Awesome Vulnerable Applications A curated list of vulnerable applications for testing and learning.
FEATURES
SIMILAR TOOLS
Web inventory tool that captures screenshots of webpages and includes additional features for enhanced usability.
Dnscan is a DNS reconnaissance tool that performs DNS scans, DNS cache snooping, and DNS amplification attack detection.
A fully customizable, offensive security reporting solution for pentesters, red teamers, and other security professionals.
Automate your reconnaissance process with AttackSurfaceMapper, a tool for mapping and analyzing network attack surfaces.
A search engine for the Internet of Things (IoT) that provides real-time information about connected devices.
LeakIX is a red-team search engine that indexes mis-configurations and vulnerabilities online.
Amass by OWASP performs comprehensive attack surface mapping and asset discovery.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.