Damn Vulnerable Rails app
☆13Sep 20, 2012Updated 13 years ago
Alternatives and similar repositories for dvra
Users that are interested in dvra are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable WordPress Site☆51Feb 24, 2023Updated 3 years ago
- Damn Vulnerable C# Application (API)☆79Jul 15, 2024Updated last year
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Dec 8, 2022Updated 3 years ago
- Damn Vulnerable Thick Client App developed in C# .NET☆176Aug 17, 2023Updated 2 years ago
- Damn Vulnerable IoT Device☆218Feb 12, 2024Updated 2 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆502Feb 28, 2026Updated last week
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn rea…☆458Dec 6, 2021Updated 4 years ago
- a Damn Vulnerable Serverless Application☆542Sep 12, 2023Updated 2 years ago
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆735Dec 13, 2023Updated 2 years ago
- Preparation for OSWE☆47Apr 19, 2020Updated 5 years ago
- A deliberately vulnerable java app for educational purposes☆19Mar 4, 2024Updated 2 years ago
- Awesome list of Living off the Land (LOL) methods, tools, and features commonly abused by attackers☆34Feb 28, 2026Updated last week
- Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security e…☆1,059Mar 29, 2024Updated last year
- ☆28Jun 27, 2020Updated 5 years ago
- ☆34Jun 13, 2023Updated 2 years ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,174Nov 25, 2024Updated last year
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated last year
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆918Oct 30, 2024Updated last year
- Bashful argument parsing☆13May 13, 2020Updated 5 years ago
- An intentionally designed broken web application based on REST API.☆578Jun 10, 2021Updated 4 years ago
- MCP Server for Cutter☆21Aug 2, 2025Updated 7 months ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- ☆13Jan 17, 2025Updated last year
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆11Sep 24, 2020Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,677May 24, 2025Updated 9 months ago
- Virtual Security Operations Center☆52Aug 28, 2023Updated 2 years ago
- ☆50Jan 30, 2026Updated last month
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 2 months ago
- TechTalk: Procesamiento masivo de datos con Go y sync.Pool☆12Jan 28, 2022Updated 4 years ago
- A VS Code Extension to import USB Rubber Ducky keystroke injection payloads quickly!☆14Aug 29, 2023Updated 2 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- ☆11Jun 8, 2022Updated 3 years ago
- cve-2025-24813验证脚本☆11Mar 14, 2025Updated 11 months ago
- USB Rubber Ducky implemented on FeatherS2 boards (e.g. Lolin S2 Pico)☆12Nov 21, 2022Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 6 years ago