Skip to content
View kOaDT's full-sized avatar

Block or report kOaDT

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kOaDT/README.md

AppSec & Software Developer

Header

Website   TryHackMe   Root-Me


CVE Discoveries (1)
CVE Score Date Description
CVE-2026-32255 8.6 2026-03-19 Kan is an open-source project management tool. In versions 0.5.4 and below, the /api/download/attatchment endpoint has no authentication and no URL validation. The Attachment Download endpoint accepts a user-supplied URL query parameter and passes it directly to fetch() server-side, and returns the full response body. An unauthenticated attacker can use this to make HTTP requests from the server to internal services, cloud metadata endpoints, or private network resources. This issue has been fixed in version 0.5.5. To workaround this issue, block or restrict access to /api/download/attatchment at the reverse proxy level (nginx, Cloudflare, etc.).
CVE Proof of Concepts (3)
CVE Description 🍴 👁️ 📥
CVE-2025-55182 This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell. 12 3 3492 563
CVE-2025-29927 This repository contains a POC and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in middleware. 5 3 1104 246
CVE-2026-32255 This repository contains a proof of concept (POC) for CVE-2026-32255, a high-severity Server-Side Request Forgery (SSRF) vulnerability in Kan, an open-source project management tool. 2 - 420 143
Projects (4)
Project Description 🍴 👁️ 📥
oss-oopssec-store The first security CTF lab built with React and Next.js. Open you browser and start hacking. 12 27 2509 15560
cyber-bot Threat intelligence platform: RSS aggregation, NVD CVE tracking, ENISA EUVD, databreaches, ... 3 1 159796 526
hate-crimes-map This project aims to visualize hate crime data to bring visibility to crimes that are often invisible or normalized by society. 3 - 27 20
crack-hash A fast, multi-threaded hash cracking tool written in Rust. This tool performs dictionary attacks against hashed passwords. 2 - 25 11
OSS Contributions (11)
Repository Description 🍴
usebruno/bruno Opensource IDE For Exploring and Testing API's (lightweight alternative to Postman/Insomnia) 42319 2247
infoslack/awesome-web-hacking A list of web application security 6827 1278
kanbn/kan The open source Trello alternative. 4560 300
OWASP/www-community OWASP Community Pages are a place where OWASP can accept community contributions for security-related content. 1335 824
OWASP/www-project-vulnerable-web-applications-directory The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available. 83 45
lingdojo/kana-dojo Aesthetic, minimalist platform for learning Japanese inspired by Duolingo and Monkeytype, built with Next.js and sponsored by Vercel. Beginner-friendly with plenty of good first issues - all contributions are welcome! 2038 1393
fabionoth/awesome-cyber-security A collection of awesome software, libraries, documents, books, resources and cools stuffs about security. 1832 250
vavkamil/awesome-vulnerable-apps Awesome Vulnerable Applications 1379 212
kaiiyer/awesome-vulnerable A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB. 1278 208
okhosting/awesome-cyber-security A curated list of cyber security resources and tools. 484 70
secnotes/awesome-cybersecurity A collection of awesome github repositories about security 73 6
Publications (1)
Title Platform Category Date
MCP Tool Poisoning OWASP article 2026-03-26
Github Metrics

