Awesome Vulnerable Applications
☆1,392Mar 9, 2026Updated 2 months ago
Alternatives and similar repositories for awesome-vulnerable-apps
Users that are interested in awesome-vulnerable-apps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆1,306Jan 11, 2026Updated 3 months ago
- A curated list of various bug bounty tools☆5,952May 1, 2026Updated last week
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,114Jul 29, 2024Updated last year
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆751Dec 13, 2023Updated 2 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,680May 24, 2025Updated 11 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,816Aug 6, 2023Updated 2 years ago
- Collection of methodology and test case for various web vulnerabilities.☆7,106Jun 25, 2025Updated 10 months ago
- Rockyou for web fuzzing☆3,141Mar 11, 2026Updated last month
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,330Mar 13, 2026Updated last month
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,789May 1, 2026Updated last week
- All about bug bounty (bypasses, payloads, and etc)☆6,722Sep 8, 2023Updated 2 years ago
- A curated list of Android Security materials and resources For Pentesters and Bug Hunters☆1,895Mar 3, 2026Updated 2 months ago
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆2,002Sep 5, 2021Updated 4 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆775Aug 21, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,471Sep 14, 2023Updated 2 years ago
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆882Apr 13, 2026Updated 3 weeks ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆508Mar 29, 2026Updated last month
- Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥☆7,472Mar 26, 2026Updated last month
- Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethica…☆909Jan 3, 2026Updated 4 months ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆4,589Apr 24, 2026Updated 2 weeks ago
- A curated list of amazingly awesome Burp Extensions☆3,392Feb 17, 2026Updated 2 months ago
- Damn Vulnerable WordPress☆201Dec 23, 2023Updated 2 years ago
- A big list of Android Hackerone disclosed reports and other resources.☆1,684Sep 10, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,210Aug 14, 2024Updated last year
- ☆2,025Feb 25, 2026Updated 2 months ago
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,721Updated this week
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆67Sep 18, 2021Updated 4 years ago
- A curated list of vulnerable web applications.☆343Dec 30, 2023Updated 2 years ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,208Apr 7, 2026Updated last month
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,494Updated this week
- OSWE, OSEP, OSED, OSEE☆3,817Jan 2, 2026Updated 4 months ago
- Hidden parameters discovery suite☆2,052Sep 8, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,527May 1, 2025Updated last year
- AppSec Payloads Arsenal for Pentration Tester and Bug Bounty Hunters☆928Apr 1, 2026Updated last month
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆3,483Mar 1, 2024Updated 2 years ago
- ☆761Aug 26, 2022Updated 3 years ago
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS…☆1,556Apr 3, 2026Updated last month
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,832Jun 9, 2024Updated last year
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.☆748Jun 25, 2021Updated 4 years ago