Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn real world web service vulnerabilities. NOTE: This project is out of date, please use https://github.com/snoopysecurity/dvws-node
☆457Dec 6, 2021Updated 4 years ago
Alternatives and similar repositories for dvws
Users that are interested in dvws are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Feb 14, 2026Updated 2 weeks ago
- OWSAP Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application which works on web sockets for client-server communication.☆354Dec 19, 2025Updated 2 months ago
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆269Aug 22, 2018Updated 7 years ago
- Damn Vulnerable WordPress Site☆51Feb 24, 2023Updated 3 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- Damn Vulnerable Java (EE) Application☆145Jan 23, 2024Updated 2 years ago
- Damn Vulnerable Cloud Application☆208Sep 12, 2018Updated 7 years ago
- An intentionally designed broken web application based on REST API.☆578Jun 10, 2021Updated 4 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Damn Vulnerable Thick Client App☆155Jul 16, 2020Updated 5 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- Damn Small Vulnerable Web☆857Dec 21, 2025Updated 2 months ago
- The Damn Vulnerable Router Firmware Project☆709Apr 7, 2021Updated 4 years ago
- Damn Vulnerable Python Web App☆185May 21, 2024Updated last year
- XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security.☆1,745Sep 12, 2020Updated 5 years ago
- small set of PHP scripts to practice exploiting LFI, RFI and CMD injection vulns☆337Apr 8, 2024Updated last year
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- A modern vulnerable web app☆1,019Mar 11, 2021Updated 4 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Damn Vulnerable C# Application (API)☆79Jul 15, 2024Updated last year
- Neet - Network Enumeration and Exploitation Tool☆167Nov 30, 2016Updated 9 years ago
- DIVA Android - Damn Insecure and vulnerable App for Android☆1,088May 19, 2023Updated 2 years ago
- A simple web app with a XXE vulnerability.☆231Nov 10, 2021Updated 4 years ago
- Damn Vulnerable NodeJS Application☆761Mar 27, 2024Updated last year
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- The Magical Code Injection Rainbow! MCIR is a framework for building configurable vulnerability testbeds. MCIR is also a collection of co…☆446Aug 7, 2020Updated 5 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- Image size issues plugin for Burp Suite☆95Jun 27, 2018Updated 7 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated last month
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- A python script used to parse the SAM registry hive.☆76Jan 26, 2018Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- Damn Vulnerable Thick Client App developed in C# .NET☆175Aug 17, 2023Updated 2 years ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Dec 8, 2022Updated 3 years ago