Skip to content
View kOaDT's full-sized avatar

Block or report kOaDT

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kOaDT/README.md

AppSec & Software Developer

Header

Website   TryHackMe   Root-Me


TryHackMe

Global Rank Top Streak
#16027 1% 579 days

CVE Proof of Concepts

CVE Description 🍴 👁️ 📥
CVE-2025-55182 This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell. 12 3 3271 322
CVE-2025-29927 This repository contains a POC and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in middleware. 5 3 986 162

Projects

Project Description 🍴 👁️ 📥
oss-oopssec-store The first security CTF lab built with React and Next.js. Open you browser and start hacking. 11 27 1958 4867
cyber-bot Threat intelligence platform: RSS aggregation, NVD CVE tracking, ENISA EUVD, databreaches, ... 3 1 167 349
hate-crimes-map This project aims to visualize hate crime data to bring visibility to crimes that are often invisible or normalized by society. 3 - 13 10
crack-hash A fast, multi-threaded hash cracking tool written in Rust. This tool performs dictionary attacks against hashed passwords. 2 - 12 6
OSS Contributions (10)
Repository Description 🍴
usebruno/bruno Opensource IDE For Exploring and Testing API's (lightweight alternative to Postman/Insomnia) 41794 2198
infoslack/awesome-web-hacking A list of web application security 6812 1278
kanbn/kan The open source Trello alternative. 4517 292
OWASP/www-project-vulnerable-web-applications-directory The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available. 81 45
lingdojo/kana-dojo Aesthetic, minimalist platform for learning Japanese inspired by Duolingo and Monkeytype, built with Next.js and sponsored by Vercel. Beginner-friendly with plenty of good first issues - all contributions are welcome! 1858 1097
fabionoth/awesome-cyber-security A collection of awesome software, libraries, documents, books, resources and cools stuffs about security. 1820 248
vavkamil/awesome-vulnerable-apps Awesome Vulnerable Applications 1373 212
kaiiyer/awesome-vulnerable A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB. 1267 209
okhosting/awesome-cyber-security A curated list of cyber security resources and tools. 471 64
secnotes/awesome-cybersecurity A collection of awesome github repositories about security 72 6
Certificates (118)
Github Metrics

