Vulnado is a purposely vulnerable Java application to help lead secure coding workshops. Vulnado application and exercises will take you through some of the OWASP top 10 Vulnerabilities and how to prevent them.
Up & Running
git clone git://github.com/ScaleSec/vulnado
cd vulnado
docker-compose up
nc -vz localhost 8080
Also Read – HiddenEye : Modern Phishing Tool With Advanced Functionality
The docker network created by docker-compose
maps pretty well to a multi-tier architecture where a web server is publicly available and there are other network resources like a database and internal site that are not publicly available.
Exercises
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…