Skip to content
View kOaDT's full-sized avatar

Block or report kOaDT

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kOaDT/README.md

AppSec & Software Developer

Header

Website   TryHackMe   Root-Me


CVE Discoveries (1)
CVE Score Date Description
CVE-2026-32255 8.6 2026-03-19 Kan is an open-source project management tool. In versions 0.5.4 and below, the /api/download/attatchment endpoint has no authentication and no URL validation. The Attachment Download endpoint accepts a user-supplied URL query parameter and passes it directly to fetch() server-side, and returns the full response body. An unauthenticated attacker can use this to make HTTP requests from the server to internal services, cloud metadata endpoints, or private network resources. This issue has been fixed in version 0.5.5. To workaround this issue, block or restrict access to /api/download/attatchment at the reverse proxy level (nginx, Cloudflare, etc.).
CVE Proof of Concepts (3)
CVE Description 🍴 👁️ 📥
CVE-2025-55182 This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell. 12 3 3393 338
CVE-2025-29927 This repository contains a POC and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in middleware. 5 3 1035 183
CVE-2026-32255 This repository contains a proof of concept (POC) for CVE-2026-32255, a high-severity Server-Side Request Forgery (SSRF) vulnerability in Kan, an open-source project management tool. 2 - 172 98
Projects (4)
Project Description 🍴 👁️ 📥
oss-oopssec-store The first security CTF lab built with React and Next.js. Open you browser and start hacking. 11 27 2280 10340
cyber-bot Threat intelligence platform: RSS aggregation, NVD CVE tracking, ENISA EUVD, databreaches, ... 3 1 143431 355
hate-crimes-map This project aims to visualize hate crime data to bring visibility to crimes that are often invisible or normalized by society. 3 - 20 15
crack-hash A fast, multi-threaded hash cracking tool written in Rust. This tool performs dictionary attacks against hashed passwords. 2 - 19 8
OSS Contributions (10)
Repository Description 🍴
usebruno/bruno Opensource IDE For Exploring and Testing API's (lightweight alternative to Postman/Insomnia) 42042 2223
infoslack/awesome-web-hacking A list of web application security 6824 1277
kanbn/kan The open source Trello alternative. 4546 294
OWASP/www-project-vulnerable-web-applications-directory The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available. 82 45
lingdojo/kana-dojo Aesthetic, minimalist platform for learning Japanese inspired by Duolingo and Monkeytype, built with Next.js and sponsored by Vercel. Beginner-friendly with plenty of good first issues - all contributions are welcome! 1940 1216
fabionoth/awesome-cyber-security A collection of awesome software, libraries, documents, books, resources and cools stuffs about security. 1827 248
vavkamil/awesome-vulnerable-apps Awesome Vulnerable Applications 1377 211
kaiiyer/awesome-vulnerable A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB. 1273 209
okhosting/awesome-cyber-security A curated list of cyber security resources and tools. 478 68
secnotes/awesome-cybersecurity A collection of awesome github repositories about security 71 6
Github Metrics

