The aim of the project is to develop intentionally vulnerable source code in various languages.
☆15May 3, 2020Updated 5 years ago
Alternatives and similar repositories for Damn-Vulnerable-Source-Code
Users that are interested in Damn-Vulnerable-Source-Code are comparing it to the libraries listed below
Sorting:
- 12-week Geekwise course on web application security and hardening.☆17Mar 19, 2020Updated 5 years ago
- LDAP Injection Vulnerability Application(Blog Sample Code)☆22Oct 4, 2018Updated 7 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- My notes on PentesterLab's Bootcamp series 🕵️☆46Oct 17, 2023Updated 2 years ago
- AI-based Web Application Penetration Testing Tool☆24Jan 19, 2024Updated 2 years ago
- Package provides a minimal and simple integration to attach OWASP security headers for building a secure Laravel application.☆18Mar 10, 2023Updated 2 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- Damn Vulnerable Java (EE) Application☆145Jan 23, 2024Updated 2 years ago
- ☆33Oct 12, 2022Updated 3 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- Damn vulnerable linux device driver for people to play with.☆28Feb 25, 2020Updated 6 years ago
- Damn Vulnerable C# Application (API)☆79Jul 15, 2024Updated last year
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 2 months ago
- ☆13Feb 26, 2021Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Raspberry Pi Smart Bartender☆14Apr 22, 2022Updated 3 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Updated this week
- ☆11Dec 5, 2020Updated 5 years ago
- ☆10Jun 13, 2024Updated last year
- ☆11Aug 25, 2018Updated 7 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- Publicly available training resources used by Security PS to train application security engineers☆10Feb 16, 2021Updated 5 years ago
- A simple PHP application that can be used to demonstrate and train participants to detect and exploit SQL Injection vulnerabilities.☆39Mar 11, 2018Updated 7 years ago
- Penetration Testing Checklist☆37May 14, 2020Updated 5 years ago
- Damn Vulnerable Thick Client App☆155Jul 16, 2020Updated 5 years ago
- ☆42Aug 12, 2022Updated 3 years ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- ☆10May 1, 2020Updated 5 years ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 7 years ago
- ☆11Oct 2, 2025Updated 5 months ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Synchronize properties from your Obsidian notes with a Markwhen timeline file.☆12Sep 20, 2025Updated 5 months ago
- ☆20Jan 12, 2022Updated 4 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago