Repository navigation

#

vulnerable-app

madhuakula/kubernetes-goat

Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀

HTML
5169
3 个月前

Self-deployed Straight-forward hacking lab machine which designed for new comer who want to learn Penetration Testing field that running inside Docker for easy setup.

PHP
284
1 个月前

Damn Vulnerable Java (EE) Application

CSS
141
2 年前

Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is written in Java (with JavaFX graphical user interface) and contains multiple challenges including SQL injection, RCE, XML vulnerabilities and more.

Java
99
2 年前

VyAPI - A cloud based vulnerable hybrid Android App

Java
85
5 年前

Conviso Vulnerable Web Application is the OSS project from the Conviso Application Security for the community. The project represents a vulnerable web application to practice security testing and improve your learning in AppSec..

HTML
61
1 个月前

Examples of different vulnerabilities, in a variety of languages, shapes and sizes.

HTML
29
1 年前

This is a collection of vulnerable machines that can help you to learn hacking, pentesting and bug hunting. I know there are a lot of lists out there, but most of them are not updated regularly. So I decided to make on myself. Hope this will help you

9
2 年前

Several snippets of vulnerable code in different programming languages.

Elixir
5
3 个月前

File Content Disclosure on Rails Test Case - CVE-2019-5418

Ruby
5
6 年前

IOTgoat is a vulnerable firmware made by the OWASP project. This is a custom made version of the 'IOTgoat firmware' built for the A5-V11 mini 3G router. This branch brings back the vulnerable IOT firmware back to a real IOT device, for a more realistic experience of IOT device exploitation on a budget.

3
4 天前

Sample Spring API for testing

Java
1
3 年前

Sistema de notas propositalmente vulnerável para educação em segurança cibernética e testes de penetração - contém 12+ vulnerabilidades web intencionais (SQL Injection, XSS, Path Traversal, Command Injection, etc.)

JavaScript
0
13 天前