TryHackMe Stats
Global Rank Top Streak
#15486 1% 586 days
TryHackMe Badges (46)
  • Networking NerdCompleting the 'Network Fundamentals' module
  • 7 Day StreakAchieving a 7 day hacking streak
  • WebbedUnderstands how the world wide web works
  • World Wide WebCompleting the 'How The Web Works' module
  • cat linux.txtBeing competent in Linux
  • 30 Day StreakHacking for 30 days solid
  • OWASP Top 10Understanding every OWASP vulnerability
  • Hash CrackerCracking all those hashes
  • MetasploitableContains the knowledge to use Metasploit
  • BlueHacking into Windows via EternalBlue
  • Cyber ReadyUnderstanding impact of training on teams
  • Sword ApprenticeCompleting the SQLMap room
  • Shield ApprenticeCompleting the FlareVM room
  • 90 Day StreakHacking for 90 days in a row
  • Linux PrivEscMastering Linux Privilege Escalation
  • Pentesting PrinciplesCompleting the 'Introduction to Pentesting' module
  • Intro to Web HackingCompleting the 'Introduction to Web Hacking' module
  • Advent of Cyber 2024Completing Advent of Cyber 2024!
  • Burp'edCompleting the Burp Suite module
  • 180 Day StreakHacking for 180 days in a row
  • Authentication StrikerUsed the Hammer to bypass authentication
  • SQL SlayerConquered Advanced SQL Injection
  • System SnifferCompleted the File Path traversal room
  • OhSINTCompleting the OhSINT room
  • Client-Side ChampSuccessfully exploited client-side vulnerabilities
  • Introduction to Security EngineeringCompleted the Security Engineer Intro room!
  • Calculated Risk — _Completed the Risk Management room! _
  • 3 Day StreakAchieving a 3 day hacking streak
  • Network and System SecurityFinished the Auditing and Monitoring room!
  • Software Security — _Completed the OWASP API Security Top 10 rooms! _
  • 365 Day StreakHacking for 365 days in a row
  • The Course AwakensFinishing the first room in the DevSecOps path!
  • Just have to deal with it — _Successfully managed a cyber crisis! _
  • Raffle RoyaltyParticipating in Hack2Win 2025!
  • /opt/m0th3rFinishing Mother’s Secret!
  • Skilled NavigatorFinishing the Eviction challenge!
  • First Step into SOCExplored emerging threats and SOC response
  • SOC ApprenticeExplored how a SOC team operates from inside
  • First alert closedClosing your first alert
  • First scenario completedCompleting your first scenario
  • 100% true positive rateAchieving 100% true positive rate in a scenario
  • 500 Day StreakHacking for 500 days in a row
  • Tooling SpecialistAdept in creating custom offensive tooling
  • Advent of Cyber 2025Completing Advent of Cyber 2025!
  • Model CompromiseCompleted the LLM Attacks Module
  • Session HeldCompleting 4 weekly missions in a row!
TryHackMe Completed Rooms (300)
# Room Difficulty
1 Crack the hash easy
2 Pickle Rick easy
3 Blue easy
4 OhSINT easy
5 Basic Pentesting easy
6 Vulnversity easy
7 Simple CTF easy
8 Kenobi easy
9 tmux easy
10 Steel Mountain easy
11 Hacking with PowerShell easy
12 Agent Sudo easy
13 LazyAdmin easy
14 Introductory Networking easy
15 Common Linux Privesc easy
16 Google Dorking easy
17 Network Services easy
18 Introductory Researching easy
19 What the Shell? easy
20 Hashing - Crypto 101 medium
21 Linux PrivEsc medium
22 Upload Vulnerabilities easy
23 Encryption - Crypto 101 medium
24 Bounty Hacker easy
25 OWASP Juice Shop easy
26 NIS - Linux Part I easy
27 Overpass easy
28 Network Services 2 easy
29 RootMe easy
30 Tutorial easy
31 MITRE medium
32 Starting Out In Cyber Sec easy
33 Nmap easy
34 Introduction to Flask easy
35 John the Ripper: The Basics easy
36 Cryptography for Dummies easy
37 How to use TryHackMe easy
38 Linux Fundamentals Part 1 info
39 Linux Fundamentals Part 2 info
40 How Websites Work easy
41 Linux Fundamentals Part 3 info
42 Putting it all together easy
43 DNS in Detail easy
44 HTTP in Detail easy
45 Windows Fundamentals 1 info
46 Windows Fundamentals 2 info
47 Learn and win prizes info
48 What is Networking? info
49 Intro to LAN info
50 OSI Model info
51 Packets & Frames info
52 Extending Your Network info
53 Learning Cyber Security easy
54 Windows Fundamentals 3 info
55 Linux Privilege Escalation medium
56 Walking An Application easy
57 Pentesting Fundamentals easy
58 Principles of Security info
59 Metasploit: Exploitation easy
60 Content Discovery easy
61 Subdomain Enumeration easy
