#
vulnerable
Here are 92 public repositories matching this topic...
The OWASP Vulnerable Web Applications Directory project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.
-
Updated
Apr 9, 2022
Damn Vulnerable NodeJS Application
-
Updated
Jan 25, 2022 - CSS
A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
awesome
hack
lab
penetration-testing
vulnerabilities
pentest
vulnerable
hacktoberfest
bwapp
vulnerable-apps
penetration-skills
security-protection
badstore
security-shepherd
test-lab
hacking-skills
hacktoberfest2021
-
Updated
Jan 27, 2022
Awesome Vulnerable Applications
security
awesome
bug
hacking
penetration-testing
awesome-list
bugbounty
vulnerable
vulnerable-applications
-
Updated
Mar 31, 2022
An open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners.
mobile-app
application-security
pentesting
android-app
android-security
mobile-security
vulnerable
ctf-platform
ctf-challenges
android-ctf
android-pentest
mobile-pentest
mobile-ctf
android-application-vulnerabilities
android-labs
-
Updated
Dec 23, 2021 - CMake
Damn Vulnerable Web Application Docker container
-
Updated
Apr 13, 2020 - PHP
Intentionally vulnerable Android application.
android
forthebadge
certificate
reverse-engineering
dynamic-analysis
reverse
vulnerabilities
bugbounty
mobile-security
frida
bypass
vulnerable
vulnerable-android-apps
hackerone-reports
frida-scripts
hardcoded-credentials
-
Updated
May 2, 2021 - Java
Damn Vulnerable eXtensive Training Environment
-
Updated
Mar 15, 2022 - Dockerfile
A lib that allows using mhyprot2 driver for enum process modules, r/w process memory and kill process.
-
Updated
Oct 28, 2020 - C#
An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit more about crypto, without the need to dive deep into the math behind it
block
crypto
aes
random
detection
oracle
rsa
md5
sha1
weak
cbc
padding
reordering
vulnerable
iv
ecb
damn
collisions
-
Updated
Mar 30, 2022 - TypeScript
Vulnerable OTP/2FA Application written in PHP using Google Authenticator
-
Updated
Nov 13, 2019 - PHP
OpenSSH remote DOS exploit and vulnerable container
-
Updated
Oct 30, 2017 - JavaScript
Frida scripts for mobile application dynamic-analysis.
android
security
demo
native
reverse-engineering
bruteforce
penetration-testing
dynamic-analysis
infosec
jni
bugbounty
frida
bypass
vulnerable
hooking
certificate-pinning
red-team
jni-android
bugbounty-tool
frida-scripts
-
Updated
Feb 1, 2021 - Python
Repository to showcase various configuration recipes with various technologies
-
Updated
Mar 31, 2022 - HTML
-
Updated
May 17, 2021 - Java
Wordpress Watcher is a wrapper for WPScan that manages scans on multiple sites and reports by email and/or syslog. Schedule scans and get notified when vulnerabilities, outdated plugins and other risks are found.
wordpress
alerts
service
asynchronous
email
syslog
scan
batch
automate
report
bulk
auto
multiple
vulnerable
wpscan
sites
warnings
mass
-
Updated
Jul 27, 2021 - Python
NTPD remote DOS exploit and vulnerable container
-
Updated
Oct 30, 2017 - C
FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching security testing methodologies, testing tools, learning, and playing.
-
Updated
Mar 16, 2022 - Jinja
Mac Script that notifies you once a delivery slot in available on Instacart
food
script
automate
opportunities
vulnerable
notifies
delivery-service
pandemic
instacart
epidemic
highschool-students
covid-19
covid19
delivery-slot
-
Updated
Apr 28, 2020
A .net Crackme Challenge made for the SecTalks Brisbane 2017 Capture the Flag Event. Writeup/solution included.
challenge
security
reverse-engineering
challenges
ctf-writeups
ida
decompile
ctf
capture-the-flag
vulnerable
radare2
writeup
vulnerable-application
ctf-solutions
ctf-challenges
-
Updated
Oct 2, 2017 - C#
Intentionally vulnerable Linux application for buffer overflow and RCE development practice
-
Updated
Aug 26, 2021 - C
docker-compose bringing up multiple vulnerable applications inside containers.
docker
docker-compose
vulnerabilities
vulnerable
vulnerable-container
vulnerable-application
vulnerable-web-app
-
Updated
Jan 29, 2018
Detectar vulnerabilidades de Path traversal con nmap
exploit
traversal
scan
path
citrix-netscaler
nmap
vulnerable
citrix
cve-2019-19781
escaneo
detectar
vulnerabilidad
cve-2021-41773
-
Updated
Apr 7, 2022 - Lua
Example of a vulnerable NodeJS+Express+MySQL service
-
Updated
Feb 21, 2022 - JavaScript
Vulnerable docker container for CVE-2018-11776
-
Updated
Aug 25, 2018
dëmi - Mikrotik Auto Exploiter (check demi2.0 named kerma)
linux
mikrotik
exploit
code
hacking
poc
cia
vulnerable
kali-linux
hacking-tool
kali
chimay-red
mikrotik-auto-exploiter
-
Updated
Apr 16, 2018 - Python
Improve this page
Add a description, image, and links to the vulnerable topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vulnerable topic, visit your repo's landing page and select "manage topics."
juice-shop_dockerHubLog.txt