Dataset with 54k vulnerable ELF executables, compiled from C sources and targetting i386 🗂️
-
Updated
Jun 11, 2023
Dataset with 54k vulnerable ELF executables, compiled from C sources and targetting i386 🗂️
A very silly vulnerable application to review your knowledge about basics of cybersecurity.
Sample Java source code containing vulnerabilities to illustrate Fortify usage
Simple Spring/Java web application for Fortify demonstrations
Angular UI front end for IWA (Insecure Web App) Pharmacy Direct
Deliberately vulnerable REST API for OWASP Top 10 (2023) security testing and learning.
AzureGenerat0r, a tool for automated generation and configuration of test environments in Microsoft Azure
An insecure React Native mobile application for use in Micro Focus demonstrations
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
An intentionally vulnerable Spring Boot application designed for security research, defensive analysis, and secure coding education in modern Java-based systems.
Assets for demo of Fortify SCA vulnerability scanning of Azure Resource Manager templates
A deilberately vulnerable angular app for educational purposes
An insecure NodeJS/Express web application for use in Debricked demonstrations
Add a description, image, and links to the vulnerable-apps topic page so that developers can more easily learn about it.
To associate your repository with the vulnerable-apps topic, visit your repo's landing page and select "manage topics."