user-hoodieOffensive

You can just google:

  • NAME-MACHINE walkthrough

  • NAME-MACHINE writeup

Examples:

Guides on writing pentesting reports: Hack the Boxarrow-up-right.

Example ​of pentesting report: TCM Securityarrow-up-right.arrow-up-right

Writeups, disclosure/reports: PentesterLandarrow-up-right, HackerOne reportsarrow-up-right.

Last updated