Vulcainreo / DVIDView external linksLinks
Damn Vulnerable IoT Device
☆214Feb 12, 2024Updated 2 years ago
Alternatives and similar repositories for DVID
Users that are interested in DVID are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- Damn Vulnerable WordPress Site☆51Feb 24, 2023Updated 2 years ago
- Damn Vulnerable Java (EE) Application☆144Jan 23, 2024Updated 2 years ago
- Damn Vulnerable Thick Client App developed in C# .NET☆174Aug 17, 2023Updated 2 years ago
- Damn Vulnerable C# Application (API)☆79Jul 15, 2024Updated last year
- The Damn Vulnerable Router Firmware Project☆707Apr 7, 2021Updated 4 years ago
- Damn Vulnerable Cloud Application☆208Sep 12, 2018Updated 7 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆863Oct 5, 2025Updated 4 months ago
- Damn Vulnerable Python Web App☆183May 21, 2024Updated last year
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆269Aug 22, 2018Updated 7 years ago
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆731Dec 13, 2023Updated 2 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆185Mar 29, 2020Updated 5 years ago
- A Virtual environment for Pentesting IoT Devices☆442Aug 25, 2025Updated 5 months ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Jan 26, 2026Updated 2 weeks ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆912Oct 30, 2024Updated last year
- A Curated list of Security Resources for all connected things☆3,198Updated this week
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn rea…☆457Dec 6, 2021Updated 4 years ago
- Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security e…☆446Nov 19, 2019Updated 6 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆15May 3, 2020Updated 5 years ago
- A curated list of awesome embedded and IoT security resources.☆2,222Oct 17, 2023Updated 2 years ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆442Oct 5, 2025Updated 4 months ago
- A list of resources for those interested in hardware, embedded, and IoT security☆75Oct 6, 2024Updated last year
- An intentionally designed broken web application based on REST API.☆577Jun 10, 2021Updated 4 years ago
- Advanced: Bluetooth low energy capture the flag☆65Aug 4, 2023Updated 2 years ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆44Sep 18, 2019Updated 6 years ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,967May 20, 2025Updated 8 months ago
- Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security e…☆1,058Mar 29, 2024Updated last year
- Riscure Hack Me embedded hardware CTF 2017-2018.☆88May 29, 2018Updated 7 years ago
- These are my notes for OSCP preparation. Hope you'll find them useful.☆14Mar 11, 2019Updated 6 years ago
- Simple voltage glitcher implementation for the iCEBreaker FPGA board☆18Mar 2, 2020Updated 5 years ago
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆256Mar 2, 2022Updated 3 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆31Oct 26, 2019Updated 6 years ago
- Presented hardware reverse engineering workshops since 2019☆61Aug 8, 2024Updated last year
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆113Jul 29, 2025Updated 6 months ago
- Content related to hardware hacking☆56Mar 28, 2019Updated 6 years ago
- Postman Integration is an extension for burp to generate Postman collection fomat json file.☆20Sep 7, 2022Updated 3 years ago
- Simulator forked from ICSim used during Car Hacking Workshops☆19Aug 30, 2024Updated last year