bWAPP Logo

bWAPP

0
Free
Visit Website

bWAPP, a buggy web application! bWAPP an extremely buggy web app ! Home Bugs Download Talks & Training Blog Home bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. It helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares one to conduct successful penetration testing and ethical hacking projects. What makes bWAPP so unique? Well, it has over 100 web vulnerabilities! It covers all major known web bugs, including all risks from the OWASP Top 10 project. bWAPP is a PHP application that uses a MySQL database. It can be hosted on Linux/Windows with Apache/IIS and MySQL. It can also be installed with WAMP or XAMPP. Another possibility is to download the bee-box, a custom Linux VM pre-installed with bWAPP. Download our What is bWAPP? introduction tutorial, including free exercises... bWAPP is for web application security-testing and educational purposes only. Have fun with this free and open source project! Cheers, Malik Mesellem bWAPP is licensed under © 2022 MME BV / Follow @MME_IT on Twitter and ask for our cheat sheet, containing all solutions! / Need an exclusive training?

FEATURES

ALTERNATIVES

Open source web application security scanner with 200+ vulnerability identification capabilities.

OpenVAS is an open-source vulnerability scanner that provides extensive testing capabilities for identifying security weaknesses in networks and systems.

Vulnerable web application for beginners in penetration testing.

Automate Google Hacking Database scraping and searching with Pagodo, a tool for finding vulnerabilities and sensitive information.

A vulnerable web site in NodeJS for testing security source code analyzers.

A collection of Ansible roles for hardening various systems and services

A virtual host scanner with the ability to detect catch-all scenarios, aliases, and dynamic default pages, presented at SecTalks BNE in September 2017.

A comprehensive open dictionary of fault injection patterns and predictable resource locations for dynamic application security testing