OWASP / www-project-vulnerable-web-applications-directory
The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.
β35Updated this week
Alternatives and similar repositories for www-project-vulnerable-web-applications-directory:
Users that are interested in www-project-vulnerable-web-applications-directory are comparing it to the libraries listed below
- Some good resources for getting started with application securityβ142Updated 3 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecretsβ45Updated this week
- π Websheep is an app based on a willingly vulnerable ReSTful APIs.β53Updated last year
- ποΈ A [work-in-progress] collection for interview questions for Information Security rolesβ135Updated 2 years ago
- Vulnerable Python Application To Learn Secure Developmentβ102Updated 10 months ago
- Curated list of public penetration test reports released by several consulting firms and academic security groupsβ33Updated 7 years ago
- Damn Vulnerable WordPress Siteβ51Updated 2 years ago
- How to prepare for OSCP complete guideβ129Updated 5 years ago
- Monorepo of Labs for the Security Knowledge Framework (SKF)β35Updated 7 months ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example aβ¦β25Updated 2 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashesβ30Updated last year
- Summary of Cyber Security interview questions I have been through, hope this helpsβ64Updated 5 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Contβ¦β47Updated 11 months ago
- OWASP Foundation Web Respositoryβ30Updated 2 years ago
- Penetration Testing Labβ24Updated 10 years ago
- β76Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Securityβ64Updated last year
- β14Updated 3 years ago
- InfoSec OpenAI Examplesβ19Updated last year
- A LateX template for penetration testing reportsβ105Updated 5 years ago
- Script to manage and create local pentesting training virtual labβ48Updated 4 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaksβ80Updated 2 years ago
- An ongoing list of virtual cybersecurity conferences.β117Updated 4 years ago
- Publicly availalbe vulnarble by desgin vm/machinesβ30Updated 2 years ago
- Penetration Testing Checklistβ35Updated 4 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility tβ¦β98Updated 6 months ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessionsβ104Updated last year
- A quick reference for understanding the nature and severity of vulnerabilities in TLS configurations and implementations.β26Updated 4 years ago
- Mindmaps allow to organize and understand information faster and better.β2Updated 3 years ago
- a curated list of useful threat modeling resourcesβ131Updated 9 months ago