Skip to content
View kOaDT's full-sized avatar

Block or report kOaDT

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kOaDT/README.md

AppSec & Software Developer

Header

Website   TryHackMe   Root-Me


TryHackMe

Global Rank Top Streak
#15500 1% 583 days

CVE Discoveries

CVE Score Date Description
CVE-2026-32255 8.6 2026-03-18 Kan is an open-source project management tool. In versions 0.5.4 and below, the /api/download/attatchment endpoint has no authentication and no URL validation. The Attachment Download endpoint accepts a user-supplied URL query parameter and passes it directly to fetch() server-side, and returns the full response body. An unauthenticated attacker can use this to make HTTP requests from the server to internal services, cloud metadata endpoints, or private network resources. This issue has been fixed in version 0.5.5. To workaround this issue, block or restrict access to /api/download/attatchment at the reverse proxy level (nginx, Cloudflare, etc.).

CVE Proof of Concepts

CVE Description 🍴 👁️ 📥
CVE-2025-55182 This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell. 12 3 3355 333
CVE-2025-29927 This repository contains a POC and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in middleware. 5 3 1022 176

Projects

Project Description 🍴 👁️ 📥
oss-oopssec-store The first security CTF lab built with React and Next.js. Open you browser and start hacking. 11 27 2224 8843
cyber-bot Threat intelligence platform: RSS aggregation, NVD CVE tracking, ENISA EUVD, databreaches, ... 3 1 177 353
hate-crimes-map This project aims to visualize hate crime data to bring visibility to crimes that are often invisible or normalized by society. 3 - 18 15
crack-hash A fast, multi-threaded hash cracking tool written in Rust. This tool performs dictionary attacks against hashed passwords. 2 - 17 8
OSS Contributions (10)
Repository Description 🍴
usebruno/bruno Opensource IDE For Exploring and Testing API's (lightweight alternative to Postman/Insomnia) 41949 2211
infoslack/awesome-web-hacking A list of web application security 6818 1277
kanbn/kan The open source Trello alternative. 4532 293
OWASP/www-project-vulnerable-web-applications-directory The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available. 82 45
lingdojo/kana-dojo Aesthetic, minimalist platform for learning Japanese inspired by Duolingo and Monkeytype, built with Next.js and sponsored by Vercel. Beginner-friendly with plenty of good first issues - all contributions are welcome! 1901 1160
fabionoth/awesome-cyber-security A collection of awesome software, libraries, documents, books, resources and cools stuffs about security. 1823 248
vavkamil/awesome-vulnerable-apps Awesome Vulnerable Applications 1376 211
kaiiyer/awesome-vulnerable A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB. 1271 208
okhosting/awesome-cyber-security A curated list of cyber security resources and tools. 478 68
secnotes/awesome-cybersecurity A collection of awesome github repositories about security 72 6
Certificates (118)
Github Metrics

