digininja / DVWALinks
Damn Vulnerable Web Application (DVWA)
☆12,520Updated last week
Alternatives and similar repositories for DVWA
Users that are interested in DVWA are comparing it to the libraries listed below
Sorting:
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,411Updated 11 months ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,797Updated 2 years ago
- Web application fuzzer☆6,384Updated last week
- WebGoat is a deliberately insecure application☆8,878Updated last month
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆6,141Updated this week
- Next generation web scanner☆6,376Updated 3 months ago
- The Browser Exploitation Framework Project☆10,678Updated this week
- Nikto web server scanner☆10,007Updated last month
- SQLI labs to test error based, Blind boolean based, Time based.☆5,713Updated 2 years ago
- Most advanced XSS scanner.☆14,697Updated 9 months ago
- w3af: web application attack and audit framework, the open source web vulnerability scanner.☆4,848Updated 2 years ago
- Web path scanner☆13,922Updated 2 weeks ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,340Updated 2 months ago
- Some setup scripts for security research tools.☆9,267Updated 2 weeks ago
- Fast subdomains enumeration tool for penetration testers☆10,779Updated last year
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,512Updated 3 months ago
- Automated All-in-One OS Command Injection Exploitation Tool☆5,603Updated last week
- Fast web fuzzer written in Go☆15,498Updated 9 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,362Updated 2 weeks ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,835Updated 3 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,710Updated last year
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆26,723Updated this week
- Attack Surface Management Platform☆9,361Updated 2 weeks ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,806Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,708Updated last month
- Weaponized web shell☆3,473Updated 3 months ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,339Updated 8 months ago
- Automated NoSQL database enumeration and web application exploitation tool.☆3,219Updated 5 months ago
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,561Updated this week
- Fast passive subdomain enumeration tool.☆12,943Updated this week