# Boxes/ Machines

- [Try Hack Me](/pentesting-quick-reference/boxes-machines/try-hack-me.md)
- [Vulnversity](/pentesting-quick-reference/boxes-machines/try-hack-me/vulnversity.md)
- [Basic Pentesting](/pentesting-quick-reference/boxes-machines/try-hack-me/basic-pentesting.md)
- [Kenobi](/pentesting-quick-reference/boxes-machines/try-hack-me/kenobi.md)
- [Steel Mountain](/pentesting-quick-reference/boxes-machines/try-hack-me/steel-mountain.md): Windows box, HFS
- [Malware Analysis](/pentesting-quick-reference/boxes-machines/try-hack-me/malware-analysis.md)
- [Summit](/pentesting-quick-reference/boxes-machines/try-hack-me/malware-analysis/summit.md): Summit tryhackme basic Malware Analysis room walkthrough
- [Telnet](/pentesting-quick-reference/boxes-machines/try-hack-me/telnet.md): https://tryhackme.com/jr/telnetcve2026
- [Vulnhub](/pentesting-quick-reference/boxes-machines/vulnhub.md)
- [Tiki](/pentesting-quick-reference/boxes-machines/vulnhub/tiki.md)
- [HTB](/pentesting-quick-reference/boxes-machines/htb.md)
- [Beep](/pentesting-quick-reference/boxes-machines/htb/beep.md): Beep HTB walkthrough 2023 tested on Kali. Beep has a very large list of running services, which can make it a bit challenging to find the correct entry method.
- [Active](/pentesting-quick-reference/boxes-machines/htb/active.md): Active HTB Machine walkthrough 2023. Active directory Basics.
- [Forest](/pentesting-quick-reference/boxes-machines/htb/forest.md): Forest HTB 2023 Walkthrough
- [Devel](/pentesting-quick-reference/boxes-machines/htb/devel.md): Devel HTB 2023 Walkthrough. Devel is relatively simple Windows machine and demonstrates the security risks associated with some default program configurations.
- [Metasploitable 2](/pentesting-quick-reference/boxes-machines/metasploitable-2.md): Metasploitable 2 is a purposely vulnerable virtual machine that is designed for security testing, training, and educational purposes. Here, we have complete walkthrough of the machine.
- [PWN.COLLEGE Talking Web](/pentesting-quick-reference/boxes-machines/pwn.college-talking-web.md): Complete solutions for Talking web pwn college. Complete writeup of all challenges
- [PWN COLLGE Web Hacking](/pentesting-quick-reference/boxes-machines/pwn-collge-web-hacking.md): Web hacking dojo walkthrough pwn.college
- [INE](/pentesting-quick-reference/boxes-machines/ine.md)
- [Host & Network Penetration Testing: System-Host Based Attacks CTF 1](/pentesting-quick-reference/boxes-machines/ine/host-and-network-penetration-testing-system-host-based-attacks-ctf-1.md)
- [Host & Network Penetration Testing: System-Host Based Attacks CTF 2 - INE](/pentesting-quick-reference/boxes-machines/ine/host-and-network-penetration-testing-system-host-based-attacks-ctf-2-ine.md)
- [Host & Network Penetration Testing: Network-Based Attacks CTF 1](/pentesting-quick-reference/boxes-machines/ine/host-and-network-penetration-testing-network-based-attacks-ctf-1.md)
- [Host & Network Penetration Testing: The Metasploit Framework CTF 1](/pentesting-quick-reference/boxes-machines/ine/host-and-network-penetration-testing-the-metasploit-framework-ctf-1.md)
- [Host & Network Penetration Testing: The Metasploit Framework CTF 2](/pentesting-quick-reference/boxes-machines/ine/host-and-network-penetration-testing-the-metasploit-framework-ctf-2.md)
- [Host & Network Penetration Testing: Exploitation CTF 1](/pentesting-quick-reference/boxes-machines/ine/host-and-network-penetration-testing-exploitation-ctf-1.md)
- [Host & Network Penetration Testing: Exploitation CTF 2](/pentesting-quick-reference/boxes-machines/ine/host-and-network-penetration-testing-exploitation-ctf-2.md)
- [Host & Network Penetration Testing: Exploitation CTF 3](/pentesting-quick-reference/boxes-machines/ine/host-and-network-penetration-testing-exploitation-ctf-3.md)
- [Host & Network Penetration Testing: Post-Exploitation CTF 1](/pentesting-quick-reference/boxes-machines/ine/host-and-network-penetration-testing-post-exploitation-ctf-1.md)
- [Host & Network Penetration Testing: Post-Exploitation CTF 2](/pentesting-quick-reference/boxes-machines/ine/host-and-network-penetration-testing-post-exploitation-ctf-2.md)
