OWASP Vulnerable Web Application Project https://github.com/hummingbirdscyber
☆412Jul 10, 2024Updated last year
Alternatives and similar repositories for Vulnerable-Web-Application
Users that are interested in Vulnerable-Web-Application are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆883Apr 13, 2026Updated last month
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆41Jul 3, 2024Updated last year
- A deliberately vulnerable web application for learning web application security.☆151Apr 28, 2025Updated last year
- Awesome Vulnerable Applications☆1,405Updated this week
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆1,314Jan 11, 2026Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Vulnerable Banking Suite☆171Sep 29, 2025Updated 7 months ago
- A curated list of vulnerable web applications.☆343Dec 30, 2023Updated 2 years ago
- a Damn Vulnerable Serverless Application☆545Sep 12, 2023Updated 2 years ago
- Damn Vulnerable Java (EE) Application☆149Jan 23, 2024Updated 2 years ago
- Tool to export Juice Shop challenges and hints in data format compatible with CTFd, RootTheBox or FBCTF☆471Apr 16, 2026Updated last month
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- A simple PHP application to learn SQL Injection detection and exploitation techniques.☆128Oct 18, 2022Updated 3 years ago
- OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. This is…☆1,484Apr 20, 2026Updated last month
- A vulnerable Play application for attackers.☆18May 4, 2026Updated 2 weeks ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- OWASP VulnerableApp Project: Break it. Scan it. Reproduce it. Benchmark against it. Improve it.☆402Updated this week
- Vulnerable Java based Web Application☆275May 10, 2026Updated last week
- A very vulnerable web site written in NodeJS with the purpose of have a project with identified vulnerabilities to test the quality of se…☆488Aug 20, 2024Updated last year
- Open source education content for the researcher community☆2,783Apr 13, 2022Updated 4 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆775Aug 21, 2023Updated 2 years ago
- Damn Small Vulnerable Web☆867Dec 21, 2025Updated 5 months ago
- This repo contains resources that a beginner would need to get started in Web application penetration testing and bug hunting.☆19Jul 24, 2022Updated 3 years ago
- The Secure Coding Framework☆272Aug 18, 2020Updated 5 years ago
- ☆12Apr 14, 2021Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Web and mobile application security training platform☆1,441May 11, 2026Updated last week
- Hacking and Securing Java☆80Jan 24, 2019Updated 7 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- docker-compose bringing up multiple vulnerable applications inside containers.☆19Jan 29, 2018Updated 8 years ago
- ☆15Apr 13, 2021Updated 5 years ago
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flaws☆329Jul 30, 2024Updated last year
- Looks up permissions within Active Directory on a target (OU or Computer) to determine access to LAPS attributes (ms-Mcs-AdmPwdExpiration…☆16May 31, 2023Updated 2 years ago
- OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and p…☆1,771Feb 9, 2023Updated 3 years ago
- Damn Vulnerable Web Application Docker container☆225Jul 5, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Nod…☆2,040Jun 15, 2024Updated last year
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,131Mar 10, 2026Updated 2 months ago
- ☆12Apr 10, 2021Updated 5 years ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- Damn Vulnerable NodeJS Application☆772Mar 27, 2024Updated 2 years ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆20Jan 24, 2021Updated 5 years ago
- Updated crt.sh one liner to get subdomains☆18Jan 13, 2020Updated 6 years ago