rewanthtammana / Damn-Vulnerable-BankView external linksLinks
Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android application security hacking skills.
☆731Dec 13, 2023Updated 2 years ago
Alternatives and similar repositories for Damn-Vulnerable-Bank
Users that are interested in Damn-Vulnerable-Bank are comparing it to the libraries listed below
Sorting:
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.☆738Jun 25, 2021Updated 4 years ago
- Oversecured Vulnerable Android App☆730Jul 18, 2024Updated last year
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆66Sep 18, 2021Updated 4 years ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆269Aug 22, 2018Updated 7 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,677May 24, 2025Updated 8 months ago
- DIVA Android - Damn Insecure and vulnerable App for Android☆1,079May 19, 2023Updated 2 years ago
- Damn Vulnerable WordPress Site☆51Feb 24, 2023Updated 2 years ago
- Damn Vulnerable Java (EE) Application☆144Jan 23, 2024Updated 2 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Jan 26, 2026Updated 2 weeks ago
- Damn Vulnerable Cloud Application☆208Sep 12, 2018Updated 7 years ago
- Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security e…☆1,058Mar 29, 2024Updated last year
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆256Mar 2, 2022Updated 3 years ago
- Damn Vulnerable Thick Client App developed in C# .NET☆174Aug 17, 2023Updated 2 years ago
- Damn Vulnerable C# Application (API)☆79Jul 15, 2024Updated last year
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,248Apr 12, 2024Updated last year
- Damn Vulnerable NodeJS Application☆757Mar 27, 2024Updated last year
- An open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security …☆223Dec 23, 2021Updated 4 years ago
- A tool to automate the boring process of APK recon☆346Sep 30, 2022Updated 3 years ago
- Damn Vulnerable Python Web App☆183May 21, 2024Updated last year
- Awesome Vulnerable Applications☆1,355Jan 19, 2026Updated 3 weeks ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆5,144Feb 8, 2024Updated 2 years ago
- Vulnerable Android application for developers and security enthusiasts to learn about Android insecurities☆1,402Apr 17, 2024Updated last year
- A curated list of Android Security materials and resources For Pentesters and Bug Hunters☆1,862May 5, 2025Updated 9 months ago
- Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime☆2,963Feb 3, 2026Updated last week
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆357Oct 14, 2020Updated 5 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- An automated SSRF finder. Just give the domain name and your server and chill! ;) Also has options to find XSS and open redirects☆971Dec 8, 2021Updated 4 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,899Oct 29, 2025Updated 3 months ago
- The Swiss Army knife for automated Web Application Testing☆2,324May 8, 2024Updated last year
- Scanning APK file for URIs, endpoints & secrets.☆5,943Aug 20, 2025Updated 5 months ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,042Aug 14, 2024Updated last year
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆325Mar 27, 2024Updated last year
- Damn Vulnerable IoT Device☆214Feb 12, 2024Updated 2 years ago
- a Damn Vulnerable Serverless Application☆544Sep 12, 2023Updated 2 years ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Dec 8, 2022Updated 3 years ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,324Jan 10, 2025Updated last year
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,074Jul 29, 2024Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,487Jan 18, 2026Updated 3 weeks ago