TryHackMe Badges (46)
  • Networking NerdCompleting the 'Network Fundamentals' module
  • 7 Day StreakAchieving a 7 day hacking streak
  • WebbedUnderstands how the world wide web works
  • World Wide WebCompleting the 'How The Web Works' module
  • cat linux.txtBeing competent in Linux
  • 30 Day StreakHacking for 30 days solid
  • OWASP Top 10Understanding every OWASP vulnerability
  • Hash CrackerCracking all those hashes
  • MetasploitableContains the knowledge to use Metasploit
  • BlueHacking into Windows via EternalBlue
  • Cyber ReadyUnderstanding impact of training on teams
  • Sword ApprenticeCompleting the SQLMap room
  • Shield ApprenticeCompleting the FlareVM room
  • 90 Day StreakHacking for 90 days in a row
  • Linux PrivEscMastering Linux Privilege Escalation
  • Pentesting PrinciplesCompleting the 'Introduction to Pentesting' module
  • Intro to Web HackingCompleting the 'Introduction to Web Hacking' module
  • Advent of Cyber 2024Completing Advent of Cyber 2024!
  • Burp'edCompleting the Burp Suite module
  • 180 Day StreakHacking for 180 days in a row
  • Authentication StrikerUsed the Hammer to bypass authentication
  • SQL SlayerConquered Advanced SQL Injection
  • System SnifferCompleted the File Path traversal room
  • OhSINTCompleting the OhSINT room
  • Client-Side ChampSuccessfully exploited client-side vulnerabilities
  • Introduction to Security EngineeringCompleted the Security Engineer Intro room!
  • Calculated Risk — _Completed the Risk Management room! _
  • 3 Day StreakAchieving a 3 day hacking streak
  • Network and System SecurityFinished the Auditing and Monitoring room!
  • Software Security — _Completed the OWASP API Security Top 10 rooms! _
  • 365 Day StreakHacking for 365 days in a row
  • The Course AwakensFinishing the first room in the DevSecOps path!
  • Just have to deal with it — _Successfully managed a cyber crisis! _
  • Raffle RoyaltyParticipating in Hack2Win 2025!
  • /opt/m0th3rFinishing Mother’s Secret!
  • Skilled NavigatorFinishing the Eviction challenge!
  • First Step into SOCExplored emerging threats and SOC response
  • SOC ApprenticeExplored how a SOC team operates from inside
  • First alert closedClosing your first alert
  • First scenario completedCompleting your first scenario
  • 100% true positive rateAchieving 100% true positive rate in a scenario
  • 500 Day StreakHacking for 500 days in a row
  • Tooling SpecialistAdept in creating custom offensive tooling
  • Advent of Cyber 2025Completing Advent of Cyber 2025!
  • Model CompromiseCompleted the LLM Attacks Module
  • Session HeldCompleting 4 weekly missions in a row!
TryHackMe Completed Rooms (298)
# Room Difficulty
1 Crack the hash easy
2 Pickle Rick easy
3 Blue easy
4 OhSINT easy
5 Basic Pentesting easy
6 Vulnversity easy
7 Simple CTF easy
8 Kenobi easy
9 tmux easy
10 Steel Mountain easy
11 Hacking with PowerShell easy
12 Agent Sudo easy
13 LazyAdmin easy
14 Introductory Networking easy
15 Common Linux Privesc easy
16 Google Dorking easy
17 Network Services easy
18 Introductory Researching easy
19 What the Shell? easy
20 Hashing - Crypto 101 medium
21 Linux PrivEsc medium
22 Upload Vulnerabilities easy
23 Encryption - Crypto 101 medium
24 Bounty Hacker easy
25 OWASP Juice Shop easy
26 NIS - Linux Part I easy
27 Overpass easy
28 Network Services 2 easy
29 RootMe easy
30 Tutorial easy
31 MITRE medium
32 Starting Out In Cyber Sec easy
33 Nmap easy
34 Introduction to Flask easy
35 John the Ripper: The Basics easy
36 Cryptography for Dummies easy
37 Linux Fundamentals Part 1 info
38 Linux Fundamentals Part 2 info
39 How Websites Work easy
40 Linux Fundamentals Part 3 info
41 Putting it all together easy
42 DNS in Detail easy
43 HTTP in Detail easy
44 Windows Fundamentals 1 info
45 Windows Fundamentals 2 info
46 What is Networking? info
47 Intro to LAN info
48 OSI Model info
49 Packets & Frames info
50 Extending Your Network info
51 Learning Cyber Security easy
52 Windows Fundamentals 3 info
53 Linux Privilege Escalation medium
54 Walking An Application easy
55 Pentesting Fundamentals easy
56 Principles of Security info
57 Metasploit: Exploitation easy
58 Content Discovery easy
59 Subdomain Enumeration easy
60 Authentication Bypass easy
61 Junior Security Analyst Intro easy
