DVWA
vulhub
Our great sponsors
DVWA | vulhub | |
---|---|---|
35 | 17 | |
9,325 | 16,186 | |
- | 2.1% | |
7.6 | 8.9 | |
4 days ago | 10 days ago | |
PHP | Dockerfile | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
DVWA
-
If you're looking for resources pertaining to hands-on practical demonstrations of learned skills and tools/techniques, look no further.
There's also a bunch of intentionally vulnerable Webapps and VMs aimed at demonstrating potential footholds and common exploits leading to owning of the host including but not limited to: bWAPP, Damn Vulnerable Web App, WebGoat, Metasploitable 3, Mutillidae, Juice Shop
-
[Question] Best practices and protecting ubuntu
I'd suggest you to download for example a VM of Damn Vulnerable Web Application (https://github.com/digininja/DVWA), learn and practice the attacks, and then try to protect the host from these attacks to prevent or limit access to the system.
-
Web penetration practice
I deployed a Damn Vulnerable Web Application (DVWA) for you, I DM'ed the url and creds. It's a controlled sandbox, intentionally vulnerable app for you to try out your hackerman skills. Go nuts, have fun dude.
-
I am setting up a pen testing lab , I want to generate some vulnerabilities on a windows server 2019 (VM)
For app security check out the damn vulnerable web app: https://github.com/digininja/DVWA
-
Novice question in regards to using some tools.
A fresh install laptop is probably going to be a frustrating first place to start as it is unlikely to be exposing any services for you to scan or test. You could install some vulnerable services, like the damn vulnerable web application here which has good setup instructions and many, many walkthroughs.
-
Vulnerability Management Practice Lab
You could spin up a version of dvwa and scan that. https://github.com/digininja/DVWA
-
Let's see what we got here
sudo git clone https://github.com/digininja/DVWA/git
-
Best login page or example for kids to hack away on and be able to "guess" the login
DVWA is a pretty solid educational, training application that is meant for this purpose. There are a bunch of different modules, but one is bruteforcing passwords.
-
Do you know any vulnerable websites that is free to use as a target for a website scanner POC?
Damn Vulnerable Web App
- Website or App for virtual hacking
vulhub
- HackTheBox - Writeup Builder [Retired]
-
Valkey Is Rapidly Overtaking Redis
This is pretty materially not fine:
https://github.com/vulhub/vulhub/tree/master/redis/CVE-2022-...
- 2 physical computers 1 vm
-
Making sense of Apache httpd's CVE-2023-25690
I just found this commit (https://github.com/vulhub/vulhub/pull/413/files) for vulnhub containing a POC. I still don't understand exactly how they get to secret.txt in their example but it's a huge step forward. Plenty of mistakes in the Changelog.
- I am setting up a pen testing lab , I want to generate some vulnerabilities on a windows server 2019 (VM)
-
How to create vulnerable machines
A GitHub repo called vulnhub contains numerous Dockerfiles to build vulnerable containers of various popular software. If you’re just getting started this is a good way to have one machine where you deploy vulnerable docker containers to poke at.
- Vulhub: Pre-Built Vulnerable Environments Based on Docker-Compose
- How can I make a ‘bad image’ that will generate ECR scan vulnerabilities?
- Pre-Built Vulnerable Environments Based on Docker-Compose
What are some alternatives?
WebGoat - WebGoat is a deliberately insecure application
docker-openvpn-client-socks - Expose an OpenVPN tunnel as a SOCKS proxy
mutillidae - OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. This is an easy-to-use web hacking environment designed for labs, security enthusiasts, classrooms, CTF, and vulnerability assessment tool targets.
docker-bloodhound - BloodHound Docker Ready to Use
vulnerable-AD - Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
SniDust - SmartDNS Proxy to hide your GeoLocation. Based on DnsDist and nginx
DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices
docker-dev-ssl-proxy - A simple nginx proxy behind a self-generated & self-signed SSL certificate (local HTTPS). Also utilized in development of https://speaker.app / https://github.com/zenOSmosis/speaker.app.
Vulnerable-Web-Application - OWASP Vulnerable Web Application Project https://github.com/hummingbirdscyber
frigate-synology-dsm7 - Dockerfile and docker-compose file to enable google coral USB accelerators in containers on Synology DSM 7
PHPSecLib - PHP Secure Communications Library
asterisk-docker - Asterisk + chan_dongle in docker.