a Damn Vulnerable Serverless Application
☆542Sep 12, 2023Updated 2 years ago
Alternatives and similar repositories for DVSA
Users that are interested in DVSA are comparing it to the libraries listed below
Sorting:
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Dec 8, 2022Updated 3 years ago
- Damn Vulnerable Cloud Application☆209Sep 12, 2018Updated 7 years ago
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- Damn Vulnerable Java (EE) Application☆147Jan 23, 2024Updated 2 years ago
- Damn Vulnerable C# Application (API)☆80Jul 15, 2024Updated last year
- Damn Vulnerable WordPress Site☆51Feb 24, 2023Updated 3 years ago
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flaws☆328Jul 30, 2024Updated last year
- OWASP Serverless Top 10☆217Jul 6, 2021Updated 4 years ago
- Damn Vulnerable Thick Client App developed in C# .NET☆176Aug 17, 2023Updated 2 years ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆269Aug 22, 2018Updated 7 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Mar 11, 2026Updated last week
- Damn Vulnerable Python Web App☆185May 21, 2024Updated last year
- Damn Vulnerable IoT Device☆219Feb 12, 2024Updated 2 years ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,510Updated this week
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn rea…☆458Dec 6, 2021Updated 4 years ago
- Damn Vulnerable NodeJS Application☆766Mar 27, 2024Updated last year
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,677May 24, 2025Updated 9 months ago
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆884Mar 2, 2026Updated 2 weeks ago
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆737Dec 13, 2023Updated 2 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆15Mar 3, 2026Updated 2 weeks ago
- The Damn Vulnerable Router Firmware Project☆712Apr 7, 2021Updated 4 years ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆918Oct 30, 2024Updated last year
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,984May 20, 2025Updated 10 months ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,097Updated this week
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆553Mar 12, 2026Updated last week
- Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security e…☆1,065Mar 29, 2024Updated last year
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,207Jul 14, 2024Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆136Apr 28, 2020Updated 5 years ago
- Multi-Cloud Security Auditing Tool☆7,579Sep 23, 2025Updated 5 months ago
- Web and mobile application security training platform☆1,428Updated this week
- Pentesting Mobile apps and resources www.sniferl4bs.com☆39Jul 10, 2021Updated 4 years ago
- A vulnerable Play application for attackers.☆18Mar 3, 2026Updated 2 weeks ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,182Nov 25, 2024Updated last year
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆435Oct 29, 2024Updated last year
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- An intentionally designed broken web application based on REST API.☆579Jun 10, 2021Updated 4 years ago
- Vulnerable Java based Web Application☆271Jun 20, 2024Updated last year
- barq: The AWS Cloud Post Exploitation framework!☆388Nov 19, 2022Updated 3 years ago