{"id":13461276,"url":"https://github.com/rapid7/hackazon","last_synced_at":"2025-03-24T22:34:31.548Z","repository":{"id":38454889,"uuid":"38128140","full_name":"rapid7/hackazon","owner":"rapid7","description":"A modern vulnerable web app","archived":true,"fork":false,"pushed_at":"2021-03-11T20:02:56.000Z","size":39594,"stargazers_count":976,"open_issues_count":15,"forks_count":335,"subscribers_count":114,"default_branch":"master","last_synced_at":"2024-12-18T06:23:39.493Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"HTML","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/rapid7.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2015-06-26T18:52:00.000Z","updated_at":"2024-12-11T16:41:03.000Z","dependencies_parsed_at":"2022-07-12T17:34:23.652Z","dependency_job_id":null,"html_url":"https://github.com/rapid7/hackazon","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/rapid7%2Fhackazon","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/rapid7%2Fhackazon/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/rapid7%2Fhackazon/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/rapid7%2Fhackazon/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/rapid7","download_url":"https://codeload.github.com/rapid7/hackazon/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":245366179,"owners_count":20603438,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-07-31T11:00:32.234Z","updated_at":"2025-03-24T22:34:27.926Z","avatar_url":"https://github.com/rapid7.png","language":"HTML","readme":"Hackazon\n========\n\nHackazon is a free, vulnerable test site that is an online storefront built with the same\ntechnologies used in today’s rich client and mobile applications. Hackazon has an AJAX\ninterface, strict workflows and RESTful API’s used by a companion mobile app providing\nuniquely-effective training and testing ground for IT security professionals. And, it’s\nfull of your favorite vulnerabilities like SQL Injection, cross-site scripting and so on.\n\nToday’s web and mobile applications as well as web services have a host of new\ntechnologies that are not being adequately tested for security vulnerabilities. It is\ncritical for IT security professionals to have a vulnerable web application to use for\ntesting the effectiveness of their tools and for honing their skills.\n\nHackazon enables users to configure each area of the application in order to change the\nvulnerability landscape to prevent “known vuln testing” or any other form of ‘cheating.’\nSince the application includes RESTful interfaces that power AJAX functionality and\nmobile clients (JSON, XML, GwT, and AMF), users will need to the latest application\nsecurity testing tools and techniques to discover all the vulnerabilities. Hackazon also\nrequires detailed testing of strict workflows, like shopping carts,that are commonly used\nin business applications.\n\nFeatures\n========\n* REST Support - http://www.w3.org/2001/sw/wiki/REST\n* GWT Support - http://www.gwtproject.org\n* AJAX and Standard HTTP Requests are Supported\n\nTechnical Details\n=================\n* PHP Version – 5.4\n* PHP Framework – http://phpixie.com/\n* JS – http://jquery.com/ \u0026 http://knockoutjs.com/\n* CSS – http://getbootstrap.com/\n* DB – MySQL 5.5 with InnoDB Support\n* Web Server – Apache 2.0\n\nAdditional Information\n======================\n* [Wiki](https://github.com/rapid7/hackazon/wiki)\n* CyberSecology Blog: [Hackazon Test Site Review](http://cybersecology.com/hackazon-review/)\n","funding_links":[],"categories":["Vulnerable Web Applications","HTML","🕸️ Vulnerable Web Applications","Welcome to Learn101","Vulnerable Web apps:","Uncategorized","Support"],"sub_categories":["Insecure Web Apps","PHP","Uncategorized"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Frapid7%2Fhackazon","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Frapid7%2Fhackazon","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Frapid7%2Fhackazon/lists"}