Skip to content
View kOaDT's full-sized avatar

Block or report kOaDT

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kOaDT/README.md

AppSec & Software Developer

Header

Website   TryHackMe   Root-Me


CVE Discoveries (1)
CVE Score Date Description
CVE-2026-32255 8.6 2026-03-19 Kan is an open-source project management tool. In versions 0.5.4 and below, the /api/download/attatchment endpoint has no authentication and no URL validation. The Attachment Download endpoint accepts a user-supplied URL query parameter and passes it directly to fetch() server-side, and returns the full response body. An unauthenticated attacker can use this to make HTTP requests from the server to internal services, cloud metadata endpoints, or private network resources. This issue has been fixed in version 0.5.5. To workaround this issue, block or restrict access to /api/download/attatchment at the reverse proxy level (nginx, Cloudflare, etc.).
CVE Proof of Concepts (3)
CVE Description 🍴 👁️ 📥
CVE-2025-55182 This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell. 12 3 3410 344
CVE-2025-29927 This repository contains a POC and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in middleware. 5 3 1052 189
CVE-2026-32255 This repository contains a proof of concept (POC) for CVE-2026-32255, a high-severity Server-Side Request Forgery (SSRF) vulnerability in Kan, an open-source project management tool. 2 - 282 126
Projects (4)
Project Description 🍴 👁️ 📥
oss-oopssec-store The first security CTF lab built with React and Next.js. Open you browser and start hacking. 11 27 2397 12135
cyber-bot Threat intelligence platform: RSS aggregation, NVD CVE tracking, ENISA EUVD, databreaches, ... 3 1 159796 436
hate-crimes-map This project aims to visualize hate crime data to bring visibility to crimes that are often invisible or normalized by society. 3 - 22 17
crack-hash A fast, multi-threaded hash cracking tool written in Rust. This tool performs dictionary attacks against hashed passwords. 2 - 21 9
OSS Contributions (10)
Repository Description 🍴
usebruno/bruno Opensource IDE For Exploring and Testing API's (lightweight alternative to Postman/Insomnia) 42101 2227
infoslack/awesome-web-hacking A list of web application security 6826 1277
kanbn/kan The open source Trello alternative. 4551 296
OWASP/www-project-vulnerable-web-applications-directory The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available. 82 45
lingdojo/kana-dojo Aesthetic, minimalist platform for learning Japanese inspired by Duolingo and Monkeytype, built with Next.js and sponsored by Vercel. Beginner-friendly with plenty of good first issues - all contributions are welcome! 1974 1269
fabionoth/awesome-cyber-security A collection of awesome software, libraries, documents, books, resources and cools stuffs about security. 1828 248
vavkamil/awesome-vulnerable-apps Awesome Vulnerable Applications 1378 211
kaiiyer/awesome-vulnerable A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB. 1276 209
okhosting/awesome-cyber-security A curated list of cyber security resources and tools. 478 69
secnotes/awesome-cybersecurity A collection of awesome github repositories about security 72 6
Github Metrics