TryHackMe Stats
Global Rank Top Streak
#15232 1% 592 days
TryHackMe Badges (46)
  • Networking NerdCompleting the 'Network Fundamentals' module
  • 7 Day StreakAchieving a 7 day hacking streak
  • WebbedUnderstands how the world wide web works
  • World Wide WebCompleting the 'How The Web Works' module
  • cat linux.txtBeing competent in Linux
  • 30 Day StreakHacking for 30 days solid
  • OWASP Top 10Understanding every OWASP vulnerability
  • Hash CrackerCracking all those hashes
  • MetasploitableContains the knowledge to use Metasploit
  • BlueHacking into Windows via EternalBlue
  • Cyber ReadyUnderstanding impact of training on teams
  • Sword ApprenticeCompleting the SQLMap room
  • Shield ApprenticeCompleting the FlareVM room
  • 90 Day StreakHacking for 90 days in a row
  • Linux PrivEscMastering Linux Privilege Escalation
  • Pentesting PrinciplesCompleting the 'Introduction to Pentesting' module
  • Intro to Web HackingCompleting the 'Introduction to Web Hacking' module
  • Advent of Cyber 2024Completing Advent of Cyber 2024!
  • Burp'edCompleting the Burp Suite module
  • 180 Day StreakHacking for 180 days in a row
  • Authentication StrikerUsed the Hammer to bypass authentication
  • SQL SlayerConquered Advanced SQL Injection
  • System SnifferCompleted the File Path traversal room
  • OhSINTCompleting the OhSINT room
  • Client-Side ChampSuccessfully exploited client-side vulnerabilities
  • Introduction to Security EngineeringCompleted the Security Engineer Intro room!
  • Calculated Risk — _Completed the Risk Management room! _
  • 3 Day StreakAchieving a 3 day hacking streak
  • Network and System SecurityFinished the Auditing and Monitoring room!
  • Software Security — _Completed the OWASP API Security Top 10 rooms! _
  • 365 Day StreakHacking for 365 days in a row
  • The Course AwakensFinishing the first room in the DevSecOps path!
  • Just have to deal with it — _Successfully managed a cyber crisis! _
  • Raffle RoyaltyParticipating in Hack2Win 2025!
  • /opt/m0th3rFinishing Mother’s Secret!
  • Skilled NavigatorFinishing the Eviction challenge!
  • First Step into SOCExplored emerging threats and SOC response
  • SOC ApprenticeExplored how a SOC team operates from inside
  • First alert closedClosing your first alert
  • First scenario completedCompleting your first scenario
  • 100% true positive rateAchieving 100% true positive rate in a scenario
  • 500 Day StreakHacking for 500 days in a row
  • Tooling SpecialistAdept in creating custom offensive tooling
  • Advent of Cyber 2025Completing Advent of Cyber 2025!
  • Model CompromiseCompleted the LLM Attacks Module
  • Session HeldCompleting 4 weekly missions in a row!
TryHackMe Completed Rooms (304)
# Room Difficulty
1 Crack the hash easy
2 Pickle Rick easy
3 Blue easy
4 OhSINT easy
5 Basic Pentesting easy
6 Vulnversity easy
7 Simple CTF easy
8 Kenobi easy
9 tmux easy
10 Steel Mountain easy
11 Hacking with PowerShell easy
12 Agent Sudo easy
13 LazyAdmin easy
14 Introductory Networking easy
15 Common Linux Privesc easy
16 Google Dorking easy
17 Network Services easy
18 Introductory Researching easy
19 What the Shell? easy
20 Hashing - Crypto 101 medium
21 Linux PrivEsc medium
22 Upload Vulnerabilities easy
23 Encryption - Crypto 101 medium
24 Bounty Hacker easy
25 OWASP Juice Shop easy
26 NIS - Linux Part I easy
27 Overpass easy
28 Network Services 2 easy
29 RootMe easy
30 The Hacker Methodology easy
31 Tutorial easy
32 Getting Started easy
33 MITRE medium
34 Starting Out In Cyber Sec easy
35 Nmap easy
36 Introduction to Flask easy
37 John the Ripper: The Basics easy
38 Cryptography for Dummies easy
39 How to use TryHackMe easy
40 Linux Fundamentals Part 1 info
41 Linux Fundamentals Part 2 info
42 How Websites Work easy
43 Linux Fundamentals Part 3 info
44 Putting it all together easy
45 DNS in Detail easy
46 HTTP in Detail easy
47 Windows Fundamentals 1 info
48 Windows Fundamentals 2 info
49 Learn and win prizes info
50 What is Networking? info
51 Intro to LAN info
52 OSI Model info
53 Packets & Frames info
54 Extending Your Network info
55 Learning Cyber Security easy
56 Windows Fundamentals 3 info
57 Linux Privilege Escalation medium
58 Walking An Application easy
59 Pentesting Fundamentals easy
60 Principles of Security info
61 Metasploit: Exploitation easy
62 Content Discovery easy
