The Penetration Testing Practice Lab provides a collection of URLs for vulnerable web applications, operating system installations, old software, and war games sites for practicing cybersecurity skills.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A blog post about bypassing AppLocker using PowerShell diagnostic scripts
A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks
A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.
A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.
AEM (Adobe Experience Manager) Hacker is a tool designed to help security researchers and penetration testers identify and exploit vulnerabilities in AEM-based systems.
A Python-based tool for identifying and exploiting file inclusion and directory traversal vulnerabilities in web applications.
XAHICO Web Platform is a cloud-based solution for vulnerability detection, penetration testing, and adversary simulation, accessible through web browsers and suitable for various user levels.
A lightweight, first-stage C2 implant written in Nim for remote access and control.
Very vulnerable ARM/ARM64[AARCH64] application with various levels of vulnerabilities for exploitation training.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.