<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ali+Razmjoo</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ali+Razmjoo"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Ali_Razmjoo"/>
		<updated>2026-05-02T04:46:29Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=247930</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=247930"/>
				<updated>2019-02-27T09:17:06Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* OHP (OWASP Honeypot) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF (draft)==&lt;br /&gt;
Idea 1: &lt;br /&gt;
&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository.  &lt;br /&gt;
&lt;br /&gt;
Idea 2: &lt;br /&gt;
&lt;br /&gt;
We want to extend the Machine learning chatbot functionality in SKF.&lt;br /&gt;
* Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
* Extend the bots capability to do the google search(using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
* Extend the bot capability to reply what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
* Extend the bot to different platforms like Facebook, telegram, slack etc.&lt;br /&gt;
** Now the working chatbot implementation for example is only for Gitter&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool, used as the backbone for security programs. It is easy to get started with and work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
Option 1: Unit Tests - Difficulty: Easy&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
Option 2: Feature Enhancement - Difficulty: Varies&lt;br /&gt;
* The functionality of DefectDojo is constantly expanding.&lt;br /&gt;
* Feature enhancements offer programming challenges for all levels of experience.&lt;br /&gt;
Option 3: Pull Request Review - Difficulty: Moderate - Hard&lt;br /&gt;
* Test pull requests and provide feedback on code.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Python_Honeypot|OWASP Honeypot]] is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to adding more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
&lt;br /&gt;
* Zero Bugs: Currently we may have several bugs in different conditions, and it's best to test the all functions and fix them&lt;br /&gt;
* Monitoring: Right now monitoring limited to the connections (send&amp;amp;recieve) and it's best to store and analysis the contents for farther investigations and recognizing incoming attacks.&lt;br /&gt;
* Duplicated codes: codes are complicated and duplicated in engine, should be fixed/clean up&lt;br /&gt;
* New modules: add some creative ICS/Network/Web modules andvulnerable web applications, services and stuff&lt;br /&gt;
* API: update API sync to all features&lt;br /&gt;
* WebUI: Demonstrate and add API on WebUI and Live version with all features&lt;br /&gt;
* WebUI Special Reports: Track the attacks more creative and provide high risk IPs&lt;br /&gt;
* Database: Better database structure, faster and use queue&lt;br /&gt;
* Data analysis: Analysis stored data and attack signatures&lt;br /&gt;
* OWASP Top 10: Preparing useful processed/raw data for OWASP top 10 project&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis &amp;amp; Tshark &amp;amp; Libpcap&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
* Web Development Skills&lt;br /&gt;
* Honeypot and Deception knowledge&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for challenges in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
While the Juice Shop is offering a lot of long-lasting motivation and challenges for security experts, it might be a bit daunting for newcomers and less experienced hackers.&lt;br /&gt;
The &amp;quot;Hacking Instructor&amp;quot; as sketched in [https://github.com/bkimminich/juice-shop/issues/440 GitHub issue #440] could guide users from this target audience through at least some of the hacking challenges. As this would be an entirely new and relatively independent feature of the Juice Shop, students should be able to bring in their own creativity and ideas a lot.&lt;br /&gt;
&lt;br /&gt;
''For this project, a good proposal with a design &amp;amp; implementation proposal more sophisticated than the rough ideas in [https://github.com/bkimminich/juice-shop/issues/440 #440] is paramount to be selected as a student!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A working implementation of e.g. an avatar-style &amp;quot;Hacking Instructor&amp;quot; or other solution based on the students own proposal&lt;br /&gt;
* Coverage of at least the trivial (1-star) and some easy (2-star) challenges&lt;br /&gt;
* Documentation how to configure or script the &amp;quot;Hacking Instructor&amp;quot; for challenges in general&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular, some UI/UX experience would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Juice Shop Mobile ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A complete mobile client for Juice-Shop API which will serve a legit mobile experience for Juice-Shop user as well as a plethora of Mobile app vulnerabilities and challenges around them to solve. Should in the best case translate the idea of Juice Shop's hacking challenges with a score board and success notifications into the mobile world.&lt;br /&gt;
&lt;br /&gt;
''Coming up with a sophisticated proposal (optimally even with a good initial sample implementation) could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's RESTful backend&lt;br /&gt;
* Get familiar with Native App developement&lt;br /&gt;
* Get familiar with Mobile vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A mobile App with consistent UI/UX for Juice-Shop with standard client side vulnerabilities.&lt;br /&gt;
* Sufficient initial release quality (en par with Juice Shop and Juice Shop CTF) to make it an official extension project hosted in its own GitHub repository ''bkimminich/juice-shop-mobile''&lt;br /&gt;
* Code follows existing styleguides and applies similar quality gates regarding code smells, test coverage etc. as the main project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) React Native and NodeJS/Express, some Mobile security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP-Securetea Tools Project ==&lt;br /&gt;
The purpose of this application is to warn the user (via various communication mechanisms) whenever their laptop accessed. This small application was developed and tested in python in Linux machine is likely to work well on the Raspberry Pi as well. -&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project/blob/master/README.md&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
We are looking any awesome idea to improve Securetea Project that is not on this list? We are expecting make this project will be useful to everyone to secure their Small IoT. &lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Below roadmap and expect  results you can choose to improve Securetea Project . &lt;br /&gt;
if any bugs please help to fix it&lt;br /&gt;
&lt;br /&gt;
===Roadmap=== &lt;br /&gt;
See Our Roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project#roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Twitter (done)&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Dashboard / Gui (done)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Protection /firewall&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Antivirus&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Whatsapp&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by SMS Alerts&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Line&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Telegram&amp;lt;br&amp;gt;&lt;br /&gt;
Intelligent Log Monitoring&amp;lt;br&amp;gt;&lt;br /&gt;
Login History&amp;lt;br&amp;gt;&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Javascript &lt;br /&gt;
* Angular and NodeJS/Express&lt;br /&gt;
* Database&lt;br /&gt;
* Linux&lt;br /&gt;
&lt;br /&gt;
=== Mentors === &lt;br /&gt;
&lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman Putra] - (OWASP Securetea Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
* [mailto:rejah.rehim@owasp.org Rejah Rehim.A.A]]- (OWASP Securetea Project Leader)&lt;br /&gt;
* [https://github.com/sananthu Ananthu S] - (Mentor)&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP iGoat (draft) ==&lt;br /&gt;
'''Idea 1:''' Completing OWASP iGoat documentation at https://docs.igoatapp.com/ and creating demo videos at for OWASP iGoat YouTube channel for learning purpose.&lt;br /&gt;
&lt;br /&gt;
'''Idea 2:''' Adding new challenge pack / CTF for iGoat. It should be one point solution for learning iOS app security&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid ==&lt;br /&gt;
&lt;br /&gt;
=== Idea 1: Anomaly detection of device state ===&lt;br /&gt;
The idea is that certain features of a device would be constantly monitored (battery use, internet usage, opp calls, etc.). Initially, the usual behaviour of the device would be learned. Later, anomalies normal behavior would be reported to the user. This should involve some explanations, such as which applications are causing an anomaly the device behaviors &lt;br /&gt;
&lt;br /&gt;
=== Idea 2: On device machine learning of maliciousness of an app ===&lt;br /&gt;
Tensor-flow for on-device processing and some other libraries have been released that enable machine learning. We have previously applied a system, that based on permissions, is able to distinguish malicious apps from non-malicious. Now, we would like to learn also from other outputs and things one can monitor about application whether it can be malicious. &lt;br /&gt;
&lt;br /&gt;
=== Idea 3:  Enhansing privacy features ===&lt;br /&gt;
The vision of Seraphimdroid is to be aware of privacy threats. This may be achieved throug knowing which applications are using user accounts or other information that user has on phone to send to the server, or just by knowing which applications may be doing it. Knowledge base should be extending with the suggestions on how to improve privacy. Also, automated settings of various apps to use encryption should be proposed.&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
=== Active Scanning WebSockets ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesn't currently support active scanning (automated attacking) of websocket traffic (messages).&lt;br /&gt;
: We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* An pluggable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated Authentication Detection and Configuration ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
: This is time consuming and error prone.&lt;br /&gt;
: Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247339</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247339"/>
				<updated>2019-02-12T12:59:46Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Python Honeypot==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Honeypot.png|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [https://travis-ci.org/zdresearch/OWASP-Honeypot/builds Linux].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We appreciate any contribution, ideas, feedback. feel free to contact us by creating an issue or send me an email directly [ali.razmjoo@owasp.org](mailto:ali.razmjoo@owasp.org). Please notice, every time you run the honeypot, it will remove and update the virtual machine, so internet access required for the host!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* WE ARE IN RESEARCH AND DEVELOP PHASE, EXPECT ERRORS!&lt;br /&gt;
* NO WARRANTY! USE WITH YOUR OWN RESPONSIBILITY!&lt;br /&gt;
* DO NOT USE IT ON THE SAME SERVER(S)/NETWORK WHICH YOU HAVING YOUR PRODUCT/INFORMATION/SENSIBLE DATA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Github: https://github.com/zdresearch/OWASP-Honeypot&lt;br /&gt;
* OpenHub: https://www.openhub.net/p/OWASP-Honeypot&lt;br /&gt;
* Wiki: https://github.com/zdresearch/OWASP-Honeypot/wiki&lt;br /&gt;
* OWASP Wiki Page: https://www.owasp.org/index.php/OWASP_Python_Honeypot&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Best way to get involved is to fix the existing issues in GitHub or add your new modules as Dockerfile and work on core improvement. if you are not a developer feel free to send your ideas and let us work on that.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247338</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247338"/>
				<updated>2019-02-12T12:59:18Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* OWASP Python Honeypot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Python Honeypot==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Honeypot.png|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [https://travis-ci.org/zdresearch/OWASP-Honeypot/builds Linux].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We appreciate any contribution, ideas, feedback. feel free to contact us by creating an issue or send me an email directly [ali.razmjoo@owasp.org](mailto:ali.razmjoo@owasp.org). Please notice, every time you run the honeypot, it will remove and update the virtual machine, so internet access required for the host!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* WE ARE IN RESEARCH AND DEVELOP PHASE, EXPECT ERRORS!&lt;br /&gt;
* NO WARRANTY! USE WITH YOUR OWN RESPONSIBILITY!&lt;br /&gt;
* DO NOT USE IT ON THE SAME SERVER(S)/NETWORK WHICH YOU HAVING YOUR PRODUCT/INFORMATION/SENSIBLE DATA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Github: https://github.com/zdresearch/OWASP-Honeypot&lt;br /&gt;
* OpenHub: https://www.openhub.net/p/OWASP-Honeypot&lt;br /&gt;
* Wiki: https://github.com/zdresearch/OWASP-Honeypot/wiki&lt;br /&gt;
* OWASP Wiki Page: https://www.owasp.org/index.php/OWASP_Python_Honeypot&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Best way to get involved is to fix the existing issues in GitHub or add your new modules as Dockerfile and work on core improvement. if you are not a developer feel free to send your ideas and let us work on that.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247337</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247337"/>
				<updated>2019-02-12T12:58:44Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* OWASP Python Honeypot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Python Honeypot==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Honeypot.png|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [https://travis-ci.org/zdresearch/OWASP-Honeypot/builds Linux].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We appreciate any contribution, ideas, feedback. feel free to contact us by creating an issue or send me an email directly [ali.razmjoo@owasp.org](mailto:ali.razmjoo@owasp.org). Please notice, every time you run the honeypot, it will remove and update the virtual machine, so internet access required for the host!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* WE ARE IN RESEARCH AND DEVELOP PHASE, EXPECT ERRORS!&lt;br /&gt;
* NO WARRANTY! USE WITH YOUR OWN RESPONSIBILITY!&lt;br /&gt;
* DO NOT USE IT ON THE SAME SERVER(S)/NETWORK WHICH YOU HAVING YOUR PRODUCT/INFORMATION/SENSIBLE DATA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Github: https://github.com/zdresearch/OWASP-Honeypot&lt;br /&gt;
* OpenHub: https://www.openhub.net/p/OWASP-Honeypot&lt;br /&gt;
* Wiki: https://github.com/zdresearch/OWASP-Honeypot/wiki&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Best way to get involved is to fix the existing issues in GitHub or add your new modules as Dockerfile and work on core improvement. if you are not a developer feel free to send your ideas and let us work on that.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247336</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247336"/>
				<updated>2019-02-12T12:58:26Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* OWASP Python Honeypot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Python Honeypot==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Honeypot.png|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [https://travis-ci.org/zdresearch/OWASP-Honeypot/builds Linux].&lt;br /&gt;
&lt;br /&gt;
We appreciate any contribution, ideas, feedback. feel free to contact us by creating an issue or send me an email directly [ali.razmjoo@owasp.org](mailto:ali.razmjoo@owasp.org). Please notice, every time you run the honeypot, it will remove and update the virtual machine, so internet access required for the host!&lt;br /&gt;
&lt;br /&gt;
* WE ARE IN RESEARCH AND DEVELOP PHASE, EXPECT ERRORS!&lt;br /&gt;
* NO WARRANTY! USE WITH YOUR OWN RESPONSIBILITY!&lt;br /&gt;
* DO NOT USE IT ON THE SAME SERVER(S)/NETWORK WHICH YOU HAVING YOUR PRODUCT/INFORMATION/SENSIBLE DATA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Github: https://github.com/zdresearch/OWASP-Honeypot&lt;br /&gt;
* OpenHub: https://www.openhub.net/p/OWASP-Honeypot&lt;br /&gt;
* Wiki: https://github.com/zdresearch/OWASP-Honeypot/wiki&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Best way to get involved is to fix the existing issues in GitHub or add your new modules as Dockerfile and work on core improvement. if you are not a developer feel free to send your ideas and let us work on that.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247335</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247335"/>
				<updated>2019-02-12T12:58:04Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* OWASP Python Honeypot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Python Honeypot==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Honeypot.png|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [https://travis-ci.org/zdresearch/OWASP-Honeypot/builds Linux].&lt;br /&gt;
&lt;br /&gt;
We appreciate any contribution, ideas, feedback. feel free to contact us by creating an issue or send me an email directly [ali.razmjoo@owasp.org](mailto:ali.razmjoo@owasp.org). Please notice, every time you run the honeypot, it will remove and update the virtual machine, so internet access required for the host!&lt;br /&gt;
&lt;br /&gt;
* WE ARE IN RESEARCH AND DEVELOP PHASE, EXPECT ERRORS!&lt;br /&gt;
* NO WARRANTY! USE WITH YOUR OWN RESPONSIBILITY!&lt;br /&gt;
* DO NOT USE IT ON THE SAME SERVER(S)/NETWORK WHICH YOU HAVING YOUR PRODUCT/INFORMATION/SENSIBLE DATA&lt;br /&gt;
&lt;br /&gt;
* Github: https://github.com/zdresearch/OWASP-Honeypot&lt;br /&gt;
* OpenHub: https://www.openhub.net/p/OWASP-Honeypot&lt;br /&gt;
* Wiki: https://github.com/zdresearch/OWASP-Honeypot/wiki&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Best way to get involved is to fix the existing issues in GitHub or add your new modules as Dockerfile and work on core improvement. if you are not a developer feel free to send your ideas and let us work on that.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247334</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247334"/>
				<updated>2019-02-12T12:57:46Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Python Honeypot==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Honeypot.png|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [https://travis-ci.org/zdresearch/OWASP-Honeypot/builds Linux].&lt;br /&gt;
&lt;br /&gt;
We appreciate any contribution, ideas, feedback. feel free to contact us by creating an issue or send me an email directly [ali.razmjoo@owasp.org](mailto:ali.razmjoo@owasp.org). Please notice, every time you run the honeypot, it will remove and update the virtual machine, so internet access required for the host!&lt;br /&gt;
&lt;br /&gt;
* WE ARE IN RESEARCH AND DEVELOP PHASE, EXPECT ERRORS!&lt;br /&gt;
* NO WARRANTY! USE WITH YOUR OWN RESPONSIBILITY!&lt;br /&gt;
* DO NOT USE IT ON THE SAME SERVER(S)/NETWORK WHICH YOU HAVING YOUR PRODUCT/INFORMATION/SENSIBLE DATA&lt;br /&gt;
&lt;br /&gt;
Github: https://github.com/zdresearch/OWASP-Honeypot&lt;br /&gt;
OpenHub: https://www.openhub.net/p/OWASP-Honeypot&lt;br /&gt;
Wiki: https://github.com/zdresearch/OWASP-Honeypot/wiki&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Best way to get involved is to fix the existing issues in GitHub or add your new modules as Dockerfile and work on core improvement. if you are not a developer feel free to send your ideas and let us work on that.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247333</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247333"/>
				<updated>2019-02-12T12:56:51Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* Licensing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Python Honeypot==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Honeypot.png|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [https://travis-ci.org/zdresearch/OWASP-Honeypot/builds Linux].&lt;br /&gt;
