Web Application Security
Re: OWASP Vulnerable Web Applications Directory Project Oct 18 2013 03:07PM
psiinon (psiinon gmail com)
And in converting my original email to text format the link got lost ;)

The project is here:


On Fri, Oct 18, 2013 at 4:04 PM, psiinon <psiinon (at) gmail (dot) com [email concealed]> wrote:
> The OWASP Vulnerable Web Applications Directory (VWAD) Project is a
> comprehensive and well maintained registry of all known vulnerable web
> applications currently available. These vulnerable web applications
> can be used by web developers, security auditors and penetration
> testers to put in practice their knowledge and skills during training
> sessions (and especially afterwards), as well as to test at any time
> the multiple hacking tools and offensive techniques available, in
> preparation for their next real-world engagement.
> The main goal of VWAD is to provide a list of vulnerable web
> applications available to security professionals for hacking and
> offensive activities, so that they can attack realistic web
> environments... without going to jail :)
> The vulnerable web applications have been classified in three
> categories: On-Line, Off-Line, and VMs/ISOs. Each list has been
> ordered alphabetically.
> An initial list that inspired this project was maintained till the end
> on 2013 at: http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html
> Please let me know if there are any mistakes or omissions, or if you
> have any suggestions for ways it could be improved.
> Simon
> --
> OWASP ZAP Project leader

OWASP ZAP Project leader

This list is sponsored by Cenzic
Let Us Hack You. Before Hackers Do!
It's Finally Here - The Cenzic Website HealthCheck. FREE.
Request Yours Now!

[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus