Skip to content
View kOaDT's full-sized avatar

Block or report kOaDT

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kOaDT/README.md

AppSec & Web Developer

Header

Website   TryHackMe   Root-Me


CVE Reported (1)
CVE Score Date Description
CVE-2026-32255 8.6 2026-03-19 Kan is an open-source project management tool. In versions 0.5.4 and below, the /api/download/attatchment endpoint has no authentication and no URL validation. The Attachment Download endpoint accepts a user-supplied URL query parameter and passes it directly to fetch() server-side, and returns the full response body. An unauthenticated attacker can use this to make HTTP requests from the server to internal services, cloud metadata endpoints, or private network resources. This issue has been fixed in version 0.5.5. To workaround this issue, block or restrict access to /api/download/attatchment at the reverse proxy level (nginx, Cloudflare, etc.).
CVE Proof of Concepts (3)
CVE Description 🍴 👁️ 📥
CVE-2025-55182 This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell. 12 3 3645 1201
CVE-2025-29927 This repository contains a POC and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in middleware. 6 3 1175 303
CVE-2026-32255 This repository contains a proof of concept (POC) for CVE-2026-32255, a high-severity Server-Side Request Forgery (SSRF) vulnerability in Kan, an open-source project management tool. 2 - 725 166
Projects (4)
Project Description 🍴 👁️ 📥
oss-oopssec-store The first security CTF lab built with React and Next.js. Open you browser and start hacking. 12 30 2786 20415
cyber-bot Threat intelligence platform: RSS aggregation, NVD CVE tracking, ENISA EUVD, databreaches, ... 3 1 183332 669
hate-crimes-map This project aims to visualize hate crime data to bring visibility to crimes that are often invisible or normalized by society. 3 - 49 39
crack-hash A fast, multi-threaded hash cracking tool written in Rust. This tool performs dictionary attacks against hashed passwords. 2 - 36 14
OSS Contributions (12)
Repository Description 🍴
usebruno/bruno Opensource IDE For Exploring and Testing API's (lightweight alternative to Postman/Insomnia) 42686 2280
infoslack/awesome-web-hacking A list of web application security 6837 1282
kanbn/kan The open source Trello alternative. 4594 309
OWASP/www-community OWASP Community Pages are a place where OWASP can accept community contributions for security-related content. 1340 824
OWASP/www-project-vulnerable-web-applications-directory The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available. 85 46
lingdojo/kana-dojo Aesthetic, minimalist platform for learning Japanese inspired by Duolingo and Monkeytype, built with Next.js and sponsored by Vercel. Beginner-friendly with plenty of good first issues - all contributions are welcome! 2202 1646
fabionoth/awesome-cyber-security A collection of awesome software, libraries, documents, books, resources and cools stuffs about security. 1836 250
vavkamil/awesome-vulnerable-apps Awesome Vulnerable Applications 1383 211
kaiiyer/awesome-vulnerable A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB. 1282 209
okhosting/awesome-cyber-security A curated list of cyber security resources and tools. 494 70
noraj/rawsec-cybersecurity-inventory An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity. 330 70
secnotes/awesome-cybersecurity A collection of awesome github repositories about security 74 6
Publications (1)
Title Platform Category Date
MCP Tool Poisoning OWASP article 2026-03-26
Github Metrics

