Pentesting Vulnerable Study Frameworks Complete List
Web Pentesting
War Games
| Application Name | Company / Developer | URL |
|---|---|---|
| Hell Bound Hackers | Hell Bound Hackers | http://hellboundhackers.org/ |
| Vulnerability Assessment | Kevin Orrey | http://www.vulnerabilityassessment.co.uk/ |
| Smash the Stack | Smash the Stack | http://www.smashthestack.org/ |
| Over the Wire | Over the Wire | http://www.overthewire.org/wargames/ |
| Hack This Site | Hack This Site | http://www.hackthissite.org/ |
| Hacking Lab | Hacking Lab | https://www.hacking-lab.com/ |
| We Chall | We Chall | https://www.wechall.net/ |
| REMnux | REMnux | http://zeltser.com/remnux/ |
Insecure Distributions
| Application Name | Company / Developer | URL |
|---|---|---|
| Damm Vulnerable Linux | DVL | http://www.damnvulnerablelinux.org/ |
| Metasploitable | Offensive Security | http://blog.metasploit.com/2010/05/introducing-metasploitable.html |
| de-ICE | Hacker Junkie | http://www.de-ice.net/ |
| Moth | Bonsai Security Software | http://www.bonsai-sec.com/en/research/moth.php |
| PwnOS | Niel Dickson | http://www.neildickson.com/os/ |
| Holynix | Pynstrom | http://pynstrom.net/holynix.php |
Reference:http://www.felipemartins.info/2011/05/pentesting-vulnerable-study-frameworks-complete-list/[1]








网友评论