Damn Vulnerable Web Services Logo

Damn Vulnerable Web Services

0
Free
Updated 11 March 2025
Visit Website

Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn real world web service vulnerabilities. The aim of this project is to help security professionals learn about Web Application Security through the use of a practical lab environment. This application includes the following vulnerabilities: - WSDL Enumeration - XML External Entity Injection - XML Bomb Denial-of-Service - XPATH Injection - WSDL Scanning - Cross Site-Tracing - OS Command Injection - Server Side Request Forgery - REST API SQL Injection - Same Origin Method Execution - JSON Web Token (JWT) Secret Key Brute Force - Cross-Origin Resource Sharing Instructions: DVWS can be used with a XAMPP setup. XAMPP is a free and open source cross-platform web server solution which mainly consists of an Apache Web Server and MySQL database. To setup, download and install the XAMPP setup first. Next, download the dvws folder and copy the folder to your htdocs directory. Lastly, Setup or reset the database by going to http://localhost/dvws/instructions.php

FEATURES

SIMILAR TOOLS

Integrates static APK analysis with Yara and requires re-compilation of Yara with the androguard module.

A plugin for viewing, detecting weak configurations, and generating Content Security Policy headers.

A source code search engine for searching alphanumeric snippets, signatures, or keywords in web page HTML, JS, and CSS code.

A technology lookup and lead generation tool that identifies the technology stack of any website and provides features for market research, competitor analysis, and data enrichment.

Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.

A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

ConDroid performs concolic execution of Android apps to observe 'interesting' behavior in dynamic analysis.

A security-focused general purpose memory allocator providing the malloc API with hardening against heap corruption vulnerabilities.

A Java API for searching and downloading Android applications from Google Play with additional check-in features for generating ANDROID-ID.

PINNED

Proton Pass Logo

Proton Pass is a cross-platform password manager that provides encrypted storage, password generation, and security monitoring features with integrated 2FA and dark web monitoring capabilities.

Data Protection
NordVPN Logo

NordVPN is a commercial VPN service that encrypts internet connections and hides IP addresses through a global network of servers, featuring integrated threat protection and multi-device support.

Network Security
Mandos Logo

Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Consulting
Checkmarx SCA Logo

Checkmarx SCA

A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Application Security
Orca Security Logo

Orca Security

A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

Cloud Security
DryRun Logo

DryRun

A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Application Security
CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved