Vulnado – Intentionally Vulnerable Java Application

Vulnado is a purposely vulnerable Java application to help lead secure coding workshops. Vulnado application and exercises will take you through some of the OWASP top 10 Vulnerabilities and how to prevent them.

Up & Running

  • Install Docker for MacOS or Windows. You’ll need to create a Docker account if you don’t already have one.
  • git clone git://github.com/ScaleSec/vulnado
  • cd vulnado
  • docker-compose up
  • Open a browser and navigate to the client to make sure it’s working: http://localhost:1337
  • Then back in your terminal verify you have connection to your API server: nc -vz localhost 8080

Also Read – HiddenEye : Modern Phishing Tool With Advanced Functionality

Architecture

The docker network created by docker-compose maps pretty well to a multi-tier architecture where a web server is publicly available and there are other network resources like a database and internal site that are not publicly available.

Exercises

R K

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

3 hours ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

23 hours ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

1 day ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

1 day ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

1 day ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

1 day ago