All Projects → tombstoneghost → TIWAP

tombstoneghost / TIWAP

Licence: MIT license
Totally Insecure Web Application Project (TIWAP)

Programming Languages

HTML
75241 projects
python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to TIWAP

training-materials
No description or website provided.
Stars: ✭ 47 (-65.69%)
Mutual labels:  training, infosec
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+7528.47%)
Mutual labels:  training, penetration-testing
diwa
A Deliberately Insecure Web Application
Stars: ✭ 32 (-76.64%)
Mutual labels:  training, infosec
Awesome Shodan Queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩‍💻
Stars: ✭ 2,758 (+1913.14%)
Mutual labels:  penetration-testing, infosec
S3Scan
Script to spider a website and find publicly open S3 buckets
Stars: ✭ 21 (-84.67%)
Mutual labels:  penetration-testing, infosec
Cameradar
Cameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+1925.55%)
Mutual labels:  penetration-testing, infosec
Dvwa
Damn Vulnerable Web Application (DVWA)
Stars: ✭ 5,727 (+4080.29%)
Mutual labels:  training, infosec
Wireshark Cheatsheet
Wireshark Cheat Sheet
Stars: ✭ 131 (-4.38%)
Mutual labels:  penetration-testing, infosec
pentest-reports
Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.
Stars: ✭ 111 (-18.98%)
Mutual labels:  penetration-testing, infosec
PyParser-CVE
Multi source CVE/exploit parser.
Stars: ✭ 25 (-81.75%)
Mutual labels:  penetration-testing, infosec
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+32.85%)
Mutual labels:  penetration-testing, infosec
urldedupe
Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (+51.82%)
Mutual labels:  penetration-testing, infosec
Docker Security Images
🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (+25.55%)
Mutual labels:  penetration-testing, infosec
DDTTX
DDTTX Tabletop Trainings
Stars: ✭ 22 (-83.94%)
Mutual labels:  training, infosec
Smogcloud
Find cloud assets that no one wants exposed 🔎 ☁️
Stars: ✭ 168 (+22.63%)
Mutual labels:  penetration-testing, infosec
championscurriculum
A training curriculum for teaching information security "champions" within small organisations and helping them conduct a basic assessment. (Work in progress)
Stars: ✭ 18 (-86.86%)
Mutual labels:  training, infosec
Roadmap
GitBook: OSCP RoadMap
Stars: ✭ 89 (-35.04%)
Mutual labels:  penetration-testing, infosec
M4ngl3m3
Common password pattern generator using strings list
Stars: ✭ 103 (-24.82%)
Mutual labels:  penetration-testing, infosec
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+3.65%)
Mutual labels:  penetration-testing, infosec
pwn-pulse
Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (-8.03%)
Mutual labels:  penetration-testing, infosec

Totally Insecure Web Application Project (TIWAP)

Forks Stars OpenIssues ClosedIssues Languages License

TIWAP is a web security testing lab made using Flask for budding security enthusiasts to learn about various web vulnerabilities. Inspired by DVWA, the contributors have tried their best to regenerate various web vulnerabilities

The application is solely made for educational purpose and to learn web hacking in a legal environment.

Read more about it here

Disclaimer

We highly recommend installing the lab on a Virtual Machine instead of a live web server (Internal or External).

We do not take responsibility for the way in which anyone uses this application (TIWAP). The application has been made for educational purpose only and should not be used maliciously. If your web servers are compromised due to installation of this application, it is not our responsibility, it is the responsibility of the person/s who uploaded and installed it.

Setup and Installation

To keep the installation and setup easy, we have configured everything for you. All you need is Docker on your system.

Once you are done with docker installation, run the following commands.

git clone https://github.com/tombstoneghost/TIWAP
cd TIWAP
docker-compose up

Note: It works only on Linux as of now and windows compatibility is work under progress

Once the lab is started, you can log in using the default credentials.
Username: admin
Password: admin

Tech Stack

Front-End: HTML, CSS and JavaScript
Back-End: Python - Flask
Databases: SQLite3 and MongoDB

Vulnerabilities

Currently, we have 20 vulnerabilities in the lab. All listed below:

  • SQL Injection
  • Blind SQL Injection
  • NoSQL Injection
  • Command Injection
  • Business Logic Flaw
  • Sensitive Data Exposure
  • XML External Entities
  • Security Misconfiguration
  • Reflected XSS
  • Stored XSS
  • DOM Based XSS
  • HTML Injection
  • Improper Certificate Validation
  • Hardcoded Credentials
  • Insecure File Upload
  • Brute Force
  • Directory Traversal
  • Cross-Site Request Forgery (CSRF)
  • Server-Side Request Forgery (SSRF)
  • Server-Side Template Injection (SSTI)

Each vulnerability is having 3 difficulty levels, namely Low, Medium and Hard. These levels can be set from the settings page.

Bugs and Issues

If you find any bugs or issues with the project, kindly raise the same on the below link.

https://github.com/tombstoneghost/TIWAP/issues

Contributors

  1. Simardeep Singh - LinkedIn | Twitter
  2. Yash Giri - LinkedIn
  3. Sakshi Aggarwal - LinkedIn | Twitter

Want to be a contributor?

  1. Star this repository
  2. Fork this repository
  3. Clone the forked repository
  4. Navigate to the project directory
  5. Create a new branch with your name
  6. Make changes
  7. Stage your changes and commit
  8. Push your local changes to remote
  9. Create a Pull Request
  10. Congratulations! You did it.

License

This project is under the MIT License - Click here for details.

Happy Hacking! :)

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].