TryHackMe Stats
Global Rank Top Streak
#15430 1% 588 days
TryHackMe Badges (46)
  • Networking NerdCompleting the 'Network Fundamentals' module
  • 7 Day StreakAchieving a 7 day hacking streak
  • WebbedUnderstands how the world wide web works
  • World Wide WebCompleting the 'How The Web Works' module
  • cat linux.txtBeing competent in Linux
  • 30 Day StreakHacking for 30 days solid
  • OWASP Top 10Understanding every OWASP vulnerability
  • Hash CrackerCracking all those hashes
  • MetasploitableContains the knowledge to use Metasploit
  • BlueHacking into Windows via EternalBlue
  • Cyber ReadyUnderstanding impact of training on teams
  • Sword ApprenticeCompleting the SQLMap room
  • Shield ApprenticeCompleting the FlareVM room
  • 90 Day StreakHacking for 90 days in a row
  • Linux PrivEscMastering Linux Privilege Escalation
  • Pentesting PrinciplesCompleting the 'Introduction to Pentesting' module
  • Intro to Web HackingCompleting the 'Introduction to Web Hacking' module
  • Advent of Cyber 2024Completing Advent of Cyber 2024!
  • Burp'edCompleting the Burp Suite module
  • 180 Day StreakHacking for 180 days in a row
  • Authentication StrikerUsed the Hammer to bypass authentication
  • SQL SlayerConquered Advanced SQL Injection
  • System SnifferCompleted the File Path traversal room
  • OhSINTCompleting the OhSINT room
  • Client-Side ChampSuccessfully exploited client-side vulnerabilities
  • Introduction to Security EngineeringCompleted the Security Engineer Intro room!
  • Calculated Risk — _Completed the Risk Management room! _
  • 3 Day StreakAchieving a 3 day hacking streak
  • Network and System SecurityFinished the Auditing and Monitoring room!
  • Software Security — _Completed the OWASP API Security Top 10 rooms! _
  • 365 Day StreakHacking for 365 days in a row
  • The Course AwakensFinishing the first room in the DevSecOps path!
  • Just have to deal with it — _Successfully managed a cyber crisis! _
  • Raffle RoyaltyParticipating in Hack2Win 2025!
  • /opt/m0th3rFinishing Mother’s Secret!
  • Skilled NavigatorFinishing the Eviction challenge!
  • First Step into SOCExplored emerging threats and SOC response
  • SOC ApprenticeExplored how a SOC team operates from inside
  • First alert closedClosing your first alert
  • First scenario completedCompleting your first scenario
  • 100% true positive rateAchieving 100% true positive rate in a scenario
  • 500 Day StreakHacking for 500 days in a row
  • Tooling SpecialistAdept in creating custom offensive tooling
  • Advent of Cyber 2025Completing Advent of Cyber 2025!
  • Model CompromiseCompleted the LLM Attacks Module
  • Session HeldCompleting 4 weekly missions in a row!
TryHackMe Completed Rooms (302)
# Room Difficulty
1 Crack the hash easy
2 Pickle Rick easy
3 Blue easy
4 OhSINT easy
5 Basic Pentesting easy
6 Vulnversity easy
7 Simple CTF easy
8 Kenobi easy
9 tmux easy
10 Steel Mountain easy
11 Hacking with PowerShell easy
12 Agent Sudo easy
13 LazyAdmin easy
14 Introductory Networking easy
15 Common Linux Privesc easy
16 Google Dorking easy
17 Network Services easy
18 Introductory Researching easy
19 What the Shell? easy
20 Hashing - Crypto 101 medium
21 Linux PrivEsc medium
22 Upload Vulnerabilities easy
23 Encryption - Crypto 101 medium
24 Bounty Hacker easy
25 OWASP Juice Shop easy
26 NIS - Linux Part I easy
27 Overpass easy
28 Network Services 2 easy
29 RootMe easy
30 Tutorial easy
31 Getting Started easy
32 MITRE medium
33 Starting Out In Cyber Sec easy
34 Nmap easy
35 Introduction to Flask easy
36 John the Ripper: The Basics easy
37 Cryptography for Dummies easy
38 How to use TryHackMe easy
39 Linux Fundamentals Part 1 info
40 Linux Fundamentals Part 2 info
41 How Websites Work easy
42 Linux Fundamentals Part 3 info
43 Putting it all together easy
44 DNS in Detail easy
45 HTTP in Detail easy
46 Windows Fundamentals 1 info
47 Windows Fundamentals 2 info
48 Learn and win prizes info
49 What is Networking? info
50 Intro to LAN info
51 OSI Model info
52 Packets & Frames info
53 Extending Your Network info
54 Learning Cyber Security easy
55 Windows Fundamentals 3 info
56 Linux Privilege Escalation medium
57 Walking An Application easy
58 Pentesting Fundamentals easy
59 Principles of Security info
60 Metasploit: Exploitation easy
61 Content Discovery easy