63 Subdomain Enumeration easy
64 Authentication Bypass easy
65 Junior Security Analyst Intro easy
66 Passive Reconnaissance easy
67 Active Reconnaissance easy
68 Nmap Live Host Discovery medium
69 Nmap Basic Port Scans easy
70 Nmap Advanced Port Scans medium
71 Metasploit: Introduction easy
72 IDOR easy
73 Vulnerabilities 101 easy
74 Metasploit: Meterpreter easy
75 Intro to SSRF easy
76 Pyramid Of Pain easy
77 Intro to Cross-site Scripting easy
78 Nmap Post Port Scans medium
79 Cyber Kill Chain easy
80 Diamond Model easy
81 Security Awareness info
82 Vulnerability Capstone easy
83 Exploit Vulnerabilities easy
84 Protocols and Servers easy
85 SQL Injection medium
86 Command Injection easy
87 Net Sec Challenge medium
88 File Inclusion medium
89 Protocols and Servers 2 medium
90 Red Team Fundamentals easy
91 Pwnkit: CVE-2021-4034 info
92 Threat Intelligence Tools easy
93 Intro to Digital Forensics easy
94 Introduction to DevSecOps medium
95 Operating System Security easy
96 Offensive Security Intro easy
97 Lo-Fi easy
98 Network Security easy
99 Web Application Security easy
100 Unified Kill Chain easy
101 Spring4Shell: CVE-2022-22965 info
102 Defensive Security Intro easy
103 SSDLC medium
104 Security Operations easy
105 Careers in Cyber info
106 Windows Privilege Escalation medium
107 Wireshark: The Basics easy
108 Intro to Cyber Threat Intel easy
109 Introduction to SIEM easy
110 Active Directory Basics easy
111 Microsoft Windows Hardening easy
112 Security Principles easy
113 Atlassian CVE-2022-26134 easy
114 Secure Network Architecture medium
115 Active Directory Hardening medium
116 Introduction to Cryptography medium
117 Network Security Protocols medium
118 OWASP API Security Top 10 - 2 medium
119 OWASP API Security Top 10 - 1 medium
120 Intro to Cloud Security easy
121 Linux System Hardening medium
122 Virtualization and Containers easy
123 Vulnerability Management medium
124 DAST medium
125 Weaponizing Vulnerabilities medium
126 Identity and Access Management easy
127 Network Device Hardening medium
128 Threat Modelling medium
129 Governance & Regulation easy
130 Mother's Secret easy
131 Security Engineer Intro easy
132 SAST medium
133 Risk Management easy
134 Broken Access Control easy
135 Logging for Accountability easy
136 Traverse easy
137 Auditing and Monitoring easy
138 Intro to IR and IM easy
139 Becoming a First Responder info
140 Cyber Crisis Management easy
141 W1seGuy easy
142 Burp Suite: The Basics info
143 Burp Suite: Repeater info
144 Burp Suite: Intruder medium
145 Burp Suite: Other Modules easy
146 Burp Suite: Extensions easy
147 Eviction easy
148 Summit easy
149 Light easy
150 HTTP Request Smuggling easy
151 The Witch's Cauldron easy
152 Confluence CVE-2023-22515 easy
153 SSRF medium
154 Become a Hacker easy
155 The Sticker Shop easy
156 File Inclusion, Path Traversal medium
157 CSRF medium
158 XSS easy
159 CORS & SOP easy
160 Prototype Pollution medium
161 Snyk Open Source easy
162 Include medium
163 Moniker Link (CVE-2024-21413) easy
164 Snyk Code easy
165 Race Conditions medium
166 LDAP Injection easy
167 Whats Your Name? medium
168 DOM-Based Attacks easy
169 XXE Injection medium
170 Insecure Deserialisation medium
171 Windows Command Line easy
172 Search Skills easy
173 Server-side Template Injection medium
174 JWT Security easy
175 Nmap: The Basics easy
176 Networking Concepts easy
177 Tcpdump: The Basics easy
178 Networking Essentials easy
179 Networking Core Protocols easy
180 Networking Secure Protocols easy
181 Advanced SQL Injection medium
182 Incident Response Fundamentals easy
183 ORM Injection medium
184 NoSQL Injection easy
185 Logs Fundamentals easy
186 Enumeration & Brute Force easy
187 SOC Fundamentals easy
188 Digital Forensics Fundamentals easy
189 Session Management easy
190 Injectics medium
191 Firewall Fundamentals easy
192 OAuth Vulnerabilities medium
193 IDS Fundamentals easy
194 Multi-Factor Authentication easy
195 Vulnerability Scanner Overview easy
196 Hammer medium
197 CyberChef: The Basics easy
198 Public Key Cryptography Basics easy
199 Cryptography Basics easy
200 Hashing Basics easy
201 CAPA: The Basics easy
202 Windows PowerShell easy
203 FlareVM: Arsenal of Tools easy
204 REMnux: Getting Started easy
205 Linux Shells easy
206 Length Extension Attacks medium
207 Insecure Randomness easy
208 Gobuster: The Basics easy
