OWASP Damn Vulnerable Web Sockets (DVWS) is a deliberately vulnerable web application designed for educational and testing purposes that implements WebSocket communication between client and server. The application follows a similar structure to DVWA (Damn Vulnerable Web Application) and contains multiple security vulnerabilities specifically related to WebSocket implementations. It serves as a training platform for security professionals to practice identifying and exploiting WebSocket-related vulnerabilities in a controlled environment. DVWS requires a LAMP stack setup with Apache, PHP, and MySQL, along with PHP MySQLi support. The application also depends on Ratchet and ReactPHP-MySQL libraries, which must be installed using Composer. Configuration involves setting up database connection parameters in the includes/connect-db.php file and creating a hosts file entry pointing dvws.local to the application's IP address. The application runs a WebSocket server through the ws-socket.php script with configurable heartbeat intervals. Users can access the setup interface to complete the initial configuration and begin exploring the various vulnerabilities present in the WebSocket implementation.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
AndroBugs Framework is an Android vulnerability analysis system that scans mobile applications for security vulnerabilities, missing best practices, and dangerous shell commands.
A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots
SearchCode is an extensive code search engine that indexes 75 billion lines of code from millions of projects to help developers find coding examples and libraries.
An open-source tool that automates the detection and analysis of DLL hijacking vulnerabilities in Windows applications, providing detailed reports and remediation guidance.
APKiD is a tool that identifies compilers, packers, obfuscators, and other weird stuff in APK files.
A deliberately vulnerable Java web application designed for educational purposes to teach web application security concepts and common vulnerabilities.
A Nuxt 3 security module that automatically implements OWASP security patterns through HTTP headers, middleware, and various protection mechanisms including CSP, XSS validation, CORS, and CSRF protection.
Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.
A technology lookup and lead generation tool that identifies the technology stack of any website and provides features for market research, competitor analysis, and data enrichment.