WebApp Sec mailing list archives

Re: OWASP Vulnerable Web Applications Directory Project


From: psiinon <psiinon () gmail com>
Date: Fri, 18 Oct 2013 16:07:50 +0100

And in converting my original email to text format the link got lost ;)

The project is here:
https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project

Simon

On Fri, Oct 18, 2013 at 4:04 PM, psiinon <psiinon () gmail com> wrote:
The OWASP Vulnerable Web Applications Directory (VWAD) Project is a
comprehensive and well maintained registry of all known vulnerable web
applications currently available. These vulnerable web applications
can be used by web developers, security auditors and penetration
testers to put in practice their knowledge and skills during training
sessions (and especially afterwards), as well as to test at any time
the multiple hacking tools and offensive techniques available, in
preparation for their next real-world engagement.

The main goal of VWAD is to provide a list of vulnerable web
applications available to security professionals for hacking and
offensive activities, so that they can attack realistic web
environments... without going to jail :)

The vulnerable web applications have been classified in three
categories: On-Line, Off-Line, and VMs/ISOs. Each list has been
ordered alphabetically.

An initial list that inspired this project was maintained till the end
on 2013 at: http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html.

Please let me know if there are any mistakes or omissions, or if you
have any suggestions for ways it could be improved.

Simon

--
OWASP ZAP Project leader



-- 
OWASP ZAP Project leader



This list is sponsored by Cenzic
--------------------------------------
Let Us Hack You. Before Hackers Do!
It's Finally Here - The Cenzic Website HealthCheck. FREE.
Request Yours Now! 
http://www.cenzic.com/2009HClaunch_Securityfocus
--------------------------------------


Current thread: