# WriteUps

- [PortSwigger](/0xsec/offensive-security/oscp/writeups/portswigger.md)
- [SQL injection labs](/0xsec/offensive-security/oscp/writeups/portswigger/sql-injection-labs.md)
- [Exploiting XXE to retrieve data by repurposing a local DTD](/0xsec/offensive-security/oscp/writeups/portswigger/exploiting-xxe-to-retrieve-data-by-repurposing-a-local-dtd.md)
- [PentesterLabs](/0xsec/offensive-security/oscp/writeups/pentesterlabs.md)
- [Recon](/0xsec/offensive-security/oscp/writeups/pentesterlabs/recon.md)
- [HTB](/0xsec/offensive-security/oscp/writeups/htb.md)
- [BoardLight](/0xsec/offensive-security/oscp/writeups/htb/boardlight.md)
- [Lame](/0xsec/offensive-security/oscp/writeups/htb/lame.md)
- [THM](/0xsec/offensive-security/oscp/writeups/thm.md)
- [Walkthroughs](/0xsec/offensive-security/oscp/writeups/thm/walkthroughs.md)
- [Attacktive Directory](/0xsec/offensive-security/oscp/writeups/thm/walkthroughs/attacktive-directory.md)
- [LineKernel](/0xsec/offensive-security/oscp/writeups/thm/walkthroughs/linekernel.md)
- [Day 1 — Linux PrivEsc](/0xsec/offensive-security/oscp/writeups/thm/walkthroughs/day-1-linux-privesc.md): Today is my Day 1 and I am going to solve machine named Linux PrivEsc on TryHackMe lets goo!!!!
- [CTF](/0xsec/offensive-security/oscp/writeups/thm/ctf.md)
- [Page](/0xsec/offensive-security/oscp/writeups/thm/ctf/page.md)
- [BLUE](/0xsec/offensive-security/oscp/writeups/thm/ctf/blue.md): OS: Windows
- [mKingdom](/0xsec/offensive-security/oscp/writeups/thm/ctf/mkingdom.md)
- [RazorBlack](/0xsec/offensive-security/oscp/writeups/thm/ctf/razorblack.md)
