A collection of vulnerable applications to test the DursGo scanner.
This repository contains two different vulnerability lab applications, each with its own configuration. Here is how to run both using Docker.
The following labs are available in this collection:
- Open Redirect Lab
- A lab demonstrating a classic Open Redirect vulnerability where the application redirects to any user-supplied URL.
Click Video Solved Lab - Open Redirect
openredirect.mp4
- Blind Vulnerabilities Lab
- Contains both Blind SSRF and Blind Command Injection vulnerabilities, detectable via OAST.
Click Video Solved Lab - Blind SSRF
blindssrf.mp4
Click Video Solved Lab - Blind Command Injection
cmdinjection-blind.mp4
- SSRF (In-Band) Lab
- A classic SSRF where the application fetches and displays content from a user-supplied URL.
Click Video Solved Lab - SSRF (In-Band)
ssrf.mp4
- DomXSS Lab
- This Lab is vulnerable to DOMXSS. The script on this page takes the content from the URL fragment
Click Video Solved Lab - DomXSS
domxss.mp4
- Mass Assignment Lab
- This link leads to a protected API endpoint vulnerable to Mass Assignment.
Click Video Solved Lab - Mass Assignment
massassignment.mp4
- CORS Misconfiguration Lab
- An API endpoint that improperly reflects the Origin header, allowing data theft from any domain.
Click Video Solved Lab - CORS Misconfiguration
cors.mp4
- Authentication Lab
- A login page to test authenticated scanning capabilities and related vulnerabilities. (Vulnerabilities: CSRF, BOLA, File Upload, Mass Assignment).
Click Video Solved Lab - Authentication
lab-auth.mp4
- Exposed Files Lab
- A directory to test the detection of sensitive files and folders like
.envor.git/.
- A directory to test the detection of sensitive files and folders like
Click Video Solved Lab - Exposed Files
exposed.mp4
- IDOR & Stored XSS Lab
- A login authenticated test for Insecure Direct Object References and Stored Cross-Site Scripting.
Click Video Solved Lab - IDOR & Stored XSS Lab
lab-shop.mp4
- GraphQL API Lab
- A vulnerable GraphQL endpoint to test for introspection, injection, and other API-specific flaws.
Click Video Solved Lab - GraphQL API
graphql.mp4
This application is a PHP-based vulnerability lab and serves as the main dashboard for all labs.
Important: The main page of this application (
http://localhost:8088) contains links to all labs, including those running on ports 5000 and 4000. To ensure all links work, you must run both applications (index-vulnandindex-vuln-2) simultaneously.
- Docker
- Docker Compose
-
Open a terminal and navigate to the
index-vulndirectory:cd index-vuln -
Run the following command to build and start the Docker container:
docker compose up --build -d
This command will run the application in the background.
-
Once the container is running, the application will be accessible at: http://localhost:8088
To stop the application, run the following command from within the index-vuln directory:
docker compose downThis application consists of two services: a Flask-based web application (Python) and a Node.js-based GraphQL API.
- Docker
- Docker Compose
-
Open a terminal and navigate to the
index-vuln-2directory:cd index-vuln-2 -
Run the following command to build and start both services:
docker compose up --build -d
-
Once the containers are running, the services will be accessible at:
- Web Application (Flask): http://localhost:5000
- GraphQL API (Node.js): http://localhost:4000
The database is initialized with the following users:
-
Admin User
- Username:
admin - Password:
admin123
- Username:
-
Regular User
- Username:
user1 - Password:
password123
- Username:
To stop both services, run the following command from within the index-vuln-2 directory:
docker compose downThis project includes a report viewer that allows you to upload and visualize vulnerability scan results in a clean web interface, with the option to export them as PDF.
-
Access the viewer at: http://localhost:8088/report/
-
Upload report
- Click the Choose File button.
- Select the JSON report generated by DursGo.
- View results
- Scan Summary (target URL, technologies, total findings, etc.)
- Detailed Vulnerabilities (each finding shown on a separate page for PDF export)
- AI Analysis section with remediation guidance and code examples
- Export as PDF
- Once the report is loaded, click Download Report as PDF to export the findings into a professional PDF document.
