Skip to content
View kOaDT's full-sized avatar

Block or report kOaDT

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kOaDT/README.md

AppSec & Software Developer

Header

Website   TryHackMe   Root-Me


CVE Discoveries (1)
CVE Score Date Description
CVE-2026-32255 8.6 2026-03-19 Kan is an open-source project management tool. In versions 0.5.4 and below, the /api/download/attatchment endpoint has no authentication and no URL validation. The Attachment Download endpoint accepts a user-supplied URL query parameter and passes it directly to fetch() server-side, and returns the full response body. An unauthenticated attacker can use this to make HTTP requests from the server to internal services, cloud metadata endpoints, or private network resources. This issue has been fixed in version 0.5.5. To workaround this issue, block or restrict access to /api/download/attatchment at the reverse proxy level (nginx, Cloudflare, etc.).
CVE Proof of Concepts (3)
CVE Description 🍴 👁️ 📥
CVE-2025-55182 This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell. 12 3 3436 372
CVE-2025-29927 This repository contains a POC and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in middleware. 5 3 1067 213
CVE-2026-32255 This repository contains a proof of concept (POC) for CVE-2026-32255, a high-severity Server-Side Request Forgery (SSRF) vulnerability in Kan, an open-source project management tool. 2 - 309 129
Projects (4)
Project Description 🍴 👁️ 📥
oss-oopssec-store The first security CTF lab built with React and Next.js. Open you browser and start hacking. 12 27 2439 13013
cyber-bot Threat intelligence platform: RSS aggregation, NVD CVE tracking, ENISA EUVD, databreaches, ... 3 1 159796 494
hate-crimes-map This project aims to visualize hate crime data to bring visibility to crimes that are often invisible or normalized by society. 3 - 23 18
crack-hash A fast, multi-threaded hash cracking tool written in Rust. This tool performs dictionary attacks against hashed passwords. 2 - 22 9
OSS Contributions (10)
Repository Description 🍴
usebruno/bruno Opensource IDE For Exploring and Testing API's (lightweight alternative to Postman/Insomnia) 42148 2233
infoslack/awesome-web-hacking A list of web application security 6828 1278
kanbn/kan The open source Trello alternative. 4553 295
OWASP/www-project-vulnerable-web-applications-directory The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available. 83 45
lingdojo/kana-dojo Aesthetic, minimalist platform for learning Japanese inspired by Duolingo and Monkeytype, built with Next.js and sponsored by Vercel. Beginner-friendly with plenty of good first issues - all contributions are welcome! 1988 1293
fabionoth/awesome-cyber-security A collection of awesome software, libraries, documents, books, resources and cools stuffs about security. 1828 248
vavkamil/awesome-vulnerable-apps Awesome Vulnerable Applications 1379 212
kaiiyer/awesome-vulnerable A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB. 1276 209
okhosting/awesome-cyber-security A curated list of cyber security resources and tools. 481 70
secnotes/awesome-cybersecurity A collection of awesome github repositories about security 72 6
Github Metrics

