Skip to content
View kOaDT's full-sized avatar

Block or report kOaDT

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kOaDT/README.md

AppSec & Software Developer

Header

Website   TryHackMe   Root-Me


TryHackMe

Global Rank Top Streak
#15895 1% 580 days

CVE Proof of Concepts

CVE Description 🍴 👁️ 📥
CVE-2025-55182 This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell. 12 3 3291 325
CVE-2025-29927 This repository contains a POC and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in middleware. 5 3 990 166

Projects

Project Description 🍴 👁️ 📥
oss-oopssec-store The first security CTF lab built with React and Next.js. Open you browser and start hacking. 11 27 2016 5005
cyber-bot Threat intelligence platform: RSS aggregation, NVD CVE tracking, ENISA EUVD, databreaches, ... 3 1 169 350
hate-crimes-map This project aims to visualize hate crime data to bring visibility to crimes that are often invisible or normalized by society. 3 - 14 10
crack-hash A fast, multi-threaded hash cracking tool written in Rust. This tool performs dictionary attacks against hashed passwords. 2 - 13 6
OSS Contributions (10)
Repository Description 🍴
usebruno/bruno Opensource IDE For Exploring and Testing API's (lightweight alternative to Postman/Insomnia) 41818 2199
infoslack/awesome-web-hacking A list of web application security 6812 1278
kanbn/kan The open source Trello alternative. 4521 292
OWASP/www-project-vulnerable-web-applications-directory The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available. 81 45
lingdojo/kana-dojo Aesthetic, minimalist platform for learning Japanese inspired by Duolingo and Monkeytype, built with Next.js and sponsored by Vercel. Beginner-friendly with plenty of good first issues - all contributions are welcome! 1869 1105
fabionoth/awesome-cyber-security A collection of awesome software, libraries, documents, books, resources and cools stuffs about security. 1820 248
vavkamil/awesome-vulnerable-apps Awesome Vulnerable Applications 1374 211
kaiiyer/awesome-vulnerable A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB. 1268 209
okhosting/awesome-cyber-security A curated list of cyber security resources and tools. 474 65
secnotes/awesome-cybersecurity A collection of awesome github repositories about security 72 6
Certificates (118)
Github Metrics