62 Passive Reconnaissance easy
63 Active Reconnaissance easy
64 Nmap Live Host Discovery medium
65 Nmap Basic Port Scans easy
66 Nmap Advanced Port Scans medium
67 Metasploit: Introduction easy
68 IDOR easy
69 Vulnerabilities 101 easy
70 Metasploit: Meterpreter easy
71 Intro to SSRF easy
72 Pyramid Of Pain easy
73 Intro to Cross-site Scripting easy
74 Nmap Post Port Scans medium
75 Cyber Kill Chain easy
76 Diamond Model easy
77 Vulnerability Capstone easy
78 Exploit Vulnerabilities easy
79 Protocols and Servers easy
80 SQL Injection medium
81 Command Injection easy
82 Net Sec Challenge medium
83 File Inclusion medium
84 Protocols and Servers 2 medium
85 Red Team Fundamentals easy
86 Pwnkit: CVE-2021-4034 info
87 Threat Intelligence Tools easy
88 Intro to Digital Forensics easy
89 Introduction to DevSecOps medium
90 Operating System Security easy
91 Offensive Security Intro easy
92 Lo-Fi easy
93 Network Security easy
94 Web Application Security easy
95 Unified Kill Chain easy
96 Spring4Shell: CVE-2022-22965 info
97 Defensive Security Intro easy
98 SSDLC medium
99 Security Operations easy
100 Careers in Cyber info
101 Windows Privilege Escalation medium
102 Wireshark: The Basics easy
103 Intro to Cyber Threat Intel easy
104 Introduction to SIEM easy
105 Active Directory Basics easy
106 Microsoft Windows Hardening easy
107 Security Principles easy
108 Atlassian CVE-2022-26134 easy
109 Secure Network Architecture medium
110 Active Directory Hardening medium
111 Introduction to Cryptography medium
112 Network Security Protocols medium
113 OWASP API Security Top 10 - 2 medium
114 OWASP API Security Top 10 - 1 medium
115 Intro to Cloud Security easy
116 Linux System Hardening medium
117 Virtualization and Containers easy
118 Vulnerability Management medium
119 DAST medium
120 Weaponizing Vulnerabilities medium
121 Identity and Access Management easy
122 Network Device Hardening medium
123 Threat Modelling medium
124 Governance & Regulation easy
125 Mother's Secret easy
126 Security Engineer Intro easy
127 SAST medium
128 Risk Management easy
129 Logging for Accountability easy
130 Traverse easy
131 Auditing and Monitoring easy
132 Intro to IR and IM easy
133 Becoming a First Responder info
134 Cyber Crisis Management easy
135 W1seGuy easy
136 Burp Suite: The Basics info
137 Burp Suite: Repeater info
138 Burp Suite: Intruder medium
139 Burp Suite: Other Modules easy
140 Burp Suite: Extensions easy
141 Eviction easy
142 Summit easy
143 Light easy
144 HTTP Request Smuggling easy
145 The Witch's Cauldron easy
146 Confluence CVE-2023-22515 easy
147 SSRF medium
148 Become a Hacker easy
149 The Sticker Shop easy
150 File Inclusion, Path Traversal medium
151 CSRF medium
152 XSS easy
153 CORS & SOP easy
154 Prototype Pollution medium
155 Snyk Open Source easy
156 Include medium
157 Moniker Link (CVE-2024-21413) easy
158 Snyk Code easy
159 Race Conditions medium
160 LDAP Injection easy
161 Whats Your Name? medium
162 DOM-Based Attacks easy
163 XXE Injection medium
164 Insecure Deserialisation medium
165 Windows Command Line easy
166 Search Skills easy
167 Server-side Template Injection medium
168 JWT Security easy
169 Nmap: The Basics easy
170 Networking Concepts easy
171 Tcpdump: The Basics easy
172 Networking Essentials easy
173 Networking Core Protocols easy
174 Networking Secure Protocols easy
175 Advanced SQL Injection medium
176 Incident Response Fundamentals easy
177 ORM Injection medium
178 NoSQL Injection easy
179 Logs Fundamentals easy
180 Enumeration & Brute Force easy
181 SOC Fundamentals easy
182 Digital Forensics Fundamentals easy
183 Session Management easy
184 Injectics medium
185 Firewall Fundamentals easy
186 OAuth Vulnerabilities medium
187 IDS Fundamentals easy
188 Multi-Factor Authentication easy
189 Vulnerability Scanner Overview easy
190 Hammer medium
191 CyberChef: The Basics easy
192 Public Key Cryptography Basics easy
193 Cryptography Basics easy
194 Hashing Basics easy
195 CAPA: The Basics easy
196 Windows PowerShell easy
197 FlareVM: Arsenal of Tools easy
198 REMnux: Getting Started easy
199 Linux Shells easy
200 Length Extension Attacks medium
201 Insecure Randomness easy
202 Gobuster: The Basics easy
203 Training Impact on Teams info
204 SQLMap: The Basics easy