&lt;br /&gt;
We appreciate any contribution, ideas, feedback. feel free to contact us by creating an issue or send me an email directly [ali.razmjoo@owasp.org](mailto:ali.razmjoo@owasp.org). Please notice, every time you run the honeypot, it will remove and update the virtual machine, so internet access required for the host!&lt;br /&gt;
&lt;br /&gt;
* WE ARE IN RESEARCH AND DEVELOP PHASE, EXPECT ERRORS!&lt;br /&gt;
* NO WARRANTY! USE WITH YOUR OWN RESPONSIBILITY!&lt;br /&gt;
* DO NOT USE IT ON THE SAME SERVER(S)/NETWORK WHICH YOU HAVING YOUR PRODUCT/INFORMATION/SENSIBLE DATA&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Best way to get involved is to fix the existing issues in GitHub or add your new modules as Dockerfile and work on core improvement. if you are not a developer feel free to send your ideas and let us work on that.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247332</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247332"/>
				<updated>2019-02-12T12:56:30Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* Licensing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Python Honeypot==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Honeypot.png|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [https://travis-ci.org/zdresearch/OWASP-Honeypot/builds Linux].&lt;br /&gt;
&lt;br /&gt;
We appreciate any contribution, ideas, feedback. feel free to contact us by creating an issue or send me an email directly [ali.razmjoo@owasp.org](mailto:ali.razmjoo@owasp.org). Please notice, every time you run the honeypot, it will remove and update the virtual machine, so internet access required for the host!&lt;br /&gt;
&lt;br /&gt;
* WE ARE IN RESEARCH AND DEVELOP PHASE, EXPECT ERRORS!&lt;br /&gt;
* NO WARRANTY! USE WITH YOUR OWN RESPONSIBILITY!&lt;br /&gt;
* DO NOT USE IT ON THE SAME SERVER(S)/NETWORK WHICH YOU HAVING YOUR PRODUCT/INFORMATION/SENSIBLE DATA&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
Permissions&lt;br /&gt;
 Commercial use&lt;br /&gt;
 Modification&lt;br /&gt;
 Distribution&lt;br /&gt;
 Patent use&lt;br /&gt;
 Private use&lt;br /&gt;
Limitations&lt;br /&gt;
 Trademark use&lt;br /&gt;
 Liability&lt;br /&gt;
 Warranty&lt;br /&gt;
Conditions&lt;br /&gt;
 License and copyright notice&lt;br /&gt;
 State changes&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Best way to get involved is to fix the existing issues in GitHub or add your new modules as Dockerfile and work on core improvement. if you are not a developer feel free to send your ideas and let us work on that.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247331</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247331"/>
				<updated>2019-02-12T12:55:22Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* OWASP Python Honeypot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Python Honeypot==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Honeypot.png|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [https://travis-ci.org/zdresearch/OWASP-Honeypot/builds Linux].&lt;br /&gt;
&lt;br /&gt;
We appreciate any contribution, ideas, feedback. feel free to contact us by creating an issue or send me an email directly [ali.razmjoo@owasp.org](mailto:ali.razmjoo@owasp.org). Please notice, every time you run the honeypot, it will remove and update the virtual machine, so internet access required for the host!&lt;br /&gt;
&lt;br /&gt;
* WE ARE IN RESEARCH AND DEVELOP PHASE, EXPECT ERRORS!&lt;br /&gt;
* NO WARRANTY! USE WITH YOUR OWN RESPONSIBILITY!&lt;br /&gt;
* DO NOT USE IT ON THE SAME SERVER(S)/NETWORK WHICH YOU HAVING YOUR PRODUCT/INFORMATION/SENSIBLE DATA&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Best way to get involved is to fix the existing issues in GitHub or add your new modules as Dockerfile and work on core improvement. if you are not a developer feel free to send your ideas and let us work on that.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247330</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247330"/>
				<updated>2019-02-12T12:55:05Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* OWASP Python Honeypot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Python Honeypot==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Honeypot.png|thumb|center]]&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [https://travis-ci.org/zdresearch/OWASP-Honeypot/builds Linux].&lt;br /&gt;
&lt;br /&gt;
We appreciate any contribution, ideas, feedback. feel free to contact us by creating an issue or send me an email directly [ali.razmjoo@owasp.org](mailto:ali.razmjoo@owasp.org). Please notice, every time you run the honeypot, it will remove and update the virtual machine, so internet access required for the host!&lt;br /&gt;
&lt;br /&gt;
* WE ARE IN RESEARCH AND DEVELOP PHASE, EXPECT ERRORS!&lt;br /&gt;
* NO WARRANTY! USE WITH YOUR OWN RESPONSIBILITY!&lt;br /&gt;
* DO NOT USE IT ON THE SAME SERVER(S)/NETWORK WHICH YOU HAVING YOUR PRODUCT/INFORMATION/SENSIBLE DATA&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Best way to get involved is to fix the existing issues in GitHub or add your new modules as Dockerfile and work on core improvement. if you are not a developer feel free to send your ideas and let us work on that.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Honeypot.png&amp;diff=247329</id>
		<title>File:Honeypot.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Honeypot.png&amp;diff=247329"/>
				<updated>2019-02-12T12:54:38Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;owasp honeypot&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247328</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247328"/>
				<updated>2019-02-12T12:52:43Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Python Honeypot==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [https://travis-ci.org/zdresearch/OWASP-Honeypot/builds Linux].&lt;br /&gt;
&lt;br /&gt;
We appreciate any contribution, ideas, feedback. feel free to contact us by creating an issue or send me an email directly [ali.razmjoo@owasp.org](mailto:ali.razmjoo@owasp.org). Please notice, every time you run the honeypot, it will remove and update the virtual machine, so internet access required for the host!&lt;br /&gt;
&lt;br /&gt;
* WE ARE IN RESEARCH AND DEVELOP PHASE, EXPECT ERRORS!&lt;br /&gt;
* NO WARRANTY! USE WITH YOUR OWN RESPONSIBILITY!&lt;br /&gt;
* DO NOT USE IT ON THE SAME SERVER(S)/NETWORK WHICH YOU HAVING YOUR PRODUCT/INFORMATION/SENSIBLE DATA&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Best way to get involved is to fix the existing issues in GitHub or add your new modules as Dockerfile and work on core improvement. if you are not a developer feel free to send your ideas and let us work on that.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247327</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247327"/>
				<updated>2019-02-12T12:52:30Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Python Honeypot==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [https://travis-ci.org/zdresearch/OWASP-Honeypot/builds Linux].&lt;br /&gt;
&lt;br /&gt;
We appreciate any contribution, ideas, feedback. feel free to contact us by creating an issue or send me an email directly [ali.razmjoo@owasp.org](mailto:ali.razmjoo@owasp.org). Please notice, every time you run the honeypot, it will remove and update the virtual machine, so internet access required for the host!&lt;br /&gt;
&lt;br /&gt;
* WE ARE IN RESEARCH AND DEVELOP PHASE, EXPECT ERRORS!&lt;br /&gt;
* NO WARRANTY! USE WITH YOUR OWN RESPONSIBILITY!&lt;br /&gt;
* DO NOT USE IT ON THE SAME SERVER(S)/NETWORK WHICH YOU HAVING YOUR PRODUCT/INFORMATION/SENSIBLE DATA&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247326</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247326"/>
				<updated>2019-02-12T12:51:52Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Python Honeypot==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [https://travis-ci.org/zdresearch/OWASP-Honeypot/builds Linux].&lt;br /&gt;
&lt;br /&gt;
We appreciate any contribution, ideas, feedback. feel free to contact us by creating an issue or send me an email directly [ali.razmjoo@owasp.org](mailto:ali.razmjoo@owasp.org). Please notice, every time you run the honeypot, it will remove and update the virtual machine, so internet access required for the host!&lt;br /&gt;
&lt;br /&gt;
* WE ARE IN RESEARCH AND DEVELOP PHASE, EXPECT ERRORS!&lt;br /&gt;
* NO WARRANTY! USE WITH YOUR OWN RESPONSIBILITY!&lt;br /&gt;
* DO NOT USE IT ON THE SAME SERVER(S)/NETWORK WHICH YOU HAVING YOUR PRODUCT/INFORMATION/SENSIBLE DATA&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
Best way to get involved is to fix the existing issues in GitHub or add your new modules as Dockerfile and work on core improvement. if you are not a developer feel free to send your ideas and let us work on that.&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247325</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247325"/>
				<updated>2019-02-12T12:50:08Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Python Honeypot==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [https://travis-ci.org/zdresearch/OWASP-Honeypot/builds Linux].&lt;br /&gt;
&lt;br /&gt;
We appreciate any contribution, ideas, feedback. feel free to contact us by creating an issue or send me an email directly [ali.razmjoo@owasp.org](mailto:ali.razmjoo@owasp.org). Please notice, every time you run the honeypot, it will remove and update the virtual machine, so internet access required for the host!&lt;br /&gt;
&lt;br /&gt;
* WE ARE IN RESEARCH AND DEVELOP PHASE, EXPECT ERRORS!&lt;br /&gt;
* NO WARRANTY! USE WITH YOUR OWN RESPONSIBILITY!&lt;br /&gt;
* DO NOT USE IT ON THE SAME SERVER(S)/NETWORK WHICH YOU HAVING YOUR PRODUCT/INFORMATION/SENSIBLE DATA&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247324</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247324"/>
				<updated>2019-02-12T12:49:40Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* OWASP Tool Project Template */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Project About==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Python Honeypot==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We appreciate any contribution, ideas, feedback. feel free to contact us by creating an issue or send me an email directly [ali.razmjoo@owasp.org](mailto:ali.razmjoo@owasp.org). Please notice, every time you run the honeypot, it will remove and update the virtual machine, so internet access required for the host!&lt;br /&gt;
&lt;br /&gt;
* WE ARE IN RESEARCH AND DEVELOP PHASE, EXPECT ERRORS!&lt;br /&gt;
* NO WARRANTY! USE WITH YOUR OWN RESPONSIBILITY!&lt;br /&gt;
* DO NOT USE IT ON THE SAME SERVER(S)/NETWORK WHICH YOU HAVING YOUR PRODUCT/INFORMATION/SENSIBLE DATA&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [https://travis-ci.org/zdresearch/OWASP-Honeypot/builds Linux].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247323</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247323"/>
				<updated>2019-02-12T12:46:15Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Project About==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Tool Project Template==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section should include an overview of what the project is, why the project was started, and what security issue is being addressed by the project deliverable. Some readers may be discouraged from looking further at the project if they do not understand the significance of the security concern that is being addressed, so provide enough context so the average reader will continue on with reading the description. You shouldn't assume the reader will understand the objective by providing security terminology, e.g. this project builds cryptographic algorithms, but should also endeavor to explain what they are used for.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Tool Template Project is a template designed to help Project Leaders create suitable project pages for OWASP Projects.  By following the instructional text in red (and then deleting it) it should be easier to understand what information OWASP and the project users are looking for.  And it's easy to get started by simply creating a new project from the appropriate project template.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [https://travis-ci.org/zdresearch/OWASP-Honeypot/builds Linux].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247322</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247322"/>
				<updated>2019-02-12T12:45:57Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Project About==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Tool Project Template==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section should include an overview of what the project is, why the project was started, and what security issue is being addressed by the project deliverable. Some readers may be discouraged from looking further at the project if they do not understand the significance of the security concern that is being addressed, so provide enough context so the average reader will continue on with reading the description. You shouldn't assume the reader will understand the objective by providing security terminology, e.g. this project builds cryptographic algorithms, but should also endeavor to explain what they are used for.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Tool Template Project is a template designed to help Project Leaders create suitable project pages for OWASP Projects.  By following the instructional text in red (and then deleting it) it should be easier to understand what information OWASP and the project users are looking for.  And it's easy to get started by simply creating a new project from the appropriate project template.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and [Linux](https://travis-ci.org/zdresearch/OWASP-Honeypot/builds).&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247321</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247321"/>
				<updated>2019-02-12T12:44:46Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Project About==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Tool Project Template==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section should include an overview of what the project is, why the project was started, and what security issue is being addressed by the project deliverable. Some readers may be discouraged from looking further at the project if they do not understand the significance of the security concern that is being addressed, so provide enough context so the average reader will continue on with reading the description. You shouldn't assume the reader will understand the objective by providing security terminology, e.g. this project builds cryptographic algorithms, but should also endeavor to explain what they are used for.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Tool Template Project is a template designed to help Project Leaders create suitable project pages for OWASP Projects.  By following the instructional text in red (and then deleting it) it should be easier to understand what information OWASP and the project users are looking for.  And it's easy to get started by simply creating a new project from the appropriate project template.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Tool Project Template is simply a sample project that was developed for instructional purposes that can be used to create default project pages for a Tool project.  After copying this template to your new project, all you have to do is follow the instructions in red, replace the sample text with text suited for your project, and then delete the sections in red.  Doing so should make it clearer to both consumers of this project, as well as OWASP reviewers who are trying to determine if the project can be promoted to the next category.  The information requested is also intended to help Project Leaders think about the roadmap and feature priorities, and give guidance to the reviews as a result of that effort.&lt;br /&gt;
&lt;br /&gt;
Creating a new set of project pages from scratch can be a challenging task.  By providing a sample layout, with instructional text and examples, the OWASP Tool Project Template makes it easier for Project Leaders to create effective security projects and hence helps promote security.&lt;br /&gt;
&lt;br /&gt;
Contextual custom dictionary builder with character substitution and word variations for pen-testers&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/zdresearch/OWASP-Honeypot/blob/master/LICENSE Apache v2].&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247320</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247320"/>
				<updated>2019-02-12T12:42:55Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Project About==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Tool Project Template==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section should include an overview of what the project is, why the project was started, and what security issue is being addressed by the project deliverable. Some readers may be discouraged from looking further at the project if they do not understand the significance of the security concern that is being addressed, so provide enough context so the average reader will continue on with reading the description. You shouldn't assume the reader will understand the objective by providing security terminology, e.g. this project builds cryptographic algorithms, but should also endeavor to explain what they are used for.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Tool Template Project is a template designed to help Project Leaders create suitable project pages for OWASP Projects.  By following the instructional text in red (and then deleting it) it should be easier to understand what information OWASP and the project users are looking for.  And it's easy to get started by simply creating a new project from the appropriate project template.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Tool Project Template is simply a sample project that was developed for instructional purposes that can be used to create default project pages for a Tool project.  After copying this template to your new project, all you have to do is follow the instructions in red, replace the sample text with text suited for your project, and then delete the sections in red.  Doing so should make it clearer to both consumers of this project, as well as OWASP reviewers who are trying to determine if the project can be promoted to the next category.  The information requested is also intended to help Project Leaders think about the roadmap and feature priorities, and give guidance to the reviews as a result of that effort.&lt;br /&gt;
&lt;br /&gt;
Creating a new set of project pages from scratch can be a challenging task.  By providing a sample layout, with instructional text and examples, the OWASP Tool Project Template makes it easier for Project Leaders to create effective security projects and hence helps promote security.&lt;br /&gt;
&lt;br /&gt;
Contextual custom dictionary builder with character substitution and word variations for pen-testers&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.  This example assumes that you want to use the AGPL 3.0 license.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP XXX and any contributions are Copyright &amp;amp;copy; by {the Project Leader(s) or OWASP} {Year(s)}.  &lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Events ==&lt;br /&gt;
&lt;br /&gt;
* Start 1 Jul 2018&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247319</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247319"/>