62 Subdomain Enumeration easy
63 Authentication Bypass easy
64 Junior Security Analyst Intro easy
65 Passive Reconnaissance easy
66 Active Reconnaissance easy
67 Nmap Live Host Discovery medium
68 Nmap Basic Port Scans easy
69 Nmap Advanced Port Scans medium
70 Metasploit: Introduction easy
71 IDOR easy
72 Vulnerabilities 101 easy
73 Metasploit: Meterpreter easy
74 Intro to SSRF easy
75 Pyramid Of Pain easy
76 Intro to Cross-site Scripting easy
77 Nmap Post Port Scans medium
78 Cyber Kill Chain easy
79 Diamond Model easy
80 Security Awareness info
81 Vulnerability Capstone easy
82 Exploit Vulnerabilities easy
83 Protocols and Servers easy
84 SQL Injection medium
85 Command Injection easy
86 Net Sec Challenge medium
87 File Inclusion medium
88 Protocols and Servers 2 medium
89 Red Team Fundamentals easy
90 Pwnkit: CVE-2021-4034 info
91 Threat Intelligence Tools easy
92 Intro to Digital Forensics easy
93 Introduction to DevSecOps medium
94 Operating System Security easy
95 Offensive Security Intro easy
96 Lo-Fi easy
97 Network Security easy
98 Web Application Security easy
99 Unified Kill Chain easy
100 Spring4Shell: CVE-2022-22965 info
101 Defensive Security Intro easy
102 SSDLC medium
103 Security Operations easy
104 Careers in Cyber info
105 Windows Privilege Escalation medium
106 Wireshark: The Basics easy
107 Intro to Cyber Threat Intel easy
108 Introduction to SIEM easy
109 Active Directory Basics easy
110 Microsoft Windows Hardening easy
111 Security Principles easy
112 Atlassian CVE-2022-26134 easy
113 Secure Network Architecture medium
114 Active Directory Hardening medium
115 Introduction to Cryptography medium
116 Network Security Protocols medium
117 OWASP API Security Top 10 - 2 medium
118 OWASP API Security Top 10 - 1 medium
119 Intro to Cloud Security easy
120 Linux System Hardening medium
121 Virtualization and Containers easy
122 Vulnerability Management medium
123 DAST medium
124 Weaponizing Vulnerabilities medium
125 Identity and Access Management easy
126 Network Device Hardening medium
127 Threat Modelling medium
128 Governance & Regulation easy
129 Mother's Secret easy
130 Security Engineer Intro easy
131 SAST medium
132 Risk Management easy
133 Logging for Accountability easy
134 Traverse easy
135 Auditing and Monitoring easy
136 Intro to IR and IM easy
137 Becoming a First Responder info
138 Cyber Crisis Management easy
139 W1seGuy easy
140 Burp Suite: The Basics info
141 Burp Suite: Repeater info
142 Burp Suite: Intruder medium
143 Burp Suite: Other Modules easy
144 Burp Suite: Extensions easy
145 Eviction easy
146 Summit easy
147 Light easy
148 HTTP Request Smuggling easy
149 The Witch's Cauldron easy
150 Confluence CVE-2023-22515 easy
151 SSRF medium
152 Become a Hacker easy
153 The Sticker Shop easy
154 File Inclusion, Path Traversal medium
155 CSRF medium
156 XSS easy
157 CORS & SOP easy
158 Prototype Pollution medium
159 Snyk Open Source easy
160 Include medium
161 Moniker Link (CVE-2024-21413) easy
162 Snyk Code easy
163 Race Conditions medium
164 LDAP Injection easy
165 Whats Your Name? medium
166 DOM-Based Attacks easy
167 XXE Injection medium
168 Insecure Deserialisation medium
169 Windows Command Line easy
170 Search Skills easy
171 Server-side Template Injection medium
172 JWT Security easy
173 Nmap: The Basics easy
174 Networking Concepts easy
175 Tcpdump: The Basics easy
176 Networking Essentials easy
177 Networking Core Protocols easy
178 Networking Secure Protocols easy
179 Advanced SQL Injection medium
180 Incident Response Fundamentals easy
181 ORM Injection medium
182 NoSQL Injection easy
183 Logs Fundamentals easy
184 Enumeration & Brute Force easy
185 SOC Fundamentals easy
186 Digital Forensics Fundamentals easy
187 Session Management easy
188 Injectics medium
189 Firewall Fundamentals easy
190 OAuth Vulnerabilities medium
191 IDS Fundamentals easy
192 Multi-Factor Authentication easy
193 Vulnerability Scanner Overview easy
194 Hammer medium
195 CyberChef: The Basics easy
196 Public Key Cryptography Basics easy
197 Cryptography Basics easy
198 Hashing Basics easy
199 CAPA: The Basics easy
200 Windows PowerShell easy
201 FlareVM: Arsenal of Tools easy
202 REMnux: Getting Started easy
203 Linux Shells easy
204 Length Extension Attacks medium
205 Insecure Randomness easy
206 Gobuster: The Basics easy
207 Training Impact on Teams info
