List of preinstalled and prepared [ready to use] ISO images or virtual machines (VMs) that contain one or multiple vulnerable web applications for penetration and security testing.
- BadStore (ISO): http://www.badstore.net (download - registration required)
- OWASP BWA - Broken Web Applications Project (VMware - list): https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project (download)
- Drunk Admin Web Hacking Challenge (VMware): https://bechtsoudis.com/work-stuff/challenges/drunk-admin-web-hacking-challenge/ (download)
- Exploit.co.il Vuln Web App (VMware): http://exploit.co.il/projects/vuln-web-app/ (download)
- GameOver (VMware): http://sourceforge.net/projects/null-gameover/ (download)
- Hackxor (VMware): http://hackxor.sourceforge.net/cgi-bin/index.pl (download) (hints&tips)
- Hacme Bank Prebuilt VM (VMware): http://ninja-sec.com/index.php/hacme-bank-prebuilt-vmware-image-ninja-sec-com/ (download)
- Kioptrix4 (VMware & Hyper-V): http://www.kioptrix.com/blog/?p=604 (download)
- LAMPSecurity (VMware): http://sourceforge.net/projects/lampsecurity/ (download) (doc)
- Metasploitable (VMware): http://blog.metasploit.com/2010/05/introducing-metasploitable.html (download - torrent) (doc)
- Metasploitable 2 (VMware): https://community.rapid7.com/docs/DOC-1875 (download)
- Moth (VMware): http://www.bonsai-sec.com/en/research/moth.php (download)
- PHDays I-Bank (VMware): http://phdays.blogspot.com.es/2012/05/once-again-about-remote-banking.html (download)
- Samurai WTF (ISO - list): http://www.samurai-wtf.org (download)
- Sauron (Quemu) [Spanish]: http://sg6-labs.blogspot.com/2007/12/secgame-1-sauron.html (solutions)
- UltimateLAMP (VMware - list): http://ronaldbradford.com/blog/ultimatelamp-2006-05-19/ (download)
- Virtual Hacking Lab (ZIP): http://sourceforge.net/projects/virtualhacking/ (download)
- Web Security Dojo (VMware, VirtualBox - list): http://www.mavensecurity.com/web_security_dojo/ (download)
If you required any more information and help about any application please mail @ This email address is being protected from spambots. You need JavaScript enabled to view it.