Applications & Systems: Vulnerabilities to practice (compilation) (parte.I)

Aman Hardikar (@AmanHardikar) recoge en su “web” un interesante “recopilatorio” de – aplicaciones y sistemas vulnerables – para practicar. También dispone de una “sección de software” para su descarga desarrollado por él, etc.

Applications & Systems - BLOG - 2

SSLAuditor/OpabiniaUtility to audit SSL and RDP services

ReportGen/NothronychusUtility to generate reports faster, consistent and of better quality

AutoNMap/T DohrniiUtility to automate and analyse NMap scans

sqlmapGUIGUI for the sqlmap (sql injection tool)

Metagoofil GUIGUI for the metagoofil (information gathering tool)

Concute v2 – CONcurrent exeCUTEr: Execute a command on a set of entities in parallel at the same time using threading

Hay otras, pero de momento “under development“… 🙂


· Aplicaciones Web Vulnerables ·

Applications & Systems - BLOG - 4

OWASP BWA

Applications & Systems - BLOG - 3

Applications & Systems - BLOG - 4

OWASP SiteGenerator

Applications & Systems - BLOG - 5

Applications & Systems - BLOG - 4

OWASP Bricks

Applications & Systems - BLOG - 6

Applications & Systems - BLOG - 4

OWASP Security Shepherd

Applications & Systems - BLOG - 7

Applications & Systems - BLOG - 4

Damn Vulnerable Web App (DVWA)

Applications & Systems - BLOG - 8

Applications & Systems - BLOG - 4

Damn Vulnerable Web Services (DVWS)

Applications & Systems - BLOG - 9

Applications & Systems - BLOG - 4

WebGoat.NET

Applications & Systems - BLOG - 10

Applications & Systems - BLOG - 4

PentesterLab

Applications & Systems - BLOG - 11

Applications & Systems - BLOG - 4

Butterfly Security Project

Applications & Systems - BLOG - 12

Applications & Systems - BLOG - 4

Foundstone Hackme Bank

Applications & Systems - BLOG - 13

Applications & Systems - BLOG - 4

Foundstone Hackme Books

Applications & Systems - BLOG - 14

Applications & Systems - BLOG - 4

Foundstone Hackme Casino

Applications & Systems - BLOG - 15

Applications & Systems - BLOG - 4

Foundstone Hackme Shipping

Applications & Systems - BLOG - 16

Applications & Systems - BLOG - 4

Foundstone Hackme Travel

Applications & Systems - BLOG - 17

Applications & Systems - BLOG - 4

LAMPSecurity

Applications & Systems - BLOG - 18

Applications & Systems - BLOG - 4

Moth

Applications & Systems - BLOG - 19

Applications & Systems - BLOG - 4

WackoPicko

Applications & Systems - BLOG - 20

Applications & Systems - BLOG - 4

WebSecurity Dojo

Applications & Systems - BLOG - 21

Applications & Systems - BLOG - 4

BodgeIt Store

Applications & Systems - BLOG - 22

Applications & Systems - BLOG - 4

hackxor

Applications & Systems - BLOG - 23

Applications & Systems - BLOG - 4

SecuriBench

Applications & Systems - BLOG - 24

Applications & Systems - BLOG - 4

SQLol

Applications & Systems - BLOG - 25

Applications & Systems - BLOG - 4

CryptOMG

Applications & Systems - BLOG - 26

Applications & Systems - BLOG - 4

XMLmao

Applications & Systems - BLOG - 27

Applications & Systems - BLOG - 4

Exploit KB Vulnerable Web App

Applications & Systems - BLOG - 28

Applications & Systems - BLOG - 4

PHDays iBank CTF

Applications & Systems - BLOG - 29

Applications & Systems - BLOG - 4

GameOver

Applications & Systems - BLOG - 30

Applications & Systems - BLOG - 4

Zap WAVE

Applications & Systems - BLOG - 31

Applications & Systems - BLOG - 4

PuzzleMall

Applications & Systems - BLOG - 32

Applications & Systems - BLOG - 4

VulnApp

Applications & Systems - BLOG - 33

Applications & Systems - BLOG - 4

sqli-labs

Applications & Systems - BLOG - 34

Applications & Systems - BLOG - 4

Drunk Admin Web Hacking Challenge

Applications & Systems - BLOG - 35

Applications & Systems - BLOG - 4

bWAPP

Applications & Systems - BLOG - 36

Applications & Systems - BLOG - 4

bWAPP – Bee-Box

Applications & Systems - BLOG - 37

Applications & Systems - BLOG - 4

NOWASP / Mutillidae 2

Applications & Systems - BLOG - 38

Applications & Systems - BLOG - 4

SocketToMe

Applications & Systems - BLOG - 39

Hasta aquí la sección de “links” -: Aplicaciones web vulnerables :-, nos vemos en la segunda entrega de aplicaciones y sistemas vulnerables… 🙂

Salu2


TonyHAT - 221

Anuncios

3 comentarios en “Applications & Systems: Vulnerabilities to practice (compilation) (parte.I)”

Responder

Por favor, inicia sesión con uno de estos métodos para publicar tu comentario:

Logo de WordPress.com

Estás comentando usando tu cuenta de WordPress.com. Cerrar sesión / Cambiar )

Imagen de Twitter

Estás comentando usando tu cuenta de Twitter. Cerrar sesión / Cambiar )

Foto de Facebook

Estás comentando usando tu cuenta de Facebook. Cerrar sesión / Cambiar )

Google+ photo

Estás comentando usando tu cuenta de Google+. Cerrar sesión / Cambiar )

Conectando a %s