diff --git a/_data/collection.json b/_data/collection.json index 6134230..6635186 100644 --- a/_data/collection.json +++ b/_data/collection.json @@ -14,43 +14,43 @@ "badge": "jerryhoff/WebGoat.NET" }, { - "url": "http://testphp.vulnweb.com", - "name": "Acuart", + "url": "https://github.com/dhammon/ai-goat", + "name": "AI-Goat", "collection": [ - "online" + "offline" ], "technology": [ - "PHP" + "Python", + "Vicuna LLM", + "LLaMa" ], "references": [ { - "name": "live", - "url": "http://testphp.vulnweb.com" + "name": "download", + "url": "https://github.com/dhammon/ai-goat" } ], - "author": "Acunetix", - "notes": "Art shopping", + "author": "fhammon, Guanwei Hu", + "notes": "AI Goat uses the Vicuna LLM which derived from Meta's LLaMA and coupled with ChatGPT's response data. When installing AI Goat the LLM binary is downloaded from third party locally on your computer.", "badge": null }, { - "url": "https://github.com/dhammon/ai-goat", - "name": "AI-Goat", + "url": "http://testphp.vulnweb.com", + "name": "Acuart", "collection": [ - "offline" + "online" ], "technology": [ - "Python", - "Vicuna LLM", - "LLaMa" + "PHP" ], "references": [ { - "name": "download", - "url": "https://github.com/dhammon/ai-goat" + "name": "live", + "url": "http://testphp.vulnweb.com" } ], - "author": "fhammon, Guanwei Hu", - "notes": "AI Goat uses the Vicuna LLM which derived from Meta's LLaMA and coupled with ChatGPT's response data. When installing AI Goat the LLM binary is downloaded from third party locally on your computer.", + "author": "Acunetix", + "notes": "Art shopping", "badge": null }, { @@ -284,6 +284,23 @@ "notes": "Last updated in 2008", "badge": null }, + { + "url": "https://github.com/cider-security-research/cicd-goat", + "name": "CI/CD Goat", + "collection": [ + "container" + ], + "technology": [ + "Gitea", + "Jenkins", + "GitLab", + "Docker" + ], + "references": [], + "author": "Cider", + "notes": "Deliberately vulnerable CI/CD environment. Hack CI/CD pipelines, capture the flags.", + "badge": "cider-security-research/cicd-goat" + }, { "url": "https://ctflearn.com/", "name": "CTFLearn", @@ -483,6 +500,28 @@ "notes": null, "badge": "rewanthtammana/Damn-Vulnerable-Bank" }, + { + "url": "https://github.com/appsecco/dvcsharp-api", + "name": "Damn Vulnerable C# Application (API) ", + "collection": [ + "container", + "offline" + ], + "technology": [ + "Docker", + "C#", + "dotnet" + ], + "references": [ + { + "name": "guide", + "url": "https://github.com/appsecco/dvcsharp-api/tree/master/documentation-dvcsharp-book" + } + ], + "author": "Appsecco ", + "notes": null, + "badge": "appsecco/dvcsharp-api" + }, { "url": "https://github.com/njmulsqb/DVEA/", "name": "Damn Vulnerable Electron App (DVEA)", @@ -824,6 +863,32 @@ "notes": null, "badge": "vegabird/xvna" }, + { + "url": "http://ffuf.me/", + "name": "FFUF.me", + "collection": [ + "online", + "offline", + "container" + ], + "technology": [ + "PHP", + "Docker" + ], + "references": [ + { + "name": "download", + "url": "https://github.com/adamtlangley/ffufme" + }, + { + "name": "live", + "url": "http://ffuf.me/" + } + ], + "author": "adamtlangley", + "notes": "Target practice for ffuf", + "badge": "adamtlangley/ffufme" + }, { "url": "https://public-firing-range.appspot.com/", "name": "Firing Range", @@ -1194,6 +1259,35 @@ "notes": null, "badge": null }, + { + "url": "http://hackxor.sourceforge.net/cgi-bin/index.pl", + "name": "Hackxor", + "collection": [ + "offline", + "online", + "container" + ], + "technology": [ + "VMware" + ], + "references": [ + { + "name": "download", + "url": "https://sourceforge.net/projects/hackxor/files/" + }, + { + "name": "guide", + "url": "http://hackxor.sourceforge.net/cgi-bin/hints.pl" + }, + { + "name": "live", + "url": "https://hackxor.net" + } + ], + "author": "albinowax", + "notes": "First 2 levels online, rest offline. Web application hacking game via