Vulnerable Apps

Explore 13 curated cybersecurity tools, with 15,370 visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Get Featured

Feature your product and reach thousands of professionals.

awesome-vulnerable-apps Logo

A list of vulnerable applications for testing and learning

0
OVAA (Oversecured Vulnerable Android App) Logo

OVAA is an intentionally vulnerable Android application that aggregates common platform security vulnerabilities for educational and security testing purposes.

0
Securibench Micro Logo

A collection of vulnerable web application test cases designed to benchmark and evaluate the effectiveness of static security analyzers and penetration testing tools.

0
Security Scenario Generator (SecGen) Logo

SecGen is an open-source framework that automatically generates vulnerable virtual machines and hacking challenges for cybersecurity education and penetration testing training.

0
SecGame #1: Sauron Logo

A Linux-based environment for penetration testing and vulnerability exploitation

0
AHHHZURE Logo

AHHHZURE is an automated deployment script that creates vulnerable Azure cloud lab environments for offensive security training and cloud penetration testing practice.

0
CloudGoat Logo

CloudGoat is a vulnerable-by-design AWS deployment tool that creates intentionally insecure cloud environments for hands-on cybersecurity training through capture-the-flag scenarios.

0
AzureGoat Logo

AzureGoat is a deliberately vulnerable Azure cloud infrastructure that incorporates OWASP Top 10 vulnerabilities and Azure service misconfigurations for security training and penetration testing practice.

0
Damn Vulnerable Linux (DVL) Logo

Linux-based operating system intentionally vulnerable for cybersecurity practice.

0
NodeGoat Logo

NodeGoat provides an environment to learn and address OWASP Top 10 security risks in Node.js web applications.

0
Damn Vulnerable eXtensive Training Environment (DVXTE) Logo

DVXTE is a Docker-based training platform containing multiple vulnerable applications designed for cybersecurity education and skill development.

0
SentinelTestbed Logo

A vulnerable web site for testing Sentinel features

0
DVHMA Damn Vulnerable Hybrid Mobile App Logo

DVHMA is an intentionally vulnerable Android hybrid mobile app built with Apache Cordova for security testing and educational purposes.

0