[Owasp-leaders] OWASP Vulnerable Web Applications Directory Project

Jim Manico jim.manico at owasp.org
Fri Oct 18 15:21:34 UTC 2013


Can we find some synergy with this new project and https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project ?

Aloha,
Jim

> Hi leaders,
> 
> I've been working with Raul to make the list of vulnerable web applications
> he was maintaining on his blog (
> http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html)
> into an OWASP Project.
> 
> The result is the OWASP Vulnerable Web Applications Directory
> Project<https://www.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project>:)
> 
> To quote from the project description:
> 
> "OWASP Vulnerable Web Applications Directory (VWAD) Project is a
> comprehensive and well maintained registry of all known vulnerable web
> applications currently available. These vulnerable web applications can be
> used by web developers, security auditors and penetration testers to put in
> practice their knowledge and skills during training sessions (and specially
> afterwards), as well as to test at any time the multiple hacking tools and
> offensive techniques available, in preparation for their next real-world
> engagement.
> 
> VWAD main goal is to provide a list of vulnerable web applications
> available to security professionals for hacking and offensive activities,
> so that they can attack realistic web environments... without going to
> jail :)
> 
> The vulnerable web applications have been classified in three categories:
> On-Line, Off-Line, and VMs/ISOs. Each list has been ordered alphabetically.
> 
> An initial list that inspired this project was maintained till the end on
> 2013 at:
> http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html."
> Please let us know if anything is wrong or missing.
> Or even better, just update the page yourself - the project is self
> contained on the OWASP wiki so anyone can go in and correct things.
> 
> And let us know if you have any suggestions for ways it could be improved.
> 
> Oh, and spread the word - we want it to be the top result when you search
> for "vulnerable web applications" using your favourite search engine.
> 
> Cheers,
> 
> Simon
> 
> 
> 
> _______________________________________________
> OWASP-Leaders mailing list
> OWASP-Leaders at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-leaders
> 



More information about the OWASP-Leaders mailing list