TIWAP is a web security testing lab made using Flask for budding security enthusiasts to learn about various web vulnerabilities. Inspired by DVWA, the contributors have tried their best to regenerate various web vulnerabilities
The application is solely made for educational purpose and to learn web hacking in a legal environment.
Setup and Installation
To keep the installation and setup easy, we have configured everything for you. All you need is Docker on your system.
Once you are done with docker installation, run the following commands.
git clone https://github.com/tombstoneghost/TIWAP
cd TIWAP
docker-compose up
Note: It works only on Linux as of now and windows compatibility is work under progress
Once the lab is started, you can log in using the default credentials.
Username: admin
Password: admin
Front-End: HTML, CSS and JavaScript
Back-End: Python – Flask
Databases: SQLite3 and MongoDB
Currently, we have 20 vulnerabilities in the lab. All listed below:
Each vulnerability is having 3 difficulty levels, namely Low, Medium and Hard. These levels can be set from the settings page.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…