TryHackMe Stats
Global Rank Top Streak
#15330 1% 589 days
TryHackMe Badges (46)
  • Networking NerdCompleting the 'Network Fundamentals' module
  • 7 Day StreakAchieving a 7 day hacking streak
  • WebbedUnderstands how the world wide web works
  • World Wide WebCompleting the 'How The Web Works' module
  • cat linux.txtBeing competent in Linux
  • 30 Day StreakHacking for 30 days solid
  • OWASP Top 10Understanding every OWASP vulnerability
  • Hash CrackerCracking all those hashes
  • MetasploitableContains the knowledge to use Metasploit
  • BlueHacking into Windows via EternalBlue
  • Cyber ReadyUnderstanding impact of training on teams
  • Sword ApprenticeCompleting the SQLMap room
  • Shield ApprenticeCompleting the FlareVM room
  • 90 Day StreakHacking for 90 days in a row
  • Linux PrivEscMastering Linux Privilege Escalation
  • Pentesting PrinciplesCompleting the 'Introduction to Pentesting' module
  • Intro to Web HackingCompleting the 'Introduction to Web Hacking' module
  • Advent of Cyber 2024Completing Advent of Cyber 2024!
  • Burp'edCompleting the Burp Suite module
  • 180 Day StreakHacking for 180 days in a row
  • Authentication StrikerUsed the Hammer to bypass authentication
  • SQL SlayerConquered Advanced SQL Injection
  • System SnifferCompleted the File Path traversal room
  • OhSINTCompleting the OhSINT room
  • Client-Side ChampSuccessfully exploited client-side vulnerabilities
  • Introduction to Security EngineeringCompleted the Security Engineer Intro room!
  • Calculated Risk — _Completed the Risk Management room! _
  • 3 Day StreakAchieving a 3 day hacking streak
  • Network and System SecurityFinished the Auditing and Monitoring room!
  • Software Security — _Completed the OWASP API Security Top 10 rooms! _
  • 365 Day StreakHacking for 365 days in a row
  • The Course AwakensFinishing the first room in the DevSecOps path!
  • Just have to deal with it — _Successfully managed a cyber crisis! _
  • Raffle RoyaltyParticipating in Hack2Win 2025!
  • /opt/m0th3rFinishing Mother’s Secret!
  • Skilled NavigatorFinishing the Eviction challenge!
  • First Step into SOCExplored emerging threats and SOC response
  • SOC ApprenticeExplored how a SOC team operates from inside
  • First alert closedClosing your first alert
  • First scenario completedCompleting your first scenario
  • 100% true positive rateAchieving 100% true positive rate in a scenario
  • 500 Day StreakHacking for 500 days in a row
  • Tooling SpecialistAdept in creating custom offensive tooling
  • Advent of Cyber 2025Completing Advent of Cyber 2025!
  • Model CompromiseCompleted the LLM Attacks Module
  • Session HeldCompleting 4 weekly missions in a row!
TryHackMe Completed Rooms (303)
# Room Difficulty
1 Crack the hash easy
2 Pickle Rick easy
3 Blue easy
4 OhSINT easy
5 Basic Pentesting easy
6 Vulnversity easy
7 Simple CTF easy
8 Kenobi easy
9 tmux easy
10 Steel Mountain easy
11 Hacking with PowerShell easy
12 Agent Sudo easy
13 LazyAdmin easy
14 Introductory Networking easy
15 Common Linux Privesc easy
16 Google Dorking easy
17 Network Services easy
18 Introductory Researching easy
19 What the Shell? easy
20 Hashing - Crypto 101 medium
21 Linux PrivEsc medium
22 Upload Vulnerabilities easy
23 Encryption - Crypto 101 medium
24 Bounty Hacker easy
25 OWASP Juice Shop easy
26 NIS - Linux Part I easy
27 Overpass easy
28 Network Services 2 easy
29 RootMe easy
30 Tutorial easy
31 Getting Started easy
32 MITRE medium
33 Starting Out In Cyber Sec easy
34 Nmap easy
35 Introduction to Flask easy
36 John the Ripper: The Basics easy
37 Cryptography for Dummies easy
38 How to use TryHackMe easy
39 Linux Fundamentals Part 1 info
40 Linux Fundamentals Part 2 info
41 How Websites Work easy
42 Linux Fundamentals Part 3 info
43 Putting it all together easy
44 DNS in Detail easy
45 HTTP in Detail easy
46 Windows Fundamentals 1 info
47 Windows Fundamentals 2 info
48 Learn and win prizes info
49 What is Networking? info
50 Intro to LAN info
51 OSI Model info
52 Packets & Frames info
53 Extending Your Network info
54 Learning Cyber Security easy
55 Windows Fundamentals 3 info
56 Linux Privilege Escalation medium
57 Walking An Application easy
58 Pentesting Fundamentals easy
59 Principles of Security info
60 Metasploit: Exploitation easy
61 Content Discovery easy
62 Subdomain Enumeration easy
63 Authentication Bypass easy
64 Junior Security Analyst Intro easy
65 Passive Reconnaissance easy
66 Active Reconnaissance easy
67 Nmap Live Host Discovery medium
68 Nmap Basic Port Scans easy
69 Nmap Advanced Port Scans medium
70 Metasploit: Introduction easy
71 IDOR easy
72 Vulnerabilities 101 easy
73 Metasploit: Meterpreter easy
74 Intro to SSRF easy
75 Pyramid Of Pain easy
76 Intro to Cross-site Scripting easy
77 Nmap Post Port Scans medium
78 Cyber Kill Chain easy
79 Diamond Model easy
80 Security Awareness info
81 Vulnerability Capstone easy
82 Exploit Vulnerabilities easy
83 Protocols and Servers easy
84 SQL Injection medium
85 Command Injection easy
86 Net Sec Challenge medium
87 File Inclusion medium
88 Protocols and Servers 2 medium
89 Red Team Fundamentals easy
90 Pwnkit: CVE-2021-4034 info
91 Threat Intelligence Tools easy
92 Intro to Digital Forensics easy
93 Introduction to DevSecOps medium
94 Operating System Security easy
95 Offensive Security Intro easy
96 Lo-Fi easy
97 Network Security easy
98 Web Application Security easy
99 Unified Kill Chain easy
100 Spring4Shell: CVE-2022-22965 info
101 Defensive Security Intro easy
102 SSDLC medium
103 Security Operations easy
104 Careers in Cyber info
105 Windows Privilege Escalation medium
106 Wireshark: The Basics easy
107 Intro to Cyber Threat Intel easy
108 Introduction to SIEM easy
109 Active Directory Basics easy
110 Microsoft Windows Hardening easy
111 Security Principles easy
112 Atlassian CVE-2022-26134 easy
113 Secure Network Architecture medium
114 Active Directory Hardening medium
115 Introduction to Cryptography medium
116 Network Security Protocols medium
117 OWASP API Security Top 10 - 2 medium
118 OWASP API Security Top 10 - 1 medium
119 Intro to Cloud Security easy
120 Linux System Hardening medium
121 Virtualization and Containers easy
122 Vulnerability Management medium
123 DAST medium
124 Weaponizing Vulnerabilities medium
125 Identity and Access Management easy
126 Network Device Hardening medium
127 Threat Modelling medium
128 Governance & Regulation easy
129 Mother's Secret easy
130 Security Engineer Intro easy
131 SAST medium
132 Risk Management easy
133 Broken Access Control easy
134 Logging for Accountability easy
135 Traverse easy
136 Auditing and Monitoring easy
137 Intro to IR and IM easy
138 Becoming a First Responder info
139 Cyber Crisis Management easy
140 W1seGuy easy
141 Burp Suite: The Basics info
142 Burp Suite: Repeater info
143 Burp Suite: Intruder medium
144 Burp Suite: Other Modules easy
145 Burp Suite: Extensions easy
146 Eviction easy
147 Summit easy
148 Light easy
149 HTTP Request Smuggling easy
150 The Witch's Cauldron easy
151 Confluence CVE-2023-22515 easy
152 SSRF medium
153 Become a Hacker easy
154 The Sticker Shop easy
155 File Inclusion, Path Traversal medium
156 CSRF medium
157 XSS easy
158 CORS & SOP easy
159 Prototype Pollution medium
160 Snyk Open Source easy
161 Include medium
162 Moniker Link (CVE-2024-21413) easy
163 Snyk Code easy
164 Race Conditions medium
165 LDAP Injection easy
166 Whats Your Name? medium
167 DOM-Based Attacks easy
168 XXE Injection medium
169 Insecure Deserialisation medium
170 Windows Command Line easy
171 Search Skills easy
172 Server-side Template Injection medium
173 JWT Security easy
174 Nmap: The Basics easy
175 Networking Concepts easy
176 Tcpdump: The Basics easy
177 Networking Essentials easy
178 Networking Core Protocols easy
179 Networking Secure Protocols easy
180 Advanced SQL Injection medium
181 Incident Response Fundamentals easy
182 ORM Injection medium
183 NoSQL Injection easy
184 Logs Fundamentals easy
185 Enumeration & Brute Force easy
186 SOC Fundamentals easy
187 Digital Forensics Fundamentals easy
188 Session Management easy
189 Injectics medium
190 Firewall Fundamentals easy
191 OAuth Vulnerabilities medium
192 IDS Fundamentals easy
193 Multi-Factor Authentication easy
194 Vulnerability Scanner Overview easy
195 Hammer medium
196 CyberChef: The Basics easy
197 Public Key Cryptography Basics easy
198 Cryptography Basics easy
199 Hashing Basics easy
200 CAPA: The Basics easy
201 Windows PowerShell easy
202 FlareVM: Arsenal of Tools easy
203 REMnux: Getting Started easy
204 Linux Shells easy
205 Length Extension Attacks medium
206 Insecure Randomness easy
207 Gobuster: The Basics easy
