A curated list of vulnerable web applications.
☆336Dec 30, 2023Updated 2 years ago
Alternatives and similar repositories for vuln-web-apps
Users that are interested in vuln-web-apps are comparing it to the libraries listed below
Sorting:
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆1,263Jan 11, 2026Updated last month
- Awesome Vulnerable Applications☆1,370Jan 19, 2026Updated last month
- OWASP Vulnerable Web Application Project https://github.com/hummingbirdscyber☆403Jul 10, 2024Updated last year
- A curated list of amazingly awesome Burp Extensions☆3,373Feb 17, 2026Updated 2 weeks ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- A simple SSRF-testing sheriff written in Go☆336Oct 31, 2024Updated last year
- Damn Vulnerable NodeJS Application☆764Mar 27, 2024Updated last year
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆884Mar 2, 2026Updated last week
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆27Feb 1, 2019Updated 7 years ago
- XSS payloads designed to turn alert(1) into P1☆1,394Sep 12, 2023Updated 2 years ago
- Damn Vulnerable Thick Client App developed in C# .NET☆176Aug 17, 2023Updated 2 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆502Feb 28, 2026Updated last week
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆47Feb 16, 2024Updated 2 years ago
- Burp Suite extension to discover assets from HTTP response.☆232Jan 22, 2025Updated last year
- Host Header Injection Checker☆84Mar 2, 2022Updated 4 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,482Oct 12, 2024Updated last year
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,174Nov 25, 2024Updated last year
- docker-compose bringing up multiple vulnerable applications inside containers.☆19Jan 29, 2018Updated 8 years ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,361Jan 24, 2021Updated 5 years ago
- Damn Vulnerable Thick Client App☆155Jul 16, 2020Updated 5 years ago
- Damn Small Vulnerable Web☆858Dec 21, 2025Updated 2 months ago
- A permutation generation tool written in golang☆209Jul 15, 2019Updated 6 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,385Sep 14, 2023Updated 2 years ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,394Nov 24, 2025Updated 3 months ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,819Jun 9, 2024Updated last year
- 📚 An ultimate collection wordlists of the best-known CMS☆93Jun 10, 2024Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆5,159Feb 8, 2024Updated 2 years ago
- XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security.☆1,744Sep 12, 2020Updated 5 years ago
- bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.☆567Mar 4, 2023Updated 3 years ago
- Bug Bounty Testing Essential Guideline : Startup Bug Hunters☆54Dec 21, 2020Updated 5 years ago
- Lesser Known Web Attack Lab☆330Feb 7, 2020Updated 6 years ago
- 12-week Geekwise course on web application security and hardening.☆17Mar 19, 2020Updated 5 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Just simple log4j scanner☆12Dec 13, 2021Updated 4 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,089Aug 14, 2024Updated last year