205 Advent of Cyber 2024 easy
206 JavaScript Essentials easy
207 Web Application Basics easy
208 SQL Fundamentals easy
209 Shells Overview easy
210 Padding Oracles medium
211 Breaking Crypto the Simple Way easy
212 Custom Tooling Using Python easy
213 Custom Tooling using Burp hard
214 Tooling via Browser Automation easy
215 SOC L1 Alert Triage easy
216 SOC L1 Alert Reporting easy
217 SOC Workbooks and Lookups easy
218 Attacking ECB Oracles hard
219 Next.js: CVE-2025-29927 easy
220 SOC Metrics and Objectives easy
221 CAPTCHApocalypse medium
222 Offensive Security Intro easy
223 Erlang/OTP SSH: CVE-2025-32433 easy
224 Writing Pentest Reports easy
225 Extract hard
226 Cipher's Secret Message easy
227 Evil-GPT easy
228 Evil-GPT v2 easy
229 Sequence medium
230 Roundcube: CVE-2025-49113 easy
231 Chaining Vulnerabilities easy
232 Voyage medium
233 Humans as Attack Vectors easy
234 Systems as Attack Vectors easy
235 SOC Role in Blue Team easy
236 Defensive Security Intro easy
237 Hack2Win: How you can grab extra tickets info
238 Introduction to EDR easy
239 Input Manipulation & Prompt Injection easy
240 Data Integrity & Model Poisoning medium
241 LLM Output Handling and Privacy Risks easy
242 IDOR - Santa’s Little IDOR medium
243 Obfuscation - The Egg Shell File medium
244 XSS - Merry XSSMas easy
245 Passwords - A Cracking Christmas easy
246 SOC Alert Triaging - Tinsel Triage medium
247 Splunk Basics - Did you SIEM? medium
248 Phishing - Merry Clickmas easy
249 Prompt Injection - Sched-yule conflict easy
250 Linux CLI - Shells Bells easy
251 YARA Rules - YARA mean one! medium
252 Forensics - Registry Furensics medium
253 Exploitation with cURL - Hoperation Eggsploit easy
254 ICS/Modbus - Claus for Concern medium
255 Race Conditions - Toy to The World easy
256 Network Discovery - Scan-ta Clause easy
257 Containers - DoorDasher's Demise medium
258 CyberChef - Hoperation Save McSkidy medium
259 Phishing - Phishmas Greetings medium
260 AI in Security - old sAInt nick easy
261 Malware Analysis - Malhare.exe easy
262 C2 Detection - Command & Carol medium
263 AWS Security - S3cret Santa easy
264 Malware Analysis - Egg-xecutable medium
265 Web Attack Forensics - Drone Alone medium
266 Cloud Security Pitfalls easy
267 Juicy medium
268 Advent of Cyber Prep Track easy
269 OWASP Top 10 2025: Insecure Data Handling easy
270 Django: CVE-2025-64459 easy
271 WAF: Introduction easy
272 BankGPT easy
273 HealthGPT easy
274 React2Shell: CVE-2025-55182 easy
275 Virtualisation Basics easy
276 Operating Systems: Introduction easy
277 Linux CLI Basics easy
278 Data Representation easy
279 Data Encoding easy
280 JavaScript: Simple Demo medium
281 Python: Simple Demo easy
282 Windows Basics easy
283 Cloud Computing Fundamentals easy
284 Windows CLI Basics easy
285 The CIA Triad easy
286 Database SQL Basics easy
287 Cryptography Concepts easy
288 Client-Server Basics easy
289 Become a Hacker easy
290 Become a Defender easy
291 n8n: CVE-2025-68613 easy
292 Offensive Security Intro easy
293 Inside a Computer System easy
294 GeoServer: CVE-2025-58360 medium
295 Offensive Security Intro easy
296 Defensive Security Intro info
297 Computer Types easy
298 Defensive Security Intro info

Pinned Loading

  1. oss-oopssec-store oss-oopssec-store Public

    The first security CTF lab built with React and Next.js. Open you browser and start hacking.

    TypeScript 11 27

  2. OWASP/www-project-vulnerable-web-applications-directory OWASP/www-project-vulnerable-web-applications-directory Public

    The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

    JavaScript 82 45

  3. poc-cve-2025-55182 poc-cve-2025-55182 Public

    This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell.

    TypeScript 12 3

  4. kanbn/kan kanbn/kan Public

    The open source Trello alternative.

    TypeScript 4.5k 294

  5. poc-cve-2025-29927 poc-cve-2025-29927 Public

    This repository contains a proof of concept (POC) and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in m…

    JavaScript 5 3

  6. poc-cve-2026-32255 poc-cve-2026-32255 Public

    This repository contains a proof of concept (POC) for CVE-2026-32255, a high-severity Server-Side Request Forgery (SSRF) vulnerability in Kan, an open-source project management tool.

    Shell 2