vulnerable-application
There are 48 repositories under vulnerable-application topic.
roottusk/vapi
vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
oversecured/ovaa
Oversecured Vulnerable Android App
rewanthtammana/Damn-Vulnerable-Bank
Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android application security hacking skills.
SasanLabs/VulnerableApp
OWASP VulnerableApp Project: For Security Enthusiasts by Security Enthusiasts.
logicalhacking/DVHMA
Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.
oversecured/OversecuredVulnerableiOSApp
Oversecured Vulnerable iOS App
incredibleindishell/sqlite-lab
This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is for fun. Just enjoy it \m/
HTBridge/pivaa
Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of mobile vulnerability scanners.
Warxim/vucsa
Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is written in Java (with JavaFX graphical user interface) and contains multiple challenges including SQL injection, RCE, XML vulnerabilities and more.
JOSHUAJEBARAJ/GCP-GOAT
GCP GOAT is the vulnerable application for learn the GCP Security
jaiswalakshansh/Vuldroid
Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code
SasanLabs/VulnerableApp-facade
VulnerableApp-facade is probably most modern lightweight distributed farm of Vulnerable Applications built for handling wide range of vulnerabilities across tech stacks.
Aif4thah/VulnerableLightApp
Vulnerable API for educational purposes
arall/vulnerabilities
Examples of different vulnerabilities, in a variety of languages, shapes and sizes.
SVelizDonoso/wingkalabs
Wingkalabs (Linux) Wingkalabs es una máquina Virtual Linux intencionalmente vulnerable. Esta máquina virtual se puede utilizar para realizar entrenamientos de seguridad, probar herramientas de seguridad y practicar técnicas comunes de pruebas de penetración.
codingo/cracknet
A .net Crackme Challenge made for the SecTalks Brisbane 2017 Capture the Flag Event. Writeup/solution included.
sec4you/VulnLabs
docker-compose bringing up multiple vulnerable applications inside containers.
OWASP/www-project-vulnerable-flask-app
OWASP Foundation Web Respository
qwqoro/Mail-Injection
📧 [Research] E-Mail Injection: Vulnerable applications
appsecco/owasp-webgoat-dot-net-docker
Docker container for running OWASP WebGoat.NET application
naryal2580/vfapi
Vulnerable FastAPI in reference to Opensource Web Application Security Project (OWASP) TOP 10: 2021
lobuhi/lobuhi.github.io
Rebujito is a fork of IppSec.Rocks and serves as a repo for hacking tools and other resources such as vulnerable apps, cheatsheets or methodologies.
UsagiB4/Vulnerable-Machines-for-Pentesting-and-Hacking
This is a collection of vulnerable machines that can help you to learn hacking, pentesting and bug hunting. I know there are a lot of lists out there, but most of them are not updated regularly. So I decided to make on myself. Hope this will help you
vvmlist/vvmlist.github.io
vvmlist is a list of vulnerable vms with key techniques used on them to solve.
m3ssap0/wordpress-really-simple-security-authn-bypass-vulnerable-application
WARNING: This is a vulnerable application to test the exploit for the Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924). Run it at your own risk!
videvelopers/Vulnerable-Flask-App
This is a vulnerable Flask web application designed to provide a lab environment for people who want to improve their web penetration testing skills. It includes multiple types of vulnerabilities for you to practice exploiting.
michealkeines/Vulnerable-API
The Vulnerable API Python Application is a purposely flawed Python app that uses Flask, Jinja, and SQLite3. It contains intentional security vulnerabilities like XSS, SQLi, HHI, LFI, RFI, and SSTI. The project aims to serve as an educational tool to learn about and test automated API scanners. Use responsibly in controlled environments only.
yusufarbc/DockerVuln
A TUI enviorment for vulnerable app containers.
logicalhacking/DVGM
Vulnerable Grade Management System
mleblebici/Vulnerable-Cassandra-App
testcases developed for research
anir0y/vwa_docker
vulnerable web application
irvinlim/vulnerability-testbeds
Bootstrap various intentionally vulnerable web apps with Docker Compose
m3ssap0/wordpress-jetpack-broken-access-control-vulnerable-application
WARNING: This is a vulnerable application to test the exploit for the Jetpack < 13.9.1 broken access control (CVE-2024-9926). Run it at your own risk!
sec-zone/vuln_app
Another vulnerable application for practicing web penetration testing.
dr34mhacks/operation-file-hunt
A vulnerable lab for understanding difference between LFI and File Retrieval