Skip to content
View kOaDT's full-sized avatar

Block or report kOaDT

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kOaDT/README.md

AppSec & Software Developer

Header

Website   TryHackMe   Root-Me


CVE Discoveries (1)
CVE Score Date Description
CVE-2026-32255 8.6 2026-03-19 Kan is an open-source project management tool. In versions 0.5.4 and below, the /api/download/attatchment endpoint has no authentication and no URL validation. The Attachment Download endpoint accepts a user-supplied URL query parameter and passes it directly to fetch() server-side, and returns the full response body. An unauthenticated attacker can use this to make HTTP requests from the server to internal services, cloud metadata endpoints, or private network resources. This issue has been fixed in version 0.5.5. To workaround this issue, block or restrict access to /api/download/attatchment at the reverse proxy level (nginx, Cloudflare, etc.).
CVE Proof of Concepts (3)
CVE Description 🍴 👁️ 📥
CVE-2025-55182 This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell. 12 3 3518 815
CVE-2025-29927 This repository contains a POC and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in middleware. 6 3 1126 258
CVE-2026-32255 This repository contains a proof of concept (POC) for CVE-2026-32255, a high-severity Server-Side Request Forgery (SSRF) vulnerability in Kan, an open-source project management tool. 2 - 711 153
Projects (4)
Project Description 🍴 👁️ 📥
oss-oopssec-store The first security CTF lab built with React and Next.js. Open you browser and start hacking. 12 28 2647 17584
cyber-bot Threat intelligence platform: RSS aggregation, NVD CVE tracking, ENISA EUVD, databreaches, ... 3 1 175324 591
hate-crimes-map This project aims to visualize hate crime data to bring visibility to crimes that are often invisible or normalized by society. 3 - 43 33
crack-hash A fast, multi-threaded hash cracking tool written in Rust. This tool performs dictionary attacks against hashed passwords. 2 - 29 13
OSS Contributions (12)
Repository Description 🍴
usebruno/bruno Opensource IDE For Exploring and Testing API's (lightweight alternative to Postman/Insomnia) 42454 2256
infoslack/awesome-web-hacking A list of web application security 6827 1279
kanbn/kan The open source Trello alternative. 4577 301
OWASP/www-community OWASP Community Pages are a place where OWASP can accept community contributions for security-related content. 1336 824
OWASP/www-project-vulnerable-web-applications-directory The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available. 84 45
lingdojo/kana-dojo Aesthetic, minimalist platform for learning Japanese inspired by Duolingo and Monkeytype, built with Next.js and sponsored by Vercel. Beginner-friendly with plenty of good first issues - all contributions are welcome! 2152 1575
fabionoth/awesome-cyber-security A collection of awesome software, libraries, documents, books, resources and cools stuffs about security. 1832 250
vavkamil/awesome-vulnerable-apps Awesome Vulnerable Applications 1380 211
kaiiyer/awesome-vulnerable A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB. 1277 209
okhosting/awesome-cyber-security A curated list of cyber security resources and tools. 487 71
noraj/rawsec-cybersecurity-inventory An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity. 329 70
secnotes/awesome-cybersecurity A collection of awesome github repositories about security 73 6
Publications (1)
Title Platform Category Date
MCP Tool Poisoning OWASP article 2026-03-26
Github Metrics

