With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
VPLE (Linux)
Vulnerable Pentesting Lab Environment
VPLE is an Intentionally Vulnerable Linux Virtual Machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing Labs. In VPLE bunch of labs are Available.
NOTE:- "Only run in VMWare Pls Don’t run in VirtualBox"
Will also run on the ProxMox server to understand how to do it pls refer to the doc in the zip named "Cybersecurity Lab Deployment on Proxmox"
The default login and password is administrator: password.
...
This is Vulnerable Web Application developed for course by Cyber Security and Privacy Foundation (www.cysecurity.org) for Java programmers
The full course on Hacking and Securing Web Java Programs is available in
https://www.udemy.com/hacking-securing-java-web-programming/
WAR file:
----------
https://sourceforge.net/projects/javavulnerablelab/files/latest/JavaVulnerableLab.war/download
Virtualbox VM...
BTS Pentesting Lab - a deliberately vulnerable Web application
BTS PenTesting Lab is an open source vulnerable web application, created by Cyber Security & Privacy Foundation (www.cysecurity.org). It can be used to learn about many different types of web application vulnerabilities.
Currently, the app contains the following types of vulnerabilities:
*SQL Injection
*XSS(includes Flash Based xss)
*CSRF
*Clickjacking
*SSRF
*File Inclusion
* Code Execution
*Insecure Direct Object Reference
*Unrestricted File Upload vulnerability
*Open URL...