digininja / DVWA
Damn Vulnerable Web Application (DVWA)
☆10,582Updated this week
Alternatives and similar repositories for DVWA:
Users that are interested in DVWA are comparing it to the libraries listed below
- ☆10Updated 3 weeks ago
- ☆10Updated 11 months ago
- hydra☆10,004Updated 5 months ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,353Updated last year
- Nikto web server scanner☆8,872Updated 3 weeks ago
- Web path scanner☆12,475Updated last week
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆5,474Updated 3 weeks ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,701Updated this week
- Web application fuzzer☆6,034Updated 5 months ago
- Next generation web scanner☆5,685Updated 6 months ago
- Advanced vulnerability scanning with Nmap NSE☆3,538Updated 4 months ago
- Attack Surface Management Platform☆8,353Updated 3 weeks ago
- w3af: web application attack and audit framework, the open source web vulnerability scanner.☆4,658Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,164Updated last year
- WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websit…☆8,751Updated last month
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,855Updated 9 months ago
- 🔥 Web-application firewalls (WAFs) from security standpoint.☆6,447Updated 3 months ago
- Git All the Payloads! A collection of web attack payloads.☆3,665Updated last year
- Fast subdomains enumeration tool for penetration testers☆10,071Updated 5 months ago
- Linux privilege escalation auditing tool☆5,761Updated 11 months ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆4,863Updated 7 months ago
- Weaponized web shell☆3,234Updated 3 months ago
- The Browser Exploitation Framework Project☆10,015Updated last week
- In-depth attack surface mapping and asset discovery☆12,376Updated last month
- Knock Subdomain Scan☆3,920Updated 2 months ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,212Updated 4 months ago
- A swiss army knife for pentesting networks☆8,554Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,586Updated 4 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,713Updated 3 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs☆2,362Updated 9 months ago