TryHackMe Stats
Global Rank Top Streak
#14932 1% 596 days
TryHackMe Badges (47)
  • Networking NerdCompleting the 'Network Fundamentals' module
  • 7 Day StreakAchieving a 7 day hacking streak
  • WebbedUnderstands how the world wide web works
  • World Wide WebCompleting the 'How The Web Works' module
  • cat linux.txtBeing competent in Linux
  • 30 Day StreakHacking for 30 days solid
  • OWASP Top 10Understanding every OWASP vulnerability
  • Hash CrackerCracking all those hashes
  • MetasploitableContains the knowledge to use Metasploit
  • BlueHacking into Windows via EternalBlue
  • Cyber ReadyUnderstanding impact of training on teams
  • Sword ApprenticeCompleting the SQLMap room
  • Shield ApprenticeCompleting the FlareVM room
  • 90 Day StreakHacking for 90 days in a row
  • Linux PrivEscMastering Linux Privilege Escalation
  • Pentesting PrinciplesCompleting the 'Introduction to Pentesting' module
  • Intro to Web HackingCompleting the 'Introduction to Web Hacking' module
  • Advent of Cyber 2024Completing Advent of Cyber 2024!
  • Burp'edCompleting the Burp Suite module
  • 180 Day StreakHacking for 180 days in a row
  • Authentication StrikerUsed the Hammer to bypass authentication
  • SQL SlayerConquered Advanced SQL Injection
  • System SnifferCompleted the File Path traversal room
  • OhSINTCompleting the OhSINT room
  • Client-Side ChampSuccessfully exploited client-side vulnerabilities
  • Introduction to Security EngineeringCompleted the Security Engineer Intro room!
  • Calculated Risk — _Completed the Risk Management room! _
  • 3 Day StreakAchieving a 3 day hacking streak
  • Network and System SecurityFinished the Auditing and Monitoring room!
  • Software Security — _Completed the OWASP API Security Top 10 rooms! _
  • 365 Day StreakHacking for 365 days in a row
  • The Course AwakensFinishing the first room in the DevSecOps path!
  • Just have to deal with it — _Successfully managed a cyber crisis! _
  • Raffle RoyaltyParticipating in Hack2Win 2025!
  • /opt/m0th3rFinishing Mother’s Secret!
  • Skilled NavigatorFinishing the Eviction challenge!
  • First Step into SOCExplored emerging threats and SOC response
  • SOC ApprenticeExplored how a SOC team operates from inside
  • First alert closedClosing your first alert
  • First scenario completedCompleting your first scenario
  • 100% true positive rateAchieving 100% true positive rate in a scenario
  • 500 Day StreakHacking for 500 days in a row
  • Tooling SpecialistAdept in creating custom offensive tooling
  • Advent of Cyber 2025Completing Advent of Cyber 2025!
  • Model CompromiseCompleted the LLM Attacks Module
  • Session HeldCompleting 4 weekly missions in a row!
  • Security AwarenessCompleting the cyber security awareness module
TryHackMe Completed Rooms (308)
# Room Difficulty
1 Crack the hash easy
2 Pickle Rick easy
3 Blue easy
4 OhSINT easy
5 Basic Pentesting easy
6 Vulnversity easy
7 Simple CTF easy
8 Kenobi easy
9 tmux easy
10 Steel Mountain easy
11 Hacking with PowerShell easy
12 Agent Sudo easy
13 LazyAdmin easy
14 Sudo Security Bypass info
15 Introductory Networking easy
16 Common Linux Privesc easy
17 Google Dorking easy
18 Network Services easy
19 Introductory Researching easy
20 What the Shell? easy
21 Hashing - Crypto 101 medium
22 Linux PrivEsc medium
23 Upload Vulnerabilities easy
24 Encryption - Crypto 101 medium
25 Bounty Hacker easy
26 OWASP Juice Shop easy
27 NIS - Linux Part I easy
28 Overpass easy
29 Network Services 2 easy
30 Python Basics easy
31 RootMe easy
32 The Hacker Methodology easy
33 Tutorial easy
34 Getting Started easy
35 MITRE medium
36 Starting Out In Cyber Sec easy
37 Nmap easy
38 Introduction to Flask easy
39 John the Ripper: The Basics easy
40 Cryptography for Dummies easy
41 How to use TryHackMe easy
42 Linux Fundamentals Part 1 info
43 Linux Fundamentals Part 2 info
44 How Websites Work easy
45 Linux Fundamentals Part 3 info
46 Putting it all together easy
47 DNS in Detail easy
48 HTTP in Detail easy
49 Windows Fundamentals 1 info
50 Windows Fundamentals 2 info
51 Learn and win prizes info
52 SQLMAP easy
53 What is Networking? info
54 Intro to LAN info
55 OSI Model info
56 Packets & Frames info
57 Extending Your Network info
58 Learning Cyber Security easy
59 Windows Fundamentals 3 info
60 Linux Privilege Escalation medium
61 Walking An Application easy
62 Pentesting Fundamentals easy
63 Principles of Security info
64 Metasploit: Exploitation easy
65 Content Discovery easy
66 Subdomain Enumeration easy
67 Authentication Bypass easy
68 Junior Security Analyst Intro easy
69 Passive Reconnaissance easy
70 Active Reconnaissance easy
71 Nmap Live Host Discovery medium
72 Nmap Basic Port Scans easy
73 Nmap Advanced Port Scans medium
74 Metasploit: Introduction easy
75 IDOR easy
76 Vulnerabilities 101 easy
77 Metasploit: Meterpreter easy
78 Intro to SSRF easy
79 Pyramid Of Pain easy
80 Intro to Cross-site Scripting easy
81 Nmap Post Port Scans medium
82 Cyber Kill Chain easy
83 Diamond Model easy
84 Security Awareness info
85 Vulnerability Capstone easy
86 Exploit Vulnerabilities easy
87 Protocols and Servers easy
88 SQL Injection medium
89 Command Injection easy
90 Net Sec Challenge medium
91 File Inclusion medium
92 Protocols and Servers 2 medium
93 Common Attacks easy
94 Red Team Fundamentals easy
95 Pwnkit: CVE-2021-4034 info
96 Threat Intelligence Tools easy
97 Intro to Digital Forensics easy
98 Introduction to DevSecOps medium
99 Operating System Security easy
100 Offensive Security Intro easy
101 Lo-Fi easy
102 Network Security easy
103 Web Application Security easy
104 Unified Kill Chain easy
105 Spring4Shell: CVE-2022-22965 info
106 Defensive Security Intro easy
107 SSDLC medium
108 Security Operations easy
109 Careers in Cyber info
110 Windows Privilege Escalation medium
111 Wireshark: The Basics easy
112 Intro to Cyber Threat Intel easy
113 Introduction to SIEM easy
114 Active Directory Basics easy
115 Microsoft Windows Hardening easy
116 Security Principles easy
117 Atlassian CVE-2022-26134 easy
118 Secure Network Architecture medium
119 Active Directory Hardening medium
120 Introduction to Cryptography medium
121 Network Security Protocols medium
122 OWASP API Security Top 10 - 2 medium
123 OWASP API Security Top 10 - 1 medium
124 Intro to Cloud Security easy
125 Linux System Hardening medium
126 Virtualization and Containers easy
127 Vulnerability Management medium
128 DAST medium
129 Weaponizing Vulnerabilities medium
130 Identity and Access Management easy
131 Network Device Hardening medium
132 Threat Modelling medium
133 Governance & Regulation easy
134 Mother's Secret easy
135 Security Engineer Intro easy
136 SAST medium
137 Risk Management easy
138 Broken Access Control easy
139 Logging for Accountability easy
140 Traverse easy
141 Auditing and Monitoring easy
142 Intro to IR and IM easy
143 Becoming a First Responder info
144 Cyber Crisis Management easy
145 W1seGuy easy
146 Burp Suite: The Basics info
147 Burp Suite: Repeater info
148 Burp Suite: Intruder medium
149 Burp Suite: Other Modules easy
150 Burp Suite: Extensions easy
151 Eviction easy
152 Summit easy
153 Light easy
154 HTTP Request Smuggling easy
155 The Witch's Cauldron easy
156 Confluence CVE-2023-22515 easy
157 SSRF medium
158 Become a Hacker easy
159 The Sticker Shop easy
160 File Inclusion, Path Traversal medium
161 CSRF medium
162 XSS easy
163 CORS & SOP easy
164 Prototype Pollution medium
165 Snyk Open Source easy
166 Include medium
167 Moniker Link (CVE-2024-21413) easy
168 Snyk Code easy
169 Race Conditions medium
170 LDAP Injection easy
171 Whats Your Name? medium
172 DOM-Based Attacks easy
173 XXE Injection medium
174 Insecure Deserialisation medium
175 Windows Command Line easy
176 Search Skills easy
177 Server-side Template Injection medium
178 JWT Security easy
179 Nmap: The Basics easy
180 Networking Concepts easy
181 Tcpdump: The Basics easy
182 Networking Essentials easy
183 Networking Core Protocols easy
184 Networking Secure Protocols easy
185 Advanced SQL Injection medium
186 Incident Response Fundamentals easy
187 ORM Injection medium
188 NoSQL Injection easy
189 Logs Fundamentals easy
190 Enumeration & Brute Force easy
191 SOC Fundamentals easy
192 Digital Forensics Fundamentals easy
193 Session Management easy
194 Injectics medium
195 Firewall Fundamentals easy
196 OAuth Vulnerabilities medium
197 IDS Fundamentals easy
198 Multi-Factor Authentication easy
199 Vulnerability Scanner Overview easy
200 Hammer medium
201 CyberChef: The Basics easy
202 Public Key Cryptography Basics easy
203 Cryptography Basics easy
204 Hashing Basics easy
205 CAPA: The Basics easy
206 Windows PowerShell easy
207 FlareVM: Arsenal of Tools easy
208 REMnux: Getting Started easy
209 Linux Shells easy
210 Length Extension Attacks medium
