Damn Vulnerable IoT Device
☆220Feb 12, 2024Updated 2 years ago
Alternatives and similar repositories for DVID
Users that are interested in DVID are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Damn Vulnerable Rails app☆14Sep 20, 2012Updated 13 years ago
- Damn Vulnerable WordPress Site☆52Feb 24, 2023Updated 3 years ago
- Damn Vulnerable Java (EE) Application☆148Jan 23, 2024Updated 2 years ago
- Damn Vulnerable C# Application (API)☆80Jul 15, 2024Updated last year
- The Damn Vulnerable Router Firmware Project☆716Apr 7, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Damn Vulnerable Thick Client App developed in C# .NET☆180Aug 17, 2023Updated 2 years ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Dec 8, 2022Updated 3 years ago
- Damn Vulnerable Cloud Application☆210Sep 12, 2018Updated 7 years ago
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆895Oct 5, 2025Updated 7 months ago
- Damn Vulnerable Python Web App☆189May 21, 2024Updated last year
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆268Aug 22, 2018Updated 7 years ago
- a Damn Vulnerable Serverless Application☆544Sep 12, 2023Updated 2 years ago
- A Virtual environment for Pentesting IoT Devices☆446Aug 25, 2025Updated 8 months ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆508Mar 29, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆16Mar 3, 2026Updated 2 months ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆935Oct 30, 2024Updated last year
- A Curated list of Security Resources for all connected things☆3,318Apr 25, 2026Updated 2 weeks ago
- Pentest report framework without data send☆19Sep 23, 2025Updated 7 months ago
- Riscure Hack Me embedded hardware CTF 2017-2018.☆88May 29, 2018Updated 7 years ago
- A curated list of awesome embedded and IoT security resources.☆2,312Oct 17, 2023Updated 2 years ago
- An intentionally designed broken web application based on REST API.☆582Jun 10, 2021Updated 4 years ago
- Damn Vulnerable NodeJS Application☆771Mar 27, 2024Updated 2 years ago
- Advanced: Bluetooth low energy capture the flag☆65Aug 4, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆463Oct 5, 2025Updated 7 months ago
- Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security e…☆1,079Mar 29, 2024Updated 2 years ago
- These are my notes for OSCP preparation. Hope you'll find them useful.☆14Mar 11, 2019Updated 7 years ago
- A tool for firmware cartography☆169Dec 8, 2025Updated 5 months ago
- Presented hardware reverse engineering workshops since 2019☆63Aug 8, 2024Updated last year
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- A tool for passive data capture and reconnaissance of serial flash chips. It is used in conjunction with a Saleae logic analyzer to recon…☆302Dec 7, 2023Updated 2 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,680May 24, 2025Updated 11 months ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆856Aug 22, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Discord bot to display events and information about a CTFd instance (https://ctfd.io/)☆11Jul 9, 2024Updated last year
- ☆11May 10, 2019Updated 7 years ago
- Laser Fault Injection on a Budget: RP2350 Edition☆13Dec 14, 2024Updated last year
- Rhme2 challenge (2016)☆333Jun 12, 2017Updated 8 years ago
- Damn vulnerable linux device driver for people to play with.☆28Feb 25, 2020Updated 6 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆120Jul 29, 2025Updated 9 months ago