				<updated>2019-02-12T12:41:28Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Project About==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Tool Project Template==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section should include an overview of what the project is, why the project was started, and what security issue is being addressed by the project deliverable. Some readers may be discouraged from looking further at the project if they do not understand the significance of the security concern that is being addressed, so provide enough context so the average reader will continue on with reading the description. You shouldn't assume the reader will understand the objective by providing security terminology, e.g. this project builds cryptographic algorithms, but should also endeavor to explain what they are used for.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Tool Template Project is a template designed to help Project Leaders create suitable project pages for OWASP Projects.  By following the instructional text in red (and then deleting it) it should be easier to understand what information OWASP and the project users are looking for.  And it's easy to get started by simply creating a new project from the appropriate project template.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Tool Project Template is simply a sample project that was developed for instructional purposes that can be used to create default project pages for a Tool project.  After copying this template to your new project, all you have to do is follow the instructions in red, replace the sample text with text suited for your project, and then delete the sections in red.  Doing so should make it clearer to both consumers of this project, as well as OWASP reviewers who are trying to determine if the project can be promoted to the next category.  The information requested is also intended to help Project Leaders think about the roadmap and feature priorities, and give guidance to the reviews as a result of that effort.&lt;br /&gt;
&lt;br /&gt;
Creating a new set of project pages from scratch can be a challenging task.  By providing a sample layout, with instructional text and examples, the OWASP Tool Project Template makes it easier for Project Leaders to create effective security projects and hence helps promote security.&lt;br /&gt;
&lt;br /&gt;
Contextual custom dictionary builder with character substitution and word variations for pen-testers&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.  This example assumes that you want to use the AGPL 3.0 license.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP XXX and any contributions are Copyright &amp;amp;copy; by {the Project Leader(s) or OWASP} {Year(s)}.  &lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot Source Code]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/wiki Documentation]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Honeypot/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
* [[OWASP_Code_Project_Template]]&lt;br /&gt;
* [[OWASP_Documentation_Project_Template]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247318</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247318"/>
				<updated>2019-02-12T12:37:56Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Project About==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Tool Project Template==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section should include an overview of what the project is, why the project was started, and what security issue is being addressed by the project deliverable. Some readers may be discouraged from looking further at the project if they do not understand the significance of the security concern that is being addressed, so provide enough context so the average reader will continue on with reading the description. You shouldn't assume the reader will understand the objective by providing security terminology, e.g. this project builds cryptographic algorithms, but should also endeavor to explain what they are used for.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Tool Template Project is a template designed to help Project Leaders create suitable project pages for OWASP Projects.  By following the instructional text in red (and then deleting it) it should be easier to understand what information OWASP and the project users are looking for.  And it's easy to get started by simply creating a new project from the appropriate project template.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Tool Project Template is simply a sample project that was developed for instructional purposes that can be used to create default project pages for a Tool project.  After copying this template to your new project, all you have to do is follow the instructions in red, replace the sample text with text suited for your project, and then delete the sections in red.  Doing so should make it clearer to both consumers of this project, as well as OWASP reviewers who are trying to determine if the project can be promoted to the next category.  The information requested is also intended to help Project Leaders think about the roadmap and feature priorities, and give guidance to the reviews as a result of that effort.&lt;br /&gt;
&lt;br /&gt;
Creating a new set of project pages from scratch can be a challenging task.  By providing a sample layout, with instructional text and examples, the OWASP Tool Project Template makes it easier for Project Leaders to create effective security projects and hence helps promote security.&lt;br /&gt;
&lt;br /&gt;
Contextual custom dictionary builder with character substitution and word variations for pen-testers&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.  This example assumes that you want to use the AGPL 3.0 license.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP XXX and any contributions are Copyright &amp;amp;copy; by {the Project Leader(s) or OWASP} {Year(s)}.  &lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to the key locations for project files, including setup programs, the source code repository, online documentation, a Wiki Home Page, threaded discussions about the project, and Issue Tracking system, etc. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Installation Package]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves What's New (Revision History)]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Wiki Home Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Slide Presentation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
* [[OWASP_Code_Project_Template]]&lt;br /&gt;
* [[OWASP_Documentation_Project_Template]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247317</id>
		<title>OWASP Python Honeypot</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Python_Honeypot&amp;diff=247317"/>
				<updated>2019-02-12T12:37:12Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Instructions are in RED text and should be removed from your document by deleting the text with the span tags. This document is intended to serve as an example of what is required of an OWASP project wiki page. The text in red serves as instructions, while the text in black serves as an example. Text in black is expected to be replaced entirely with information specific to your OWASP project.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
==Project About==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Tool Project Template==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This section should include an overview of what the project is, why the project was started, and what security issue is being addressed by the project deliverable. Some readers may be discouraged from looking further at the project if they do not understand the significance of the security concern that is being addressed, so provide enough context so the average reader will continue on with reading the description. You shouldn't assume the reader will understand the objective by providing security terminology, e.g. this project builds cryptographic algorithms, but should also endeavor to explain what they are used for.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Tool Template Project is a template designed to help Project Leaders create suitable project pages for OWASP Projects.  By following the instructional text in red (and then deleting it) it should be easier to understand what information OWASP and the project users are looking for.  And it's easy to get started by simply creating a new project from the appropriate project template.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Tool Project Template is simply a sample project that was developed for instructional purposes that can be used to create default project pages for a Tool project.  After copying this template to your new project, all you have to do is follow the instructions in red, replace the sample text with text suited for your project, and then delete the sections in red.  Doing so should make it clearer to both consumers of this project, as well as OWASP reviewers who are trying to determine if the project can be promoted to the next category.  The information requested is also intended to help Project Leaders think about the roadmap and feature priorities, and give guidance to the reviews as a result of that effort.&lt;br /&gt;
&lt;br /&gt;
Creating a new set of project pages from scratch can be a challenging task.  By providing a sample layout, with instructional text and examples, the OWASP Tool Project Template makes it easier for Project Leaders to create effective security projects and hence helps promote security.&lt;br /&gt;
&lt;br /&gt;
Contextual custom dictionary builder with character substitution and word variations for pen-testers&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.  This example assumes that you want to use the AGPL 3.0 license.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP XXX and any contributions are Copyright &amp;amp;copy; by {the Project Leader(s) or OWASP} {Year(s)}.  &lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to the key locations for project files, including setup programs, the source code repository, online documentation, a Wiki Home Page, threaded discussions about the project, and Issue Tracking system, etc. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Installation Package]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves What's New (Revision History)]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Wiki Home Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Slide Presentation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
* [[OWASP_Code_Project_Template]]&lt;br /&gt;
* [[OWASP_Documentation_Project_Template]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Apache-software-foundation.jpeg|link=https://www.apache.org/licenses/LICENSE-2.0|Apache License 2.0]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=246578</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=246578"/>
				<updated>2019-01-15T20:37:48Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* Mentors and Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF (draft)==&lt;br /&gt;
Idea 1: &lt;br /&gt;
&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository.  &lt;br /&gt;
&lt;br /&gt;
Idea 2: &lt;br /&gt;
&lt;br /&gt;
We want to extend the Machine learning chatbot functionality in SKF.&lt;br /&gt;
* Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
* Extend the bots capability to do the google search(using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
* Extend the bot capability to reply what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
* Extend the bot to different platforms like Facebook, telegram, slack etc.&lt;br /&gt;
** Now the working chatbot implementation for example is only for Gitter&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool, used as the backbone for security programs. It is easy to get started with and work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
Option 1: Unit Tests - Difficulty: Easy&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
Option 2: Feature Enhancement - Difficulty: Varies&lt;br /&gt;
* The functionality of DefectDojo is constantly expanding.&lt;br /&gt;
* Feature enhancements offer programming challenges for all levels of experience.&lt;br /&gt;
Option 3: Pull Request Review - Difficulty: Moderate - Hard&lt;br /&gt;
* Test pull requests and provide feedback on code.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to add more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Roadmap ===&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP-Securetea Tools Project  (draft)==&lt;br /&gt;
The purpose of this application is to warn the user (via various communication mechanisms) whenever their laptop accessed. This small application was developed and tested in python in Linux machine is likely to work well on the Raspberry Pi as well. -&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project/blob/master/README.md&lt;br /&gt;
&lt;br /&gt;
Ideas 1 :&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Twitter (done)&lt;br /&gt;
Securetea Dashboard / Gui (done)&lt;br /&gt;
&lt;br /&gt;
Expect  result : &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Protection /firewall&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Antivirus&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Whatsapp&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by SMS Alerts&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Line&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Telegram&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
&lt;br /&gt;
Ade Yoseman Putra&amp;lt;br&amp;gt;&lt;br /&gt;
Rejah Rehim&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=246577</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=246577"/>
				<updated>2019-01-15T20:35:51Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* Mentors and Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF (draft)==&lt;br /&gt;
Idea 1: &lt;br /&gt;
&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository.  &lt;br /&gt;
&lt;br /&gt;
Idea 2: &lt;br /&gt;
&lt;br /&gt;
We want to extend the Machine learning chatbot functionality in SKF.&lt;br /&gt;
* Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
* Extend the bots capability to do the google search(using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
* Extend the bot capability to reply what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
* Extend the bot to different platforms like Facebook, telegram, slack etc.&lt;br /&gt;
** Now the working chatbot implementation for example is only for Gitter&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool, used as the backbone for security programs. It is easy to get started with and work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
Option 1: Unit Tests - Difficulty: Easy&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
Option 2: Feature Enhancement - Difficulty: Varies&lt;br /&gt;
* The functionality of DefectDojo is constantly expanding.&lt;br /&gt;
* Feature enhancements offer programming challenges for all levels of experience.&lt;br /&gt;
Option 3: Pull Request Review - Difficulty: Moderate - Hard&lt;br /&gt;
* Test pull requests and provide feedback on code.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to add more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Roadmap ===&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami] (Mentor)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP-Securetea Tools Project  (draft)==&lt;br /&gt;
The purpose of this application is to warn the user (via various communication mechanisms) whenever their laptop accessed. This small application was developed and tested in python in Linux machine is likely to work well on the Raspberry Pi as well. -&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project/blob/master/README.md&lt;br /&gt;
&lt;br /&gt;
Ideas 1 :&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Twitter (done)&lt;br /&gt;
Securetea Dashboard / Gui (done)&lt;br /&gt;
&lt;br /&gt;
Expect  result : &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Protection /firewall&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Antivirus&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Whatsapp&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by SMS Alerts&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Line&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Telegram&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
&lt;br /&gt;
Ade Yoseman Putra&amp;lt;br&amp;gt;&lt;br /&gt;
Rejah Rehim&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=246496</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=246496"/>
				<updated>2019-01-10T09:57:13Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF (draft)==&lt;br /&gt;
Idea 1: Build lab examples and write-ups (how to test) for different code languages delivered in Docker (these must correlate with a Knowledge base item in SKF)&lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
Idea 2: We want to extend the Machine learning chatbot functionality in SKF.&lt;br /&gt;
* Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
* Extend the bots capability to do the google search(using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
* Extend the bot capability to reply what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
* Extend the bot to different platforms like Facebook, telegram, slack etc.&lt;br /&gt;
** Now the working chatbot implementation for example is only for Gitter&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool, used as the backbone for security programs. It is easy to get started with and work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
Option 1: Unit Tests - Difficulty: Easy&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
Option 2: Feature Enhancement - Difficulty: Varies&lt;br /&gt;
* The functionality of DefectDojo is constantly expanding.&lt;br /&gt;
* Feature enhancements offer programming challenges for all levels of experience.&lt;br /&gt;
Option 3: Pull Request Review - Difficulty: Moderate - Hard&lt;br /&gt;
* Test pull requests and provide feedback on code.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to add more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Roadmap ===&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=246495</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=246495"/>
				<updated>2019-01-10T09:56:47Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: I edit the wrong page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP Foundation has been selected as an organization to be part of the GOOGLE SUMMER CODE 2018''' &lt;br /&gt;
&lt;br /&gt;
=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Active Scanning WebSockets===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesnt current support active scanning (automated attacking) of websockets.&lt;br /&gt;
:&lt;br /&gt;
:We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* An plugable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== React Handling  ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP doesnt understand React applications as well as it should be able to.&lt;br /&gt;
:&lt;br /&gt;
:It would be great if ZAP had a much better understanding of such applications, including how to explore and attack them more effectively.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* ZAP able to explore React applications more effectively&lt;br /&gt;
:* ZAP able to attack React applications more effectively&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* As React is written in JavaScript, good knowledge of this language is recommended. ZAP is written in Java, so some knowledge of this language would be useful. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning. (Including adapting some of the existing scan rules to leverage the new component.)&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:: '''Note''' This issue was previously undertaken, however, only partial progress was made. The [https://github.com/zaproxy/zap-extensions/pull/1014 Pull Request] is still open and can be built upon. The 2018 effort needs to ensure the code builds and is successfully put to use in some of the existing scan rules and unit tests.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be very useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated authentication detection and configuration  ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&lt;br /&gt;
:This is time consuming and error prone.&lt;br /&gt;
:&lt;br /&gt;
:Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Develop Bamboo Addon ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:It would be great to have an official ZAP add-on for [https://www.atlassian.com/software/bamboo Bamboo], equivalent to the one we now have for [https://wiki.jenkins.io/display/JENKINS/zap+plugin Jenkins]&lt;br /&gt;
:&lt;br /&gt;
:For more information about Bamboo plugins see the [https://developer.atlassian.com/server/bamboo/bamboo-plugin-guide/ Bamboo plugin guide].&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:&lt;br /&gt;
:A Bamboo addon that supports:&lt;br /&gt;
:* Spidering (using the traditional and Ajax spiders)&lt;br /&gt;
:* Active Scanning&lt;br /&gt;