TryHackMe Stats
Global Rank Top Streak
#14402 1% 602 days
TryHackMe Badges (47)
  • Networking NerdCompleting the 'Network Fundamentals' module
  • 7 Day StreakAchieving a 7 day hacking streak
  • WebbedUnderstands how the world wide web works
  • World Wide WebCompleting the 'How The Web Works' module
  • cat linux.txtBeing competent in Linux
  • 30 Day StreakHacking for 30 days solid
  • OWASP Top 10Understanding every OWASP vulnerability
  • Hash CrackerCracking all those hashes
  • MetasploitableContains the knowledge to use Metasploit
  • BlueHacking into Windows via EternalBlue
  • Cyber ReadyUnderstanding impact of training on teams
  • Sword ApprenticeCompleting the SQLMap room
  • Shield ApprenticeCompleting the FlareVM room
  • 90 Day StreakHacking for 90 days in a row
  • Linux PrivEscMastering Linux Privilege Escalation
  • Pentesting PrinciplesCompleting the 'Introduction to Pentesting' module
  • Intro to Web HackingCompleting the 'Introduction to Web Hacking' module
  • Advent of Cyber 2024Completing Advent of Cyber 2024!
  • Burp'edCompleting the Burp Suite module
  • 180 Day StreakHacking for 180 days in a row
  • Authentication StrikerUsed the Hammer to bypass authentication
  • SQL SlayerConquered Advanced SQL Injection
  • System SnifferCompleted the File Path traversal room
  • OhSINTCompleting the OhSINT room
  • Client-Side ChampSuccessfully exploited client-side vulnerabilities
  • Introduction to Security EngineeringCompleted the Security Engineer Intro room!
  • Calculated Risk — _Completed the Risk Management room! _
  • 3 Day StreakAchieving a 3 day hacking streak
  • Network and System SecurityFinished the Auditing and Monitoring room!
  • Software Security — _Completed the OWASP API Security Top 10 rooms! _
  • 365 Day StreakHacking for 365 days in a row
  • The Course AwakensFinishing the first room in the DevSecOps path!
  • Just have to deal with it — _Successfully managed a cyber crisis! _
  • Raffle RoyaltyParticipating in Hack2Win 2025!
  • /opt/m0th3rFinishing Mother’s Secret!
  • Skilled NavigatorFinishing the Eviction challenge!
  • First Step into SOCExplored emerging threats and SOC response
  • SOC ApprenticeExplored how a SOC team operates from inside
  • First alert closedClosing your first alert
  • First scenario completedCompleting your first scenario
  • 100% true positive rateAchieving 100% true positive rate in a scenario
  • 500 Day StreakHacking for 500 days in a row
  • Tooling SpecialistAdept in creating custom offensive tooling
  • Advent of Cyber 2025Completing Advent of Cyber 2025!
  • Model CompromiseCompleted the LLM Attacks Module
  • Session HeldCompleting 4 weekly missions in a row!
  • Security AwarenessCompleting the cyber security awareness module
TryHackMe Completed Rooms (314)
# Room Difficulty
1 Crack the hash easy
2 Kali Machine easy
3 Pickle Rick easy
4 Blue easy
5 OhSINT easy
6 Basic Pentesting easy
7 Vulnversity easy
8 Simple CTF easy
9 Kenobi easy
10 tmux easy
11 Steel Mountain easy
12 Hacking with PowerShell easy
13 Bebop easy
14 DVWA easy
15 Agent Sudo easy
16 LazyAdmin easy
17 Sudo Security Bypass info
18 Introductory Networking easy
19 Common Linux Privesc easy
20 Google Dorking easy
21 Network Services easy
22 Introductory Researching easy
23 What the Shell? easy
24 Hashing - Crypto 101 medium
25 Linux PrivEsc medium
26 Upload Vulnerabilities easy
27 Encryption - Crypto 101 medium
28 Bounty Hacker easy
29 OWASP Juice Shop easy
30 NIS - Linux Part I easy
31 Overpass easy
32 Network Services 2 easy
33 Python Basics easy
34 RootMe easy
35 Physical Security Intro easy
36 The Hacker Methodology easy
37 Tutorial easy
38 Getting Started easy
39 MITRE medium
40 Starting Out In Cyber Sec easy
41 Nmap easy
42 Introduction to Flask easy
43 John the Ripper: The Basics easy
44 Cryptography for Dummies easy
45 How to use TryHackMe easy
46 Linux Fundamentals Part 1 info
47 Linux Fundamentals Part 2 info
48 How Websites Work easy
49 Linux Fundamentals Part 3 info
50 Putting it all together easy
51 DNS in Detail easy
52 HTTP in Detail easy
53 Windows Fundamentals 1 info
54 Windows Fundamentals 2 info
55 Learn and win prizes info
56 SQLMAP easy
57 What is Networking? info
58 Intro to LAN info
59 OSI Model info
60 Packets & Frames info
61 Extending Your Network info
62 Learning Cyber Security easy
63 Windows Fundamentals 3 info
64 Linux Privilege Escalation medium
65 Walking An Application easy
