Damn Vulnerable GraphQL Application is a deliberately weak and insecure implementation of GraphQL that provides a safe environment to attack a GraphQL application, allowing developers and IT professionals to test for vulnerabilities. DVGA has numerous flaws, such as Injections, Code Executions, Bypasses, Denial of Service, and more. A public Postman collection is also available to replay solutions to the challenges. You can import the collection by clicking on the Run in Postman button below. DVGA supports Beginner and Expert level game modes, which will change the exploitation difficulty.
FEATURES
ALTERNATIVES
Goof is a vulnerable Node.js demo application that includes a series of vulnerabilities and exploits
A web-based tool for instrumenting and analyzing Android applications using Flask, Jinja, and Redis.
Guidelines for secure coding in Java SE to avoid bugs that could weaken security and open holes in Java's security features.
Emulates browser functionality to detect exploits targeting browser vulnerabilities.
A security analysis platform that combines SAST, SCA, SBOM generation and AI-assisted remediation to detect and fix vulnerabilities during the software development lifecycle.
A brute-force protection middleware for express routes that rate-limits incoming requests.
This article discusses the different types of remote timing attacks and provides defense strategies against them.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.