:* Authentication&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP and Bamboo are written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2018 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] user story])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Frontend Technology Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frontend framework AngularJS 1.x along with Bootstrap 3. Several major releases later, there now are [https://github.com/bkimminich/juice-shop/issues/165 Angular 5] and [https://github.com/bkimminich/juice-shop/issues/400 Bootstrap 4] available as well as other mature web frontend frameworks. Migrating the OWASP Juice Shop to the latest version of Angular and Bootstrap is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target client-architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, testing and building&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== UI/Graphics Design Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The UI of OWASP Juice Shop was written following recommendations from Twitter Bootstrap to be responsive, but it never had an actual designer or graphics artist take a look or add some insight. Currently the look &amp;amp; feel comes &amp;quot;out of the box&amp;quot; from a [https://bootswatch.com Bootswatch] theme and [https://fontawesome.com Font Awesome 5] icons. This gives it a quite modern look, but also leaves it very generic. The project could greatly benefit from involvement of someone with actual UI/UX Design expertise. Having a matching theme for [https://ctfd.io CTFd] would be another big achievement for the Juice Shop.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Design concepts to pick or have the user community vote on (including color schemes, sample screens, icons etc.)&lt;br /&gt;
* Overhauling the overall UI look &amp;amp; feel, e.g. by making an individual Bootswatch theme or designing some individual icons&lt;br /&gt;
* &amp;lt;del&amp;gt;Getting rid of the stock images by providing individually designed product images for the standard inventory of the shop&amp;lt;/del&amp;gt; ([https://github.com/bkimminich/juice-shop/issues/315 #315] in progress)&lt;br /&gt;
* Add more flexibility and options to the existing theming/customization of the UI (see [https://github.com/bkimminich/juice-shop/issues/379 #379])&lt;br /&gt;
* Design a [https://github.com/bkimminich/juice-shop-ctf/issues/9 &amp;quot;Juice Shop&amp;quot; CTFd-theme] playing well with the look &amp;amp; feel of the application&lt;br /&gt;
* Execution of migration without breaking functionality or client-side unit and end-to-end tests along the way&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the existing HTML views and CSS of the frontend&lt;br /&gt;
* Get a feeling for the high quality bar by inspecting the existing client-side unit and e2e test suites&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Strong web and graphic design experience&lt;br /&gt;
* Sophisticated HTML and CSS experience&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework - Chatbot machine learning feature==&lt;br /&gt;
&lt;br /&gt;
=== Brief Explanation ===&lt;br /&gt;
We want to create a SKF Chatbot service using the knowledge already inside SKF like the knowledge base items, code examples and the security controls like ASVS and PCI DSS.&lt;br /&gt;
&lt;br /&gt;
The chatbot service and core of this new feature can be consumed by website’s as an addon, IDE of developers and website chat channels like Gitter.im.&lt;br /&gt;
&lt;br /&gt;
The core of the SKF Chatbot will be using machine learning to accomplish the hard task of correlating data and merging different sources as a response/answer.&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
# A Defined Knowledge Base (Data Structure / DB) which can be used to define and search for entities. For example: if a query is:&lt;br /&gt;
## How to mitigate CSRF in PHP   the system should be able to understand or translate it to:  {How: intent} to {mitigate: solution} {CSRF: attack} in {PHP: programming language}  This kind of query can be further user to fetch right information in the knowledge base and provide right solution (code example) for mitigating CSRF in PHP.&lt;br /&gt;
## What is CSRF?   the system should be able to understand or translate it to:  {What: intent} is {CSRF: attack/defense}  This kind of query can be further user to fetch right information in the knowledge base that explains CSRF and provide the security control from example ASVS&lt;br /&gt;
# An ETL process to convert existing SKF Knowledge data and ASVS data to above mentioned data structure.&lt;br /&gt;
# A Chatbot (using existing frameworks) to:&lt;br /&gt;
## Understand at least two intent like (How to, What is …..) and be able to enrich the user query as mentioned above.&lt;br /&gt;
## Based on enriched query fetch relevant information from knowledge base and return.&lt;br /&gt;
# An integration to some chat system like Gitter.im, IRC, Slack etc.&lt;br /&gt;
&lt;br /&gt;
=== Knowledge Prerequisites ===&lt;br /&gt;
* Programming languages:&lt;br /&gt;
** OWASP-SKF API is build in Python 3.6/3.7&lt;br /&gt;
** OWASP-SKF Frontend is build with Angular 4 TS&lt;br /&gt;
* Machine learning enthusiastic/interest&lt;br /&gt;
&lt;br /&gt;
=== Proposal from student ===&lt;br /&gt;
* We want to ask from the student to write a proposal on how to approach the problem we described.&lt;br /&gt;
'''Mentors''':&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org] Minhaz [mailto:minhaz@owasp.org]&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
if you need more details please visit the [https://github.com/viraintel/OWASP-Nettacker GitHub page] or contact a leader([mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:reza.espargham@owasp.org Reza Espargham]).&lt;br /&gt;
&lt;br /&gt;
===Getting started===&lt;br /&gt;
&lt;br /&gt;
* You may read the available documents in the [https://github.com/viraintel/OWASP-Nettacker/wiki wiki page]. Developers and users documents are separated.&lt;br /&gt;
&lt;br /&gt;
'''A Better Penetration Testing Automated Framework'''&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
The expected results are to contribute the OWASP Nettacker framework [https://github.com/viraintel/OWASP-Nettacker/issues issues] (mostly help wanted or enhancement). Please check the GitHub repo to learn more.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* The whole framework was written in Python language. You must be familiar with Python 2.x, 3.x.&lt;br /&gt;
* Good knowledge of computer security (and penetration testing)&lt;br /&gt;
* Knowledge of OS (Linux, Windows, Mac...) and Services&lt;br /&gt;
* Familiar with IDS/IPS/Firewalls and ...&lt;br /&gt;
* To develop the API you should be familiar with HTTP, Database...&lt;br /&gt;
&lt;br /&gt;
===Mentors===&lt;br /&gt;
Mentors are: [mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:abiusx@owasp.org Abbas Naderi Afooshteh], [mailto:sriharsha.g15@iiits.in SRI HARSHA Gajavalli]&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP CSRF Protector ==&lt;br /&gt;
[[CSRFProtector Project|OWASP CSRF Protector Project]] is a project started with the goal to help developer to mitigate CSRF in web applications with ease. It's based on [[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet|Synchronizer Token Pattern]] and leverages an injected java-script code to provide CSRF mitigation without much developer intervention. So far it has been implemented as a [https://github.com/mebjas/CSRF-Protector-PHP PHP Library] and an [[CSRFProtector Project|Apache 2.2.x module]]. Although different libraries and frameworks provide CSRF mitigation these days - all of them require developer to explicitly inject tokens with every form. &lt;br /&gt;
===OWASP CSRF Protector - Extending the design as a python package to work with Flask and an Express JS (Node.JS) middleware===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The design of CSRF Protector involves a server side middle-ware that intercepts every incoming request and validates them for CSRF attacks. If the validation is successful the flow of control goes to business logic and the tokens are refreshed. In case of failed validation configured actions are taken. Post that, another middle ware takes care of injecting a JavaScript code (refer [https://github.com/mebjas/CSRF-Protector-PHP/blob/master/js/csrfprotector.js CSRF Protector PHP JS Code]) to HTML output. On the client side this code ensures that, for every request that require validation - the correct token is sent along with the request.&lt;br /&gt;
&lt;br /&gt;
Check [https://github.com/mebjas/CSRF-Protector-PHP/wiki GitHub Wiki] for some reference;&lt;br /&gt;
&lt;br /&gt;
The goal of this project would be to:&lt;br /&gt;
# Port this design to a python module that can be used easily with Flask - [https://github.com/mebjas/CSRF-Protector-py/projects/1?add_cards_query=is%3Aopen Kanban Board]&lt;br /&gt;
# Port this design to a node js module that can work well with express js (a popular Node.JS based framework). - [https://github.com/mebjas/CSRF-Protector-JS Initial Repo Link]&lt;br /&gt;
# Fix some outstanding issues with java-script code used in library: [https://github.com/mebjas/CSRF-Protector-PHP/issues?q=is%3Aopen+is%3Aissue+label%3AJS Issues] &lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: Clean, maintainable (ES6 compatible and using recommended design patterns) in case of Node.JS'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Javascript (Client Side), Python (having worked with flask preferable), Node.JS (having worked with node.js and middle wares preferable)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Contact: [mailto:minhaz@owasp.org;minhazv@microsoft.com Minhaz A V]&lt;br /&gt;
== OWASP BLT (Bug Logging Tool) ==&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
&lt;br /&gt;
BLT lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
Check OWASP WIKI PAGE [https://www.owasp.org/index.php/OWASP_Bug_Logging_Tool] for some reference;&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Fuse app to allow easy bug reporting from phone.&lt;br /&gt;
* BUG cryptocurrency rewarded for each bug reported - requires a way to verify bugs are valid and not duplicates&lt;br /&gt;
* Allow for companies to do private (paid) bug bounties&lt;br /&gt;
* allow for bug reporting via email &lt;br /&gt;
* build a referral program&lt;br /&gt;
* integrate an idea / suggestion feature&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. Fusetools will be used for the app and C++ (Bitcoin based) or Ethereum will be used for the cryptocurrency part.&lt;br /&gt;
&lt;br /&gt;
===Proposals from student:===&lt;br /&gt;
* Proposal on new features &lt;br /&gt;
* Recommendations on how to use social applications to promote OWASP BLT&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Sean Auriti [https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] &lt;br /&gt;
* Sourav Badami [https://www.owasp.org/index.php/User:Souravbadami Sourav Badami] [mailto:souravbadami@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - 2017 OWASP Top Ten==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add support for multiple OWASP Top Ten versions, such as 2017 and 2010.&lt;br /&gt;
Currently RailsGoat supports only the 2013 version of OWASP Top Ten.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that supports additional version(s) of OWASP Top Ten&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 305 [https://github.com/OWASP/railsgoat/issues/305] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, Mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Capture-The-Flag RailsGoat Image Creation Automation==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Create automation to build a Capture-The-Flag competition (CTF) image (VM, ISO, etc) which contains everything needed, such as [Operating System, Rails Stack, RailsGoat], so RailsGoat can easily be used in more Capture-The-Flag competitions.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that automates the process of building RailsGoat CTF images.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 306 [https://github.com/OWASP/railsgoat/issues/306] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* Some background in creating VMs/ISOs would be helpful.&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Matt Robinson [mailto:brimstone@the.narro.ws] - OWASP RailsGoat Mentor&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat. Need to get permission from publisher. @jasnow got permission previously.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* More teaching RailsGoat examples based on &amp;quot;Security on Rails&amp;quot; book's lunchedin project.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 307 [https://github.com/OWASP/railsgoat/issues/307] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security&lt;br /&gt;
would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Add Devise Gem Support and Vulnerabilities to RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add Devise Support to RailsGoat along with adding Devise-related vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* Using Devise gem inside RailsGoat plus Devise-related vulnerabilities.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 207 [https://github.com/OWASP/railsgoat/issues/207] and * Issue 243 [https://github.com/OWASP/railsgoat/issues/243] has more details.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Your Idea==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
RailsGoat is a great framework for learning about OWASP Top 10 2013 using a vulnerable version of the Ruby on Rails (versions 3 to 5), as well as some &amp;quot;extras&amp;quot; that the initial project contributors felt worthwhile to share. This project is designed to educate both developers, as well as security professionals. Feel free to check out the [Railsgoat Github site](https://github.com/OWASP/railsgoat) for more details. If you have an idea that is not on this list then don't worry, you can still submit it.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that makes RailsGoat even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
=== Needs: ===&lt;br /&gt;
* Student Developers&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
*  [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=246494</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=246494"/>
				<updated>2019-01-10T09:52:21Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* Mentors and Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP Foundation has been selected as an organization to be part of the GOOGLE SUMMER CODE 2018''' &lt;br /&gt;
&lt;br /&gt;
=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Active Scanning WebSockets===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesnt current support active scanning (automated attacking) of websockets.&lt;br /&gt;
:&lt;br /&gt;
:We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* An plugable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== React Handling  ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP doesnt understand React applications as well as it should be able to.&lt;br /&gt;
:&lt;br /&gt;
:It would be great if ZAP had a much better understanding of such applications, including how to explore and attack them more effectively.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* ZAP able to explore React applications more effectively&lt;br /&gt;
:* ZAP able to attack React applications more effectively&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* As React is written in JavaScript, good knowledge of this language is recommended. ZAP is written in Java, so some knowledge of this language would be useful. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning. (Including adapting some of the existing scan rules to leverage the new component.)&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:: '''Note''' This issue was previously undertaken, however, only partial progress was made. The [https://github.com/zaproxy/zap-extensions/pull/1014 Pull Request] is still open and can be built upon. The 2018 effort needs to ensure the code builds and is successfully put to use in some of the existing scan rules and unit tests.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be very useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated authentication detection and configuration  ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&lt;br /&gt;
:This is time consuming and error prone.&lt;br /&gt;
:&lt;br /&gt;
:Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Develop Bamboo Addon ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:It would be great to have an official ZAP add-on for [https://www.atlassian.com/software/bamboo Bamboo], equivalent to the one we now have for [https://wiki.jenkins.io/display/JENKINS/zap+plugin Jenkins]&lt;br /&gt;
:&lt;br /&gt;
:For more information about Bamboo plugins see the [https://developer.atlassian.com/server/bamboo/bamboo-plugin-guide/ Bamboo plugin guide].&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:&lt;br /&gt;
:A Bamboo addon that supports:&lt;br /&gt;
:* Spidering (using the traditional and Ajax spiders)&lt;br /&gt;
:* Active Scanning&lt;br /&gt;
:* Authentication&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP and Bamboo are written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2018 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] user story])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Frontend Technology Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frontend framework AngularJS 1.x along with Bootstrap 3. Several major releases later, there now are [https://github.com/bkimminich/juice-shop/issues/165 Angular 5] and [https://github.com/bkimminich/juice-shop/issues/400 Bootstrap 4] available as well as other mature web frontend frameworks. Migrating the OWASP Juice Shop to the latest version of Angular and Bootstrap is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target client-architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, testing and building&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== UI/Graphics Design Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The UI of OWASP Juice Shop was written following recommendations from Twitter Bootstrap to be responsive, but it never had an actual designer or graphics artist take a look or add some insight. Currently the look &amp;amp; feel comes &amp;quot;out of the box&amp;quot; from a [https://bootswatch.com Bootswatch] theme and [https://fontawesome.com Font Awesome 5] icons. This gives it a quite modern look, but also leaves it very generic. The project could greatly benefit from involvement of someone with actual UI/UX Design expertise. Having a matching theme for [https://ctfd.io CTFd] would be another big achievement for the Juice Shop.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Design concepts to pick or have the user community vote on (including color schemes, sample screens, icons etc.)&lt;br /&gt;
* Overhauling the overall UI look &amp;amp; feel, e.g. by making an individual Bootswatch theme or designing some individual icons&lt;br /&gt;
* &amp;lt;del&amp;gt;Getting rid of the stock images by providing individually designed product images for the standard inventory of the shop&amp;lt;/del&amp;gt; ([https://github.com/bkimminich/juice-shop/issues/315 #315] in progress)&lt;br /&gt;
* Add more flexibility and options to the existing theming/customization of the UI (see [https://github.com/bkimminich/juice-shop/issues/379 #379])&lt;br /&gt;
* Design a [https://github.com/bkimminich/juice-shop-ctf/issues/9 &amp;quot;Juice Shop&amp;quot; CTFd-theme] playing well with the look &amp;amp; feel of the application&lt;br /&gt;
* Execution of migration without breaking functionality or client-side unit and end-to-end tests along the way&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the existing HTML views and CSS of the frontend&lt;br /&gt;
* Get a feeling for the high quality bar by inspecting the existing client-side unit and e2e test suites&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Strong web and graphic design experience&lt;br /&gt;
* Sophisticated HTML and CSS experience&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework - Chatbot machine learning feature==&lt;br /&gt;
&lt;br /&gt;
=== Brief Explanation ===&lt;br /&gt;
We want to create a SKF Chatbot service using the knowledge already inside SKF like the knowledge base items, code examples and the security controls like ASVS and PCI DSS.&lt;br /&gt;
&lt;br /&gt;