208 Training Impact on Teams info
209 SQLMap: The Basics easy
210 Advent of Cyber 2024 easy
211 JavaScript Essentials easy
212 Web Application Basics easy
213 SQL Fundamentals easy
214 Shells Overview easy
215 Padding Oracles medium
216 Breaking Crypto the Simple Way easy
217 Custom Tooling Using Python easy
218 Custom Tooling using Burp hard
219 Tooling via Browser Automation easy
220 SOC L1 Alert Triage easy
221 SOC L1 Alert Reporting easy
222 SOC Workbooks and Lookups easy
223 Attacking ECB Oracles hard
224 Next.js: CVE-2025-29927 easy
225 SOC Metrics and Objectives easy
226 CAPTCHApocalypse medium
227 Offensive Security Intro easy
228 Erlang/OTP SSH: CVE-2025-32433 easy
229 Writing Pentest Reports easy
230 Extract hard
231 Cipher's Secret Message easy
232 Evil-GPT easy
233 Evil-GPT v2 easy
234 Sequence medium
235 Roundcube: CVE-2025-49113 easy
236 Chaining Vulnerabilities easy
237 Voyage medium
238 Humans as Attack Vectors easy
239 Systems as Attack Vectors easy
240 SOC Role in Blue Team easy
241 Defensive Security Intro easy
242 Hack2Win: How you can grab extra tickets info
243 Introduction to EDR easy
244 Input Manipulation & Prompt Injection easy
245 Data Integrity & Model Poisoning medium
246 LLM Output Handling and Privacy Risks easy
247 IDOR - Santa’s Little IDOR medium
248 Obfuscation - The Egg Shell File medium
249 XSS - Merry XSSMas easy
250 Passwords - A Cracking Christmas easy
251 SOC Alert Triaging - Tinsel Triage medium
252 Splunk Basics - Did you SIEM? medium
253 Phishing - Merry Clickmas easy
254 Prompt Injection - Sched-yule conflict easy
255 Linux CLI - Shells Bells easy
256 YARA Rules - YARA mean one! medium
257 Forensics - Registry Furensics medium
258 Exploitation with cURL - Hoperation Eggsploit easy
259 ICS/Modbus - Claus for Concern medium
260 Race Conditions - Toy to The World easy
261 Network Discovery - Scan-ta Clause easy
262 Containers - DoorDasher's Demise medium
263 CyberChef - Hoperation Save McSkidy medium
264 Phishing - Phishmas Greetings medium
265 AI in Security - old sAInt nick easy
266 Malware Analysis - Malhare.exe easy
267 C2 Detection - Command & Carol medium
268 AWS Security - S3cret Santa easy
269 Malware Analysis - Egg-xecutable medium
270 Web Attack Forensics - Drone Alone medium
271 Cloud Security Pitfalls easy
272 Juicy medium
273 Advent of Cyber Prep Track easy
274 OWASP Top 10 2025: Insecure Data Handling easy
275 Django: CVE-2025-64459 easy
276 WAF: Introduction easy
277 BankGPT easy
278 HealthGPT easy
279 React2Shell: CVE-2025-55182 easy
280 Virtualisation Basics easy
281 Operating Systems: Introduction easy
282 Linux CLI Basics easy
283 Data Representation easy
284 Data Encoding easy
285 JavaScript: Simple Demo medium
286 Python: Simple Demo easy
287 Windows Basics easy
288 Cloud Computing Fundamentals easy
289 Windows CLI Basics easy
290 The CIA Triad easy
291 Database SQL Basics easy
292 Cryptography Concepts easy
293 Client-Server Basics easy
294 Become a Hacker easy
295 Become a Defender easy
296 n8n: CVE-2025-68613 easy
297 Offensive Security Intro easy
298 Inside a Computer System easy
299 GeoServer: CVE-2025-58360 medium
300 Offensive Security Intro easy
301 Defensive Security Intro info
302 Computer Types easy
303 Defensive Security Intro info
Certificates (118)

Pinned Loading

  1. oss-oopssec-store oss-oopssec-store Public

    Security training for the apps you actually ship. Open your browser and start hacking.

    TypeScript 12 27

  2. OWASP/www-project-vulnerable-web-applications-directory OWASP/www-project-vulnerable-web-applications-directory Public

    The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

    HTML 83 45

  3. poc-cve-2025-55182 poc-cve-2025-55182 Public

    This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell.

    TypeScript 12 3

  4. kanbn/kan kanbn/kan Public

    The open source Trello alternative.

    TypeScript 4.6k 295

  5. poc-cve-2025-29927 poc-cve-2025-29927 Public

    This repository contains a proof of concept (POC) and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in m…

    JavaScript 5 3

  6. poc-cve-2026-32255 poc-cve-2026-32255 Public

    This repository contains a proof of concept (POC) for CVE-2026-32255, a high-severity Server-Side Request Forgery (SSRF) vulnerability in Kan, an open-source project management tool.

    Shell 2