66 Pentesting Fundamentals easy
67 Principles of Security info
68 Metasploit: Exploitation easy
69 Content Discovery easy
70 Subdomain Enumeration easy
71 Authentication Bypass easy
72 Junior Security Analyst Intro easy
73 Passive Reconnaissance easy
74 Active Reconnaissance easy
75 Nmap Live Host Discovery medium
76 Nmap Basic Port Scans easy
77 Nmap Advanced Port Scans medium
78 Metasploit: Introduction easy
79 IDOR easy
80 Vulnerabilities 101 easy
81 Metasploit: Meterpreter easy
82 Intro to SSRF easy
83 Pyramid Of Pain easy
84 Intro to Cross-site Scripting easy
85 Nmap Post Port Scans medium
86 Cyber Kill Chain easy
87 Diamond Model easy
88 Security Awareness info
89 Vulnerability Capstone easy
90 Exploit Vulnerabilities easy
91 Protocols and Servers easy
92 SQL Injection medium
93 Command Injection easy
94 Net Sec Challenge medium
95 File Inclusion medium
96 Protocols and Servers 2 medium
97 Common Attacks easy
98 Red Team Fundamentals easy
99 Pwnkit: CVE-2021-4034 info
100 Threat Intelligence Tools easy
101 Intro to Digital Forensics easy
102 Introduction to DevSecOps medium
103 Operating System Security easy
104 Offensive Security Intro easy
105 Lo-Fi easy
106 Network Security easy
107 Web Application Security easy
108 Unified Kill Chain easy
109 Spring4Shell: CVE-2022-22965 info
110 Defensive Security Intro easy
111 SSDLC medium
112 Security Operations easy
113 Careers in Cyber info
114 Windows Privilege Escalation medium
115 Wireshark: The Basics easy
116 Intro to Cyber Threat Intel easy
117 Introduction to SIEM easy
118 Intro to Containerisation easy
119 Active Directory Basics easy
120 Microsoft Windows Hardening easy
121 Security Principles easy
122 Atlassian CVE-2022-26134 easy
123 Secure Network Architecture medium
124 Active Directory Hardening medium
125 Introduction to Cryptography medium
126 Network Security Protocols medium
127 OWASP API Security Top 10 - 2 medium
128 OWASP API Security Top 10 - 1 medium
129 Intro to Cloud Security easy
130 Linux System Hardening medium
131 Virtualization and Containers easy
132 Vulnerability Management medium
133 DAST medium
134 Weaponizing Vulnerabilities medium
135 Identity and Access Management easy
136 Network Device Hardening medium
137 Threat Modelling medium
138 Governance & Regulation easy
139 Mother's Secret easy
140 Security Engineer Intro easy
141 SAST medium
142 Risk Management easy
143 Broken Access Control easy
144 Logging for Accountability easy
145 Traverse easy
146 Auditing and Monitoring easy
147 Intro to IR and IM easy
148 Becoming a First Responder info
149 Cyber Crisis Management easy
150 W1seGuy easy
151 Burp Suite: The Basics info
152 Burp Suite: Repeater info
153 Burp Suite: Intruder medium
154 Burp Suite: Other Modules easy
155 Burp Suite: Extensions easy
156 Eviction easy
157 Summit easy
158 Light easy
159 HTTP Request Smuggling easy
160 The Witch's Cauldron easy
161 Confluence CVE-2023-22515 easy
162 SSRF medium
163 Become a Hacker easy
164 The Sticker Shop easy
165 File Inclusion, Path Traversal medium
166 CSRF medium
167 XSS easy
168 CORS & SOP easy
169 Prototype Pollution medium
170 Snyk Open Source easy
171 Include medium
172 Moniker Link (CVE-2024-21413) easy
173 Snyk Code easy
174 Race Conditions medium
175 LDAP Injection easy
176 Whats Your Name? medium
177 DOM-Based Attacks easy
178 XXE Injection medium
179 Insecure Deserialisation medium
180 Windows Command Line easy
181 Search Skills easy
182 Server-side Template Injection medium
183 JWT Security easy
184 Nmap: The Basics easy
185 Networking Concepts easy
186 Tcpdump: The Basics easy
187 Networking Essentials easy
188 Networking Core Protocols easy
189 Networking Secure Protocols easy
190 Advanced SQL Injection medium
191 Incident Response Fundamentals easy
192 ORM Injection medium
193 NoSQL Injection easy
194 Logs Fundamentals easy
195 Enumeration & Brute Force easy
196 SOC Fundamentals easy
197 Digital Forensics Fundamentals easy
198 Session Management easy
199 Injectics medium
200 Firewall Fundamentals easy
201 OAuth Vulnerabilities medium
202 IDS Fundamentals easy
203 Multi-Factor Authentication easy
204 Vulnerability Scanner Overview easy
205 Hammer medium
206 CyberChef: The Basics easy
207 Public Key Cryptography Basics easy
208 Cryptography Basics easy
209 Hashing Basics easy
210 CAPA: The Basics easy
211 Windows PowerShell easy
212 FlareVM: Arsenal of Tools easy
213 REMnux: Getting Started easy
214 Linux Shells easy
215 Length Extension Attacks medium
