Vulnerable Environments
Browse our collection of pre-built vulnerable environments for security research and education. Each environment is containerized with Docker and comes with detailed documentation.
5 Results in Hard Coding
Apache Superset Hardcoded JWT Secret Key Leads to Authentication Bypass
Explore the Apache Superset Hardcoded JWT Secret Key Leads to Authentication Bypass vulnerability and learn how to exploit it.
Apache HugeGraph JWT Token Secret Hardcoding Leads to Authentication Bypass
Explore the Apache HugeGraph JWT Token Secret Hardcoding Leads to Authentication Bypass vulnerability and learn how to exploit it.
InfluxDB Empty JWT Secret Key Authentication Bypass
Explore the InfluxDB Empty JWT Secret Key Authentication Bypass vulnerability and learn how to exploit it.
Apache APISIX Hardcoded API Token Leads to RCE
Explore the Apache APISIX Hardcoded API Token Leads to RCE vulnerability and learn how to exploit it.
Apache Shiro 1.2.4 Deserialization Remote Code Execution
Explore the Apache Shiro 1.2.4 Deserialization Remote Code Execution vulnerability and learn how to exploit it.