Damn Vulnerable IoT Device
☆219Feb 12, 2024Updated 2 years ago
Alternatives and similar repositories for DVID
Users that are interested in DVID are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- Damn Vulnerable Java (EE) Application☆147Jan 23, 2024Updated 2 years ago
- Damn Vulnerable C# Application (API)☆80Jul 15, 2024Updated last year
- The Damn Vulnerable Router Firmware Project☆711Apr 7, 2021Updated 4 years ago
- Damn Vulnerable Thick Client App developed in C# .NET☆177Aug 17, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Dec 8, 2022Updated 3 years ago
- Damn Vulnerable Cloud Application☆210Sep 12, 2018Updated 7 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆878Oct 5, 2025Updated 5 months ago
- Damn Vulnerable Python Web App☆185May 21, 2024Updated last year
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆269Aug 22, 2018Updated 7 years ago
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆738Dec 13, 2023Updated 2 years ago
- A Virtual environment for Pentesting IoT Devices☆445Aug 25, 2025Updated 7 months ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Updated this week
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn rea…☆458Dec 6, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆15Mar 3, 2026Updated 3 weeks ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆920Oct 30, 2024Updated last year
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆185Mar 29, 2020Updated 6 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆77Oct 6, 2024Updated last year
- A Curated list of Security Resources for all connected things☆3,216Mar 7, 2026Updated 3 weeks ago
- A curated list of awesome embedded and IoT security resources.☆2,259Oct 17, 2023Updated 2 years ago
- Damn Vulnerable NodeJS Application☆766Mar 27, 2024Updated 2 years ago
- Advanced: Bluetooth low energy capture the flag☆65Aug 4, 2023Updated 2 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆31Oct 26, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆451Oct 5, 2025Updated 5 months ago
- Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security e…☆1,069Mar 29, 2024Updated 2 years ago
- These are my notes for OSCP preparation. Hope you'll find them useful.☆14Mar 11, 2019Updated 7 years ago
- Presented hardware reverse engineering workshops since 2019☆62Aug 8, 2024Updated last year
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,677May 24, 2025Updated 10 months ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆848Aug 22, 2025Updated 7 months ago
- OWASP IoT Top 10 2018 Mapping Project☆22Oct 16, 2019Updated 6 years ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆11May 10, 2019Updated 6 years ago
- Laser Fault Injection on a Budget: RP2350 Edition☆13Dec 14, 2024Updated last year
- Rhme2 challenge (2016)☆330Jun 12, 2017Updated 8 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,993May 20, 2025Updated 10 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆117Jul 29, 2025Updated 8 months ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,192Nov 25, 2024Updated last year