Skip to content
Purposely vulnerable Java application to help lead secure coding workshops
Branch: master
Clone or download
Type Name Latest commit message Commit time
Failed to load latest commit information.
reverse_shell Added rce/reverse shell exercise Feb 15, 2019
src Added supplementary ssrf endpoint Feb 21, 2019
mvnw initial commit Feb 13, 2019
pom.xml Added XSS exercise Feb 21, 2019

Vulnado - Intentionally Vulnerable Java Application

This application and exercises will take you through some of the OWASP top 10 Vulnerabilities and how to prevent them.

Up and running

  1. Install Docker for MacOS or Windows. You'll need to create a Docker account if you don't already have one.
  2. git clone git://
  3. cd vulnado
  4. docker-compose up
  5. Open a browser and navigate to the client to make sure it's working: [http://localhost:1337](docker-compose up)
  6. Then back in your terminal verify you have connection to your API server: nc -vz localhost 8080


The docker network created by docker-compose maps pretty well to a multi-tier architecture where a web server is publicly available and there are other network resources like a database and internal site that are not publicly available.


You can’t perform that action at this time.