Folders:
- vuln_app: intentionally vulnerable Flask app
- patched_app: fixed version demonstrating mitigations
- exploits: PoC scripts and pages
- Create virtualenv and activate
- pip install flask flask-wtf requests
- Run vulnerable app:
- cd vuln_app
- python app_vuln.py
- Visit http://127.0.0.1:5000
- SQLi: http://127.0.0.1:5000/search?q=' OR '1'='1
- XSS: post <script>alert('XSS')</script> in comments
- CSRF: open exploits/csrf_poc.html while app is running
- Use patched_app to show fixes.
- Evidence: screenshots, curl logs, sqlite3 queries, exploit outputs.
- Ethical use only: do not attack systems you don't own or have permission to test.