TryHackMe Badges (46)
  • Networking NerdCompleting the 'Network Fundamentals' module
  • 7 Day StreakAchieving a 7 day hacking streak
  • WebbedUnderstands how the world wide web works
  • World Wide WebCompleting the 'How The Web Works' module
  • cat linux.txtBeing competent in Linux
  • 30 Day StreakHacking for 30 days solid
  • OWASP Top 10Understanding every OWASP vulnerability
  • Hash CrackerCracking all those hashes
  • MetasploitableContains the knowledge to use Metasploit
  • BlueHacking into Windows via EternalBlue
  • Cyber ReadyUnderstanding impact of training on teams
  • Sword ApprenticeCompleting the SQLMap room
  • Shield ApprenticeCompleting the FlareVM room
  • 90 Day StreakHacking for 90 days in a row
  • Linux PrivEscMastering Linux Privilege Escalation
  • Pentesting PrinciplesCompleting the 'Introduction to Pentesting' module
  • Intro to Web HackingCompleting the 'Introduction to Web Hacking' module
  • Advent of Cyber 2024Completing Advent of Cyber 2024!
  • Burp'edCompleting the Burp Suite module
  • 180 Day StreakHacking for 180 days in a row
  • Authentication StrikerUsed the Hammer to bypass authentication
  • SQL SlayerConquered Advanced SQL Injection
  • System SnifferCompleted the File Path traversal room
  • OhSINTCompleting the OhSINT room
  • Client-Side ChampSuccessfully exploited client-side vulnerabilities
  • Introduction to Security EngineeringCompleted the Security Engineer Intro room!
  • Calculated Risk — _Completed the Risk Management room! _
  • 3 Day StreakAchieving a 3 day hacking streak
  • Network and System SecurityFinished the Auditing and Monitoring room!
  • Software Security — _Completed the OWASP API Security Top 10 rooms! _
  • 365 Day StreakHacking for 365 days in a row
  • The Course AwakensFinishing the first room in the DevSecOps path!
  • Just have to deal with it — _Successfully managed a cyber crisis! _
  • Raffle RoyaltyParticipating in Hack2Win 2025!
  • /opt/m0th3rFinishing Mother’s Secret!
  • Skilled NavigatorFinishing the Eviction challenge!
  • First Step into SOCExplored emerging threats and SOC response
  • SOC ApprenticeExplored how a SOC team operates from inside
  • First alert closedClosing your first alert
  • First scenario completedCompleting your first scenario
  • 100% true positive rateAchieving 100% true positive rate in a scenario
  • 500 Day StreakHacking for 500 days in a row
  • Tooling SpecialistAdept in creating custom offensive tooling
  • Advent of Cyber 2025Completing Advent of Cyber 2025!
  • Model CompromiseCompleted the LLM Attacks Module
  • Session HeldCompleting 4 weekly missions in a row!
TryHackMe Completed Rooms (295)
# Room Difficulty
1 Crack the hash easy
2 Pickle Rick easy
3 Blue easy
4 OhSINT easy
5 Basic Pentesting easy
6 Vulnversity easy
7 Simple CTF easy
8 Kenobi easy
9 tmux easy
10 Steel Mountain easy
11 Hacking with PowerShell easy
12 Agent Sudo easy
13 LazyAdmin easy
14 Introductory Networking easy
15 Common Linux Privesc easy
16 Google Dorking easy
17 Network Services easy
18 Introductory Researching easy
19 What the Shell? easy
20 Hashing - Crypto 101 medium
21 Linux PrivEsc medium
22 Upload Vulnerabilities easy
23 Encryption - Crypto 101 medium
24 Bounty Hacker easy
25 OWASP Juice Shop easy
26 Overpass easy
27 Network Services 2 easy
28 RootMe easy
29 Tutorial easy
30 MITRE medium
31 Starting Out In Cyber Sec easy
32 Nmap easy
33 Introduction to Flask easy
34 John the Ripper: The Basics easy
35 Linux Fundamentals Part 1 info
36 Linux Fundamentals Part 2 info
37 How Websites Work easy
38 Linux Fundamentals Part 3 info
39 Putting it all together easy
40 DNS in Detail easy
41 HTTP in Detail easy
42 Windows Fundamentals 1 info
43 Windows Fundamentals 2 info
44 What is Networking? info
45 Intro to LAN info
46 OSI Model info
47 Packets & Frames info
48 Extending Your Network info
49 Learning Cyber Security easy
50 Windows Fundamentals 3 info
51 Linux Privilege Escalation medium
52 Walking An Application easy
53 Pentesting Fundamentals easy
54 Principles of Security info
55 Metasploit: Exploitation easy
56 Content Discovery easy
57 Subdomain Enumeration easy
58 Authentication Bypass easy
59 Junior Security Analyst Intro easy
60 Passive Reconnaissance easy
