon nmap --top-ports 3000 -T5 [TARGET_IP] --open //Probably could do 5-10k PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 80/
Offsec - InfosecPrep - Jun 21st 2023
Prep set up nc -nlvp 4444 Enumeration Assume netdiscover + subnet ping scan Target: [LAB_IP] ##Nmap → nmap -p- -sV -sC --open -T4 [LAB_IP] -oN InfoSecPrep_nmap.txt 15:19:
Offsec - ICMP - Nov 4th 2023
Given Target [LAB_IP] rustscan [LAB_IP] 22/tcp open ssh syn-ack 80/tcp open http syn-ack nmap -sC -sV -p22,80 [LAB_IP] -oN icmp.nmap -v dirbuster http:
Offsec - Gaara - Jun 3rd 2023
Target is [LAB_IP] I installed auto recon to make recon automated as much as possible. https://github.com/Tib3rius/AutoRecon sudo env "PATH=$PATH" autorecon [LAB_IP]