Awesome Vulnerable Applications A curated list of vulnerable applications for testing and learning.
FEATURES
SIMILAR TOOLS
A search engine for the Internet of Things (IoT) that provides real-time information about connected devices.
An OSINT tool that generates username lists for companies on LinkedIn for social engineering attacks or security testing purposes.
Automate OSINT for threat intelligence and attack surface mapping with SpiderFoot.
Nmap is an essential network scanning tool used for network security auditing and status monitoring.
An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.
Dnscan is a DNS reconnaissance tool that performs DNS scans, DNS cache snooping, and DNS amplification attack detection.
Automate your reconnaissance process with AttackSurfaceMapper, a tool for mapping and analyzing network attack surfaces.
A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.