TryHackMe Badges (46)
  • Networking NerdCompleting the 'Network Fundamentals' module
  • 7 Day StreakAchieving a 7 day hacking streak
  • WebbedUnderstands how the world wide web works
  • World Wide WebCompleting the 'How The Web Works' module
  • cat linux.txtBeing competent in Linux
  • 30 Day StreakHacking for 30 days solid
  • OWASP Top 10Understanding every OWASP vulnerability
  • Hash CrackerCracking all those hashes
  • MetasploitableContains the knowledge to use Metasploit
  • BlueHacking into Windows via EternalBlue
  • Cyber ReadyUnderstanding impact of training on teams
  • Sword ApprenticeCompleting the SQLMap room
  • Shield ApprenticeCompleting the FlareVM room
  • 90 Day StreakHacking for 90 days in a row
  • Linux PrivEscMastering Linux Privilege Escalation
  • Pentesting PrinciplesCompleting the 'Introduction to Pentesting' module
  • Intro to Web HackingCompleting the 'Introduction to Web Hacking' module
  • Advent of Cyber 2024Completing Advent of Cyber 2024!
  • Burp'edCompleting the Burp Suite module
  • 180 Day StreakHacking for 180 days in a row
  • Authentication StrikerUsed the Hammer to bypass authentication
  • SQL SlayerConquered Advanced SQL Injection
  • System SnifferCompleted the File Path traversal room
  • OhSINTCompleting the OhSINT room
  • Client-Side ChampSuccessfully exploited client-side vulnerabilities
  • Introduction to Security EngineeringCompleted the Security Engineer Intro room!
  • Calculated Risk — _Completed the Risk Management room! _
  • 3 Day StreakAchieving a 3 day hacking streak
  • Network and System SecurityFinished the Auditing and Monitoring room!
  • Software Security — _Completed the OWASP API Security Top 10 rooms! _
  • 365 Day StreakHacking for 365 days in a row
  • The Course AwakensFinishing the first room in the DevSecOps path!
  • Just have to deal with it — _Successfully managed a cyber crisis! _
  • Raffle RoyaltyParticipating in Hack2Win 2025!
  • /opt/m0th3rFinishing Mother’s Secret!
  • Skilled NavigatorFinishing the Eviction challenge!
  • First Step into SOCExplored emerging threats and SOC response
  • SOC ApprenticeExplored how a SOC team operates from inside
  • First alert closedClosing your first alert
  • First scenario completedCompleting your first scenario
  • 100% true positive rateAchieving 100% true positive rate in a scenario
  • 500 Day StreakHacking for 500 days in a row
  • Tooling SpecialistAdept in creating custom offensive tooling
  • Advent of Cyber 2025Completing Advent of Cyber 2025!
  • Model CompromiseCompleted the LLM Attacks Module
  • Session HeldCompleting 4 weekly missions in a row!
TryHackMe Completed Rooms (294)
# Room Difficulty
1 Crack the hash easy
2 Pickle Rick easy
3 Blue easy
4 OhSINT easy
5 Basic Pentesting easy
6 Vulnversity easy
7 Simple CTF easy
8 Kenobi easy
9 tmux easy
10 Steel Mountain easy
11 Hacking with PowerShell easy
12 Agent Sudo easy
13 LazyAdmin easy
14 Introductory Networking easy
15 Common Linux Privesc easy
16 Network Services easy
17 Introductory Researching easy
18 What the Shell? easy
19 Hashing - Crypto 101 medium
20 Linux PrivEsc medium
21 Upload Vulnerabilities easy
22 Encryption - Crypto 101 medium
23 Bounty Hacker easy
24 OWASP Juice Shop easy
25 Overpass easy
26 Network Services 2 easy
27 RootMe easy
28 Tutorial easy
29 MITRE medium
30 Starting Out In Cyber Sec easy
31 Nmap easy
32 Introduction to Flask easy
33 John the Ripper: The Basics easy
34 Linux Fundamentals Part 1 info
35 Linux Fundamentals Part 2 info
36 How Websites Work easy
37 Linux Fundamentals Part 3 info
38 Putting it all together easy
39 DNS in Detail easy
40 HTTP in Detail easy
41 Windows Fundamentals 1 info
42 Windows Fundamentals 2 info
43 What is Networking? info
44 Intro to LAN info
45 OSI Model info
46 Packets & Frames info
47 Extending Your Network info
48 Learning Cyber Security easy
49 Windows Fundamentals 3 info
50 Linux Privilege Escalation medium
51 Walking An Application easy
52 Pentesting Fundamentals easy
53 Principles of Security info
54 Metasploit: Exploitation easy
55 Content Discovery easy
56 Subdomain Enumeration easy
57 Authentication Bypass easy
58 Junior Security Analyst Intro easy
59 Passive Reconnaissance easy
60 Active Reconnaissance easy
61 Nmap Live Host Discovery medium
62 Nmap Basic Port Scans easy
63 Nmap Advanced Port Scans medium
64 Metasploit: Introduction easy
65 IDOR easy
66 Vulnerabilities 101 easy
67 Metasploit: Meterpreter easy
68 Intro to SSRF easy
69 Pyramid Of Pain easy
70 Intro to Cross-site Scripting easy
71 Nmap Post Port Scans medium
72 Cyber Kill Chain easy
73 Diamond Model easy
74 Vulnerability Capstone easy
75 Exploit Vulnerabilities easy
76 Protocols and Servers easy
77 SQL Injection medium
78 Command Injection easy
79 Net Sec Challenge medium
80 File Inclusion medium
81 Protocols and Servers 2 medium
82 Red Team Fundamentals easy
83 Pwnkit: CVE-2021-4034 info
84 Threat Intelligence Tools easy
85 Intro to Digital Forensics easy
86 Introduction to DevSecOps medium
87 Operating System Security easy
88 Offensive Security Intro easy
89 Lo-Fi easy
90 Network Security easy
91 Web Application Security easy
92 Unified Kill Chain easy
93 Spring4Shell: CVE-2022-22965 info
94 Defensive Security Intro easy
95 SSDLC medium
96 Security Operations easy
97 Careers in Cyber info
98 Windows Privilege Escalation medium
99 Wireshark: The Basics easy
100 Intro to Cyber Threat Intel easy
101 Introduction to SIEM easy
102 Active Directory Basics easy
103 Microsoft Windows Hardening easy
104 Security Principles easy
105 Atlassian CVE-2022-26134 easy
106 Secure Network Architecture medium
107 Active Directory Hardening medium
108 Introduction to Cryptography medium
109 Network Security Protocols medium
110 OWASP API Security Top 10 - 2 medium
111 OWASP API Security Top 10 - 1 medium
112 Intro to Cloud Security easy
113 Linux System Hardening medium
114 Virtualization and Containers easy
115 Vulnerability Management medium
116 DAST medium
117 Weaponizing Vulnerabilities medium
118 Identity and Access Management easy
119 Network Device Hardening medium
120 Threat Modelling medium
121 Governance & Regulation easy
122 Mother's Secret easy
123 Security Engineer Intro easy
124 SAST medium
125 Risk Management easy
126 Logging for Accountability easy
127 Traverse easy
128 Auditing and Monitoring easy
129 Intro to IR and IM easy
130 Becoming a First Responder info
131 Cyber Crisis Management easy
132 W1seGuy easy
133 Burp Suite: The Basics info
134 Burp Suite: Repeater info
135 Burp Suite: Intruder medium
136 Burp Suite: Other Modules easy
137 Burp Suite: Extensions easy
138 Eviction easy
139 Summit easy
140 Light easy
141 HTTP Request Smuggling easy
142 The Witch's Cauldron easy
143 Confluence CVE-2023-22515 easy
144 SSRF medium
145 Become a Hacker easy
146 The Sticker Shop easy
147 File Inclusion, Path Traversal medium
148 CSRF medium
149 XSS easy
150 CORS & SOP easy
151 Prototype Pollution medium
152 Snyk Open Source easy
153 Include medium
154 Moniker Link (CVE-2024-21413) easy
155 Snyk Code easy
156 Race Conditions medium
157 LDAP Injection easy
158 Whats Your Name? medium
159 DOM-Based Attacks easy
160 XXE Injection medium
161 Insecure Deserialisation medium
162 Windows Command Line easy
163 Search Skills easy
164 Server-side Template Injection medium
165 JWT Security easy
166 Nmap: The Basics easy
167 Networking Concepts easy
168 Tcpdump: The Basics easy
169 Networking Essentials easy
170 Networking Core Protocols easy
171 Networking Secure Protocols easy
172 Advanced SQL Injection medium
173 Incident Response Fundamentals easy
174 ORM Injection medium
175 NoSQL Injection easy
176 Logs Fundamentals easy
177 Enumeration & Brute Force easy
178 SOC Fundamentals easy
179 Digital Forensics Fundamentals easy
180 Session Management easy
181 Injectics medium
182 Firewall Fundamentals easy
183 OAuth Vulnerabilities medium
184 IDS Fundamentals easy
185 Multi-Factor Authentication easy
186 Vulnerability Scanner Overview easy
187 Hammer medium
188 CyberChef: The Basics easy
189 Public Key Cryptography Basics easy
190 Cryptography Basics easy
191 Hashing Basics easy
192 CAPA: The Basics easy
193 Windows PowerShell easy
194 FlareVM: Arsenal of Tools easy
195 REMnux: Getting Started easy
196 Linux Shells easy
197 Length Extension Attacks medium
198 Insecure Randomness easy
199 Gobuster: The Basics easy
200 Training Impact on Teams info
201 SQLMap: The Basics easy
202 Advent of Cyber 2024 easy
203 JavaScript Essentials easy
204 Web Application Basics easy
