This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Vulnerable Web Applications Directory Project/Pages/Online"
From OWASP
(Created page with "{| border="1" width="80%" cellspacing="0" cellpadding="2" |- ! scope="col" | App Name / Link ! scope="col" | Technology ! scope="col" | Author ! scope="col" | Notes |- | [http...") |
(Add Juice Shop demo instance on Heroku) |
||
(11 intermediate revisions by 4 users not shown) | |||
Line 26: | Line 26: | ||
| (jsmith/Demo1234) | | (jsmith/Demo1234) | ||
|- | |- | ||
− | | [http:// | + | | [http://www.bgabank.com/ BGA Vulnerable BANK App] |
+ | | .NET | ||
+ | | BGA Security | ||
| | | | ||
− | | | + | |- |
+ | | [http://crackme.trustwave.com/ Crack Me Bank] | ||
+ | | | ||
+ | | Trustwave | ||
| | | | ||
|- | |- | ||
Line 40: | Line 45: | ||
| Google | | Google | ||
| | | | ||
+ | |- | ||
+ | | [https://public-firing-range.appspot.com/ Firing Range] | ||
+ | | | ||
+ | | Google | ||
+ | | [https://github.com/google/firing-range Source code] | ||
|- | |- | ||
| [http://hackademic1.teilar.gr Hackademic Challenges Project] | | [http://hackademic1.teilar.gr Hackademic Challenges Project] | ||
Line 50: | Line 60: | ||
| PCTechtips | | PCTechtips | ||
| | | | ||
+ | |- | ||
+ | | [http://hackazon.webscantest.com/ Hackazon] | ||
+ | | AJAX, JSON, XML, GwT, AMF | ||
+ | | NTObjectives | ||
+ | | [http://www.ntobjectives.com/hackazon/ Project page] | ||
|- | |- | ||
| [https://www.hacking-lab.com/events/registerform.html?eventid=245 Hacking Lab] | | [https://www.hacking-lab.com/events/registerform.html?eventid=245 Hacking Lab] | ||
Line 70: | Line 85: | ||
| | | | ||
| First 2 levels online (algo/smurf), rest offline | | First 2 levels online (algo/smurf), rest offline | ||
+ | |- | ||
+ | | [https://juice-shop.herokuapp.com Juice Shop] | ||
+ | | Javascript | ||
+ | | OWASP | ||
+ | | Demo instance. Do not use for massive attacks/scans! | ||
+ | |- | ||
+ | | [http://aspnet.testsparker.com/ Netsparker Test App .NET] | ||
+ | | ASP.NET | ||
+ | | Netsparker | ||
+ | | | ||
+ | |- | ||
+ | | [http://php.testsparker.com/ Netsparker Test App PHP] | ||
+ | | PHP | ||
+ | | Netsparker | ||
+ | | | ||
|- | |- | ||
| [http://pentesteracademylab.appspot.com Pentester Academy] | | [http://pentesteracademylab.appspot.com Pentester Academy] | ||
Line 75: | Line 105: | ||
| | | | ||
| | | | ||
+ | |- | ||
+ | | [http://testhtml5.vulnweb.com/ Security Tweets] | ||
+ | | | ||
+ | | Acunetix | ||
+ | | HTML5 | ||
|- | |- | ||
| [http://vicnum.ciphertechs.com Vicnum Project] | | [http://vicnum.ciphertechs.com Vicnum Project] |
Latest revision as of 13:14, 13 December 2016
App Name / Link | Technology | Author | Notes |
---|---|---|---|
Acuart | PHP | Acunetix | Art shopping |
Acublog | .NET | Acunetix | Blog |
Acuforum | ASP | Acunetix | Forum |
Altoro Mutual | IBM/Watchfire | (jsmith/Demo1234) | |
BGA Vulnerable BANK App | .NET | BGA Security | |
Crack Me Bank | Trustwave | ||
Enigma Group | Enigma Group | ||
Gruyere | Python | ||
Firing Range | Source code | ||
Hackademic Challenges Project | PHP - Joomla | OWASP | |
Hacker Challenge | PCTechtips | ||
Hackazon | AJAX, JSON, XML, GwT, AMF | NTObjectives | Project page |
Hacking Lab | Hacking Lab | ||
Hack.me | eLearnSecurity | Beta | |
HackThisSite | HackThisSite | Basic & Realistic (web) Missions | |
hackxor | First 2 levels online (algo/smurf), rest offline | ||
Juice Shop | Javascript | OWASP | Demo instance. Do not use for massive attacks/scans! |
Netsparker Test App .NET | ASP.NET | Netsparker | |
Netsparker Test App PHP | PHP | Netsparker | |
Pentester Academy | |||
Security Tweets | Acunetix | HTML5 | |
Vicnum Project | Perl & PHP | ||
Web Scanner Test Site | NTOSpider | (testuser/testpass) | |
XSS Test Suite | |||
Zero Bank | HP/SpiDynamics | (admin/admin) |