/pygoat

intentionally vuln web Application Security in flask or django

Primary LanguageHTML

pygoat

intentionally vuln web Application Security in flask or django. our roadmap build intentionally vuln web Application in flask or django the vulnerability can based on OWASP top ten
• A1:2017-Injection
• A2:2017-Broken Authentication
• A3:2017-Sensitive Data Exposure
• A4:2017-XML External Entities (XXE)
• A5:2017-Broken Access Control
• A6:2017-Security Misconfiguration
• A7:2017-Cross-Site Scripting (XSS)
• A8:2017-Insecure Deserialization
• A9:2017-Using Components with Known Vulnerabilities
• A10:2017-Insufficient Logging & Monitoring

To setup the project on your local machine:
1. Click on Fork.
2. Go to your fork and clone the project to your local machine.
3. Install the requirements pip install -r requirements.txt.
4. Apply the migrations python manage.py migrate.
5. Finally, run the development server python manage.py runserver.

The project will be available at 127.0.0.1:8000.