DVWA
CyberChef
Our great sponsors
DVWA | CyberChef | |
---|---|---|
35 | 286 | |
9,254 | 25,384 | |
- | 3.8% | |
7.7 | 8.8 | |
about 1 month ago | 5 days ago | |
PHP | JavaScript | |
GNU General Public License v3.0 only | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
DVWA
-
If you're looking for resources pertaining to hands-on practical demonstrations of learned skills and tools/techniques, look no further.
There's also a bunch of intentionally vulnerable Webapps and VMs aimed at demonstrating potential footholds and common exploits leading to owning of the host including but not limited to: bWAPP, Damn Vulnerable Web App, WebGoat, Metasploitable 3, Mutillidae, Juice Shop
-
[Question] Best practices and protecting ubuntu
I'd suggest you to download for example a VM of Damn Vulnerable Web Application (https://github.com/digininja/DVWA), learn and practice the attacks, and then try to protect the host from these attacks to prevent or limit access to the system.
-
Web penetration practice
I deployed a Damn Vulnerable Web Application (DVWA) for you, I DM'ed the url and creds. It's a controlled sandbox, intentionally vulnerable app for you to try out your hackerman skills. Go nuts, have fun dude.
-
I am setting up a pen testing lab , I want to generate some vulnerabilities on a windows server 2019 (VM)
For app security check out the damn vulnerable web app: https://github.com/digininja/DVWA
-
Novice question in regards to using some tools.
A fresh install laptop is probably going to be a frustrating first place to start as it is unlikely to be exposing any services for you to scan or test. You could install some vulnerable services, like the damn vulnerable web application here which has good setup instructions and many, many walkthroughs.
-
Vulnerability Management Practice Lab
You could spin up a version of dvwa and scan that. https://github.com/digininja/DVWA
-
Let's see what we got here
sudo git clone https://github.com/digininja/DVWA/git
-
Best login page or example for kids to hack away on and be able to "guess" the login
DVWA is a pretty solid educational, training application that is meant for this purpose. There are a bunch of different modules, but one is bruteforcing passwords.
-
Do you know any vulnerable websites that is free to use as a target for a website scanner POC?
Damn Vulnerable Web App
- Website or App for virtual hacking
CyberChef
-
PicoCTF 2024: packer
Then we take the encrypted text and use CyberChef to decrypt it.
-
Unbreakable 2024: secrets-of-winter
Let's go to CyberChef and insert our pieces of evidence.
-
YouTube: Google has found a way to break Invidious
A parameter was changed from '2AMBCgIQBg' to 'CgIIAdgDAQ%3D%3D' which is just the correct base64 encoding they should have been using the entire time.
I don't think this was a hostile action by Google, I think someone just added better input validation for security reasons and it accidently broke the bad requests they were sending.
https://gchq.github.io/CyberChef/#recipe=URL_Decode()From_Ba...
-
PicoCTF 2024- CanYouSee
❗This is indeed the flag, but the text is encrypted with Base64. Usually, the presence of padding character "=" indicates that's Base64 type of encoding (but that's only one of the hints). To decrypt it, we can use CyberChef. Copy-paste the text and we either:
-
CyberChef VS DevToolboxWeb - a user suggested alternative
2 projects | 6 Feb 2024
-
CyberChef from GCHQ: The Cyber Swiss Army Knife
It uses a combination of magic bytes (like the `file` command), entropy analysis and character frequency detection to determine whether an output is likely to be of interest to the user.
The file type mechanism is written here[0]. There's a list of all signatures we detect here[1].
[0] https://github.com/gchq/CyberChef/blob/master/src/core/lib/F...
- Show HN: File Hider
- UK GCHQ's CyberChef
-
Lets try this again. Got a code for you to break.
I think this can be deciphered using CyberChef...
- CyberChef is a useful tool for decoding information.
What are some alternatives?
WebGoat - WebGoat is a deliberately insecure application
QR-Code-generator - High-quality QR Code generator library in Java, TypeScript/JavaScript, Python, Rust, C++, C.
mutillidae - OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. This is an easy-to-use web hacking environment designed for labs, security enthusiasts, classrooms, CTF, and vulnerability assessment tool targets.
CapRover - Scalable PaaS (automated Docker+nginx) - aka Heroku on Steroids
vulnerable-AD - Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
py4e - Web site for www.py4e.com and source to the Python 3.0 textbook
DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices
cyberchef-recipes - A list of cyber-chef recipes and curated links
Vulnerable-Web-Application - OWASP Vulnerable Web Application Project https://github.com/hummingbirdscyber
Ciphey - ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
PHPSecLib - PHP Secure Communications Library
Monica - Personal CRM. Remember everything about your friends, family and business relationships.