digininja / DVWALinks
Damn Vulnerable Web Application (DVWA)
☆11,975Updated this week
Alternatives and similar repositories for DVWA
Users that are interested in DVWA are comparing it to the libraries listed below
Sorting:
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,703Updated last year
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,261Updated 8 months ago
- Nikto web server scanner☆9,720Updated last month
- Next generation web scanner☆6,136Updated 2 weeks ago
- Web application fuzzer☆6,303Updated last year
- Web path scanner☆13,538Updated 3 weeks ago
- Fast web fuzzer written in Go☆14,918Updated 5 months ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆5,923Updated last month
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,818Updated 2 years ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,126Updated 5 months ago
- w3af: web application attack and audit framework, the open source web vulnerability scanner.☆4,797Updated 2 years ago
- 🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List☆7,595Updated last year
- hydra☆10,991Updated last week
- Weaponized web shell☆3,392Updated 2 weeks ago
- SQLI labs to test error based, Blind boolean based, Time based.☆5,592Updated last year
- Some setup scripts for security research tools.☆9,113Updated 3 weeks ago
- Fast subdomains enumeration tool for penetration testers☆10,643Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,628Updated 2 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆3,170Updated last month
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,480Updated last week
- Advanced vulnerability scanning with Nmap NSE☆3,676Updated last year
- Automatic SQL injection and database takeover tool☆35,504Updated last week
- In-depth attack surface mapping and asset discovery☆13,652Updated last month
- Directory/File, DNS and VHost busting tool written in Go☆12,691Updated this week
- The Browser Exploitation Framework Project☆10,488Updated this week
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,778Updated 4 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,477Updated last week
- Metasploit Framework☆36,731Updated this week
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,852Updated 4 years ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,174Updated last month