The chatbot service and core of this new feature can be consumed by website’s as an addon, IDE of developers and website chat channels like Gitter.im.&lt;br /&gt;
&lt;br /&gt;
The core of the SKF Chatbot will be using machine learning to accomplish the hard task of correlating data and merging different sources as a response/answer.&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
# A Defined Knowledge Base (Data Structure / DB) which can be used to define and search for entities. For example: if a query is:&lt;br /&gt;
## How to mitigate CSRF in PHP   the system should be able to understand or translate it to:  {How: intent} to {mitigate: solution} {CSRF: attack} in {PHP: programming language}  This kind of query can be further user to fetch right information in the knowledge base and provide right solution (code example) for mitigating CSRF in PHP.&lt;br /&gt;
## What is CSRF?   the system should be able to understand or translate it to:  {What: intent} is {CSRF: attack/defense}  This kind of query can be further user to fetch right information in the knowledge base that explains CSRF and provide the security control from example ASVS&lt;br /&gt;
# An ETL process to convert existing SKF Knowledge data and ASVS data to above mentioned data structure.&lt;br /&gt;
# A Chatbot (using existing frameworks) to:&lt;br /&gt;
## Understand at least two intent like (How to, What is …..) and be able to enrich the user query as mentioned above.&lt;br /&gt;
## Based on enriched query fetch relevant information from knowledge base and return.&lt;br /&gt;
# An integration to some chat system like Gitter.im, IRC, Slack etc.&lt;br /&gt;
&lt;br /&gt;
=== Knowledge Prerequisites ===&lt;br /&gt;
* Programming languages:&lt;br /&gt;
** OWASP-SKF API is build in Python 3.6/3.7&lt;br /&gt;
** OWASP-SKF Frontend is build with Angular 4 TS&lt;br /&gt;
* Machine learning enthusiastic/interest&lt;br /&gt;
&lt;br /&gt;
=== Proposal from student ===&lt;br /&gt;
* We want to ask from the student to write a proposal on how to approach the problem we described.&lt;br /&gt;
'''Mentors''':&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org] Minhaz [mailto:minhaz@owasp.org]&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
if you need more details please visit the [https://github.com/viraintel/OWASP-Nettacker GitHub page] or contact a leader([mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:reza.espargham@owasp.org Reza Espargham]).&lt;br /&gt;
&lt;br /&gt;
===Getting started===&lt;br /&gt;
&lt;br /&gt;
* You may read the available documents in the [https://github.com/viraintel/OWASP-Nettacker/wiki wiki page]. Developers and users documents are separated.&lt;br /&gt;
&lt;br /&gt;
'''A Better Penetration Testing Automated Framework'''&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
The expected results are to contribute the OWASP Nettacker framework [https://github.com/viraintel/OWASP-Nettacker/issues issues] (mostly help wanted or enhancement). Please check the GitHub repo to learn more.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* The whole framework was written in Python language. You must be familiar with Python 2.x, 3.x.&lt;br /&gt;
* Good knowledge of computer security (and penetration testing)&lt;br /&gt;
* Knowledge of OS (Linux, Windows, Mac...) and Services&lt;br /&gt;
* Familiar with IDS/IPS/Firewalls and ...&lt;br /&gt;
* To develop the API you should be familiar with HTTP, Database...&lt;br /&gt;
&lt;br /&gt;
===Mentors===&lt;br /&gt;
Mentors are: [mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:abiusx@owasp.org Abbas Naderi Afooshteh], [mailto:sriharsha.g15@iiits.in SRI HARSHA Gajavalli]&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP CSRF Protector ==&lt;br /&gt;
[[CSRFProtector Project|OWASP CSRF Protector Project]] is a project started with the goal to help developer to mitigate CSRF in web applications with ease. It's based on [[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet|Synchronizer Token Pattern]] and leverages an injected java-script code to provide CSRF mitigation without much developer intervention. So far it has been implemented as a [https://github.com/mebjas/CSRF-Protector-PHP PHP Library] and an [[CSRFProtector Project|Apache 2.2.x module]]. Although different libraries and frameworks provide CSRF mitigation these days - all of them require developer to explicitly inject tokens with every form. &lt;br /&gt;
===OWASP CSRF Protector - Extending the design as a python package to work with Flask and an Express JS (Node.JS) middleware===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The design of CSRF Protector involves a server side middle-ware that intercepts every incoming request and validates them for CSRF attacks. If the validation is successful the flow of control goes to business logic and the tokens are refreshed. In case of failed validation configured actions are taken. Post that, another middle ware takes care of injecting a JavaScript code (refer [https://github.com/mebjas/CSRF-Protector-PHP/blob/master/js/csrfprotector.js CSRF Protector PHP JS Code]) to HTML output. On the client side this code ensures that, for every request that require validation - the correct token is sent along with the request.&lt;br /&gt;
&lt;br /&gt;
Check [https://github.com/mebjas/CSRF-Protector-PHP/wiki GitHub Wiki] for some reference;&lt;br /&gt;
&lt;br /&gt;
The goal of this project would be to:&lt;br /&gt;
# Port this design to a python module that can be used easily with Flask - [https://github.com/mebjas/CSRF-Protector-py/projects/1?add_cards_query=is%3Aopen Kanban Board]&lt;br /&gt;
# Port this design to a node js module that can work well with express js (a popular Node.JS based framework). - [https://github.com/mebjas/CSRF-Protector-JS Initial Repo Link]&lt;br /&gt;
# Fix some outstanding issues with java-script code used in library: [https://github.com/mebjas/CSRF-Protector-PHP/issues?q=is%3Aopen+is%3Aissue+label%3AJS Issues] &lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: Clean, maintainable (ES6 compatible and using recommended design patterns) in case of Node.JS'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Javascript (Client Side), Python (having worked with flask preferable), Node.JS (having worked with node.js and middle wares preferable)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Contact: [mailto:minhaz@owasp.org;minhazv@microsoft.com Minhaz A V]&lt;br /&gt;
== OWASP BLT (Bug Logging Tool) ==&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
&lt;br /&gt;
BLT lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
Check OWASP WIKI PAGE [https://www.owasp.org/index.php/OWASP_Bug_Logging_Tool] for some reference;&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Fuse app to allow easy bug reporting from phone.&lt;br /&gt;
* BUG cryptocurrency rewarded for each bug reported - requires a way to verify bugs are valid and not duplicates&lt;br /&gt;
* Allow for companies to do private (paid) bug bounties&lt;br /&gt;
* allow for bug reporting via email &lt;br /&gt;
* build a referral program&lt;br /&gt;
* integrate an idea / suggestion feature&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. Fusetools will be used for the app and C++ (Bitcoin based) or Ethereum will be used for the cryptocurrency part.&lt;br /&gt;
&lt;br /&gt;
===Proposals from student:===&lt;br /&gt;
* Proposal on new features &lt;br /&gt;
* Recommendations on how to use social applications to promote OWASP BLT&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Sean Auriti [https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] &lt;br /&gt;
* Sourav Badami [https://www.owasp.org/index.php/User:Souravbadami Sourav Badami] [mailto:souravbadami@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - 2017 OWASP Top Ten==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add support for multiple OWASP Top Ten versions, such as 2017 and 2010.&lt;br /&gt;
Currently RailsGoat supports only the 2013 version of OWASP Top Ten.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that supports additional version(s) of OWASP Top Ten&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 305 [https://github.com/OWASP/railsgoat/issues/305] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, Mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Capture-The-Flag RailsGoat Image Creation Automation==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Create automation to build a Capture-The-Flag competition (CTF) image (VM, ISO, etc) which contains everything needed, such as [Operating System, Rails Stack, RailsGoat], so RailsGoat can easily be used in more Capture-The-Flag competitions.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that automates the process of building RailsGoat CTF images.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 306 [https://github.com/OWASP/railsgoat/issues/306] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* Some background in creating VMs/ISOs would be helpful.&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Matt Robinson [mailto:brimstone@the.narro.ws] - OWASP RailsGoat Mentor&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat. Need to get permission from publisher. @jasnow got permission previously.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* More teaching RailsGoat examples based on &amp;quot;Security on Rails&amp;quot; book's lunchedin project.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 307 [https://github.com/OWASP/railsgoat/issues/307] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security&lt;br /&gt;
would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Add Devise Gem Support and Vulnerabilities to RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add Devise Support to RailsGoat along with adding Devise-related vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* Using Devise gem inside RailsGoat plus Devise-related vulnerabilities.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 207 [https://github.com/OWASP/railsgoat/issues/207] and * Issue 243 [https://github.com/OWASP/railsgoat/issues/243] has more details.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Your Idea==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
RailsGoat is a great framework for learning about OWASP Top 10 2013 using a vulnerable version of the Ruby on Rails (versions 3 to 5), as well as some &amp;quot;extras&amp;quot; that the initial project contributors felt worthwhile to share. This project is designed to educate both developers, as well as security professionals. Feel free to check out the [Railsgoat Github site](https://github.com/OWASP/railsgoat) for more details. If you have an idea that is not on this list then don't worry, you can still submit it.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that makes RailsGoat even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
=== Needs: ===&lt;br /&gt;
* Student Developers&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
*  [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to add more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Roadmap ===&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=246493</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=246493"/>
				<updated>2019-01-10T09:43:54Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* Mentors and Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP Foundation has been selected as an organization to be part of the GOOGLE SUMMER CODE 2018''' &lt;br /&gt;
&lt;br /&gt;
=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Active Scanning WebSockets===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesnt current support active scanning (automated attacking) of websockets.&lt;br /&gt;
:&lt;br /&gt;
:We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* An plugable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== React Handling  ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP doesnt understand React applications as well as it should be able to.&lt;br /&gt;
:&lt;br /&gt;
:It would be great if ZAP had a much better understanding of such applications, including how to explore and attack them more effectively.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* ZAP able to explore React applications more effectively&lt;br /&gt;
:* ZAP able to attack React applications more effectively&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* As React is written in JavaScript, good knowledge of this language is recommended. ZAP is written in Java, so some knowledge of this language would be useful. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning. (Including adapting some of the existing scan rules to leverage the new component.)&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:: '''Note''' This issue was previously undertaken, however, only partial progress was made. The [https://github.com/zaproxy/zap-extensions/pull/1014 Pull Request] is still open and can be built upon. The 2018 effort needs to ensure the code builds and is successfully put to use in some of the existing scan rules and unit tests.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be very useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated authentication detection and configuration  ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&lt;br /&gt;
:This is time consuming and error prone.&lt;br /&gt;
:&lt;br /&gt;
:Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Develop Bamboo Addon ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:It would be great to have an official ZAP add-on for [https://www.atlassian.com/software/bamboo Bamboo], equivalent to the one we now have for [https://wiki.jenkins.io/display/JENKINS/zap+plugin Jenkins]&lt;br /&gt;
:&lt;br /&gt;
:For more information about Bamboo plugins see the [https://developer.atlassian.com/server/bamboo/bamboo-plugin-guide/ Bamboo plugin guide].&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:&lt;br /&gt;
:A Bamboo addon that supports:&lt;br /&gt;
:* Spidering (using the traditional and Ajax spiders)&lt;br /&gt;
:* Active Scanning&lt;br /&gt;
:* Authentication&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP and Bamboo are written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2018 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] user story])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Frontend Technology Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frontend framework AngularJS 1.x along with Bootstrap 3. Several major releases later, there now are [https://github.com/bkimminich/juice-shop/issues/165 Angular 5] and [https://github.com/bkimminich/juice-shop/issues/400 Bootstrap 4] available as well as other mature web frontend frameworks. Migrating the OWASP Juice Shop to the latest version of Angular and Bootstrap is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target client-architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, testing and building&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== UI/Graphics Design Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The UI of OWASP Juice Shop was written following recommendations from Twitter Bootstrap to be responsive, but it never had an actual designer or graphics artist take a look or add some insight. Currently the look &amp;amp; feel comes &amp;quot;out of the box&amp;quot; from a [https://bootswatch.com Bootswatch] theme and [https://fontawesome.com Font Awesome 5] icons. This gives it a quite modern look, but also leaves it very generic. The project could greatly benefit from involvement of someone with actual UI/UX Design expertise. Having a matching theme for [https://ctfd.io CTFd] would be another big achievement for the Juice Shop.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Design concepts to pick or have the user community vote on (including color schemes, sample screens, icons etc.)&lt;br /&gt;
* Overhauling the overall UI look &amp;amp; feel, e.g. by making an individual Bootswatch theme or designing some individual icons&lt;br /&gt;
* &amp;lt;del&amp;gt;Getting rid of the stock images by providing individually designed product images for the standard inventory of the shop&amp;lt;/del&amp;gt; ([https://github.com/bkimminich/juice-shop/issues/315 #315] in progress)&lt;br /&gt;
* Add more flexibility and options to the existing theming/customization of the UI (see [https://github.com/bkimminich/juice-shop/issues/379 #379])&lt;br /&gt;
* Design a [https://github.com/bkimminich/juice-shop-ctf/issues/9 &amp;quot;Juice Shop&amp;quot; CTFd-theme] playing well with the look &amp;amp; feel of the application&lt;br /&gt;
* Execution of migration without breaking functionality or client-side unit and end-to-end tests along the way&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the existing HTML views and CSS of the frontend&lt;br /&gt;
* Get a feeling for the high quality bar by inspecting the existing client-side unit and e2e test suites&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Strong web and graphic design experience&lt;br /&gt;
* Sophisticated HTML and CSS experience&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework - Chatbot machine learning feature==&lt;br /&gt;
&lt;br /&gt;
=== Brief Explanation ===&lt;br /&gt;
We want to create a SKF Chatbot service using the knowledge already inside SKF like the knowledge base items, code examples and the security controls like ASVS and PCI DSS.&lt;br /&gt;
&lt;br /&gt;
The chatbot service and core of this new feature can be consumed by website’s as an addon, IDE of developers and website chat channels like Gitter.im.&lt;br /&gt;
&lt;br /&gt;
The core of the SKF Chatbot will be using machine learning to accomplish the hard task of correlating data and merging different sources as a response/answer.&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
# A Defined Knowledge Base (Data Structure / DB) which can be used to define and search for entities. For example: if a query is:&lt;br /&gt;
## How to mitigate CSRF in PHP   the system should be able to understand or translate it to:  {How: intent} to {mitigate: solution} {CSRF: attack} in {PHP: programming language}  This kind of query can be further user to fetch right information in the knowledge base and provide right solution (code example) for mitigating CSRF in PHP.&lt;br /&gt;
## What is CSRF?   the system should be able to understand or translate it to:  {What: intent} is {CSRF: attack/defense}  This kind of query can be further user to fetch right information in the knowledge base that explains CSRF and provide the security control from example ASVS&lt;br /&gt;
# An ETL process to convert existing SKF Knowledge data and ASVS data to above mentioned data structure.&lt;br /&gt;
# A Chatbot (using existing frameworks) to:&lt;br /&gt;
## Understand at least two intent like (How to, What is …..) and be able to enrich the user query as mentioned above.&lt;br /&gt;
## Based on enriched query fetch relevant information from knowledge base and return.&lt;br /&gt;
# An integration to some chat system like Gitter.im, IRC, Slack etc.&lt;br /&gt;
&lt;br /&gt;
=== Knowledge Prerequisites ===&lt;br /&gt;
* Programming languages:&lt;br /&gt;
** OWASP-SKF API is build in Python 3.6/3.7&lt;br /&gt;
** OWASP-SKF Frontend is build with Angular 4 TS&lt;br /&gt;
* Machine learning enthusiastic/interest&lt;br /&gt;
&lt;br /&gt;
=== Proposal from student ===&lt;br /&gt;
* We want to ask from the student to write a proposal on how to approach the problem we described.&lt;br /&gt;
'''Mentors''':&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org] Minhaz [mailto:minhaz@owasp.org]&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
if you need more details please visit the [https://github.com/viraintel/OWASP-Nettacker GitHub page] or contact a leader([mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:reza.espargham@owasp.org Reza Espargham]).&lt;br /&gt;
&lt;br /&gt;
===Getting started===&lt;br /&gt;
&lt;br /&gt;
* You may read the available documents in the [https://github.com/viraintel/OWASP-Nettacker/wiki wiki page]. Developers and users documents are separated.&lt;br /&gt;
&lt;br /&gt;
'''A Better Penetration Testing Automated Framework'''&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
The expected results are to contribute the OWASP Nettacker framework [https://github.com/viraintel/OWASP-Nettacker/issues issues] (mostly help wanted or enhancement). Please check the GitHub repo to learn more.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* The whole framework was written in Python language. You must be familiar with Python 2.x, 3.x.&lt;br /&gt;
* Good knowledge of computer security (and penetration testing)&lt;br /&gt;
* Knowledge of OS (Linux, Windows, Mac...) and Services&lt;br /&gt;
* Familiar with IDS/IPS/Firewalls and ...&lt;br /&gt;
* To develop the API you should be familiar with HTTP, Database...&lt;br /&gt;
&lt;br /&gt;
===Mentors===&lt;br /&gt;
Mentors are: [mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:abiusx@owasp.org Abbas Naderi Afooshteh], [mailto:sriharsha.g15@iiits.in SRI HARSHA Gajavalli]&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP CSRF Protector ==&lt;br /&gt;
[[CSRFProtector Project|OWASP CSRF Protector Project]] is a project started with the goal to help developer to mitigate CSRF in web applications with ease. It's based on [[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet|Synchronizer Token Pattern]] and leverages an injected java-script code to provide CSRF mitigation without much developer intervention. So far it has been implemented as a [https://github.com/mebjas/CSRF-Protector-PHP PHP Library] and an [[CSRFProtector Project|Apache 2.2.x module]]. Although different libraries and frameworks provide CSRF mitigation these days - all of them require developer to explicitly inject tokens with every form. &lt;br /&gt;
===OWASP CSRF Protector - Extending the design as a python package to work with Flask and an Express JS (Node.JS) middleware===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The design of CSRF Protector involves a server side middle-ware that intercepts every incoming request and validates them for CSRF attacks. If the validation is successful the flow of control goes to business logic and the tokens are refreshed. In case of failed validation configured actions are taken. Post that, another middle ware takes care of injecting a JavaScript code (refer [https://github.com/mebjas/CSRF-Protector-PHP/blob/master/js/csrfprotector.js CSRF Protector PHP JS Code]) to HTML output. On the client side this code ensures that, for every request that require validation - the correct token is sent along with the request.&lt;br /&gt;
&lt;br /&gt;
Check [https://github.com/mebjas/CSRF-Protector-PHP/wiki GitHub Wiki] for some reference;&lt;br /&gt;
&lt;br /&gt;
The goal of this project would be to:&lt;br /&gt;
# Port this design to a python module that can be used easily with Flask - [https://github.com/mebjas/CSRF-Protector-py/projects/1?add_cards_query=is%3Aopen Kanban Board]&lt;br /&gt;
# Port this design to a node js module that can work well with express js (a popular Node.JS based framework). - [https://github.com/mebjas/CSRF-Protector-JS Initial Repo Link]&lt;br /&gt;
# Fix some outstanding issues with java-script code used in library: [https://github.com/mebjas/CSRF-Protector-PHP/issues?q=is%3Aopen+is%3Aissue+label%3AJS Issues] &lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: Clean, maintainable (ES6 compatible and using recommended design patterns) in case of Node.JS'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Javascript (Client Side), Python (having worked with flask preferable), Node.JS (having worked with node.js and middle wares preferable)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Contact: [mailto:minhaz@owasp.org;minhazv@microsoft.com Minhaz A V]&lt;br /&gt;
== OWASP BLT (Bug Logging Tool) ==&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
&lt;br /&gt;
BLT lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
Check OWASP WIKI PAGE [https://www.owasp.org/index.php/OWASP_Bug_Logging_Tool] for some reference;&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Fuse app to allow easy bug reporting from phone.&lt;br /&gt;
* BUG cryptocurrency rewarded for each bug reported - requires a way to verify bugs are valid and not duplicates&lt;br /&gt;
* Allow for companies to do private (paid) bug bounties&lt;br /&gt;
* allow for bug reporting via email &lt;br /&gt;
* build a referral program&lt;br /&gt;
* integrate an idea / suggestion feature&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. Fusetools will be used for the app and C++ (Bitcoin based) or Ethereum will be used for the cryptocurrency part.&lt;br /&gt;
&lt;br /&gt;
===Proposals from student:===&lt;br /&gt;
* Proposal on new features &lt;br /&gt;
* Recommendations on how to use social applications to promote OWASP BLT&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Sean Auriti [https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] &lt;br /&gt;
* Sourav Badami [https://www.owasp.org/index.php/User:Souravbadami Sourav Badami] [mailto:souravbadami@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - 2017 OWASP Top Ten==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add support for multiple OWASP Top Ten versions, such as 2017 and 2010.&lt;br /&gt;
Currently RailsGoat supports only the 2013 version of OWASP Top Ten.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that supports additional version(s) of OWASP Top Ten&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 305 [https://github.com/OWASP/railsgoat/issues/305] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, Mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Capture-The-Flag RailsGoat Image Creation Automation==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Create automation to build a Capture-The-Flag competition (CTF) image (VM, ISO, etc) which contains everything needed, such as [Operating System, Rails Stack, RailsGoat], so RailsGoat can easily be used in more Capture-The-Flag competitions.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that automates the process of building RailsGoat CTF images.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 306 [https://github.com/OWASP/railsgoat/issues/306] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* Some background in creating VMs/ISOs would be helpful.&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Matt Robinson [mailto:brimstone@the.narro.ws] - OWASP RailsGoat Mentor&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat. Need to get permission from publisher. @jasnow got permission previously.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* More teaching RailsGoat examples based on &amp;quot;Security on Rails&amp;quot; book's lunchedin project.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 307 [https://github.com/OWASP/railsgoat/issues/307] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security&lt;br /&gt;
would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Add Devise Gem Support and Vulnerabilities to RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add Devise Support to RailsGoat along with adding Devise-related vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* Using Devise gem inside RailsGoat plus Devise-related vulnerabilities.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 207 [https://github.com/OWASP/railsgoat/issues/207] and * Issue 243 [https://github.com/OWASP/railsgoat/issues/243] has more details.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Your Idea==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
RailsGoat is a great framework for learning about OWASP Top 10 2013 using a vulnerable version of the Ruby on Rails (versions 3 to 5), as well as some &amp;quot;extras&amp;quot; that the initial project contributors felt worthwhile to share. This project is designed to educate both developers, as well as security professionals. Feel free to check out the [Railsgoat Github site](https://github.com/OWASP/railsgoat) for more details. If you have an idea that is not on this list then don't worry, you can still submit it.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that makes RailsGoat even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
=== Needs: ===&lt;br /&gt;
* Student Developers&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
*  [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to add more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Roadmap ===&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* Ali Razmjoo (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* Reza Espargham (Mentor)&lt;br /&gt;
* Abbas Naderi (Mentor)&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=246492</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=246492"/>
				<updated>2019-01-10T09:43:00Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* Students Requirements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP Foundation has been selected as an organization to be part of the GOOGLE SUMMER CODE 2018''' &lt;br /&gt;
&lt;br /&gt;
=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Active Scanning WebSockets===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesnt current support active scanning (automated attacking) of websockets.&lt;br /&gt;
:&lt;br /&gt;
:We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* An plugable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== React Handling  ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP doesnt understand React applications as well as it should be able to.&lt;br /&gt;
:&lt;br /&gt;
:It would be great if ZAP had a much better understanding of such applications, including how to explore and attack them more effectively.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* ZAP able to explore React applications more effectively&lt;br /&gt;
:* ZAP able to attack React applications more effectively&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* As React is written in JavaScript, good knowledge of this language is recommended. ZAP is written in Java, so some knowledge of this language would be useful. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning. (Including adapting some of the existing scan rules to leverage the new component.)&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:: '''Note''' This issue was previously undertaken, however, only partial progress was made. The [https://github.com/zaproxy/zap-extensions/pull/1014 Pull Request] is still open and can be built upon. The 2018 effort needs to ensure the code builds and is successfully put to use in some of the existing scan rules and unit tests.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be very useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated authentication detection and configuration  ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&lt;br /&gt;
:This is time consuming and error prone.&lt;br /&gt;
:&lt;br /&gt;
:Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Develop Bamboo Addon ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:It would be great to have an official ZAP add-on for [https://www.atlassian.com/software/bamboo Bamboo], equivalent to the one we now have for [https://wiki.jenkins.io/display/JENKINS/zap+plugin Jenkins]&lt;br /&gt;
:&lt;br /&gt;
:For more information about Bamboo plugins see the [https://developer.atlassian.com/server/bamboo/bamboo-plugin-guide/ Bamboo plugin guide].&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:&lt;br /&gt;
:A Bamboo addon that supports:&lt;br /&gt;
:* Spidering (using the traditional and Ajax spiders)&lt;br /&gt;
:* Active Scanning&lt;br /&gt;
:* Authentication&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP and Bamboo are written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2018 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] user story])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Frontend Technology Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frontend framework AngularJS 1.x along with Bootstrap 3. Several major releases later, there now are [https://github.com/bkimminich/juice-shop/issues/165 Angular 5] and [https://github.com/bkimminich/juice-shop/issues/400 Bootstrap 4] available as well as other mature web frontend frameworks. Migrating the OWASP Juice Shop to the latest version of Angular and Bootstrap is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target client-architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, testing and building&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== UI/Graphics Design Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The UI of OWASP Juice Shop was written following recommendations from Twitter Bootstrap to be responsive, but it never had an actual designer or graphics artist take a look or add some insight. Currently the look &amp;amp; feel comes &amp;quot;out of the box&amp;quot; from a [https://bootswatch.com Bootswatch] theme and [https://fontawesome.com Font Awesome 5] icons. This gives it a quite modern look, but also leaves it very generic. The project could greatly benefit from involvement of someone with actual UI/UX Design expertise. Having a matching theme for [https://ctfd.io CTFd] would be another big achievement for the Juice Shop.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Design concepts to pick or have the user community vote on (including color schemes, sample screens, icons etc.)&lt;br /&gt;
* Overhauling the overall UI look &amp;amp; feel, e.g. by making an individual Bootswatch theme or designing some individual icons&lt;br /&gt;
* &amp;lt;del&amp;gt;Getting rid of the stock images by providing individually designed product images for the standard inventory of the shop&amp;lt;/del&amp;gt; ([https://github.com/bkimminich/juice-shop/issues/315 #315] in progress)&lt;br /&gt;
* Add more flexibility and options to the existing theming/customization of the UI (see [https://github.com/bkimminich/juice-shop/issues/379 #379])&lt;br /&gt;
* Design a [https://github.com/bkimminich/juice-shop-ctf/issues/9 &amp;quot;Juice Shop&amp;quot; CTFd-theme] playing well with the look &amp;amp; feel of the application&lt;br /&gt;
* Execution of migration without breaking functionality or client-side unit and end-to-end tests along the way&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the existing HTML views and CSS of the frontend&lt;br /&gt;
* Get a feeling for the high quality bar by inspecting the existing client-side unit and e2e test suites&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Strong web and graphic design experience&lt;br /&gt;
* Sophisticated HTML and CSS experience&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework - Chatbot machine learning feature==&lt;br /&gt;
&lt;br /&gt;
=== Brief Explanation ===&lt;br /&gt;
We want to create a SKF Chatbot service using the knowledge already inside SKF like the knowledge base items, code examples and the security controls like ASVS and PCI DSS.&lt;br /&gt;
&lt;br /&gt;
The chatbot service and core of this new feature can be consumed by website’s as an addon, IDE of developers and website chat channels like Gitter.im.&lt;br /&gt;
&lt;br /&gt;
The core of the SKF Chatbot will be using machine learning to accomplish the hard task of correlating data and merging different sources as a response/answer.&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
# A Defined Knowledge Base (Data Structure / DB) which can be used to define and search for entities. For example: if a query is:&lt;br /&gt;
## How to mitigate CSRF in PHP   the system should be able to understand or translate it to:  {How: intent} to {mitigate: solution} {CSRF: attack} in {PHP: programming language}  This kind of query can be further user to fetch right information in the knowledge base and provide right solution (code example) for mitigating CSRF in PHP.&lt;br /&gt;
## What is CSRF?   the system should be able to understand or translate it to:  {What: intent} is {CSRF: attack/defense}  This kind of query can be further user to fetch right information in the knowledge base that explains CSRF and provide the security control from example ASVS&lt;br /&gt;
# An ETL process to convert existing SKF Knowledge data and ASVS data to above mentioned data structure.&lt;br /&gt;
# A Chatbot (using existing frameworks) to:&lt;br /&gt;
## Understand at least two intent like (How to, What is …..) and be able to enrich the user query as mentioned above.&lt;br /&gt;
## Based on enriched query fetch relevant information from knowledge base and return.&lt;br /&gt;
# An integration to some chat system like Gitter.im, IRC, Slack etc.&lt;br /&gt;
&lt;br /&gt;
=== Knowledge Prerequisites ===&lt;br /&gt;
* Programming languages:&lt;br /&gt;
** OWASP-SKF API is build in Python 3.6/3.7&lt;br /&gt;
** OWASP-SKF Frontend is build with Angular 4 TS&lt;br /&gt;
* Machine learning enthusiastic/interest&lt;br /&gt;
&lt;br /&gt;
=== Proposal from student ===&lt;br /&gt;
* We want to ask from the student to write a proposal on how to approach the problem we described.&lt;br /&gt;
'''Mentors''':&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org] Minhaz [mailto:minhaz@owasp.org]&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
if you need more details please visit the [https://github.com/viraintel/OWASP-Nettacker GitHub page] or contact a leader([mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:reza.espargham@owasp.org Reza Espargham]).&lt;br /&gt;
&lt;br /&gt;
===Getting started===&lt;br /&gt;
&lt;br /&gt;
* You may read the available documents in the [https://github.com/viraintel/OWASP-Nettacker/wiki wiki page]. Developers and users documents are separated.&lt;br /&gt;
&lt;br /&gt;
'''A Better Penetration Testing Automated Framework'''&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
The expected results are to contribute the OWASP Nettacker framework [https://github.com/viraintel/OWASP-Nettacker/issues issues] (mostly help wanted or enhancement). Please check the GitHub repo to learn more.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* The whole framework was written in Python language. You must be familiar with Python 2.x, 3.x.&lt;br /&gt;
* Good knowledge of computer security (and penetration testing)&lt;br /&gt;
* Knowledge of OS (Linux, Windows, Mac...) and Services&lt;br /&gt;
* Familiar with IDS/IPS/Firewalls and ...&lt;br /&gt;
* To develop the API you should be familiar with HTTP, Database...&lt;br /&gt;
&lt;br /&gt;
===Mentors===&lt;br /&gt;
Mentors are: [mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:abiusx@owasp.org Abbas Naderi Afooshteh], [mailto:sriharsha.g15@iiits.in SRI HARSHA Gajavalli]&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP CSRF Protector ==&lt;br /&gt;
[[CSRFProtector Project|OWASP CSRF Protector Project]] is a project started with the goal to help developer to mitigate CSRF in web applications with ease. It's based on [[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet|Synchronizer Token Pattern]] and leverages an injected java-script code to provide CSRF mitigation without much developer intervention. So far it has been implemented as a [https://github.com/mebjas/CSRF-Protector-PHP PHP Library] and an [[CSRFProtector Project|Apache 2.2.x module]]. Although different libraries and frameworks provide CSRF mitigation these days - all of them require developer to explicitly inject tokens with every form. &lt;br /&gt;
===OWASP CSRF Protector - Extending the design as a python package to work with Flask and an Express JS (Node.JS) middleware===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The design of CSRF Protector involves a server side middle-ware that intercepts every incoming request and validates them for CSRF attacks. If the validation is successful the flow of control goes to business logic and the tokens are refreshed. In case of failed validation configured actions are taken. Post that, another middle ware takes care of injecting a JavaScript code (refer [https://github.com/mebjas/CSRF-Protector-PHP/blob/master/js/csrfprotector.js CSRF Protector PHP JS Code]) to HTML output. On the client side this code ensures that, for every request that require validation - the correct token is sent along with the request.&lt;br /&gt;
&lt;br /&gt;
Check [https://github.com/mebjas/CSRF-Protector-PHP/wiki GitHub Wiki] for some reference;&lt;br /&gt;
&lt;br /&gt;
The goal of this project would be to:&lt;br /&gt;
# Port this design to a python module that can be used easily with Flask - [https://github.com/mebjas/CSRF-Protector-py/projects/1?add_cards_query=is%3Aopen Kanban Board]&lt;br /&gt;
# Port this design to a node js module that can work well with express js (a popular Node.JS based framework). - [https://github.com/mebjas/CSRF-Protector-JS Initial Repo Link]&lt;br /&gt;
# Fix some outstanding issues with java-script code used in library: [https://github.com/mebjas/CSRF-Protector-PHP/issues?q=is%3Aopen+is%3Aissue+label%3AJS Issues] &lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: Clean, maintainable (ES6 compatible and using recommended design patterns) in case of Node.JS'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Javascript (Client Side), Python (having worked with flask preferable), Node.JS (having worked with node.js and middle wares preferable)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Contact: [mailto:minhaz@owasp.org;minhazv@microsoft.com Minhaz A V]&lt;br /&gt;
== OWASP BLT (Bug Logging Tool) ==&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
&lt;br /&gt;
BLT lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
Check OWASP WIKI PAGE [https://www.owasp.org/index.php/OWASP_Bug_Logging_Tool] for some reference;&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Fuse app to allow easy bug reporting from phone.&lt;br /&gt;
* BUG cryptocurrency rewarded for each bug reported - requires a way to verify bugs are valid and not duplicates&lt;br /&gt;
* Allow for companies to do private (paid) bug bounties&lt;br /&gt;
* allow for bug reporting via email &lt;br /&gt;
* build a referral program&lt;br /&gt;
* integrate an idea / suggestion feature&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. Fusetools will be used for the app and C++ (Bitcoin based) or Ethereum will be used for the cryptocurrency part.&lt;br /&gt;
&lt;br /&gt;
===Proposals from student:===&lt;br /&gt;
* Proposal on new features &lt;br /&gt;
* Recommendations on how to use social applications to promote OWASP BLT&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Sean Auriti [https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] &lt;br /&gt;
* Sourav Badami [https://www.owasp.org/index.php/User:Souravbadami Sourav Badami] [mailto:souravbadami@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - 2017 OWASP Top Ten==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add support for multiple OWASP Top Ten versions, such as 2017 and 2010.&lt;br /&gt;
Currently RailsGoat supports only the 2013 version of OWASP Top Ten.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that supports additional version(s) of OWASP Top Ten&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 305 [https://github.com/OWASP/railsgoat/issues/305] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, Mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Capture-The-Flag RailsGoat Image Creation Automation==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Create automation to build a Capture-The-Flag competition (CTF) image (VM, ISO, etc) which contains everything needed, such as [Operating System, Rails Stack, RailsGoat], so RailsGoat can easily be used in more Capture-The-Flag competitions.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that automates the process of building RailsGoat CTF images.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 306 [https://github.com/OWASP/railsgoat/issues/306] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* Some background in creating VMs/ISOs would be helpful.&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Matt Robinson [mailto:brimstone@the.narro.ws] - OWASP RailsGoat Mentor&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat. Need to get permission from publisher. @jasnow got permission previously.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* More teaching RailsGoat examples based on &amp;quot;Security on Rails&amp;quot; book's lunchedin project.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 307 [https://github.com/OWASP/railsgoat/issues/307] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security&lt;br /&gt;
would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Add Devise Gem Support and Vulnerabilities to RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add Devise Support to RailsGoat along with adding Devise-related vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* Using Devise gem inside RailsGoat plus Devise-related vulnerabilities.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 207 [https://github.com/OWASP/railsgoat/issues/207] and * Issue 243 [https://github.com/OWASP/railsgoat/issues/243] has more details.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Your Idea==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
RailsGoat is a great framework for learning about OWASP Top 10 2013 using a vulnerable version of the Ruby on Rails (versions 3 to 5), as well as some &amp;quot;extras&amp;quot; that the initial project contributors felt worthwhile to share. This project is designed to educate both developers, as well as security professionals. Feel free to check out the [Railsgoat Github site](https://github.com/OWASP/railsgoat) for more details. If you have an idea that is not on this list then don't worry, you can still submit it.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that makes RailsGoat even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
=== Needs: ===&lt;br /&gt;
* Student Developers&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
*  [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to add more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Roadmap ===&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
...&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=246491</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=246491"/>
				<updated>2019-01-10T09:38:32Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP Foundation has been selected as an organization to be part of the GOOGLE SUMMER CODE 2018''' &lt;br /&gt;
&lt;br /&gt;
=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Active Scanning WebSockets===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesnt current support active scanning (automated attacking) of websockets.&lt;br /&gt;
:&lt;br /&gt;
:We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* An plugable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== React Handling  ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP doesnt understand React applications as well as it should be able to.&lt;br /&gt;
:&lt;br /&gt;
:It would be great if ZAP had a much better understanding of such applications, including how to explore and attack them more effectively.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* ZAP able to explore React applications more effectively&lt;br /&gt;
:* ZAP able to attack React applications more effectively&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* As React is written in JavaScript, good knowledge of this language is recommended. ZAP is written in Java, so some knowledge of this language would be useful. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning. (Including adapting some of the existing scan rules to leverage the new component.)&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:: '''Note''' This issue was previously undertaken, however, only partial progress was made. The [https://github.com/zaproxy/zap-extensions/pull/1014 Pull Request] is still open and can be built upon. The 2018 effort needs to ensure the code builds and is successfully put to use in some of the existing scan rules and unit tests.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be very useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated authentication detection and configuration  ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&lt;br /&gt;
:This is time consuming and error prone.&lt;br /&gt;
:&lt;br /&gt;
:Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Develop Bamboo Addon ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:It would be great to have an official ZAP add-on for [https://www.atlassian.com/software/bamboo Bamboo], equivalent to the one we now have for [https://wiki.jenkins.io/display/JENKINS/zap+plugin Jenkins]&lt;br /&gt;
:&lt;br /&gt;
:For more information about Bamboo plugins see the [https://developer.atlassian.com/server/bamboo/bamboo-plugin-guide/ Bamboo plugin guide].&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:&lt;br /&gt;
:A Bamboo addon that supports:&lt;br /&gt;
:* Spidering (using the traditional and Ajax spiders)&lt;br /&gt;
:* Active Scanning&lt;br /&gt;
:* Authentication&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP and Bamboo are written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2018 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] user story])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Frontend Technology Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frontend framework AngularJS 1.x along with Bootstrap 3. Several major releases later, there now are [https://github.com/bkimminich/juice-shop/issues/165 Angular 5] and [https://github.com/bkimminich/juice-shop/issues/400 Bootstrap 4] available as well as other mature web frontend frameworks. Migrating the OWASP Juice Shop to the latest version of Angular and Bootstrap is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target client-architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, testing and building&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== UI/Graphics Design Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The UI of OWASP Juice Shop was written following recommendations from Twitter Bootstrap to be responsive, but it never had an actual designer or graphics artist take a look or add some insight. Currently the look &amp;amp; feel comes &amp;quot;out of the box&amp;quot; from a [https://bootswatch.com Bootswatch] theme and [https://fontawesome.com Font Awesome 5] icons. This gives it a quite modern look, but also leaves it very generic. The project could greatly benefit from involvement of someone with actual UI/UX Design expertise. Having a matching theme for [https://ctfd.io CTFd] would be another big achievement for the Juice Shop.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Design concepts to pick or have the user community vote on (including color schemes, sample screens, icons etc.)&lt;br /&gt;
* Overhauling the overall UI look &amp;amp; feel, e.g. by making an individual Bootswatch theme or designing some individual icons&lt;br /&gt;
* &amp;lt;del&amp;gt;Getting rid of the stock images by providing individually designed product images for the standard inventory of the shop&amp;lt;/del&amp;gt; ([https://github.com/bkimminich/juice-shop/issues/315 #315] in progress)&lt;br /&gt;
* Add more flexibility and options to the existing theming/customization of the UI (see [https://github.com/bkimminich/juice-shop/issues/379 #379])&lt;br /&gt;
* Design a [https://github.com/bkimminich/juice-shop-ctf/issues/9 &amp;quot;Juice Shop&amp;quot; CTFd-theme] playing well with the look &amp;amp; feel of the application&lt;br /&gt;
* Execution of migration without breaking functionality or client-side unit and end-to-end tests along the way&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the existing HTML views and CSS of the frontend&lt;br /&gt;
* Get a feeling for the high quality bar by inspecting the existing client-side unit and e2e test suites&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Strong web and graphic design experience&lt;br /&gt;
* Sophisticated HTML and CSS experience&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework - Chatbot machine learning feature==&lt;br /&gt;
&lt;br /&gt;
=== Brief Explanation ===&lt;br /&gt;
We want to create a SKF Chatbot service using the knowledge already inside SKF like the knowledge base items, code examples and the security controls like ASVS and PCI DSS.&lt;br /&gt;
&lt;br /&gt;
The chatbot service and core of this new feature can be consumed by website’s as an addon, IDE of developers and website chat channels like Gitter.im.&lt;br /&gt;
&lt;br /&gt;
The core of the SKF Chatbot will be using machine learning to accomplish the hard task of correlating data and merging different sources as a response/answer.&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
# A Defined Knowledge Base (Data Structure / DB) which can be used to define and search for entities. For example: if a query is:&lt;br /&gt;
## How to mitigate CSRF in PHP   the system should be able to understand or translate it to:  {How: intent} to {mitigate: solution} {CSRF: attack} in {PHP: programming language}  This kind of query can be further user to fetch right information in the knowledge base and provide right solution (code example) for mitigating CSRF in PHP.&lt;br /&gt;
## What is CSRF?   the system should be able to understand or translate it to:  {What: intent} is {CSRF: attack/defense}  This kind of query can be further user to fetch right information in the knowledge base that explains CSRF and provide the security control from example ASVS&lt;br /&gt;
# An ETL process to convert existing SKF Knowledge data and ASVS data to above mentioned data structure.&lt;br /&gt;
# A Chatbot (using existing frameworks) to:&lt;br /&gt;
## Understand at least two intent like (How to, What is …..) and be able to enrich the user query as mentioned above.&lt;br /&gt;
## Based on enriched query fetch relevant information from knowledge base and return.&lt;br /&gt;
# An integration to some chat system like Gitter.im, IRC, Slack etc.&lt;br /&gt;
&lt;br /&gt;
=== Knowledge Prerequisites ===&lt;br /&gt;
* Programming languages:&lt;br /&gt;
** OWASP-SKF API is build in Python 3.6/3.7&lt;br /&gt;
** OWASP-SKF Frontend is build with Angular 4 TS&lt;br /&gt;
* Machine learning enthusiastic/interest&lt;br /&gt;
&lt;br /&gt;
=== Proposal from student ===&lt;br /&gt;
* We want to ask from the student to write a proposal on how to approach the problem we described.&lt;br /&gt;
'''Mentors''':&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org] Minhaz [mailto:minhaz@owasp.org]&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
if you need more details please visit the [https://github.com/viraintel/OWASP-Nettacker GitHub page] or contact a leader([mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:reza.espargham@owasp.org Reza Espargham]).&lt;br /&gt;
&lt;br /&gt;
===Getting started===&lt;br /&gt;
&lt;br /&gt;
* You may read the available documents in the [https://github.com/viraintel/OWASP-Nettacker/wiki wiki page]. Developers and users documents are separated.&lt;br /&gt;
&lt;br /&gt;
'''A Better Penetration Testing Automated Framework'''&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
The expected results are to contribute the OWASP Nettacker framework [https://github.com/viraintel/OWASP-Nettacker/issues issues] (mostly help wanted or enhancement). Please check the GitHub repo to learn more.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* The whole framework was written in Python language. You must be familiar with Python 2.x, 3.x.&lt;br /&gt;
* Good knowledge of computer security (and penetration testing)&lt;br /&gt;
* Knowledge of OS (Linux, Windows, Mac...) and Services&lt;br /&gt;
* Familiar with IDS/IPS/Firewalls and ...&lt;br /&gt;
* To develop the API you should be familiar with HTTP, Database...&lt;br /&gt;
&lt;br /&gt;
===Mentors===&lt;br /&gt;
Mentors are: [mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:abiusx@owasp.org Abbas Naderi Afooshteh], [mailto:sriharsha.g15@iiits.in SRI HARSHA Gajavalli]&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP CSRF Protector ==&lt;br /&gt;
[[CSRFProtector Project|OWASP CSRF Protector Project]] is a project started with the goal to help developer to mitigate CSRF in web applications with ease. It's based on [[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet|Synchronizer Token Pattern]] and leverages an injected java-script code to provide CSRF mitigation without much developer intervention. So far it has been implemented as a [https://github.com/mebjas/CSRF-Protector-PHP PHP Library] and an [[CSRFProtector Project|Apache 2.2.x module]]. Although different libraries and frameworks provide CSRF mitigation these days - all of them require developer to explicitly inject tokens with every form. &lt;br /&gt;
===OWASP CSRF Protector - Extending the design as a python package to work with Flask and an Express JS (Node.JS) middleware===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The design of CSRF Protector involves a server side middle-ware that intercepts every incoming request and validates them for CSRF attacks. If the validation is successful the flow of control goes to business logic and the tokens are refreshed. In case of failed validation configured actions are taken. Post that, another middle ware takes care of injecting a JavaScript code (refer [https://github.com/mebjas/CSRF-Protector-PHP/blob/master/js/csrfprotector.js CSRF Protector PHP JS Code]) to HTML output. On the client side this code ensures that, for every request that require validation - the correct token is sent along with the request.&lt;br /&gt;
&lt;br /&gt;
Check [https://github.com/mebjas/CSRF-Protector-PHP/wiki GitHub Wiki] for some reference;&lt;br /&gt;
&lt;br /&gt;
The goal of this project would be to:&lt;br /&gt;
# Port this design to a python module that can be used easily with Flask - [https://github.com/mebjas/CSRF-Protector-py/projects/1?add_cards_query=is%3Aopen Kanban Board]&lt;br /&gt;
# Port this design to a node js module that can work well with express js (a popular Node.JS based framework). - [https://github.com/mebjas/CSRF-Protector-JS Initial Repo Link]&lt;br /&gt;
# Fix some outstanding issues with java-script code used in library: [https://github.com/mebjas/CSRF-Protector-PHP/issues?q=is%3Aopen+is%3Aissue+label%3AJS Issues] &lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: Clean, maintainable (ES6 compatible and using recommended design patterns) in case of Node.JS'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Javascript (Client Side), Python (having worked with flask preferable), Node.JS (having worked with node.js and middle wares preferable)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Contact: [mailto:minhaz@owasp.org;minhazv@microsoft.com Minhaz A V]&lt;br /&gt;
== OWASP BLT (Bug Logging Tool) ==&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
&lt;br /&gt;
BLT lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
Check OWASP WIKI PAGE [https://www.owasp.org/index.php/OWASP_Bug_Logging_Tool] for some reference;&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Fuse app to allow easy bug reporting from phone.&lt;br /&gt;
* BUG cryptocurrency rewarded for each bug reported - requires a way to verify bugs are valid and not duplicates&lt;br /&gt;
* Allow for companies to do private (paid) bug bounties&lt;br /&gt;
* allow for bug reporting via email &lt;br /&gt;
* build a referral program&lt;br /&gt;
* integrate an idea / suggestion feature&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. Fusetools will be used for the app and C++ (Bitcoin based) or Ethereum will be used for the cryptocurrency part.&lt;br /&gt;
&lt;br /&gt;
===Proposals from student:===&lt;br /&gt;
* Proposal on new features &lt;br /&gt;
* Recommendations on how to use social applications to promote OWASP BLT&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Sean Auriti [https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] &lt;br /&gt;
* Sourav Badami [https://www.owasp.org/index.php/User:Souravbadami Sourav Badami] [mailto:souravbadami@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - 2017 OWASP Top Ten==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add support for multiple OWASP Top Ten versions, such as 2017 and 2010.&lt;br /&gt;
Currently RailsGoat supports only the 2013 version of OWASP Top Ten.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that supports additional version(s) of OWASP Top Ten&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 305 [https://github.com/OWASP/railsgoat/issues/305] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, Mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Capture-The-Flag RailsGoat Image Creation Automation==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Create automation to build a Capture-The-Flag competition (CTF) image (VM, ISO, etc) which contains everything needed, such as [Operating System, Rails Stack, RailsGoat], so RailsGoat can easily be used in more Capture-The-Flag competitions.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that automates the process of building RailsGoat CTF images.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 306 [https://github.com/OWASP/railsgoat/issues/306] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* Some background in creating VMs/ISOs would be helpful.&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Matt Robinson [mailto:brimstone@the.narro.ws] - OWASP RailsGoat Mentor&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat. Need to get permission from publisher. @jasnow got permission previously.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* More teaching RailsGoat examples based on &amp;quot;Security on Rails&amp;quot; book's lunchedin project.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 307 [https://github.com/OWASP/railsgoat/issues/307] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security&lt;br /&gt;
