digininja / DVWA
Damn Vulnerable Web Application (DVWA)
☆11,067Updated this week
Alternatives and similar repositories for DVWA:
Users that are interested in DVWA are comparing it to the libraries listed below
- ☆10Updated 3 months ago
- Web application fuzzer☆6,149Updated 8 months ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆4,994Updated 2 months ago
- Fast subdomains enumeration tool for penetration testers☆10,299Updated 8 months ago
- SQLI labs to test error based, Blind boolean based, Time based.☆5,439Updated last year
- Knock Subdomain Scan☆3,973Updated 5 months ago
- Most advanced XSS scanner.☆13,852Updated last month
- Attack Surface Management Platform☆8,679Updated last month
- hydra☆10,324Updated 3 weeks ago
- Web path scanner☆12,804Updated 2 months ago
- Fast web fuzzer written in Go☆13,818Updated 3 weeks ago
- Open Source Vulnerability Management Platform☆5,367Updated last month
- Next generation web scanner☆5,833Updated 9 months ago
- Nikto web server scanner☆9,194Updated 2 months ago
- Weaponized web shell☆3,293Updated 6 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,245Updated this week
- The Browser Exploitation Framework Project☆10,178Updated this week
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,922Updated last year
- A Tool for Domain Flyovers☆5,751Updated 2 years ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆5,606Updated 3 months ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,774Updated 2 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,495Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,308Updated last year
- Directory/File, DNS and VHost busting tool written in Go☆11,451Updated last week
- Veil 3.1.X (Check version info in Veil at runtime)☆4,086Updated last year
- 🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List☆6,991Updated 9 months ago
- E-mails, subdomains and names Harvester - OSINT☆12,508Updated this week
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,782Updated 3 years ago
- Pre-Built Vulnerable Environments Based on Docker-Compose☆18,737Updated this week
- PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with othe…☆3,564Updated last year