srini0x00 / dvtaView external linksLinks
Damn Vulnerable Thick Client App developed in C# .NET
☆174Aug 17, 2023Updated 2 years ago
Alternatives and similar repositories for dvta
Users that are interested in dvta are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- Damn Vulnerable Java (EE) Application☆144Jan 23, 2024Updated 2 years ago
- Damn Vulnerable Thick Client App☆154Jul 16, 2020Updated 5 years ago
- Damn Vulnerable C# Application (API)☆79Jul 15, 2024Updated last year
- Damn Vulnerable WordPress Site☆51Feb 24, 2023Updated 2 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆107Jan 9, 2024Updated 2 years ago
- Damn Vulnerable IoT Device☆214Feb 12, 2024Updated 2 years ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Dec 8, 2022Updated 3 years ago
- Damn Vulnerable Python Web App☆183May 21, 2024Updated last year
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Jan 26, 2026Updated 2 weeks ago
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆731Dec 13, 2023Updated 2 years ago
- a Damn Vulnerable Serverless Application☆544Sep 12, 2023Updated 2 years ago
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn rea…☆457Dec 6, 2021Updated 4 years ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆912Oct 30, 2024Updated last year
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆80Dec 21, 2023Updated 2 years ago
- Damn Vulnerable ElectronJS App (DVEA)☆17Jan 28, 2026Updated 2 weeks ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆269Aug 22, 2018Updated 7 years ago
- A Burp extension to show the Collaborator client in a tab☆24Dec 23, 2022Updated 3 years ago
- A OWASP Based Checklist With 80+ Test Cases☆155Oct 26, 2022Updated 3 years ago
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆17Jul 7, 2022Updated 3 years ago
- Damn Vulnerable NodeJS Application☆757Mar 27, 2024Updated last year
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,167Nov 25, 2024Updated last year
- A simple web app with a XXE vulnerability.☆229Nov 10, 2021Updated 4 years ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,967May 20, 2025Updated 8 months ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- ☆26Aug 5, 2025Updated 6 months ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,677May 24, 2025Updated 8 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,248Apr 12, 2024Updated last year
- my n00b notes on web_study☆16May 29, 2025Updated 8 months ago
- ☆10May 25, 2023Updated 2 years ago
- Small utility package for manipulating Windows process tokens☆26Apr 26, 2022Updated 3 years ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Jun 19, 2024Updated last year
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆16Jun 9, 2023Updated 2 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Jun 11, 2023Updated 2 years ago
- A care package of useful bofs for red team engagments☆55Dec 6, 2024Updated last year