208 SQLMap: The Basics easy
209 Advent of Cyber 2024 easy
210 JavaScript Essentials easy
211 Web Application Basics easy
212 SQL Fundamentals easy
213 Shells Overview easy
214 Padding Oracles medium
215 Breaking Crypto the Simple Way easy
216 Custom Tooling Using Python easy
217 Custom Tooling using Burp hard
218 Tooling via Browser Automation easy
219 SOC L1 Alert Triage easy
220 SOC L1 Alert Reporting easy
221 SOC Workbooks and Lookups easy
222 Attacking ECB Oracles hard
223 Next.js: CVE-2025-29927 easy
224 SOC Metrics and Objectives easy
225 CAPTCHApocalypse medium
226 Offensive Security Intro easy
227 Erlang/OTP SSH: CVE-2025-32433 easy
228 Writing Pentest Reports easy
229 Extract hard
230 Cipher's Secret Message easy
231 Evil-GPT easy
232 Evil-GPT v2 easy
233 Sequence medium
234 Roundcube: CVE-2025-49113 easy
235 Chaining Vulnerabilities easy
236 Voyage medium
237 Humans as Attack Vectors easy
238 Systems as Attack Vectors easy
239 SOC Role in Blue Team easy
240 Defensive Security Intro easy
241 Hack2Win: How you can grab extra tickets info
242 Introduction to EDR easy
243 Input Manipulation & Prompt Injection easy
244 Data Integrity & Model Poisoning medium
245 LLM Output Handling and Privacy Risks easy
246 IDOR - Santa’s Little IDOR medium
247 Obfuscation - The Egg Shell File medium
248 XSS - Merry XSSMas easy
249 Passwords - A Cracking Christmas easy
250 SOC Alert Triaging - Tinsel Triage medium
251 Splunk Basics - Did you SIEM? medium
252 Phishing - Merry Clickmas easy
253 Prompt Injection - Sched-yule conflict easy
254 Linux CLI - Shells Bells easy
255 YARA Rules - YARA mean one! medium
256 Forensics - Registry Furensics medium
257 Exploitation with cURL - Hoperation Eggsploit easy
258 ICS/Modbus - Claus for Concern medium
259 Race Conditions - Toy to The World easy
260 Network Discovery - Scan-ta Clause easy
261 Containers - DoorDasher's Demise medium
262 CyberChef - Hoperation Save McSkidy medium
263 Phishing - Phishmas Greetings medium
264 AI in Security - old sAInt nick easy
265 Malware Analysis - Malhare.exe easy
266 C2 Detection - Command & Carol medium
267 AWS Security - S3cret Santa easy
268 Malware Analysis - Egg-xecutable medium
269 Web Attack Forensics - Drone Alone medium
270 Cloud Security Pitfalls easy
271 Juicy medium
272 Advent of Cyber Prep Track easy
273 OWASP Top 10 2025: Insecure Data Handling easy
274 Django: CVE-2025-64459 easy
275 WAF: Introduction easy
276 BankGPT easy
277 HealthGPT easy
278 React2Shell: CVE-2025-55182 easy
279 Virtualisation Basics easy
280 Operating Systems: Introduction easy
281 Linux CLI Basics easy
282 Data Representation easy
283 Data Encoding easy
284 JavaScript: Simple Demo medium
285 Python: Simple Demo easy
286 Windows Basics easy
287 Cloud Computing Fundamentals easy
288 Windows CLI Basics easy
289 The CIA Triad easy
290 Database SQL Basics easy
291 Cryptography Concepts easy
292 Client-Server Basics easy
293 Become a Hacker easy
294 Become a Defender easy
295 n8n: CVE-2025-68613 easy
296 Offensive Security Intro easy
297 Inside a Computer System easy
298 GeoServer: CVE-2025-58360 medium
299 Offensive Security Intro easy
300 Defensive Security Intro info
301 Computer Types easy
302 Defensive Security Intro info
Certificates (118)

Pinned Loading

  1. oss-oopssec-store oss-oopssec-store Public

    Security training for the apps you actually ship. Open your browser and start hacking.

    TypeScript 11 27

  2. OWASP/www-project-vulnerable-web-applications-directory OWASP/www-project-vulnerable-web-applications-directory Public

    The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

    HTML 82 45

  3. poc-cve-2025-55182 poc-cve-2025-55182 Public

    This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell.

    TypeScript 12 3

  4. kanbn/kan kanbn/kan Public

    The open source Trello alternative.

    TypeScript 4.6k 296

  5. poc-cve-2025-29927 poc-cve-2025-29927 Public

    This repository contains a proof of concept (POC) and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in m…

    JavaScript 5 3

  6. poc-cve-2026-32255 poc-cve-2026-32255 Public

    This repository contains a proof of concept (POC) for CVE-2026-32255, a high-severity Server-Side Request Forgery (SSRF) vulnerability in Kan, an open-source project management tool.

    Shell 2