62 Authentication Bypass easy
63 Junior Security Analyst Intro easy
64 Passive Reconnaissance easy
65 Active Reconnaissance easy
66 Nmap Live Host Discovery medium
67 Nmap Basic Port Scans easy
68 Nmap Advanced Port Scans medium
69 Metasploit: Introduction easy
70 IDOR easy
71 Vulnerabilities 101 easy
72 Metasploit: Meterpreter easy
73 Intro to SSRF easy
74 Pyramid Of Pain easy
75 Intro to Cross-site Scripting easy
76 Nmap Post Port Scans medium
77 Cyber Kill Chain easy
78 Diamond Model easy
79 Vulnerability Capstone easy
80 Exploit Vulnerabilities easy
81 Protocols and Servers easy
82 SQL Injection medium
83 Command Injection easy
84 Net Sec Challenge medium
85 File Inclusion medium
86 Protocols and Servers 2 medium
87 Red Team Fundamentals easy
88 Pwnkit: CVE-2021-4034 info
89 Threat Intelligence Tools easy
90 Intro to Digital Forensics easy
91 Introduction to DevSecOps medium
92 Operating System Security easy
93 Offensive Security Intro easy
94 Lo-Fi easy
95 Network Security easy
96 Web Application Security easy
97 Unified Kill Chain easy
98 Spring4Shell: CVE-2022-22965 info
99 Defensive Security Intro easy
100 SSDLC medium
101 Security Operations easy
102 Careers in Cyber info
103 Windows Privilege Escalation medium
104 Wireshark: The Basics easy
105 Intro to Cyber Threat Intel easy
106 Introduction to SIEM easy
107 Active Directory Basics easy
108 Microsoft Windows Hardening easy
109 Security Principles easy
110 Atlassian CVE-2022-26134 easy
111 Secure Network Architecture medium
112 Active Directory Hardening medium
113 Introduction to Cryptography medium
114 Network Security Protocols medium
115 OWASP API Security Top 10 - 2 medium
116 OWASP API Security Top 10 - 1 medium
117 Intro to Cloud Security easy
118 Linux System Hardening medium
119 Virtualization and Containers easy
120 Vulnerability Management medium
121 DAST medium
122 Weaponizing Vulnerabilities medium
123 Identity and Access Management easy
124 Network Device Hardening medium
125 Threat Modelling medium
126 Governance & Regulation easy
127 Mother's Secret easy
128 Security Engineer Intro easy
129 SAST medium
130 Risk Management easy
131 Logging for Accountability easy
132 Traverse easy
133 Auditing and Monitoring easy
134 Intro to IR and IM easy
135 Becoming a First Responder info
136 Cyber Crisis Management easy
137 W1seGuy easy
138 Burp Suite: The Basics info
139 Burp Suite: Repeater info
140 Burp Suite: Intruder medium
141 Burp Suite: Other Modules easy
142 Burp Suite: Extensions easy
143 Eviction easy
144 Summit easy
145 Light easy
146 HTTP Request Smuggling easy
147 The Witch's Cauldron easy
148 Confluence CVE-2023-22515 easy
149 SSRF medium
150 Become a Hacker easy
151 The Sticker Shop easy
152 File Inclusion, Path Traversal medium
153 CSRF medium
154 XSS easy
155 CORS & SOP easy
156 Prototype Pollution medium
157 Snyk Open Source easy
158 Include medium
159 Moniker Link (CVE-2024-21413) easy
160 Snyk Code easy
161 Race Conditions medium
162 LDAP Injection easy
163 Whats Your Name? medium
164 DOM-Based Attacks easy
165 XXE Injection medium
166 Insecure Deserialisation medium
167 Windows Command Line easy
168 Search Skills easy
169 Server-side Template Injection medium
170 JWT Security easy
171 Nmap: The Basics easy
172 Networking Concepts easy
173 Tcpdump: The Basics easy
174 Networking Essentials easy
175 Networking Core Protocols easy
176 Networking Secure Protocols easy
177 Advanced SQL Injection medium
178 Incident Response Fundamentals easy
179 ORM Injection medium
180 NoSQL Injection easy
181 Logs Fundamentals easy
182 Enumeration & Brute Force easy
183 SOC Fundamentals easy
184 Digital Forensics Fundamentals easy
185 Session Management easy
186 Injectics medium
187 Firewall Fundamentals easy
188 OAuth Vulnerabilities medium
189 IDS Fundamentals easy
190 Multi-Factor Authentication easy
191 Vulnerability Scanner Overview easy
192 Hammer medium
193 CyberChef: The Basics easy
194 Public Key Cryptography Basics easy
195 Cryptography Basics easy
196 Hashing Basics easy
197 CAPA: The Basics easy
198 Windows PowerShell easy
199 FlareVM: Arsenal of Tools easy
200 REMnux: Getting Started easy
201 Linux Shells easy
202 Length Extension Attacks medium
203 Insecure Randomness easy
204 Gobuster: The Basics easy
205 Training Impact on Teams info
