4 tools and resources
A series of vulnerable virtual machine images with documentation to teach Linux, Apache, PHP, MySQL security.
Collection of URLs for vulnerable web applications and systems for cybersecurity practice.
A guide to brute forcing DVWA on the high security level with anti-CSRF tokens
A docker container with multiple vulnerable applications for cybersecurity training.