Damn Vulnerable Cloud Application
☆208Sep 12, 2018Updated 7 years ago
Alternatives and similar repositories for dvca
Users that are interested in dvca are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Dec 8, 2022Updated 3 years ago
- Damn Vulnerable Java (EE) Application☆145Jan 23, 2024Updated 2 years ago
- Damn Vulnerable WordPress Site☆51Feb 24, 2023Updated 3 years ago
- Damn Vulnerable C# Application (API)☆79Jul 15, 2024Updated last year
- a Damn Vulnerable Serverless Application☆542Sep 12, 2023Updated 2 years ago
- Damn Vulnerable Thick Client App developed in C# .NET☆176Aug 17, 2023Updated 2 years ago
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn rea…☆457Dec 6, 2021Updated 4 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Apr 28, 2020Updated 5 years ago
- Damn Vulnerable IoT Device☆218Feb 12, 2024Updated 2 years ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- Damn Vulnerable Python Web App☆185May 21, 2024Updated last year
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Updated this week
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆735Dec 13, 2023Updated 2 years ago
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flaws☆328Jul 30, 2024Updated last year
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆550Sep 11, 2025Updated 5 months ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆753Oct 14, 2023Updated 2 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆917Oct 30, 2024Updated last year
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆762Aug 21, 2023Updated 2 years ago
- Lab for exploring SSRF vulnerabilities☆247May 30, 2021Updated 4 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆15May 3, 2020Updated 5 years ago
- Damn Vulnerable NodeJS Application☆761Mar 27, 2024Updated last year
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,975May 20, 2025Updated 9 months ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- ☆50Jan 30, 2026Updated last month
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆269Aug 22, 2018Updated 7 years ago
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- An intentionally designed broken web application based on REST API.☆578Jun 10, 2021Updated 4 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- ☆139Mar 29, 2023Updated 2 years ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,487Feb 12, 2026Updated 2 weeks ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- This script is used to generate some basic detections of the aws security services☆72Feb 21, 2022Updated 4 years ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,361Jan 24, 2021Updated 5 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Dec 10, 2022Updated 3 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,676May 24, 2025Updated 9 months ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,174Nov 25, 2024Updated last year