Git Product home page Git Product logo

konduktouser's Projects

altoroj icon altoroj

WARNING: This app contains security vulnerabilities. AltoroJ is a sample banking J2EE web application. It shows what happens when web applications are written with consideration of app functionality but not app security. It's a simple and uncluttered platform for demonstrating and learning more about real-life application security issues.

cloudgoat icon cloudgoat

CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool

diwa icon diwa

A Deliberately Insecure Web Application

dvsa icon dvsa

a Damn Vulnerable Serverless Application

dvwa icon dvwa

Damn Vulnerable Web Application (DVWA)

hammer icon hammer

An example of a mis-configured Rails application release under MIT license.

juice-shop icon juice-shop

OWASP Juice Shop: Probably the most modern and sophisticated insecure web application

kaimonkey icon kaimonkey

KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.

mutillidae icon mutillidae

OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP. It is pre-installed on SamuraiWTF and OWASP BWA. The existing version can be updated on these platforms. With dozens of vulnerabilities and hints to help the user; this is an easy-to-use web hacking environment designed for labs, security enthusiast, classrooms, CTF, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, corporate web sec training courses, and as an "assess the assessor" target for vulnerability assessment software. A containerized version of the application is available as a companion project.

nodegoat icon nodegoat

The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.

pygoat icon pygoat

intentionally vuln web Application Security in django

railsgoat icon railsgoat

A vulnerable version of Rails that follows the OWASP Top 10

vulnado icon vulnado

Purposely vulnerable Java application to help lead secure coding workshops

vulnerableapp icon vulnerableapp

OWASP VulnerableApp Project: For Security Enthusiasts by Security Enthusiasts.

vulnerableapp-facade icon vulnerableapp-facade

VulnerableApp-facade is probably most modern lightweight distributed farm of Vulnerable Applications built for handling wide range of vulnerabilities across tech stacks.

vulpy icon vulpy

Vulnerable Python Application To Learn Secure Development

wrongsecrets icon wrongsecrets

Vulnerable app with examples showing how to not use secrets

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.