This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Vulnerable Web Applications Directory Project"
m (→OWASP Vulnerable Web Applications Directory Project: added a minor note in the catch phrase mentioning that these sites are TEST sites.) |
Raul Siles (talk | contribs) |
||
Line 85: | Line 85: | ||
| colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]] | | colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]] | ||
|} | |} | ||
− | |||
− | |||
=On-Line apps= | =On-Line apps= |
Revision as of 21:14, 22 January 2016
- Main
- On-Line apps
- Off-Line apps
- Virtual Machines or ISOs
- Acknowledgements
- Road Map and Getting Involved
- Project About
OWASP Vulnerable Web Applications Directory ProjectThe OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available for legal security and vulnerability testing of various kinds. IntroductionSelect from the above tabs to view all of the:
DescriptionThe OWASP Vulnerable Web Applications Directory (VWAD) Project is a comprehensive and well maintained registry of all known vulnerable web applications currently available. These vulnerable web applications can be used by web developers, security auditors and penetration testers to put in practice their knowledge and skills during training sessions (and especially afterwards), as well as to test at any time the multiple hacking tools and offensive techniques available, in preparation for their next real-world engagement. The main goal of VWAD is to provide a list of vulnerable web applications available to security professionals for hacking and offensive activities, so that they can attack realistic web environments... without going to jail :) The vulnerable web applications have been classified in three categories: On-Line, Off-Line, and VMs/ISOs. Each list has been ordered alphabetically. An initial list that inspired this project was maintained till October 2013 at: http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html. A brief description of the OWASP VWAD project is available at: http://blog.dinosec.com/2013/11/owasp-vulnerable-web-applications.html. The associated GitHub repository is available at: https://github.com/OWASP/OWASP-VWAD. LicensingOWASP Vulnerable Web Applications Directory Projects is free to use. It is licensed under the Apache 2.0 License, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially. |
What is VWAD?OWASP VWAD provides:
PresentationInterview with Simon Bennetts – The OWASP Web Applications Vulnerability Project . Project LeadersRelated Projects
Ohloh |
Quick Download
News and Events
In PrintN/A Classifications
Please note that the source page for this tab is automatically generated via the VWAD github project. You can either edit that page directly or submit a pull request. Vulnerable applications that have to be downloaded and used locally: Please note that the source page for this tab is automatically generated via the VWAD github project. You can either edit that page directly or submit a pull request.
Please note that the source page for this tab is automatically generated via the VWAD github project. You can either edit that page directly or submit a pull request. VMs which contain multiple vulnerable applications:
Please note that the source page for this tab is automatically generated via the VWAD github project. You can either edit that page directly or submit a pull request. Please add any new apps in alphabetic order, correct mistakes or just comment on this page if you dont have write access to this wiki. The following apps are quite old and appear not to be maintained - as such they are probably less useful.
Please note that the source page for this tab is automatically generated via the VWAD github project. You can either edit that page directly or submit a pull request.
VolunteersVWAD is developed by a worldwide team of volunteers. The primary contributors to date have been: OthersOn-line resources used
Other vulnerable web-app compilationsAs of March 5, 2014, all known Vulnerable Web Applications have been included. Going forward the plan is to:
Involvement in the development and promotion of the OWASP Vulnerable Web Applications Directory Project is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
|