61 Active Reconnaissance easy
62 Nmap Live Host Discovery medium
63 Nmap Basic Port Scans easy
64 Nmap Advanced Port Scans medium
65 Metasploit: Introduction easy
66 IDOR easy
67 Vulnerabilities 101 easy
68 Metasploit: Meterpreter easy
69 Intro to SSRF easy
70 Pyramid Of Pain easy
71 Intro to Cross-site Scripting easy
72 Nmap Post Port Scans medium
73 Cyber Kill Chain easy
74 Diamond Model easy
75 Vulnerability Capstone easy
76 Exploit Vulnerabilities easy
77 Protocols and Servers easy
78 SQL Injection medium
79 Command Injection easy
80 Net Sec Challenge medium
81 File Inclusion medium
82 Protocols and Servers 2 medium
83 Red Team Fundamentals easy
84 Pwnkit: CVE-2021-4034 info
85 Threat Intelligence Tools easy
86 Intro to Digital Forensics easy
87 Introduction to DevSecOps medium
88 Operating System Security easy
89 Offensive Security Intro easy
90 Lo-Fi easy
91 Network Security easy
92 Web Application Security easy
93 Unified Kill Chain easy
94 Spring4Shell: CVE-2022-22965 info
95 Defensive Security Intro easy
96 SSDLC medium
97 Security Operations easy
98 Careers in Cyber info
99 Windows Privilege Escalation medium
100 Wireshark: The Basics easy
101 Intro to Cyber Threat Intel easy
102 Introduction to SIEM easy
103 Active Directory Basics easy
104 Microsoft Windows Hardening easy
105 Security Principles easy
106 Atlassian CVE-2022-26134 easy
107 Secure Network Architecture medium
108 Active Directory Hardening medium
109 Introduction to Cryptography medium
110 Network Security Protocols medium
111 OWASP API Security Top 10 - 2 medium
112 OWASP API Security Top 10 - 1 medium
113 Intro to Cloud Security easy
114 Linux System Hardening medium
115 Virtualization and Containers easy
116 Vulnerability Management medium
117 DAST medium
118 Weaponizing Vulnerabilities medium
119 Identity and Access Management easy
120 Network Device Hardening medium
121 Threat Modelling medium
122 Governance & Regulation easy
123 Mother's Secret easy
124 Security Engineer Intro easy
125 SAST medium
126 Risk Management easy
127 Logging for Accountability easy
128 Traverse easy
129 Auditing and Monitoring easy
130 Intro to IR and IM easy
131 Becoming a First Responder info
132 Cyber Crisis Management easy
133 W1seGuy easy
134 Burp Suite: The Basics info
135 Burp Suite: Repeater info
136 Burp Suite: Intruder medium
137 Burp Suite: Other Modules easy
138 Burp Suite: Extensions easy
139 Eviction easy
140 Summit easy
141 Light easy
142 HTTP Request Smuggling easy
143 The Witch's Cauldron easy
144 Confluence CVE-2023-22515 easy
145 SSRF medium
146 Become a Hacker easy
147 The Sticker Shop easy
148 File Inclusion, Path Traversal medium
149 CSRF medium
150 XSS easy
151 CORS & SOP easy
152 Prototype Pollution medium
153 Snyk Open Source easy
154 Include medium
155 Moniker Link (CVE-2024-21413) easy
156 Snyk Code easy
157 Race Conditions medium
158 LDAP Injection easy
159 Whats Your Name? medium
160 DOM-Based Attacks easy
161 XXE Injection medium
162 Insecure Deserialisation medium
163 Windows Command Line easy
164 Search Skills easy
165 Server-side Template Injection medium
166 JWT Security easy
167 Nmap: The Basics easy
168 Networking Concepts easy
169 Tcpdump: The Basics easy
170 Networking Essentials easy
171 Networking Core Protocols easy
172 Networking Secure Protocols easy
173 Advanced SQL Injection medium
174 Incident Response Fundamentals easy
175 ORM Injection medium
176 NoSQL Injection easy
177 Logs Fundamentals easy
178 Enumeration & Brute Force easy
179 SOC Fundamentals easy
180 Digital Forensics Fundamentals easy
181 Session Management easy
182 Injectics medium
183 Firewall Fundamentals easy
184 OAuth Vulnerabilities medium
185 IDS Fundamentals easy
186 Multi-Factor Authentication easy
187 Vulnerability Scanner Overview easy
188 Hammer medium
189 CyberChef: The Basics easy
190 Public Key Cryptography Basics easy
191 Cryptography Basics easy
192 Hashing Basics easy
193 CAPA: The Basics easy
194 Windows PowerShell easy
195 FlareVM: Arsenal of Tools easy
196 REMnux: Getting Started easy
197 Linux Shells easy
198 Length Extension Attacks medium
199 Insecure Randomness easy
200 Gobuster: The Basics easy
201 Training Impact on Teams info
202 SQLMap: The Basics easy
