Xtreme Vulnerable Web Application (XVWA) Logo

Xtreme Vulnerable Web Application (XVWA)

0
Free
Visit Website

XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security. It’s not advisable to host this application online as it is designed to be “Xtremely Vulnerable”. We recommend hosting this application in a local/controlled environment and sharpening your application security ninja skills with any tools of your own choice. It’s totally legal to break or hack into this. The idea is to evangelize web application security to the community in possibly the easiest and fundamental way. Learn and acquire these skills for a good purpose. How you use these skills and knowledge base is not our responsibility. XVWA is designed to understand the following security issues: SQL Injection, Error-Based SQL Injection, Blind OS Command Injection, XPATH Injection, Formula Injection, PHP Object Injection, Unrestricted File Upload, Reflected Cross-Site Scripting, Stored Cross-Site Scripting, DOM-Based Cross-Site Scripting, Server-Side Request Forgery (Cross-Site Port Attacks), File Inclusion, Session Issues, Insecure Direct Object Reference, Missing Functional Level Access Control, Cross-Site Request Forgery (CSRF), Cryptography.

FEATURES

ALTERNATIVES

A vulnerable by design infrastructure on Azure featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfigurations.

Real-time, eBPF-based Security Observability and Runtime Enforcement component

A tool for identifying potential security vulnerabilities in web applications

A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Akamai Client-Side Protection & Compliance is a security tool that monitors and protects against client-side threats on websites, aiding in PCI DSS v4.0 compliance.

A Windows Kernel driver intentionally vulnerable to help improve skills in kernel-level exploitation.

A Rust-based command-line tool for analyzing .apk files to detect vulnerabilities.

A CSP plugin for hapi with per-route configuration options.

PINNED