Damn Vulnerable WordPress Site
☆51Feb 24, 2023Updated 3 years ago
Alternatives and similar repositories for dvwps
Users that are interested in dvwps are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- Damn Vulnerable Java (EE) Application☆145Jan 23, 2024Updated 2 years ago
- Damn Vulnerable C# Application (API)☆79Jul 15, 2024Updated last year
- Damn Vulnerable Python Web App☆185May 21, 2024Updated last year
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Dec 8, 2022Updated 3 years ago
- Damn Vulnerable IoT Device☆218Feb 12, 2024Updated 2 years ago
- Damn Vulnerable Thick Client App developed in C# .NET☆176Aug 17, 2023Updated 2 years ago
- Damn Vulnerable Cloud Application☆208Sep 12, 2018Updated 7 years ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆269Aug 22, 2018Updated 7 years ago
- Damn Vulnerable NodeJS Application☆761Mar 27, 2024Updated last year
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn rea…☆457Dec 6, 2021Updated 4 years ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Feb 28, 2026Updated last week
- a Damn Vulnerable Serverless Application☆542Sep 12, 2023Updated 2 years ago
- qsinject (Query String Inject) is a tool that allows you to quickly substitute query string values with regex matches, one-at-a-time.☆30May 6, 2020Updated 5 years ago
- Damn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security e…☆447Nov 19, 2019Updated 6 years ago
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆735Dec 13, 2023Updated 2 years ago
- Damn Vulnerable WordPress☆199Dec 23, 2023Updated 2 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆710Apr 7, 2021Updated 4 years ago
- An intentionally designed broken web application based on REST API.☆578Jun 10, 2021Updated 4 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Ransomware programado en Python☆10Oct 8, 2020Updated 5 years ago
- ECMAScript AST query library.☆12Jul 7, 2020Updated 5 years ago
- A Burp extension to show the Collaborator client in a tab☆24Dec 23, 2022Updated 3 years ago
- sub domain wild card filtering tool☆40Apr 18, 2020Updated 5 years ago
- ☆12Jan 9, 2023Updated 3 years ago
- Numbers in Your Documents can reveal your personal informations. This tool is an OSINT tool to gather informations from CC, BIN code, MIC…☆13Jan 31, 2021Updated 5 years ago
- Keylogger that sends Email at a specific time☆10Apr 7, 2018Updated 7 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Tiny read-only unlocker for MS Office documents☆12Aug 18, 2021Updated 4 years ago
- Spongebob-themed cypher injection playground☆13Jun 4, 2023Updated 2 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Tool to get the top android apps for bug bounty purpose☆17Sep 10, 2020Updated 5 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 10 months ago
- Tools that I've created/used during CTP-OSCE☆10Jun 17, 2019Updated 6 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Skills To Improve Before Heading to OSCP☆15May 14, 2017Updated 8 years ago
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year