This section contains my HackTheBox machine writeups, focusing on enumeration, exploitation, and privilege escalation techniques.