206 SQLMap: The Basics easy
207 Advent of Cyber 2024 easy
208 JavaScript Essentials easy
209 Web Application Basics easy
210 SQL Fundamentals easy
211 Shells Overview easy
212 Padding Oracles medium
213 Breaking Crypto the Simple Way easy
214 Custom Tooling Using Python easy
215 Custom Tooling using Burp hard
216 Tooling via Browser Automation easy
217 SOC L1 Alert Triage easy
218 SOC L1 Alert Reporting easy
219 SOC Workbooks and Lookups easy
220 Attacking ECB Oracles hard
221 Next.js: CVE-2025-29927 easy
222 SOC Metrics and Objectives easy
223 CAPTCHApocalypse medium
224 Offensive Security Intro easy
225 Erlang/OTP SSH: CVE-2025-32433 easy
226 Writing Pentest Reports easy
227 Extract hard
228 Cipher's Secret Message easy
229 Evil-GPT easy
230 Evil-GPT v2 easy
231 Sequence medium
232 Roundcube: CVE-2025-49113 easy
233 Chaining Vulnerabilities easy
234 Voyage medium
235 Humans as Attack Vectors easy
236 Systems as Attack Vectors easy
237 SOC Role in Blue Team easy
238 Defensive Security Intro easy
239 Hack2Win: How you can grab extra tickets info
240 Introduction to EDR easy
241 Input Manipulation & Prompt Injection easy
242 Data Integrity & Model Poisoning medium
243 LLM Output Handling and Privacy Risks easy
244 IDOR - Santa’s Little IDOR medium
245 Obfuscation - The Egg Shell File medium
246 XSS - Merry XSSMas easy
247 Passwords - A Cracking Christmas easy
248 SOC Alert Triaging - Tinsel Triage medium
249 Splunk Basics - Did you SIEM? medium
250 Phishing - Merry Clickmas easy
251 Prompt Injection - Sched-yule conflict easy
252 Linux CLI - Shells Bells easy
253 YARA Rules - YARA mean one! medium
254 Forensics - Registry Furensics medium
255 Exploitation with cURL - Hoperation Eggsploit easy
256 ICS/Modbus - Claus for Concern medium
257 Race Conditions - Toy to The World easy
258 Network Discovery - Scan-ta Clause easy
259 Containers - DoorDasher's Demise medium
260 CyberChef - Hoperation Save McSkidy medium
261 Phishing - Phishmas Greetings medium
262 AI in Security - old sAInt nick easy
263 Malware Analysis - Malhare.exe easy
264 C2 Detection - Command & Carol medium
265 AWS Security - S3cret Santa easy
266 Malware Analysis - Egg-xecutable medium
267 Web Attack Forensics - Drone Alone medium
268 Cloud Security Pitfalls easy
269 Juicy medium
270 Advent of Cyber Prep Track easy
271 OWASP Top 10 2025: Insecure Data Handling easy
272 Django: CVE-2025-64459 easy
273 WAF: Introduction easy
274 BankGPT easy
275 HealthGPT easy
276 React2Shell: CVE-2025-55182 easy
277 Virtualisation Basics easy
278 Operating Systems: Introduction easy
279 Linux CLI Basics easy
280 Data Representation easy
281 Data Encoding easy
282 JavaScript: Simple Demo medium
283 Python: Simple Demo easy
284 Windows Basics easy
285 Cloud Computing Fundamentals easy
286 Windows CLI Basics easy
287 The CIA Triad easy
288 Database SQL Basics easy
289 Cryptography Concepts easy
290 Client-Server Basics easy
291 Become a Hacker easy
292 Become a Defender easy
293 n8n: CVE-2025-68613 easy
294 Offensive Security Intro easy
295 Inside a Computer System easy
296 GeoServer: CVE-2025-58360 medium
297 Offensive Security Intro easy
298 Defensive Security Intro info
299 Computer Types easy
300 Defensive Security Intro info
Certificates (118)

Pinned Loading

  1. oss-oopssec-store oss-oopssec-store Public

    The first security CTF lab built with React and Next.js. Open you browser and start hacking.

    TypeScript 11 27

  2. OWASP/www-project-vulnerable-web-applications-directory OWASP/www-project-vulnerable-web-applications-directory Public

    The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

    JavaScript 82 45

  3. poc-cve-2025-55182 poc-cve-2025-55182 Public

    This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell.

    TypeScript 12 3

  4. kanbn/kan kanbn/kan Public

    The open source Trello alternative.

    TypeScript 4.5k 296

  5. poc-cve-2025-29927 poc-cve-2025-29927 Public

    This repository contains a proof of concept (POC) and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in m…

    JavaScript 5 3

  6. poc-cve-2026-32255 poc-cve-2026-32255 Public

    This repository contains a proof of concept (POC) for CVE-2026-32255, a high-severity Server-Side Request Forgery (SSRF) vulnerability in Kan, an open-source project management tool.

    Shell 2