Skip to content

DylanTestOrg/pygoat

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

73 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

pygoat

intentionally vuln web Application Security in django. our roadmap build intentionally vuln web Application in django. The Vulnerability can based on OWASP top ten
• A1:2017-Injection
• A2:2017-Broken Authentication
• A3:2017-Sensitive Data Exposure
• A4:2017-XML External Entities (XXE)
• A5:2017-Broken Access Control
• A6:2017-Security Misconfiguration
• A7:2017-Cross-Site Scripting (XSS)
• A8:2017-Insecure Deserialization
• A9:2017-Using Components with Known Vulnerabilities
• A10:2017-Insufficient Logging & Monitoring

To setup the project on your local machine:
1. Click on Fork.
2. Go to your fork and clone the project to your local machine.
3. Install the requirements pip install -r requirements.txt.
4. Apply the migrations python manage.py migrate.
5. Finally, run the development server python manage.py runserver.

The project will be available at 127.0.0.1:8000.

About

intentionally vuln web Application Security in flask or django

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • HTML 61.8%
  • Python 28.0%
  • CSS 8.9%
  • JavaScript 1.3%