DVXTE (Damn Vulnerable eXtensive Training Environment) is a Docker-based cybersecurity training platform that provides multiple vulnerable applications in a single container environment. The platform includes several intentionally vulnerable applications such as Juiceshop, which are designed to help users learn and practice cybersecurity skills in a controlled environment. Key features include: - Docker containerization for easy deployment and management - Multiple vulnerable applications bundled together - Reset functionality to restore the environment to its initial state - Designed specifically for educational and training purposes - Provides hands-on experience with real-world security vulnerabilities The tool serves as a practical learning environment where users can safely explore security vulnerabilities, practice penetration testing techniques, and develop their cybersecurity skills without risking production systems.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A human risk management platform that combines security awareness training, simulated phishing, real-time coaching, and security orchestration to reduce cybersecurity risks associated with human behavior.
A security awareness training platform that combines phishing simulations with psychology-based training to help organizations reduce phishing vulnerabilities and build a security-aware culture.
A security awareness training platform that combines interactive lessons, phishing simulation, policy tracking, and awareness materials to educate employees on cybersecurity best practices.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.