Awesome Vulnerable Applications
☆1,387Mar 9, 2026Updated last month
Alternatives and similar repositories for awesome-vulnerable-apps
Users that are interested in awesome-vulnerable-apps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆1,289Jan 11, 2026Updated 3 months ago
- A curated list of various bug bounty tools☆5,906Updated this week
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,104Jul 29, 2024Updated last year
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆747Dec 13, 2023Updated 2 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,674May 24, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,644Aug 6, 2023Updated 2 years ago
- Rockyou for web fuzzing☆3,121Mar 11, 2026Updated last month
- Collection of methodology and test case for various web vulnerabilities.☆7,078Jun 25, 2025Updated 9 months ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,301Mar 13, 2026Updated last month
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,745Nov 23, 2025Updated 4 months ago
- All about bug bounty (bypasses, payloads, and etc)☆6,699Sep 8, 2023Updated 2 years ago
- A curated list of Android Security materials and resources For Pentesters and Bug Hunters☆1,889Mar 3, 2026Updated last month
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆773Aug 21, 2023Updated 2 years ago
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆881Updated this week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,997Sep 5, 2021Updated 4 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,424Sep 14, 2023Updated 2 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆504Mar 29, 2026Updated 3 weeks ago
- Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethica…☆906Jan 3, 2026Updated 3 months ago
- Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥☆7,446Mar 26, 2026Updated 3 weeks ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆4,571Mar 20, 2026Updated 3 weeks ago
- Damn Vulnerable WordPress☆200Dec 23, 2023Updated 2 years ago
- A curated list of amazingly awesome Burp Extensions☆3,391Feb 17, 2026Updated 2 months ago
- A big list of Android Hackerone disclosed reports and other resources.☆1,676Sep 10, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,153Aug 14, 2024Updated last year
- ☆2,004Feb 25, 2026Updated last month
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆67Sep 18, 2021Updated 4 years ago
- A curated list of vulnerable web applications.☆340Dec 30, 2023Updated 2 years ago
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,698Updated this week
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,200Apr 7, 2026Updated last week
- OSWE, OSEP, OSED, OSEE☆3,798Jan 2, 2026Updated 3 months ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,483May 1, 2025Updated 11 months ago
- Hidden parameters discovery suite☆2,047Sep 8, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,444Apr 10, 2026Updated last week
- AppSec Payloads Arsenal for Pentration Tester and Bug Bounty Hunters☆925Apr 1, 2026Updated 2 weeks ago
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,464Mar 1, 2024Updated 2 years ago
- ☆758Aug 26, 2022Updated 3 years ago
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS…☆1,541Apr 3, 2026Updated 2 weeks ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,832Jun 9, 2024Updated last year
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.☆745Jun 25, 2021Updated 4 years ago