205 SQL Fundamentals easy
206 Shells Overview easy
207 Padding Oracles medium
208 Breaking Crypto the Simple Way easy
209 Custom Tooling Using Python easy
210 Custom Tooling using Burp hard
211 Tooling via Browser Automation easy
212 SOC L1 Alert Triage easy
213 SOC L1 Alert Reporting easy
214 SOC Workbooks and Lookups easy
215 Attacking ECB Oracles hard
216 Next.js: CVE-2025-29927 easy
217 SOC Metrics and Objectives easy
218 CAPTCHApocalypse medium
219 Offensive Security Intro easy
220 Erlang/OTP SSH: CVE-2025-32433 easy
221 Writing Pentest Reports easy
222 Extract hard
223 Cipher's Secret Message easy
224 Evil-GPT easy
225 Evil-GPT v2 easy
226 Sequence medium
227 Roundcube: CVE-2025-49113 easy
228 Chaining Vulnerabilities easy
229 Voyage medium
230 Humans as Attack Vectors easy
231 Systems as Attack Vectors easy
232 SOC Role in Blue Team easy
233 Defensive Security Intro easy
234 Hack2Win: How you can grab extra tickets info
235 Introduction to EDR easy
236 Input Manipulation & Prompt Injection easy
237 Data Integrity & Model Poisoning medium
238 LLM Output Handling and Privacy Risks easy
239 IDOR - Santa’s Little IDOR medium
240 Obfuscation - The Egg Shell File medium
241 XSS - Merry XSSMas easy
242 Passwords - A Cracking Christmas easy
243 SOC Alert Triaging - Tinsel Triage medium
244 Splunk Basics - Did you SIEM? medium
245 Phishing - Merry Clickmas easy
246 Prompt Injection - Sched-yule conflict easy
247 Linux CLI - Shells Bells easy
248 YARA Rules - YARA mean one! medium
249 Forensics - Registry Furensics medium
250 Exploitation with cURL - Hoperation Eggsploit easy
251 ICS/Modbus - Claus for Concern medium
252 Race Conditions - Toy to The World easy
253 Network Discovery - Scan-ta Clause easy
254 Containers - DoorDasher's Demise medium
255 CyberChef - Hoperation Save McSkidy medium
256 Phishing - Phishmas Greetings medium
257 AI in Security - old sAInt nick easy
258 Malware Analysis - Malhare.exe easy
259 C2 Detection - Command & Carol medium
260 AWS Security - S3cret Santa easy
261 Malware Analysis - Egg-xecutable medium
262 Web Attack Forensics - Drone Alone medium
263 Cloud Security Pitfalls easy
264 Juicy medium
265 Advent of Cyber Prep Track easy
266 OWASP Top 10 2025: Insecure Data Handling easy
267 WAF: Introduction easy
268 BankGPT easy
269 HealthGPT easy
270 React2Shell: CVE-2025-55182 easy
271 Virtualisation Basics easy
272 Operating Systems: Introduction easy
273 Linux CLI Basics easy
274 Data Representation easy
275 Data Encoding easy
276 JavaScript: Simple Demo medium
277 Python: Simple Demo easy
278 Windows Basics easy
279 Cloud Computing Fundamentals easy
280 Windows CLI Basics easy
281 The CIA Triad easy
282 Database SQL Basics easy
283 Cryptography Concepts easy
284 Client-Server Basics easy
285 Become a Hacker easy
286 Become a Defender easy
287 n8n: CVE-2025-68613 easy
288 Offensive Security Intro easy
289 Inside a Computer System easy
290 GeoServer: CVE-2025-58360 medium
291 Offensive Security Intro easy
292 Defensive Security Intro info
293 Computer Types easy
294 Defensive Security Intro info

Pinned Loading

  1. oss-oopssec-store oss-oopssec-store Public

    The first security CTF lab built with React and Next.js. Open you browser and start hacking.

    TypeScript 11 27

  2. poc-cve-2025-55182 poc-cve-2025-55182 Public

    This repository contains a POC of CVE-2025-55182, a critical (CVSS score 10.0) pre-authentication remote code execution vulnerability affecting React Server Components, also known as React2Shell.

    TypeScript 12 3

  3. poc-cve-2025-29927 poc-cve-2025-29927 Public

    This repository contains a proof of concept (POC) and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in m…

    JavaScript 5 3

  4. cyber-bot cyber-bot Public

    Cyber Bot is an Node.js project that helps users improve their cybersecurity skills through scheduled Telegram messages.

    JavaScript 3 1

  5. crack-hash crack-hash Public

    A fast, multi-threaded hash cracking tool written in Rust. This tool performs dictionary attacks against hashed passwords.

    Rust 2

  6. hate-crimes-map hate-crimes-map Public

    This project aims to visualize hate crime data to bring visibility to crimes that are often invisible or normalized by society.

    TypeScript 3