Skip to content

stacknil/sec-writeups-public

sec-writeups-public

Public, sanitized security write-ups from authorized labs and training platforms.

A local-first public knowledge base focused on methodology, reasoning, and reusable security patterns, not copy-paste exploitation.

At A Glance

Current public snapshot:

  • 111 active public notes
  • 100 active TryHackMe notes
  • 11 topic-organized notes under notes/
  • 9 organized TryHackMe learning tracks
  • public governance for taxonomy, placeholders, publication, and maintenance

Best fit for readers who want:

  • structured security notes instead of transcript dumps
  • reusable concepts rather than challenge spoilers
  • a public-safe reference set for web, networking, crypto, forensics, and blue-team basics

Why This Repo Exists

This repository is built to make security notes easier to:

  • read in public
  • publish safely
  • reuse as patterns
  • maintain over time

The emphasis is on:

  • methodology over one-liners
  • defensive takeaways alongside findings
  • sanitized publishing by default
  • structured, reviewable notes instead of raw dump logs

What You Will Find

The live public corpus is currently centered on TryHackMe and supplemented by a smaller topic-organized notes/ tree.

Track Notes Focus
TryHackMe/00-foundations 29 intro security, research workflow, tooling basics
TryHackMe/10-web 8 web fundamentals, HTTP, JavaScript, app testing basics
TryHackMe/20-linux 3 Linux fundamentals
TryHackMe/30-windows 4 Windows fundamentals
TryHackMe/40-networking 13 networking, protocols, packet analysis
TryHackMe/50-crypto 4 hashing, public-key crypto, cracking basics
TryHackMe/60-forensics 1 introductory forensic tooling
TryHackMe/80-blue-team 6 SIEM, detection, analyst notes
TryHackMe/90-events 32 event and challenge write-ups, sanitized for publication

Additional organized notes outside the TryHackMe tree:

  • notes/ currently contains 11 active public notes

Start Here

If you are browsing this repo for the first time:

Goal Start with
understand the repo publishing boundary POLICY.md
publish a new public-safe write-up SANITIZATION_CHECKLIST.md
understand the full publication flow docs/publication-workflow.md
browse governance and maintenance docs docs/README.md
read foundational security notes first TryHackMe/00-foundations
jump straight into web content TryHackMe/10-web
browse networking notes TryHackMe/40-networking
browse blue-team notes TryHackMe/80-blue-team

Repository Map

sec-writeups-public/
├── TryHackMe/
│   ├── 00-foundations/
│   ├── 10-web/
│   ├── 20-linux/
│   ├── 30-windows/
│   ├── 40-networking/
│   ├── 50-crypto/
│   ├── 60-forensics/
│   ├── 80-blue-team/
│   ├── 90-events/
│   └── _meta/
├── docs/
├── reports/
├── schemas/
├── scripts/
└── templates/

How Notes Are Written

Most public notes aim for the same reading experience:

  1. Summary first: what matters, quickly.
  2. Core concepts next: enough structure to reuse the idea later.
  3. Lab-safe examples only: placeholders, no sensitive live details.
  4. Takeaways and references: remediation, detection, or broader lessons where relevant.

This is intentionally not a “press button, get shell” repository.

Reading Style

These notes are optimized for fast scanning and later reuse:

  • summary-first structure
  • consistent headings and glossary sections where useful
  • placeholders instead of live identifiers
  • emphasis on concepts, workflow, and defensive value

That makes the repo work better as a reference shelf than as a challenge-by-challenge transcript archive.

Publication Guardrails

Public write-ups in this repo are expected to be:

  • sanitized
  • authorization-safe
  • placeholder-driven
  • taxonomy-controlled
  • markdownlint-clean on changed files

Short version:

  • no real target identifiers
  • no secrets, tokens, cookies, or VPN configs
  • no weaponized exploit chains
  • no raw private evidence dumps
  • prefer remediation and detection framing where it helps

Start here before publishing:

Maintainer Quick Links

Governance Layers

The public repo is kept coherent by four lightweight layers:

Layer Source of truth
taxonomy schemas/taxonomy.json
derived tags TryHackMe/_meta/TAGS.md
placeholders docs/placeholder-policy.md
publication process docs/publication-workflow.md

Required Local Checks

Run these before publishing or merging materially edited public notes:

python scripts/render_tags_doc.py --check
python scripts/render_readme_snapshot.py --check
python scripts/check_placeholders.py <changed files>
python scripts/check_markdown.py
python -m pre_commit run --files <changed files>

Manual audit helpers:

  • Full-repo placeholder audit: python scripts/check_placeholders.py --report reports/placeholder-audit.txt
  • Local tracked-file markdownlint debt audit: python scripts/generate_markdownlint_debt.py
  • Artifact-backed remote markdownlint debt audit: GitHub Actions -> Markdownlint Debt Audit

Scope Boundary

This public repository is for:

  • authorized training platforms
  • lab environments
  • explicitly permitted targets
  • sanitized notes safe to publish

If you want raw command logs, full exploit chains, unsanitized evidence, or private working notes, those stay outside this public repo.

Legal And Ethical Use

Do not use any of this against systems you do not own or do not have written permission to test.

You are responsible for complying with platform rules, local law, and the publication boundary defined in this repository.

About

Public, sanitized security write-ups from authorized labs, focused on methodology, reusable patterns, and safe publishing.

Topics

Resources

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors

Languages