This is a repo to hold a collection of vulnerable applications used to practice and learn about security vulnerabilities.
If you want to use docker, you can use the following commands for any given application:
docker-compose build
docker-compose up -d
To use an app, enter its directory, and run the following commands:
pip install -r requirements.txt
./app.py
This app is used to demonstrate XSS and CSRF.
This app is used to demonstrate bash injection in python
This app is used to demonstrate Insecure Direct Object References (IDOR)
This app is used to demonstrate Poor Data Validation