|[Arizona Cyber Warfare Range](http://azcwr.org/)|The ranges offer an excellent platform for you to learn computer network attack (CNA), computer network defense (CND), and digital forensics (DF). You can play any of these roles.|
93
93
|[Avatao](https://www.avatao.com/)|More than 350 hands-on challenges (free and paid) to master IT security and it's growing day by day.|
94
94
|[BodgeIt Store](https://github.com/psiinon/bodgeit)|The BodgeIt Store is a vulnerable web application which is currently aimed at people who are new to pen testing.|
95
-
|[bWAPP](http://www.itsecgames.com/)|bWAPP,orabuggy web application, is a free and open source deliberately insecure web application.|
95
+
|[bWAPP](http://www.itsecgames.com/)|buggy web application, is a free and open source deliberately insecure web application.Ithelpssecurityenthusiasts,developersandstudentstodiscoverandtopreventwebvulnerabilities.bWAPPpreparesonetoconductsuccessfulpenetrationtestingandethicalhackingprojects.|
96
96
|[Cyber Degrees](http://www.cyberdegrees.org/resources/free-online-courses/)|Free online cyber security Massive Open Online Courses (MOOCS).|
97
97
|[Commix testbed](https://github.com/commixproject/commix-testbed)|A collection of web pages, vulnerable to command injection flaws.|
98
98
|[CryptOMG](https://github.com/SpiderLabs/CryptOMG)|CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.|