Automating Hack The Box 'Editor' with an LLM-driven n8n Agent
A technical writeup demonstrating how an LLM-driven n8n workflow can fully enumerate and exploit HTB machines end-to-end, chaining reconnaissance, exploit selection, shell stabilization, and flag extraction—while highlighting the reliability, safety, and ethics considerations for automated red team operations.