missions, based on real vulnerabilities.", + "badge": null + }, { "url": "http://www.mcafee.com/us/downloads/free-tools/hacme-bank.aspx", "name": "Hacme Bank", @@ -1773,6 +1867,21 @@ "notes": null, "badge": "SasanLabs/VulnerableApp-facade" }, + { + "url": "https://pentest-ground.com/", + "name": "Pentest-Ground", + "collection": [ + "online" + ], + "technology": [ + "PHP", + "Docker" + ], + "references": [], + "author": "Pentest-Tools.com", + "notes": "Suite of vulnerable web apps to practice", + "badge": null + }, { "url": "http://pentesteracademylab.appspot.com", "name": "Pentester Academy", @@ -2157,6 +2266,21 @@ "notes": "In Portuguese (Português) - Free online trainning with free online lab", "badge": null }, + { + "url": "https://github.com/Hackmanit/template-injection-playground", + "name": "Template Injection Playground", + "collection": [ + "container" + ], + "technology": [ + "Docker", + "Various Template Engines" + ], + "references": [], + "author": "Hackmanit and Maximilian Hildebrand", + "notes": null, + "badge": "Hackmanit/template-injection-playground" + }, { "url": "https://github.com/dhatanian/ticketmagpie", "name": "TicketMagpie", @@ -2362,6 +2486,27 @@ "notes": null, "badge": "yogisec/VulnerableSAMLApp" }, + { + "url": "https://github.com/Aif4thah/VulnerableLightApp", + "name": "VulnerableLightApp", + "collection": [ + "offline" + ], + "technology": [ + ".NET", + "C#", + "AspNetCore" + ], + "references": [ + { + "name": "guide", + "url": "https://github.com/Aif4thah/VulnerableLightApp" + } + ], + "author": "Michael Vacarella", + "notes": "Vulnerable API for educational purposes", + "badge": "Aif4thah/VulnerableLightApp" + }, { "url": "https://github.com/ctxis/VulnerableXsltConsoleApplication", "name": "VulnerableXsltConsoleApplication", @@ -2443,6 +2588,22 @@ "notes": null, "badge": "adamdoupe/WackoPicko" }, + { + "url": "https://github.com/samuraiwtf/wayfarer", + "name": "Wayfarer", + "collection": [ + "container" + ], + "technology": [ + "Docker", + "OAuth", + "React" + ], + "references": [], + "author": "SamuraiWTF", + "notes": null, + "badge": "SamuraiWTF/wayfarer" + }, { "url": "http://www.mavensecurity.com/web_security_dojo/", "name": "Web Security Dojo", @@ -2594,116 +2755,237 @@ "badge": "s4n7h0/xvwa" }, { - "url": "http://zero.webappsecurity.com/", - "name": "Zero Bank", + "author": "Fernando Mengali, Vagner Mengali", + "badge": null, "collection": [ - "online" + "offline" ], - "technology": [], + "name": "Yrprey", + "notes": "Framework created in NextJs (TypeScript) and PHP/MySQL with OWASP TOP 10 API vulnerabilities of 2019 and 2023. Yrprey can was created for educational purposes, contributing to the teaching and learning of those interested in Pentest (intrusion testing) and Application Security (Appsec).", "references": [ { - "name": "live", - "url": "http://zero.webappsecurity.com" + "name": "download", + "url": "https://github.com/yrprey/yrprey-backend" + }, + { + "name": "download", + "url": "https://github.com/yrprey/yrprey-frontend" + }, + { + "name": "docker", + "url": "https://github.com/yrprey/yrprey-application" } ], - "author": "Micro Focus Fortify (was HP/SpiDynamics)", - "notes": "(username/password)", - "badge": null + "technology": [ + "PHP", + "TypeScript", + "NextJs" + ], + "url": "https://yrprey.com" }, { - "url": "http://www.itsecgames.com/", - "name": "bWAPP", + "author": "Fernando Mengali", + "badge": null, "collection": [ "offline" ], - "technology": [ - "PHP" - ], + "name": "YrpreyBlog", + "notes": "A framework created in PHP/MySQL with OWASP TOP 10 Web Application vulnerabilities.", "references": [ { "name": "download", - "url": "https://sourceforge.net/projects/bwapp/files/" - }, - { - "name": "guide", - "url": "http://itsecgames.blogspot.be/2013/01/bwapp-installation.html" + "url": "https://github.com/yrprey/yrpreyBlog" } ], - "author": null, - "notes": null, - "badge": null + "technology": [ + "PHP", + "CSS", + "Bootstrap", + "MySQL" + ], + "url": "https://yrprey.com" }, { - "url": "https://owasp.org/www-project-crapi/", - "name": "crAPI", + "author": "Fernando Mengali", + "badge": null, "collection": [ - "offline", - "container" - ], - "technology": [ - "Go", - "nginx" + "offline" ], + "name": "YrpreyC", + "notes": "YrpreyC is a framework written in the C language that contains vulnerabilities related to memory issues, categorized as overflows", "references": [ { - "name": "downloads", - "url": "https://github.com/OWASP/crAPI" + "name": "download", + "url": "https://github.com/yrprey/yrpreyC" } ], - "author": "OWASP", - "notes": null, - "badge": "OWASP/crAPI" + "technology": [ + "C" + ], + "url": "https://yrprey.com" }, { - "url": "https://github.com/snoopysecurity/dvws-node", - "name": "dvws-node", + "author": "Fernando Mengali", + "badge": null, "collection": [ - "offline", - "container" - ], - "technology": [ - "Web Services", - "NodeJS" + "offline" ], + "name": "YrpreyC++", + "notes": "YrpreyC++ is a framework written in the C++ language that contains vulnerabilities related to memory issues, categorized as overflows", "references": [ { - "name": "guide", - "url": "https://github.com/snoopysecurity/dvws-node/wiki" + "name": "download", + "url": "https://github.com/yrprey/yrpreyCPlus" } ], - "author": "@snoopysecurity", - "notes": null, - "badge": "snoopysecurity/dvws-node" + "technology": [ + "C++" + ], + "url": "https://yrprey.com" }, { - "url": "http://hackxor.sourceforge.net/cgi-bin/index.pl", - "name": "Hackxor", + "author": "Fernando Mengali", + "badge": null, "collection": [ - "offline", - "online", - "container" + "offline" + ], + "name": "YrpreyPHP", + "notes": "A framework created in PHP/MySQL with OWASP TOP 10 Web Application vulnerabilities. YrpreyPHP was created for educational purposes, contributing to the teaching and learning of those interested in Pentest (intrusion testing) and Application Security (AppSec).", + "references": [ + { + "name": "download", + "url": "https://github.com/yrprey/yrpreyPHP/" + } ], "technology": [ - "VMware" + "PHP", + "CSS", + "Bootstrap", + "MySQL" + ], + "url": "https://yrprey.com" + }, + { + "author": "Fernando Mengali", + "badge": null, + "collection": [ + "offline" ], + "name": "YrpreyPathTraversal", + "notes": "YrpreyPathTraversal is a framework written in PHP, with examples of exploiting Path Traversal and Local File Inclusion vulnerabilities in different ways.", "references": [ { "name": "download", - "url": "https://sourceforge.net/projects/hackxor/files/" - }, + "url": "https://github.com/yrprey/YrpreyPathTraversal" + } + ], + "technology": [ + "PHP", + "MySQL", + "Semantic UI", + "Bootstrap" + ], + "url": "https://yrprey.com" + }, + { + "url": "http://zero.webappsecurity.com/", + "name": "Zero Bank", + "collection": [ + "online" + ], + "technology": [], + "references": [ { - "name": "guide", - "url": "http://hackxor.sourceforge.net/cgi-bin/hints.pl" + "name": "live", + "url": "http://zero.webappsecurity.com" + } + ], + "author": "Micro Focus Fortify (was HP/SpiDynamics)", + "notes": "(username/password)", + "badge": null + }, + { + "url": "http://www.itsecgames.com/", + "name": "bWAPP", + "collection": [ + "offline" + ], + "technology": [ + "PHP" + ], + "references": [ + { + "name": "download", + "url": "https://sourceforge.net/projects/bwapp/files/" }, { - "name": "live", - "url": "https://hackxor.net" + "name": "guide", + "url": "http://itsecgames.blogspot.be/2013/01/bwapp-installation.html" } ], - "author": "albinowax", - "notes": "First 2 levels online, rest offline. Web application hacking game via missions, based on real vulnerabilities.", + "author": null, + "notes": null, "badge": null }, + { + "url": "https://owasp.org/www-project-crapi/", + "name": "crAPI", + "collection": [ + "offline", + "container" + ], + "technology": [ + "Go", + "nginx" + ], + "references": [ + { + "name": "downloads", + "url": "https://github.com/OWASP/crAPI" + } + ], + "author": "OWASP", + "notes": null, + "badge": "OWASP/crAPI" + }, + { + "url": "https://github.com/Checkmarx/capital", + "name": "c{api}tal", + "collection": [ + "container" + ], + "technology": [ + "Docker", + "postgres", + "OpenAPI", + "Python" + ], + "references": [], + "author": "Checkmarx", + "notes": null, + "badge": "Checkmarx/capital" + }, + { + "url": "https://github.com/snoopysecurity/dvws-node", + "name": "dvws-node", + "collection": [ + "offline", + "container" + ], + "technology": [ + "Web Services", + "NodeJS" + ], + "references": [ + { + "name": "guide", + "url": "https://github.com/snoopysecurity/dvws-node/wiki" + } + ], + "author": "@snoopysecurity", + "notes": null, + "badge": "snoopysecurity/dvws-node" + }, { "url": "https://github.com/omerlh/insecure-deserialisation-net-poc", "name": "insecure-deserialisation-net-poc", @@ -2797,27 +3079,6 @@ "notes": "vAPI is a Vulnerable Interface that demonstrates the OWASP API Top 10 vulnerabilities in the means of exercises", "badge": "roottusk/vapi" }, - { - "url": "https://github.com/Aif4thah/VulnerableLightApp", - "name": "VulnerableLightApp", - "collection": [ - "offline" - ], - "technology": [ - ".NET", - "C#", - "AspNetCore" - ], - "references": [ - { - "name": "guide", - "url": "https://github.com/Aif4thah/VulnerableLightApp" - } - ], - "author": "Michael Vacarella", - "notes": "Vulnerable API for educational purposes", - "badge": "Aif4thah/VulnerableLightApp" - }, { "url": "https://github.com/mattvaldes/vulnerable-api", "name": "vulnerable-api", @@ -2859,480 +3120,289 @@ "badge": "marmicode/websheep" }, { - "url": "https://github.com/cider-security-research/cicd-goat", - "name": "CI/CD Goat", + "author": "Fernando Mengali", + "badge": null, "collection": [ - "container" + "offline" + ], + "name": "ypreyAPINodeJS", + "notes": "yrpreyAPINodeJS is a vulnerable framework written in NodeJS and based on the OWASP TOP 10 API.", + "references": [ + { + "name": "download", + "url": "https://github.com/yrprey/ypreyAPINodeJS" + } ], "technology": [ - "Gitea", - "Jenkins", - "GitLab", - "Docker" + "NodeJS", + "PHP", + "MariaDB", + "Bootstrap", + "JavaScript" ], - "references": [], - "author": "Cider", - "notes": "Deliberately vulnerable CI/CD environment. Hack CI/CD pipelines, capture the flags.", - "badge": "cider-security-research/cicd-goat" + "url": "https://yrprey.com" }, { - "url": "http://ffuf.me/", - "name": "FFUF.me", + "author": "Fernando Mengali", + "badge": null, "collection": [ - "online", - "offline", - "container" + "offline" + ], + "name": "ypreyAPIPython", + "notes": "ypreyAPIPython is a vulnerable framework written in Python and based on the OWASP TOP 10 API.", + "references": [ + { + "name": "download", + "url": "https://github.com/yrprey/ypreyAPIPython" + } ], "technology": [ + "Python", "PHP", - "Docker" + "MariaDB", + "Bootstrap", + "JavaScript" ], + "url": "https://yrprey.com" + }, + { + "author": "Fernando Mengali", + "badge": null, + "collection": [ + "offline" + ], + "name": "ypreyPollsPHP", + "notes": "ypreyPollsPHP is a vulnerable framework written in PHP with a polls management scenario, based on the OWASP TOP 10", "references": [ { "name": "download", - "url": "https://github.com/adamtlangley/ffufme" - }, + "url": "https://github.com/yrprey/ypreyPollsPHP" + } + ], + "technology": [ + "PHP", + "MySQL", + "Materialize", + "Bootstrap" + ], + "url": "https://yrprey.com" + }, + { + "author": "Fernando Mengali", + "badge": null, + "collection": [ + "offline" + ], + "name": "yrpreyASPC", + "notes": "yrpreyASPC is a vulnerable framework written in ASP and C with vulnerabilities based on Buffer Overflow, Command Injection, and web application vulnerabilities.", + "references": [ { - "name": "live", - "url": "http://ffuf.me/" + "name": "download", + "url": "https://github.com/yrprey/yrpreyASPC" } ], - "author": "adamtlangley", - "notes": "Target practice for ffuf", - "badge": "adamtlangley/ffufme" + "technology": [ + "ASP", + "MySQL", + "C" + ], + "url": "https://yrprey.com" }, { - "url": "https://pentest-ground.com/", - "name": "Pentest-Ground", + "author": "Fernando Mengali", + "badge": null, "collection": [ - "online" + "offline" + ], + "name": "yrpreyASPCPlus", + "notes": "yrpreyASPCPlus is a vulnerable framework written in ASP and C++ with vulnerabilities based on Buffer Overflow, Command Injection, and web application vulnerabilities.", + "references": [ + { + "name": "download", + "url": "https://github.com/yrprey/yrpreyASPCPlus" + } + ], + "technology": [ + "ASP", + "MySQL", + "C++" + ], + "url": "https://yrprey.com" + }, + { + "author": "Fernando Mengali", + "badge": null, + "collection": [ + "offline" + ], + "name": "yrpreyFinance", + "notes": "yrpreyFinance is a vulnerable framework written in PHP with a financial management scenario, based on the OWASP TOP 10", + "references": [ + { + "name": "download", + "url": "https://github.com/yrprey/yrpreyFinance" + } ], "technology": [ "PHP", - "Docker" + "MySQL", + "Bootstrap" ], - "references": [], - "author": "Pentest-Tools.com", - "notes": "Suite of vulnerable web apps to practice", - "badge": null + "url": "https://yrprey.com" + }, + { + "author": "Fernando Mengali", + "badge": null, + "collection": [ + "offline" + ], + "name": "yrpreyLibrary", + "notes": "yrpreyLibrary is a vulnerable framework written in PHP, based on the OWASP TOP 10", + "references": [ + { + "name": "download", + "url": "https://github.com/yrprey/yrpreyLibrary" + } + ], + "technology": [ + "PHP", + "MySQL", + "Bootstrap" + ], + "url": "https://yrprey.com" }, { - "author":"Fernando Mengali, Vagner Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"Yrprey", - "notes":"Framework created in NextJs (TypeScript) and PHP/MySQL with OWASP TOP 10 API vulnerabilities of 2019 and 2023. Yrprey can was created for educational purposes, contributing to the teaching and learning of those interested in Pentest (intrusion testing) and Application Security (Appsec).", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/yrprey-backend" - }, - { - "name":"download", - "url":"https://github.com/yrprey/yrprey-frontend" - }, - { - "name":"docker", - "url":"https://github.com/yrprey/yrprey-application" - } - ], - "technology":[ - "PHP", - "TypeScript", - "NextJs" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"YrpreyPHP", - "notes":"A framework created in PHP/MySQL with OWASP TOP 10 Web Application vulnerabilities. YrpreyPHP was created for educational purposes, contributing to the teaching and learning of those interested in Pentest (intrusion testing) and Application Security (AppSec).", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/yrpreyPHP/" - } - ], - "technology":[ - "PHP", - "CSS", - "Bootstrap", - "MySQL" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"YrpreyBlog", - "notes":"A framework created in PHP/MySQL with OWASP TOP 10 Web Application vulnerabilities.", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/yrpreyBlog" - } - ], - "technology":[ - "PHP", - "CSS", - "Bootstrap", - "MySQL" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"YrpreyC", - "notes":"YrpreyC is a framework written in the C language that contains vulnerabilities related to memory issues, categorized as overflows", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/yrpreyC" - } - ], - "technology":[ - "C" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"YrpreyC++", - "notes":"YrpreyC++ is a framework written in the C++ language that contains vulnerabilities related to memory issues, categorized as overflows", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/yrpreyCPlus" - } - ], - "technology":[ - "C++" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"yrpreyTasksPython", - "notes":"yrpreyTasksPython is a vulnerable framework written in Python with a task management scenario, based on the OWASP TOP 10", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/yrpreyTasksPython" - } - ], - "technology":[ - "Python", - "PHP", - "MySQL", - "Bootstrap" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"yrpreyTasksNodeJS", - "notes":"yrpreyTasksNodeJS is a vulnerable framework written in NodeJS with a task management scenario, based on the OWASP TOP 10", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/yrpreyTasksNodeJS" - } - ], - "technology":[ - "NodeJS", - "PHP", - "MySQL", - "Bootstrap" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"yrpreyTasks", - "notes":"yrpreyTasks is a vulnerable framework written in PHP with a task management scenario, based on the OWASP TOP 10", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/yrpreyTasks" - } - ], - "technology":[ - "PHP", - "MySQL", - "Bootstrap" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"ypreyPollsPHP", - "notes":"ypreyPollsPHP is a vulnerable framework written in PHP with a polls management scenario, based on the OWASP TOP 10", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/ypreyPollsPHP" - } - ], - "technology":[ - "PHP", - "MySQL", - "Materialize", - "Bootstrap" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"yrpreyPollsPython", - "notes":"yrpreyPollsPython is a vulnerable framework written in Python with a polls management scenario, based on the OWASP TOP 10", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/yrpreyPollsPython" - } - ], - "technology":[ - "Python", - "PHP", - "MySQL", - "Materialize", - "Bootstrap" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"yrpreyPollsNodeJS", - "notes":"yrpreyPollsNodeJS is a vulnerable framework written in NodeJS with a polls management scenario, based on the OWASP TOP 10", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/yrpreyPollsNodeJS" - } - ], - "technology":[ - "NodeJS", - "PHP", - "MySQL", - "Materialize", - "Bootstrap" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"yrpreyPollsPerl", - "notes":"yrpreyPollsPerl is a vulnerable framework written in Perl with a polls management scenario, based on the OWASP TOP 10", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/yrpreyPollsPerl" - } - ], - "technology":[ - "Perl", - "PHP", - "MySQL", - "Materialize", - "Bootstrap" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"ypreyAPINodeJS", - "notes":"yrpreyAPINodeJS is a vulnerable framework written in NodeJS and based on the OWASP TOP 10 API.", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/ypreyAPINodeJS" - } - ], - "technology":[ - "NodeJS", - "PHP", - "MariaDB", - "Bootstrap", - "JavaScript" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"ypreyAPIPython", - "notes":"ypreyAPIPython is a vulnerable framework written in Python and based on the OWASP TOP 10 API.", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/ypreyAPIPython" - } - ], - "technology":[ - "Python", - "PHP", - "MariaDB", - "Bootstrap", - "JavaScript" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"yrpreyLibrary", - "notes":"yrpreyLibrary is a vulnerable framework written in PHP, based on the OWASP TOP 10", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/yrpreyLibrary" - } - ], - "technology":[ - "PHP", - "MySQL", - "Bootstrap" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"yrpreyFinance", - "notes":"yrpreyFinance is a vulnerable framework written in PHP with a financial management scenario, based on the OWASP TOP 10", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/yrpreyFinance" - } - ], - "technology":[ - "PHP", - "MySQL", - "Bootstrap" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"yrpreyASPC", - "notes":"yrpreyASPC is a vulnerable framework written in ASP and C with vulnerabilities based on Buffer Overflow, Command Injection, and web application vulnerabilities.", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/yrpreyASPC" - } - ], - "technology":[ - "ASP", - "MySQL", - "C" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"yrpreyASPCPlus", - "notes":"yrpreyASPCPlus is a vulnerable framework written in ASP and C++ with vulnerabilities based on Buffer Overflow, Command Injection, and web application vulnerabilities.", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/yrpreyASPCPlus" - } - ], - "technology":[ - "ASP", - "MySQL", - "C++" - ], - "url":"https://yrprey.com" - }, - { - "author":"Fernando Mengali", - "badge":null, - "collection":[ - "offline" - ], - "name":"YrpreyPathTraversal", - "notes":"YrpreyPathTraversal is a framework written in PHP, with examples of exploiting Path Traversal and Local File Inclusion vulnerabilities in different ways.", - "references":[ - { - "name":"download", - "url":"https://github.com/yrprey/YrpreyPathTraversal" - } - ], - "technology":[ - "PHP", - "MySQL", - "Semantic UI", - "Bootstrap" - ], - "url":"https://yrprey.com" - } + "author": "Fernando Mengali", + "badge": null, + "collection": [ + "offline" + ], + "name": "yrpreyPollsNodeJS", + "notes": "yrpreyPollsNodeJS is a vulnerable framework written in NodeJS with a polls management scenario, based on the OWASP TOP 10", + "references": [ + { + "name": "download", + "url": "https://github.com/yrprey/yrpreyPollsNodeJS" + } + ], + "technology": [ + "NodeJS", + "PHP", + "MySQL", + "Materialize", + "Bootstrap" + ], + "url": "https://yrprey.com" + }, + { + "author": "Fernando Mengali", + "badge": null, + "collection": [ + "offline" + ], + "name": "yrpreyPollsPerl", + "notes": "yrpreyPollsPerl is a vulnerable framework written in Perl with a polls management scenario, based on the OWASP TOP 10", + "references": [ + { + "name": "download", + "url": "https://github.com/yrprey/yrpreyPollsPerl" + } + ], + "technology": [ + "Perl", + "PHP", + "MySQL", + "Materialize", + "Bootstrap" + ], + "url": "https://yrprey.com" + }, + { + "author": "Fernando Mengali", + "badge": null, + "collection": [ + "offline" + ], + "name": "yrpreyPollsPython", + "notes": "yrpreyPollsPython is a vulnerable framework written in Python with a polls management scenario, based on the OWASP TOP 10", + "references": [ + { + "name": "download", + "url": "https://github.com/yrprey/yrpreyPollsPython" + } + ], + "technology": [ + "Python", + "PHP", + "MySQL", + "Materialize", + "Bootstrap" + ], + "url": "https://yrprey.com" + }, + { + "author": "Fernando Mengali", + "badge": null, + "collection": [ + "offline" + ], + "name": "yrpreyTasks", + "notes": "yrpreyTasks is a vulnerable framework written in PHP with a task management scenario, based on the OWASP TOP 10", + "references": [ + { + "name": "download", + "url": "https://github.com/yrprey/yrpreyTasks" + } + ], + "technology": [ + "PHP", + "MySQL", + "Bootstrap" + ], + "url": "https://yrprey.com" + }, + { + "author": "Fernando Mengali", + "badge": null, + "collection": [ + "offline" + ], + "name": "yrpreyTasksNodeJS", + "notes": "yrpreyTasksNodeJS is a vulnerable framework written in NodeJS with a task management scenario, based on the OWASP TOP 10", + "references": [ + { + "name": "download", + "url": "https://github.com/yrprey/yrpreyTasksNodeJS" + } + ], + "technology": [ + "NodeJS", + "PHP", + "MySQL", + "Bootstrap" + ], + "url": "https://yrprey.com" + }, + { + "author": "Fernando Mengali", + "badge": null, + "collection": [ + "offline" + ], + "name": "yrpreyTasksPython", + "notes": "yrpreyTasksPython is a vulnerable framework written in Python with a task management scenario, based on the OWASP TOP 10", + "references": [ + { + "name": "download", + "url": "https://github.com/yrprey/yrpreyTasksPython" + } + ], + "technology": [ + "Python", + "PHP", + "MySQL", + "Bootstrap" + ], + "url": "https://yrprey.com" + } ]