igpg / OWASP-VWAD

The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

OWASP-VWAD

OWASP Incubator

The OWASP Vulnerable Web Applications Directory Project (VWAD, https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

The raw data for the project is held in the src/*.tsv files.

The full OWASP wiki source code is available at https://www.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project&action=edit.

The individual five wiki source code pages are available at:

To recreate the TSV files from the OWASP wiki pages:

  • Copy the five wiki source code pages into the 'src/owasp-wiki/' directory, using the following filenames: Online.wiki, Offline.wiki, OfflineOld.wiki, VMs.wiki, and VMsOld.wiki.
  • Run the 'python bin/owasp-wiki-to-tsv.py' script

To regenerate the OWASP wiki pages after updating the TSV files:

  • Run the 'python bin/tsv-to-owasp-wiki.py' script
  • Update the five OWASP wiki pages with the contents of the new files available at 'dist/': Online.wiki, Offline.wiki, OfflineOld.wiki, VMs.wiki, and VMsOld.wiki.

Example to add a new entry via the TSV files (e.g. to the offline category)

  • Add the new entry for the new vulnerable application to the corresponding .tsv file (e.g. offline.tsv) under ./src
  • Use git to submit a pull request (or commit the changes) from the modified .tsv file to this GitHub project

Optional:

  • Run the 'python bin/tsv-to-owasp-wiki.py' script from the main project directory
  • This will generate all the .wiki files from the .tsv files under ./dist
  • Copy the contents of the corresponding .wiki file (e.g. Offline.wiki) to the official Wiki page of the OWASP VWAD project IMPORTANT: Do not forget that the .wiki file does not include the header and the trailer used by the Wiki page to create the table. Simply, copy and paste the contents inside the current table.
  • (Optional) You can delete the contents of the ./dist directory after copying them to the Wiki

About

The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

License:Apache License 2.0


Languages

Language:Python 100.0%