OWASP Hackademic Challenges Logo

OWASP Hackademic Challenges

0
Free
Visit Website

The Hackademic Challenges implement realistic scenarios with known vulnerabilities in a safe and controllable environment. Users can attempt to discover and exploit these vulnerabilities in order to learn important concepts of information security through an attacker's perspective. Currently, there are 10 scenarios available. You can choose to start from the one that you find most appealing, although we suggest to follow the order presented on the first page. We intend to expand the available challenges with additional scenarios that involve cryptography, and even vulnerable systems being implemented in downloadable virtual machines. Deployment Dependencies of Hackademic involve a web server (Apache, nginx) with PHP and Mysql/MariaDB connected with it. Make sure you have installed these before you start deploying Hackademic. We recommand to use Apache as the web server.

FEATURES

ALTERNATIVES

Important security headers for Fastify with granular control over application routes.

Gitleaks is a SAST tool for detecting and preventing hardcoded secrets in git repos.

Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.

Automatically redirect users from www to non-www for a secure connection.

A tool for secure content publishing and verification using offline signing and trusted collections.

ARM TrustZone provides a secure execution environment for applications on ARM processors.

A tool to profile web applications based on response time discrepancies.

OWASP Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application for client-server communication with numerous vulnerabilities.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved