From 12ec4f789437f3d5783ad715e7d3dd761cf7bec1 Mon Sep 17 00:00:00 2001 From: Joe Shenouda Date: Mon, 1 Jul 2024 00:20:46 +0200 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 848596f..f472a6d 100644 --- a/README.md +++ b/README.md @@ -130,7 +130,7 @@ Ạ̸͛̀̑̚w̷̙͓͊̑̈́͂̀̈́ẻ̸̟̝̒͠s̸̛̜̣͖̘̪̦͂͂̃͛͜o̷͌̏ |[OWASP Broken Web Applications Project](https://sourceforge.net/projects/owaspbwa/)|OWASP Broken Web Applications Project is a collection of vulnerable web applications that is distributed on a Virtual Machine.| |[OWASP GoatDroid](https://github.com/jackMannino/OWASP-GoatDroid-Project)|OWASP GoatDroid is a fully functional and self-contained training environment for educating developers and testers on Android security. GoatDroid requires minimal dependencies and is ideal for both Android beginners as well as more advanced users.| |[OWASP iGoat](https://wiki.owasp.org/index.php/OWASP_iGoat_Tool_Project)|iGoat is a learning tool for iOS developers (iPhone, iPad, etc.).| -|[OWASP Mutillidae II](https://sourceforge.net/projects/mutillidae/)|OWASP Mutillidae II is a free, open source, deliberately vulnerable web-application providing a target for web-security enthusiast.| +|[OWASP Mutillidae II](https://owasp.org/www-project-mutillidae-ii/)|OWASP Mutillidae II is a free, open source, deliberately vulnerable web-application providing a target for web-security enthusiast.| |[OWASP Security Shepherd](https://www.owasp.org/index.php/OWASP_Security_Shepherd)|The OWASP Security Shepherd project is a web and mobile application security training platform.| |[OWASP SiteGenerator](https://en.freedownloadmanager.org/Windows-PC/OWASP-Site-Generator-FREE.html)|OWASP SiteGenerator allows the creating of dynamic websites based on XML files and predefined vulnerabilities (some simple, some complex) covering .Net languages and web development architectures (for example, navigation: Html, Javascript, Flash, Java, etc...).| |[Pentesterlab](https://pentesterlab.com/exercises/from_sqli_to_shell)|This exercise explains how you can, from a SQL injection, gain access to the administration console, then in the administration console, how you can run commands on the system.|