209 Training Impact on Teams info
210 SQLMap: The Basics easy
211 Advent of Cyber 2024 easy
212 JavaScript Essentials easy
213 Web Application Basics easy
214 SQL Fundamentals easy
215 Shells Overview easy
216 Padding Oracles medium
217 Breaking Crypto the Simple Way easy
218 Custom Tooling Using Python easy
219 Custom Tooling using Burp hard
220 Tooling via Browser Automation easy
221 SOC L1 Alert Triage easy
222 SOC L1 Alert Reporting easy
223 SOC Workbooks and Lookups easy
224 Attacking ECB Oracles hard
225 Next.js: CVE-2025-29927 easy
226 SOC Metrics and Objectives easy
227 CAPTCHApocalypse medium
228 Offensive Security Intro easy
229 Erlang/OTP SSH: CVE-2025-32433 easy
230 Writing Pentest Reports easy
231 Extract hard
232 Cipher's Secret Message easy
233 Evil-GPT easy
234 Evil-GPT v2 easy
235 Sequence medium
236 Roundcube: CVE-2025-49113 easy
237 Chaining Vulnerabilities easy
238 Voyage medium
239 Humans as Attack Vectors easy
240 Systems as Attack Vectors easy
241 SOC Role in Blue Team easy
242 Defensive Security Intro easy
243 Hack2Win: How you can grab extra tickets info
244 Introduction to EDR easy
245 Input Manipulation & Prompt Injection easy
246 Data Integrity & Model Poisoning medium
247 LLM Output Handling and Privacy Risks easy
248 IDOR - Santa’s Little IDOR medium
249 Obfuscation - The Egg Shell File medium
250 XSS - Merry XSSMas easy
251 Passwords - A Cracking Christmas easy
252 SOC Alert Triaging - Tinsel Triage medium
253 Splunk Basics - Did you SIEM? medium
254 Phishing - Merry Clickmas easy
255 Prompt Injection - Sched-yule conflict easy
256 Linux CLI - Shells Bells easy
257 YARA Rules - YARA mean one! medium
258 Forensics - Registry Furensics medium
259 Exploitation with cURL - Hoperation Eggsploit easy
260 ICS/Modbus - Claus for Concern medium
261 Race Conditions - Toy to The World easy
262 Network Discovery - Scan-ta Clause easy
263 Containers - DoorDasher's Demise medium
264 CyberChef - Hoperation Save McSkidy medium
265 Phishing - Phishmas Greetings medium
266 AI in Security - old sAInt nick easy
267 Malware Analysis - Malhare.exe easy
268 C2 Detection - Command & Carol medium
269 AWS Security - S3cret Santa easy
270 Malware Analysis - Egg-xecutable medium
271 Web Attack Forensics - Drone Alone medium
272 Cloud Security Pitfalls easy
273 Juicy medium
274 Advent of Cyber Prep Track easy
275 OWASP Top 10 2025: Insecure Data Handling easy
276 Django: CVE-2025-64459 easy
277 WAF: Introduction easy
278 BankGPT easy
279 HealthGPT easy
280 React2Shell: CVE-2025-55182 easy
281 Virtualisation Basics easy
282 Operating Systems: Introduction easy
283 Linux CLI Basics easy
284 Data Representation easy
285 Data Encoding easy
286 JavaScript: Simple Demo medium
287 Python: Simple Demo easy
288 Windows Basics easy
289 Cloud Computing Fundamentals easy
290 Windows CLI Basics easy
291 The CIA Triad easy
292 Database SQL Basics easy
293 Cryptography Concepts easy
294 Client-Server Basics easy
295 Become a Hacker easy
296 Become a Defender easy
297 n8n: CVE-2025-68613 easy
298 Offensive Security Intro easy
299 Inside a Computer System easy
300 GeoServer: CVE-2025-58360 medium
301 Offensive Security Intro easy
302 Defensive Security Intro info
303 Computer Types easy
304 Defensive Security Intro info
Certificates (118)

Pinned Loading

  1. oss-oopssec-store oss-oopssec-store Public

    Security training for the apps you actually ship. Open your browser and start hacking.

    TypeScript 12 27

  2. OWASP/www-community OWASP/www-community Public

    OWASP Community Pages are a place where OWASP can accept community contributions for security-related content.

    HTML 1.3k 824

  3. OWASP/www-project-vulnerable-web-applications-directory OWASP/www-project-vulnerable-web-applications-directory Public

    The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

    HTML 83 45

  4. poc-cve-2025-55182 poc-cve-2025-55182 Public

    This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell.

    TypeScript 12 3

  5. kanbn/kan kanbn/kan Public

    The open source Trello alternative.

    TypeScript 4.6k 300

  6. poc-cve-2026-32255 poc-cve-2026-32255 Public

    This repository contains a proof of concept (POC) for CVE-2026-32255, a high-severity Server-Side Request Forgery (SSRF) vulnerability in Kan, an open-source project management tool.

    Shell 2