Kali Linux

TIWAP : Totally Insecure Web Application Project

TIWAP is a web security testing lab made using Flask for budding security enthusiasts to learn about various web vulnerabilities. Inspired by DVWA, the contributors have tried their best to regenerate various web vulnerabilities

The application is solely made for educational purpose and to learn web hacking in a legal environment.

Setup and Installation

To keep the installation and setup easy, we have configured everything for you. All you need is Docker on your system.

Once you are done with docker installation, run the following commands.

git clone https://github.com/tombstoneghost/TIWAP
cd TIWAP
docker-compose up

Note: It works only on Linux as of now and windows compatibility is work under progress

Once the lab is started, you can log in using the default credentials.
Username: admin
Password: admin

Tech Stack

Front-End: HTML, CSS and JavaScript
Back-End: Python – Flask
Databases: SQLite3 and MongoDB

Vulnerabilities

Currently, we have 20 vulnerabilities in the lab. All listed below:

  • SQL Injection
  • Blind SQL Injection
  • NoSQL Injection
  • Command Injection
  • Business Logic Flaw
  • Sensitive Data Exposure
  • XML External Entities
  • Security Misconfiguration
  • Reflected XSS
  • Stored XSS
  • DOM Based XSS
  • HTML Injection
  • Improper Certificate Validation
  • Hardcoded Credentials
  • Insecure File Upload
  • Brute Force
  • Directory Traversal
  • Cross-Site Request Forgery (CSRF)
  • Server-Side Request Forgery (SSRF)
  • Server-Side Template Injection (SSTI)

Each vulnerability is having 3 difficulty levels, namely Low, Medium and Hard. These levels can be set from the settings page.

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

4 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

4 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

4 weeks ago