Home Search
vulnerable - search results
If you're not happy with the results, please do another search
Broken Droid Factory : Crafting Vulnerable APKs For Pen Testing And Security Training
BDF is a Python tool designed to spin-up pseudo random vulnerable Android applications for vulnerability research, ethical hacking, and pen testing Android app practice.
To...
XZ-Vulnerable-Honeypot : A New SSH Defense Mechanism With CVE-2024-3094
An innovative SSH honeypot equipped with the XZ backdoor, identified by CVE-2024-3094.
Designed to bait and study potential attackers, this tool offers a unique...
Inbound SSH Connection To Vulnerable XZ Machine : CVE-2024-3094 Exploits
This KQL query can be used to detect post exploitation activities related to CVE-2024-3094. This vulnerability is related to reports of malicious code being...
HackSys Extreme Vulnerable Driver – A Deep Dive into HEVD Exploitation
The HackSys Extreme Vulnerable Driver (HEVD) is a Windows Kernel driver that is intentionally vulnerable. It has been developed for security researchers and enthusiasts to improve their skills in kernel-level exploitation.
HEVD offers a range of...
VuCSA : Vulnerable Client-Server Application – Made For Learning/Presenting
Vulnerable client-server application (VuCSA) is made for learning/presenting how to perform penetration tests of non-http thick clients. It is written in Java (with JavaFX...
Cicd-Goat : A Deliberately Vulnerable CI/CD Environment
The CI/CD-Goat project allows engineers and security practitioners to learn and practice CI/CD security through a set of 10 challenges, enacted against a real,...
Erlik 2 : Vulnerable Flask App
Erlik 2 is a vulnerable Flask Web App. It is a lab environment created for people who want to improve themselves in the field...
Erlik : Vulnerable Soap Service
Erlik is a vulnerable SOAP web service. It is a lab environment created for people who want to improve themselves in the field of...
TerraformGoat : “Vulnerable By Design” Multi Cloud Deployment Tool
TerraformGoat is selefra research lab's "Vulnerable by Design" multi cloud deployment tool.
Currently supported cloud vendors include Alibaba Cloud, Tencent Cloud, Huawei Cloud, Amazon Web...
vAPI : Vulnerable Adversely Programmed Interface Which Is Self-Hostable API
vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios in the means of Exercises.
Requirements
PHPMySQLPostManMITM Proxy
Installation (Docker)
docker-compose...