XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security.
☆1,747Sep 12, 2020Updated 5 years ago
Alternatives and similar repositories for xvwa
Users that are interested in xvwa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn rea…☆458Dec 6, 2021Updated 4 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- Damn Small Vulnerable Web☆864Dec 21, 2025Updated 3 months ago
- A modern vulnerable web app☆1,024Mar 11, 2021Updated 5 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of PHP backdoors. For educational or testing purposes only.☆2,259Mar 9, 2024Updated 2 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,140Apr 21, 2024Updated last year
- Automated All-in-One OS Command Injection Exploitation Tool☆5,704Updated this week
- The Magical Code Injection Rainbow! MCIR is a framework for building configurable vulnerability testbeds. MCIR is also a collection of co…☆447Aug 7, 2020Updated 5 years ago
- Welcome to the XSS Challenge Wiki!☆1,593Jun 24, 2020Updated 5 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,876Nov 10, 2023Updated 2 years ago
- OWSAP Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application which works on web sockets for client-server communication.☆358Dec 19, 2025Updated 4 months ago
- Git All the Payloads! A collection of web attack payloads.☆3,928May 15, 2023Updated 2 years ago
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,504Jan 13, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,485Oct 12, 2024Updated last year
- A Tool for Domain Flyovers☆5,923May 22, 2022Updated 3 years ago
- Damn Vulnerable Web Application (DVWA)☆12,896Mar 19, 2026Updated last month
- Sleepy Puppy XSS Payload Management Framework☆1,041Jul 24, 2018Updated 7 years ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,733Dec 1, 2024Updated last year
- A curated list of resources for learning about application security☆6,887Feb 22, 2025Updated last year
- TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.☆1,653May 25, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆2,322Dec 8, 2023Updated 2 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,913Sep 27, 2021Updated 4 years ago
- Add headers to all Burp requests to bypass some WAF products☆330Jan 28, 2018Updated 8 years ago
- Lab set-up for learning SQL Injection Techniques☆101Dec 6, 2020Updated 5 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆575Dec 9, 2017Updated 8 years ago
- Attack Surface Management Platform☆9,673Feb 15, 2026Updated 2 months ago
- The Bug Hunters Methodology☆4,273Aug 1, 2023Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,190May 11, 2023Updated 2 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,837Jan 19, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Post Exploitation Collection☆1,572May 1, 2020Updated 5 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,505Mar 22, 2026Updated 3 weeks ago
- Advanced Web Shell☆580May 1, 2017Updated 8 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,685Jan 5, 2026Updated 3 months ago
- Weaponized web shell☆3,504Oct 1, 2025Updated 6 months ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,516Jan 21, 2020Updated 6 years ago