Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.
-
Updated
Nov 17, 2023 - Python
10000
Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.
Frida scripts for mobile application dynamic-analysis.
Wordpress Watcher is a wrapper for WPScan that manages scans on multiple sites and reports by email and/or syslog. Schedule scans and get notified when vulnerabilities, outdated plugins and other risks are found.
Nikto Vulnerability Report Tool 🌌
Vulnerable FastAPI in reference to Opensource Web Application Security Project (OWASP) TOP 10: 2021
This is a vulnerable Flask web application designed to provide a lab environment for people who want to improve their web penetration testing skills. It includes multiple types of vulnerabilities for you to practice exploiting.
MonSurf is a Web surfing tool that searches for open/vulnerable IP Addresses, ports, webcams, security cameras, satellites and IoT Devices connected over the Internet through Shodan. Keep in mind that not all features work properly and requires special care, if you emcounter any issues please do share them at the issues sections. Happy Hunting!;)
A script that webs scrapes multiple webpages for known vulnerable Windows Drivers, SHA256 hashes all system drivers, looks for matching driver names and SHA256 hashes.
An example of an extremely vulnerable Django application. Clone of the DVWA.
Erlik 2 - Vulnerable-Flask-App
A collection of containerized security vulnerabilities including privilege escalation CVEs and SUID exploits for hands-on penetration testing practice.
An intentionally vulnerable web application with 4 preexisting vulnerabilities to demonstrate fluency in complex web application security.
An intentionally-insecure web application built for educational purposes using agile development practices.
A Thick client app for linux, designed to be vulnerable. a.k.a. Linux-Damn-Vulnerable-Thick-Client or Linux-Thick-Client-GOAT
Living off the Land. Scan Windows for vulnerable and/or malicious drivers.
A playground with an intentionally terribly insecure binary to learn about ROP.
An automated tool for discovering vulnerabilities in GraphQL applications through fuzzing techniques, including OS Command Injection and XSS, with a focus on OWASP Top Ten vulnerabilities.
Add a description, image, and links to the vulnerable topic page so that developers can more easily learn about it.
To associate your repository with the vulnerable topic, visit your repo's landing page and select "manage topics."