Awesome Vulnerable Applications
☆1,379Mar 9, 2026Updated 3 weeks ago
Alternatives and similar repositories for awesome-vulnerable-apps
Users that are interested in awesome-vulnerable-apps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆1,276Jan 11, 2026Updated 2 months ago
- A curated list of various bug bounty tools☆5,853Feb 9, 2026Updated last month
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,088Jul 29, 2024Updated last year
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆738Dec 13, 2023Updated 2 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,677May 24, 2025Updated 10 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,588Aug 6, 2023Updated 2 years ago
- Collection of methodology and test case for various web vulnerabilities.☆7,057Jun 25, 2025Updated 9 months ago
- Rockyou for web fuzzing☆3,099Mar 11, 2026Updated 2 weeks ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,264Mar 13, 2026Updated 2 weeks ago
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,660Nov 23, 2025Updated 4 months ago
- All about bug bounty (bypasses, payloads, and etc)☆6,679Sep 8, 2023Updated 2 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆768Aug 21, 2023Updated 2 years ago
- A curated list of Android Security materials and resources For Pentesters and Bug Hunters☆1,882Mar 3, 2026Updated 3 weeks ago
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆884Mar 2, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,989Sep 5, 2021Updated 4 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,413Sep 14, 2023Updated 2 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Updated this week
- Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥☆7,401Updated this week
- Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethica…☆902Jan 3, 2026Updated 2 months ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆4,550Mar 20, 2026Updated last week
- A curated list of amazingly awesome Burp Extensions☆3,385Feb 17, 2026Updated last month
- Damn Vulnerable WordPress☆199Dec 23, 2023Updated 2 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,124Aug 14, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A big list of Android Hackerone disclosed reports and other resources.☆1,673Sep 10, 2025Updated 6 months ago
- ☆1,993Feb 25, 2026Updated last month
- A curated list of vulnerable web applications.☆341Dec 30, 2023Updated 2 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆67Sep 18, 2021Updated 4 years ago
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,675Updated this week
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,192Nov 25, 2024Updated last year
- OSWE, OSEP, OSED, OSEE☆3,795Jan 2, 2026Updated 2 months ago
- Hidden parameters discovery suite☆2,038Sep 8, 2024Updated last year
- AppSec Payloads Arsenal for Pentration Tester and Bug Bounty Hunters☆921Mar 12, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,371Mar 20, 2026Updated last week
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,453May 1, 2025Updated 10 months ago
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,453Mar 1, 2024Updated 2 years ago
- ☆757Aug 26, 2022Updated 3 years ago
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS…☆1,535Jan 28, 2026Updated 2 months ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,824Jun 9, 2024Updated last year
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.☆744Jun 25, 2021Updated 4 years ago