OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. This is an easy-to-use web hacking environment designed for labs, security enthusiasts, classrooms, CTF, and vulnerability assessment tool targets.
☆1,474Aug 3, 2025Updated 7 months ago
Alternatives and similar repositories for mutillidae
Users that are interested in mutillidae are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security enthusiasts.☆103Jul 2, 2025Updated 8 months ago
- Damn Vulnerable Web Application (DVWA)☆12,806Updated this week
- WebGoat is a deliberately insecure application☆9,034Feb 8, 2026Updated last month
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,483Feb 13, 2025Updated last year
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆12,711Updated this week
- The main SamuraiWTF collaborative distro repo.☆554Mar 10, 2025Updated last year
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆884Mar 2, 2026Updated 3 weeks ago
- In-depth attack surface mapping and asset discovery☆14,282Updated this week
- Fast subdomains enumeration tool for penetration testers☆10,864Aug 2, 2024Updated last year
- The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.☆8,963Mar 18, 2026Updated last week
- OWASP Broken Web Applications Project☆309Mar 13, 2024Updated 2 years ago
- Damn Vulnerable NodeJS Application☆766Mar 27, 2024Updated last year
- Nikto web server scanner☆10,199Updated this week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,293Mar 16, 2026Updated last week
- Fast web fuzzer written in Go☆15,793Apr 24, 2025Updated 11 months ago
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Mar 11, 2026Updated 2 weeks ago
- Web application fuzzer☆6,445Jan 21, 2026Updated 2 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,663Updated this week
- Directory/File, DNS and VHost busting tool written in Go☆13,532Updated this week
- Web and mobile application security training platform☆1,428Mar 16, 2026Updated last week
- Impacket is a collection of Python classes for working with network protocols.☆15,560Updated this week
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,860Sep 6, 2023Updated 2 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,539Updated this week
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,399Sep 14, 2023Updated 2 years ago
- Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications…☆1,427Sep 17, 2024Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,805Apr 25, 2024Updated last year
- JAWS - Just Another Windows (Enum) Script☆1,931Apr 19, 2021Updated 4 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,867Dec 25, 2023Updated 2 years ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆6,237Jan 27, 2026Updated last month
- A Tool for Domain Flyovers☆5,912May 22, 2022Updated 3 years ago
- Fast passive subdomain enumeration tool.☆13,283Updated this week
- Web path scanner☆14,114Mar 16, 2026Updated last week
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,175Sep 11, 2024Updated last year
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,587Updated this week
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,912Aug 17, 2020Updated 5 years ago
- Attack Surface Management Platform☆9,466Feb 15, 2026Updated last month
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,851Nov 10, 2023Updated 2 years ago
- Linux privilege escalation auditing tool☆6,420Feb 19, 2026Updated last month
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,499Sep 22, 2024Updated last year