Vulnerable API for educational purposes
-
Updated
May 24, 2024 - C#
Vulnerable API for educational purposes
Rebujito is a fork of IppSec.Rocks and serves as a repo for hacking tools and other resources such as vulnerable apps, cheatsheets or methodologies.
OWASP VulnerableApp Project: For Security Enthusiasts by Security Enthusiasts.
Examples of different vulnerabilities, in a variety of languages, shapes and sizes.
Oversecured Vulnerable iOS App
Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android application security hacking skills.
VulnerableApp-facade is probably most modern lightweight distributed farm of Vulnerable Applications built for handling wide range of vulnerabilities across tech stacks.
Oversecured Vulnerable Android App
📧 [Research] E-Mail Injection: Vulnerable applications
DIBBA is an intentionally vulnerable Android application that makes the process of learning about Android Building Blocks more fun and interactive. Each activity contains a different CTF challenge
Vulnerable Grade Management System
GCP GOAT is the vulnerable application for learn the GCP Security
A TUI enviorment for vulnerable app containers.
Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is written in Java (with JavaFX graphical user interface) and contains multiple challenges including SQL injection, RCE, XML vulnerabilities and more.
WARNING: This is a vulnerable application to test the exploit for the Cacti command injection (CVE-2023-39362). Run it at your own risk!
vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
The Vulnerable API Python Application is a purposely flawed Python app that uses Flask, Jinja, and SQLite3. It contains intentional security vulnerabilities like XSS, SQLi, HHI, LFI, RFI, and SSTI. The project aims to serve as an educational tool to learn about and test automated API scanners. Use responsibly in controlled environments only.
This is a collection of vulnerable machines that can help you to learn hacking, pentesting and bug hunting. I know there are a lot of lists out there, but most of them are not updated regularly. So I decided to make on myself. Hope this will help you
Add a description, image, and links to the vulnerable-application topic page so that developers can more easily learn about it.
To associate your repository with the vulnerable-application topic, visit your repo's landing page and select "manage topics."