211 Insecure Randomness easy
212 Gobuster: The Basics easy
213 Training Impact on Teams info
214 SQLMap: The Basics easy
215 Advent of Cyber 2024 easy
216 JavaScript Essentials easy
217 Web Application Basics easy
218 SQL Fundamentals easy
219 Shells Overview easy
220 Padding Oracles medium
221 Breaking Crypto the Simple Way easy
222 Custom Tooling Using Python easy
223 Custom Tooling using Burp hard
224 Tooling via Browser Automation easy
225 SOC L1 Alert Triage easy
226 SOC L1 Alert Reporting easy
227 SOC Workbooks and Lookups easy
228 Attacking ECB Oracles hard
229 Next.js: CVE-2025-29927 easy
230 SOC Metrics and Objectives easy
231 CAPTCHApocalypse medium
232 Offensive Security Intro easy
233 Erlang/OTP SSH: CVE-2025-32433 easy
234 Writing Pentest Reports easy
235 Extract hard
236 Cipher's Secret Message easy
237 Evil-GPT easy
238 Evil-GPT v2 easy
239 Sequence medium
240 Roundcube: CVE-2025-49113 easy
241 Chaining Vulnerabilities easy
242 Voyage medium
243 Humans as Attack Vectors easy
244 Systems as Attack Vectors easy
245 SOC Role in Blue Team easy
246 Defensive Security Intro easy
247 Hack2Win: How you can grab extra tickets info
248 Introduction to EDR easy
249 Input Manipulation & Prompt Injection easy
250 Data Integrity & Model Poisoning medium
251 LLM Output Handling and Privacy Risks easy
252 IDOR - Santa’s Little IDOR medium
253 Obfuscation - The Egg Shell File medium
254 XSS - Merry XSSMas easy
255 Passwords - A Cracking Christmas easy
256 SOC Alert Triaging - Tinsel Triage medium
257 Splunk Basics - Did you SIEM? medium
258 Phishing - Merry Clickmas easy
259 Prompt Injection - Sched-yule conflict easy
260 Linux CLI - Shells Bells easy
261 YARA Rules - YARA mean one! medium
262 Forensics - Registry Furensics medium
263 Exploitation with cURL - Hoperation Eggsploit easy
264 ICS/Modbus - Claus for Concern medium
265 Race Conditions - Toy to The World easy
266 Network Discovery - Scan-ta Clause easy
267 Containers - DoorDasher's Demise medium
268 CyberChef - Hoperation Save McSkidy medium
269 Phishing - Phishmas Greetings medium
270 AI in Security - old sAInt nick easy
271 Malware Analysis - Malhare.exe easy
272 C2 Detection - Command & Carol medium
273 AWS Security - S3cret Santa easy
274 Malware Analysis - Egg-xecutable medium
275 Web Attack Forensics - Drone Alone medium
276 Cloud Security Pitfalls easy
277 Juicy medium
278 Advent of Cyber Prep Track easy
279 OWASP Top 10 2025: Insecure Data Handling easy
280 Django: CVE-2025-64459 easy
281 WAF: Introduction easy
282 BankGPT easy
283 HealthGPT easy
284 React2Shell: CVE-2025-55182 easy
285 Virtualisation Basics easy
286 Operating Systems: Introduction easy
287 Linux CLI Basics easy
288 Data Representation easy
289 Data Encoding easy
290 JavaScript: Simple Demo medium
291 Python: Simple Demo easy
292 Windows Basics easy
293 Cloud Computing Fundamentals easy
294 Windows CLI Basics easy
295 The CIA Triad easy
296 Database SQL Basics easy
297 Cryptography Concepts easy
298 Client-Server Basics easy
299 Become a Hacker easy
300 Become a Defender easy
301 n8n: CVE-2025-68613 easy
302 Offensive Security Intro easy
303 Inside a Computer System easy
304 GeoServer: CVE-2025-58360 medium
305 Offensive Security Intro easy
306 Defensive Security Intro info
307 Computer Types easy
308 Defensive Security Intro info
Certificates (118)

Pinned Loading

  1. oss-oopssec-store oss-oopssec-store Public

    Security training for the apps you actually ship. Open your browser and start hacking.

    TypeScript 12 28

  2. OWASP/www-community OWASP/www-community Public

    OWASP Community Pages are a place where OWASP can accept community contributions for security-related content.

    HTML 1.3k 824

  3. OWASP/www-project-vulnerable-web-applications-directory OWASP/www-project-vulnerable-web-applications-directory Public

    The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

    HTML 84 45

  4. poc-cve-2025-55182 poc-cve-2025-55182 Public

    This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell.

    TypeScript 12 3

  5. kanbn/kan kanbn/kan Public

    The open source Trello alternative.

    TypeScript 4.6k 301

  6. poc-cve-2026-32255 poc-cve-2026-32255 Public

    This repository contains a proof of concept (POC) for CVE-2026-32255, a high-severity Server-Side Request Forgery (SSRF) vulnerability in Kan, an open-source project management tool.

    Shell 2