https://github.com/nyuuuukie/darkly
🔐 An introduction to the web security. The goal is to find 14 vulnerabilities in the web-app classified by OWASP
https://github.com/nyuuuukie/darkly
21school 42born2code 42projects 42school darkly
Last synced: 7 months ago
JSON representation
🔐 An introduction to the web security. The goal is to find 14 vulnerabilities in the web-app classified by OWASP
- Host: GitHub
- URL: https://github.com/nyuuuukie/darkly
- Owner: nyuuuukie
- Created: 2022-10-02T19:26:51.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2022-10-27T16:31:49.000Z (almost 3 years ago)
- Last Synced: 2025-01-03T15:16:14.088Z (9 months ago)
- Topics: 21school, 42born2code, 42projects, 42school, darkly
- Language: Shell
- Homepage:
- Size: 29.3 KB
- Stars: 0
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Security: Security-Misconfiguration/Resources/README.md
Awesome Lists containing this project
README
# darkly
This project is an introduction to the web security. The goal is to find 14 vulnerabilities in the web-app.
## env
To use the scripts set IPADDR env variable to the current ip address of the app.
For example, `export IPADDR=192.168.64.4`## Vulnerability/Attack/Exploit:
* [Form Validation](/Form-Validation/Resources/README.md)
* [Reflected XSS](/Reflected-XSS/Resources/README.md)
* [Stored XSS](/Stored-XSS/Resources/README.md)
* [Broken Authentication](/Broken-Authentication/Resources/README.md)
* [Brute Force Credentials](/Brute-Force-Credentials/Resources/README.md)
* [Path Traversal](/Path-Traversal/Resources/README.md)
* [Referer Spoofing](/Referer-Spoofing/Resources/README.md)
* [Security Misconfiguration](/Security-Misconfiguration/Resources/README.md)
* [Scraping](/Scraping/Resources/README.md)
* [SQLi (images)](/SQLi-Images/Resources/README.md)
* [SQLi (members)](/SQLi-Members/Resources/README.md)
* [Unrestricted File Upload](/Unrestricted-File-Upload/Resources/README.md)
* [Unvalidated Redirects](/Unvalidated-Redirects/Resources/README.md)
* [Web-Parameter-Tampering](/Web-Parameter-Tampering/Resources/README.md)