203 Advent of Cyber 2024 easy
204 JavaScript Essentials easy
205 Web Application Basics easy
206 SQL Fundamentals easy
207 Shells Overview easy
208 Padding Oracles medium
209 Breaking Crypto the Simple Way easy
210 Custom Tooling Using Python easy
211 Custom Tooling using Burp hard
212 Tooling via Browser Automation easy
213 SOC L1 Alert Triage easy
214 SOC L1 Alert Reporting easy
215 SOC Workbooks and Lookups easy
216 Attacking ECB Oracles hard
217 Next.js: CVE-2025-29927 easy
218 SOC Metrics and Objectives easy
219 CAPTCHApocalypse medium
220 Offensive Security Intro easy
221 Erlang/OTP SSH: CVE-2025-32433 easy
222 Writing Pentest Reports easy
223 Extract hard
224 Cipher's Secret Message easy
225 Evil-GPT easy
226 Evil-GPT v2 easy
227 Sequence medium
228 Roundcube: CVE-2025-49113 easy
229 Chaining Vulnerabilities easy
230 Voyage medium
231 Humans as Attack Vectors easy
232 Systems as Attack Vectors easy
233 SOC Role in Blue Team easy
234 Defensive Security Intro easy
235 Hack2Win: How you can grab extra tickets info
236 Introduction to EDR easy
237 Input Manipulation & Prompt Injection easy
238 Data Integrity & Model Poisoning medium
239 LLM Output Handling and Privacy Risks easy
240 IDOR - Santa’s Little IDOR medium
241 Obfuscation - The Egg Shell File medium
242 XSS - Merry XSSMas easy
243 Passwords - A Cracking Christmas easy
244 SOC Alert Triaging - Tinsel Triage medium
245 Splunk Basics - Did you SIEM? medium
246 Phishing - Merry Clickmas easy
247 Prompt Injection - Sched-yule conflict easy
248 Linux CLI - Shells Bells easy
249 YARA Rules - YARA mean one! medium
250 Forensics - Registry Furensics medium
251 Exploitation with cURL - Hoperation Eggsploit easy
252 ICS/Modbus - Claus for Concern medium
253 Race Conditions - Toy to The World easy
254 Network Discovery - Scan-ta Clause easy
255 Containers - DoorDasher's Demise medium
256 CyberChef - Hoperation Save McSkidy medium
257 Phishing - Phishmas Greetings medium
258 AI in Security - old sAInt nick easy
259 Malware Analysis - Malhare.exe easy
260 C2 Detection - Command & Carol medium
261 AWS Security - S3cret Santa easy
262 Malware Analysis - Egg-xecutable medium
263 Web Attack Forensics - Drone Alone medium
264 Cloud Security Pitfalls easy
265 Juicy medium
266 Advent of Cyber Prep Track easy
267 OWASP Top 10 2025: Insecure Data Handling easy
268 WAF: Introduction easy
269 BankGPT easy
270 HealthGPT easy
271 React2Shell: CVE-2025-55182 easy
272 Virtualisation Basics easy
273 Operating Systems: Introduction easy
274 Linux CLI Basics easy
275 Data Representation easy
276 Data Encoding easy
277 JavaScript: Simple Demo medium
278 Python: Simple Demo easy
279 Windows Basics easy
280 Cloud Computing Fundamentals easy
281 Windows CLI Basics easy
282 The CIA Triad easy
283 Database SQL Basics easy
284 Cryptography Concepts easy
285 Client-Server Basics easy
286 Become a Hacker easy
287 Become a Defender easy
288 n8n: CVE-2025-68613 easy
289 Offensive Security Intro easy
290 Inside a Computer System easy
291 GeoServer: CVE-2025-58360 medium
292 Offensive Security Intro easy
293 Defensive Security Intro info
294 Computer Types easy
295 Defensive Security Intro info

Pinned Loading

  1. oss-oopssec-store oss-oopssec-store Public

    The first security CTF lab built with React and Next.js. Open you browser and start hacking.

    TypeScript 11 27

  2. poc-cve-2025-55182 poc-cve-2025-55182 Public

    This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell.

    TypeScript 12 3

  3. poc-cve-2025-29927 poc-cve-2025-29927 Public

    This repository contains a proof of concept (POC) and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in m…

    JavaScript 5 3

  4. cyber-bot cyber-bot Public

    Cyber Bot is an Node.js project that helps users improve their cybersecurity skills through scheduled Telegram messages.

    JavaScript 3 1

  5. crack-hash crack-hash Public

    A fast, multi-threaded hash cracking tool written in Rust. This tool performs dictionary attacks against hashed passwords.

    Rust 2

  6. hate-crimes-map hate-crimes-map Public

    This project aims to visualize hate crime data to bring visibility to crimes that are often invisible or normalized by society.

    TypeScript 3