Skip to content

The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

License

Notifications You must be signed in to change notification settings

markdenihan/OWASP-VWAD

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

OWASP-VWAD

The OWASP Vulnerable Web Applications Directory Project (VWAD, https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

The raw data for the project is held in the src/*.tsv files.

The full OWASP wiki source code is available at https://www.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project&action=edit.

The individual five wiki source code pages are available at:

To recreate the TSV files from the OWASP wiki pages:

  • Copy the five wiki source code pages into the 'src/owasp-wiki/' directory, using the following filenames: Online.wiki, Offline.wiki, OfflineOld.wiki, VMs.wiki, and VMsOld.wiki.
  • Run the 'python bin/owasp-wiki-to-tsv.py' script

To regenerate the OWASP wiki pages after updating the TSV files:

  • Run the 'python bin/tsv-to-owasp-wiki.py' script
  • Update the five OWASP wiki pages with the contents of the new files available at 'dist/': Online.wiki, Offline.wiki, OfflineOld.wiki, VMs.wiki, and VMsOld.wiki.

About

The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%