This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

Difference between revisions of "Project Information:template Vicnum Project"

Jump to: navigation, search
m (Related Projects)
m (Related Projects)
Line 51: Line 51:
== Related Projects ==
== Related Projects ==
| valign="top"  style="padding-left:25px;width:200px;" |
| valign="top"  style="padding-left:25px;width:200px;" |

Revision as of 15:45, 10 February 2014

OWASP Project Header.jpg

OWASP Vicnum Project

OWASP Vicnum Project are intentionally vulnerable web applications.


A lightweight vulnerable web application based on a game played to kill time. It demonstrates common web application vulnerabilities such as cross site scripting. Vicnum is especially helpful to IT auditors who need to hone web security skills.


Write a description that is just a few paragraphs long


OWASP Vicnum is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.

Where is Vicnum?

Vulnerable VM of some Vicnum applications is downloadable from sourceforge.

Since individual applications within the project are contstantly being updated, not everything is on that VM Individual components are either on sourceforge or on github.

Vicnum applications are also distributed as part of the Broken Web Application Project (see

Vicnum applications can also typically available online at


Project Leader

Mordecai Kraushar

Nicole Becher

Related Projects

Quick Downloads

News and Events

In Print

This project can be purchased as a print on demand book from


Owasp-incubator-trans-85.png Owasp-builders-small.png
Project Type Files CODE.jpg


Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:

  • xxx
  • xxx


  • xxx
  • xxx

As of February, the priorities are:

  • xxx
  • xxx
  • xxx

Involvement in the development and promotion of Vicnum is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:

  • xxx
  • xxx