Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.
-
Updated
Nov 17, 2023 - Python
Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.
Frida scripts for mobile application dynamic-analysis.
Wordpress Watcher is a wrapper for WPScan that manages scans on multiple sites and reports by email and/or syslog. Schedule scans and get notified when vulnerabilities, outdated plugins and other risks are found.
Nikto Vulnerability Report Tool 🌌
Vulnerable FastAPI in reference to Opensource Web Application Security Project (OWASP) TOP 10: 2021
This is a vulnerable Flask web application designed to provide a lab environment for people who want to improve their web penetration testing skills. It includes multiple types of vulnerabilities for you to practice exploiting.
MonSurf is a Web surfing tool that searches for open/vulnerable IP Addresses, ports, webcams, security cameras, satellites and IoT Devices connected over the Internet through Shodan. Keep in mind that not all features work properly and requires special care, if you emcounter any issues please do share them at the issues sections. Happy Hunting!;)
Erlik 2 - Vulnerable-Flask-App
An example of an extremely vulnerable Django application. Clone of the DVWA.
A script that webs scrapes multiple webpages for known vulnerable Windows Drivers, SHA256 hashes all system drivers, looks for matching driver names and SHA256 hashes.
An intentionally vulnerable web application with 4 preexisting vulnerabilities to demonstrate fluency in complex web application security.
An intentionally-insecure web application built for educational purposes using agile development practices.
Scans the OS and system drivers and compares them to a curated list of known vulnerable and malicous drivers from a .csv file downloaded from "Living Off the Land" at https://www.loldrivers.io/
A playground with an intentionally terribly insecure binary to learn about ROP.
An automated tool for discovering vulnerabilities in GraphQL applications through fuzzing techniques, including OS Command Injection and XSS, with a focus on OWASP Top Ten vulnerabilities.
SQLi Labs
Vulnerable Web Application — Cyber Security Base 2023 course project I
Add a description, image, and links to the vulnerable topic page so that developers can more easily learn about it.
To associate your repository with the vulnerable topic, visit your repo's landing page and select "manage topics."