216 Insecure Randomness easy
217 Gobuster: The Basics easy
218 Training Impact on Teams info
219 SQLMap: The Basics easy
220 Advent of Cyber 2024 easy
221 JavaScript Essentials easy
222 Web Application Basics easy
223 SQL Fundamentals easy
224 Shells Overview easy
225 Padding Oracles medium
226 Breaking Crypto the Simple Way easy
227 Custom Tooling Using Python easy
228 Custom Tooling using Burp hard
229 Tooling via Browser Automation easy
230 SOC L1 Alert Triage easy
231 SOC L1 Alert Reporting easy
232 SOC Workbooks and Lookups easy
233 Attacking ECB Oracles hard
234 Next.js: CVE-2025-29927 easy
235 SOC Metrics and Objectives easy
236 CAPTCHApocalypse medium
237 Offensive Security Intro easy
238 Erlang/OTP SSH: CVE-2025-32433 easy
239 Writing Pentest Reports easy
240 Extract hard
241 Cipher's Secret Message easy
242 Evil-GPT easy
243 Evil-GPT v2 easy
244 Sequence medium
245 Roundcube: CVE-2025-49113 easy
246 Chaining Vulnerabilities easy
247 Voyage medium
248 Humans as Attack Vectors easy
249 Systems as Attack Vectors easy
250 SOC Role in Blue Team easy
251 Web Security Essentials easy
252 Defensive Security Intro easy
253 Hack2Win: How you can grab extra tickets info
254 Introduction to EDR easy
255 Input Manipulation & Prompt Injection easy
256 Data Integrity & Model Poisoning medium
257 LLM Output Handling and Privacy Risks easy
258 IDOR - Santa’s Little IDOR medium
259 Obfuscation - The Egg Shell File medium
260 XSS - Merry XSSMas easy
261 Passwords - A Cracking Christmas easy
262 SOC Alert Triaging - Tinsel Triage medium
263 Splunk Basics - Did you SIEM? medium
264 Phishing - Merry Clickmas easy
265 Prompt Injection - Sched-yule conflict easy
266 Linux CLI - Shells Bells easy
267 YARA Rules - YARA mean one! medium
268 Forensics - Registry Furensics medium
269 Exploitation with cURL - Hoperation Eggsploit easy
270 ICS/Modbus - Claus for Concern medium
271 Race Conditions - Toy to The World easy
272 Network Discovery - Scan-ta Clause easy
273 Containers - DoorDasher's Demise medium
274 CyberChef - Hoperation Save McSkidy medium
275 Phishing - Phishmas Greetings medium
276 AI in Security - old sAInt nick easy
277 Malware Analysis - Malhare.exe easy
278 C2 Detection - Command & Carol medium
279 AWS Security - S3cret Santa easy
280 Malware Analysis - Egg-xecutable medium
281 Web Attack Forensics - Drone Alone medium
282 Cloud Security Pitfalls easy
283 Juicy medium
284 Advent of Cyber Prep Track easy
285 OWASP Top 10 2025: Insecure Data Handling easy
286 Django: CVE-2025-64459 easy
287 WAF: Introduction easy
288 BankGPT easy
289 HealthGPT easy
290 React2Shell: CVE-2025-55182 easy
291 Virtualisation Basics easy
292 Operating Systems: Introduction easy
293 Linux CLI Basics easy
294 Data Representation easy
295 Data Encoding easy
296 JavaScript: Simple Demo medium
297 Python: Simple Demo easy
298 Windows Basics easy
299 Cloud Computing Fundamentals easy
300 Windows CLI Basics easy
301 The CIA Triad easy
302 Database SQL Basics easy
303 Cryptography Concepts easy
304 Client-Server Basics easy
305 Become a Hacker easy
306 Become a Defender easy
307 n8n: CVE-2025-68613 easy
308 Offensive Security Intro easy
309 Inside a Computer System easy
310 GeoServer: CVE-2025-58360 medium
311 Offensive Security Intro easy
312 Defensive Security Intro info
313 Computer Types easy
314 Defensive Security Intro info
Certificates (119)

Pinned Loading

  1. oss-oopssec-store oss-oopssec-store Public

    Security training for the apps you actually ship. Open your browser and start hacking.

    TypeScript 12 30

  2. OWASP/www-community OWASP/www-community Public

    OWASP Community Pages are a place where OWASP can accept community contributions for security-related content.

    HTML 1.3k 824

  3. OWASP/www-project-vulnerable-web-applications-directory OWASP/www-project-vulnerable-web-applications-directory Public

    The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

    HTML 85 46

  4. poc-cve-2025-55182 poc-cve-2025-55182 Public

    This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell.

    TypeScript 12 3

  5. kanbn/kan kanbn/kan Public

    The open source Trello alternative.

    TypeScript 4.6k 309

  6. poc-cve-2026-32255 poc-cve-2026-32255 Public

    This repository contains a proof of concept (POC) for CVE-2026-32255, a high-severity Server-Side Request Forgery (SSRF) vulnerability in Kan, an open-source project management tool.

    Shell 2