would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Add Devise Gem Support and Vulnerabilities to RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add Devise Support to RailsGoat along with adding Devise-related vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* Using Devise gem inside RailsGoat plus Devise-related vulnerabilities.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 207 [https://github.com/OWASP/railsgoat/issues/207] and * Issue 243 [https://github.com/OWASP/railsgoat/issues/243] has more details.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Your Idea==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
RailsGoat is a great framework for learning about OWASP Top 10 2013 using a vulnerable version of the Ruby on Rails (versions 3 to 5), as well as some &amp;quot;extras&amp;quot; that the initial project contributors felt worthwhile to share. This project is designed to educate both developers, as well as security professionals. Feel free to check out the [Railsgoat Github site](https://github.com/OWASP/railsgoat) for more details. If you have an idea that is not on this list then don't worry, you can still submit it.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that makes RailsGoat even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
=== Needs: ===&lt;br /&gt;
* Student Developers&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
*  [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to add more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Roadmap ===&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
...&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=246490</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=246490"/>
				<updated>2019-01-10T09:37:30Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: add ohp&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP Foundation has been selected as an organization to be part of the GOOGLE SUMMER CODE 2018''' &lt;br /&gt;
&lt;br /&gt;
=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Active Scanning WebSockets===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesnt current support active scanning (automated attacking) of websockets.&lt;br /&gt;
:&lt;br /&gt;
:We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* An plugable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== React Handling  ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP doesnt understand React applications as well as it should be able to.&lt;br /&gt;
:&lt;br /&gt;
:It would be great if ZAP had a much better understanding of such applications, including how to explore and attack them more effectively.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* ZAP able to explore React applications more effectively&lt;br /&gt;
:* ZAP able to attack React applications more effectively&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* As React is written in JavaScript, good knowledge of this language is recommended. ZAP is written in Java, so some knowledge of this language would be useful. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning. (Including adapting some of the existing scan rules to leverage the new component.)&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:: '''Note''' This issue was previously undertaken, however, only partial progress was made. The [https://github.com/zaproxy/zap-extensions/pull/1014 Pull Request] is still open and can be built upon. The 2018 effort needs to ensure the code builds and is successfully put to use in some of the existing scan rules and unit tests.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be very useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated authentication detection and configuration  ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&lt;br /&gt;
:This is time consuming and error prone.&lt;br /&gt;
:&lt;br /&gt;
:Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Develop Bamboo Addon ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:It would be great to have an official ZAP add-on for [https://www.atlassian.com/software/bamboo Bamboo], equivalent to the one we now have for [https://wiki.jenkins.io/display/JENKINS/zap+plugin Jenkins]&lt;br /&gt;
:&lt;br /&gt;
:For more information about Bamboo plugins see the [https://developer.atlassian.com/server/bamboo/bamboo-plugin-guide/ Bamboo plugin guide].&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:&lt;br /&gt;
:A Bamboo addon that supports:&lt;br /&gt;
:* Spidering (using the traditional and Ajax spiders)&lt;br /&gt;
:* Active Scanning&lt;br /&gt;
:* Authentication&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP and Bamboo are written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started: '''&lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2018 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] user story])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Frontend Technology Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frontend framework AngularJS 1.x along with Bootstrap 3. Several major releases later, there now are [https://github.com/bkimminich/juice-shop/issues/165 Angular 5] and [https://github.com/bkimminich/juice-shop/issues/400 Bootstrap 4] available as well as other mature web frontend frameworks. Migrating the OWASP Juice Shop to the latest version of Angular and Bootstrap is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target client-architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, testing and building&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== UI/Graphics Design Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The UI of OWASP Juice Shop was written following recommendations from Twitter Bootstrap to be responsive, but it never had an actual designer or graphics artist take a look or add some insight. Currently the look &amp;amp; feel comes &amp;quot;out of the box&amp;quot; from a [https://bootswatch.com Bootswatch] theme and [https://fontawesome.com Font Awesome 5] icons. This gives it a quite modern look, but also leaves it very generic. The project could greatly benefit from involvement of someone with actual UI/UX Design expertise. Having a matching theme for [https://ctfd.io CTFd] would be another big achievement for the Juice Shop.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Design concepts to pick or have the user community vote on (including color schemes, sample screens, icons etc.)&lt;br /&gt;
* Overhauling the overall UI look &amp;amp; feel, e.g. by making an individual Bootswatch theme or designing some individual icons&lt;br /&gt;
* &amp;lt;del&amp;gt;Getting rid of the stock images by providing individually designed product images for the standard inventory of the shop&amp;lt;/del&amp;gt; ([https://github.com/bkimminich/juice-shop/issues/315 #315] in progress)&lt;br /&gt;
* Add more flexibility and options to the existing theming/customization of the UI (see [https://github.com/bkimminich/juice-shop/issues/379 #379])&lt;br /&gt;
* Design a [https://github.com/bkimminich/juice-shop-ctf/issues/9 &amp;quot;Juice Shop&amp;quot; CTFd-theme] playing well with the look &amp;amp; feel of the application&lt;br /&gt;
* Execution of migration without breaking functionality or client-side unit and end-to-end tests along the way&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the existing HTML views and CSS of the frontend&lt;br /&gt;
* Get a feeling for the high quality bar by inspecting the existing client-side unit and e2e test suites&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Strong web and graphic design experience&lt;br /&gt;
* Sophisticated HTML and CSS experience&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework - Chatbot machine learning feature==&lt;br /&gt;
&lt;br /&gt;
=== Brief Explanation ===&lt;br /&gt;
We want to create a SKF Chatbot service using the knowledge already inside SKF like the knowledge base items, code examples and the security controls like ASVS and PCI DSS.&lt;br /&gt;
&lt;br /&gt;
The chatbot service and core of this new feature can be consumed by website’s as an addon, IDE of developers and website chat channels like Gitter.im.&lt;br /&gt;
&lt;br /&gt;
The core of the SKF Chatbot will be using machine learning to accomplish the hard task of correlating data and merging different sources as a response/answer.&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
# A Defined Knowledge Base (Data Structure / DB) which can be used to define and search for entities. For example: if a query is:&lt;br /&gt;
## How to mitigate CSRF in PHP   the system should be able to understand or translate it to:  {How: intent} to {mitigate: solution} {CSRF: attack} in {PHP: programming language}  This kind of query can be further user to fetch right information in the knowledge base and provide right solution (code example) for mitigating CSRF in PHP.&lt;br /&gt;
## What is CSRF?   the system should be able to understand or translate it to:  {What: intent} is {CSRF: attack/defense}  This kind of query can be further user to fetch right information in the knowledge base that explains CSRF and provide the security control from example ASVS&lt;br /&gt;
# An ETL process to convert existing SKF Knowledge data and ASVS data to above mentioned data structure.&lt;br /&gt;
# A Chatbot (using existing frameworks) to:&lt;br /&gt;
## Understand at least two intent like (How to, What is …..) and be able to enrich the user query as mentioned above.&lt;br /&gt;
## Based on enriched query fetch relevant information from knowledge base and return.&lt;br /&gt;
# An integration to some chat system like Gitter.im, IRC, Slack etc.&lt;br /&gt;
&lt;br /&gt;
=== Knowledge Prerequisites ===&lt;br /&gt;
* Programming languages:&lt;br /&gt;
** OWASP-SKF API is build in Python 3.6/3.7&lt;br /&gt;
** OWASP-SKF Frontend is build with Angular 4 TS&lt;br /&gt;
* Machine learning enthusiastic/interest&lt;br /&gt;
&lt;br /&gt;
=== Proposal from student ===&lt;br /&gt;
* We want to ask from the student to write a proposal on how to approach the problem we described.&lt;br /&gt;
'''Mentors''':&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org] Minhaz [mailto:minhaz@owasp.org]&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
if you need more details please visit the [https://github.com/viraintel/OWASP-Nettacker GitHub page] or contact a leader([mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:reza.espargham@owasp.org Reza Espargham]).&lt;br /&gt;
&lt;br /&gt;
===Getting started===&lt;br /&gt;
&lt;br /&gt;
* You may read the available documents in the [https://github.com/viraintel/OWASP-Nettacker/wiki wiki page]. Developers and users documents are separated.&lt;br /&gt;
&lt;br /&gt;
'''A Better Penetration Testing Automated Framework'''&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
The expected results are to contribute the OWASP Nettacker framework [https://github.com/viraintel/OWASP-Nettacker/issues issues] (mostly help wanted or enhancement). Please check the GitHub repo to learn more.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* The whole framework was written in Python language. You must be familiar with Python 2.x, 3.x.&lt;br /&gt;
* Good knowledge of computer security (and penetration testing)&lt;br /&gt;
* Knowledge of OS (Linux, Windows, Mac...) and Services&lt;br /&gt;
* Familiar with IDS/IPS/Firewalls and ...&lt;br /&gt;
* To develop the API you should be familiar with HTTP, Database...&lt;br /&gt;
&lt;br /&gt;
===Mentors===&lt;br /&gt;
Mentors are: [mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:abiusx@owasp.org Abbas Naderi Afooshteh], [mailto:sriharsha.g15@iiits.in SRI HARSHA Gajavalli]&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP CSRF Protector ==&lt;br /&gt;
[[CSRFProtector Project|OWASP CSRF Protector Project]] is a project started with the goal to help developer to mitigate CSRF in web applications with ease. It's based on [[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet|Synchronizer Token Pattern]] and leverages an injected java-script code to provide CSRF mitigation without much developer intervention. So far it has been implemented as a [https://github.com/mebjas/CSRF-Protector-PHP PHP Library] and an [[CSRFProtector Project|Apache 2.2.x module]]. Although different libraries and frameworks provide CSRF mitigation these days - all of them require developer to explicitly inject tokens with every form. &lt;br /&gt;
===OWASP CSRF Protector - Extending the design as a python package to work with Flask and an Express JS (Node.JS) middleware===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The design of CSRF Protector involves a server side middle-ware that intercepts every incoming request and validates them for CSRF attacks. If the validation is successful the flow of control goes to business logic and the tokens are refreshed. In case of failed validation configured actions are taken. Post that, another middle ware takes care of injecting a JavaScript code (refer [https://github.com/mebjas/CSRF-Protector-PHP/blob/master/js/csrfprotector.js CSRF Protector PHP JS Code]) to HTML output. On the client side this code ensures that, for every request that require validation - the correct token is sent along with the request.&lt;br /&gt;
&lt;br /&gt;
Check [https://github.com/mebjas/CSRF-Protector-PHP/wiki GitHub Wiki] for some reference;&lt;br /&gt;
&lt;br /&gt;
The goal of this project would be to:&lt;br /&gt;
# Port this design to a python module that can be used easily with Flask - [https://github.com/mebjas/CSRF-Protector-py/projects/1?add_cards_query=is%3Aopen Kanban Board]&lt;br /&gt;
# Port this design to a node js module that can work well with express js (a popular Node.JS based framework). - [https://github.com/mebjas/CSRF-Protector-JS Initial Repo Link]&lt;br /&gt;
# Fix some outstanding issues with java-script code used in library: [https://github.com/mebjas/CSRF-Protector-PHP/issues?q=is%3Aopen+is%3Aissue+label%3AJS Issues] &lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: Clean, maintainable (ES6 compatible and using recommended design patterns) in case of Node.JS'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Javascript (Client Side), Python (having worked with flask preferable), Node.JS (having worked with node.js and middle wares preferable)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Contact: [mailto:minhaz@owasp.org;minhazv@microsoft.com Minhaz A V]&lt;br /&gt;
== OWASP BLT (Bug Logging Tool) ==&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
&lt;br /&gt;
BLT lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
Check OWASP WIKI PAGE [https://www.owasp.org/index.php/OWASP_Bug_Logging_Tool] for some reference;&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Fuse app to allow easy bug reporting from phone.&lt;br /&gt;
* BUG cryptocurrency rewarded for each bug reported - requires a way to verify bugs are valid and not duplicates&lt;br /&gt;
* Allow for companies to do private (paid) bug bounties&lt;br /&gt;
* allow for bug reporting via email &lt;br /&gt;
* build a referral program&lt;br /&gt;
* integrate an idea / suggestion feature&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential. Fusetools will be used for the app and C++ (Bitcoin based) or Ethereum will be used for the cryptocurrency part.&lt;br /&gt;
&lt;br /&gt;
===Proposals from student:===&lt;br /&gt;
* Proposal on new features &lt;br /&gt;
* Recommendations on how to use social applications to promote OWASP BLT&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Sean Auriti [https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] &lt;br /&gt;
* Sourav Badami [https://www.owasp.org/index.php/User:Souravbadami Sourav Badami] [mailto:souravbadami@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - 2017 OWASP Top Ten==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add support for multiple OWASP Top Ten versions, such as 2017 and 2010.&lt;br /&gt;
Currently RailsGoat supports only the 2013 version of OWASP Top Ten.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that supports additional version(s) of OWASP Top Ten&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 305 [https://github.com/OWASP/railsgoat/issues/305] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, Mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Capture-The-Flag RailsGoat Image Creation Automation==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Create automation to build a Capture-The-Flag competition (CTF) image (VM, ISO, etc) which contains everything needed, such as [Operating System, Rails Stack, RailsGoat], so RailsGoat can easily be used in more Capture-The-Flag competitions.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that automates the process of building RailsGoat CTF images.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 306 [https://github.com/OWASP/railsgoat/issues/306] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* Some background in creating VMs/ISOs would be helpful.&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Matt Robinson [mailto:brimstone@the.narro.ws] - OWASP RailsGoat Mentor&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Merge &amp;quot;Security on Rails&amp;quot; book's lunchedin examples into RailsGoat. Need to get permission from publisher. @jasnow got permission previously.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* More teaching RailsGoat examples based on &amp;quot;Security on Rails&amp;quot; book's lunchedin project.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 307 [https://github.com/OWASP/railsgoat/issues/307] has more details. &lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security&lt;br /&gt;
would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Add Devise Gem Support and Vulnerabilities to RailsGoat==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
Add Devise Support to RailsGoat along with adding Devise-related vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* Using Devise gem inside RailsGoat plus Devise-related vulnerabilities.&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
* We have created a dedicated wiki for the OWASP GSOC initiative: https://github.com/OWASP/railsgoat/wiki/RailsGoat-Summer-of-Code-Type-Project-Information&lt;br /&gt;
* Issue 207 [https://github.com/OWASP/railsgoat/issues/207] and * Issue 243 [https://github.com/OWASP/railsgoat/issues/243] has more details.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
==OWASP RailsGoat - Your Idea==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
RailsGoat is a great framework for learning about OWASP Top 10 2013 using a vulnerable version of the Ruby on Rails (versions 3 to 5), as well as some &amp;quot;extras&amp;quot; that the initial project contributors felt worthwhile to share. This project is designed to educate both developers, as well as security professionals. Feel free to check out the [Railsgoat Github site](https://github.com/OWASP/railsgoat) for more details. If you have an idea that is not on this list then don't worry, you can still submit it.&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Wonderful experience for Student Developers, Mentors, and Technical Advisors&lt;br /&gt;
* A new feature that makes RailsGoat even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
=== Needs: ===&lt;br /&gt;
* Student Developers&lt;br /&gt;
&lt;br /&gt;
===Getting Started===&lt;br /&gt;
* Have a look at the RailsGoat https://github.com/OWASP/railsgoat/blob/master/README.md file, especially the 'Getting Started' section. We like to see student developers who have already contributed to RailsGoat, so try fixing one of the bugs.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
* RailsGoat is written in Ruby and Ruby-on-Rails, so a good knowledge of this language ecosystem is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Frank Rietta [mailto:frank@rietta.com] - OWASP RailsGoat Mentor&lt;br /&gt;
*  [https://www.owasp.org/index.php/User:Ken Ken Johnson @] - OWASP RailsGoat &amp;quot;Technical Advisor, mentor&amp;quot;&lt;br /&gt;
* John Poulin [mailto:john.m.poulin@gmail.com] - OWASP RailsGoat Mentor&lt;br /&gt;
* Al Snow [mailto:jasnow@hotmail.com] - OWASP RailsGoat Project Coordinator&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= OHP (OWASP Honeypot) =&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
== Getting Start ==&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to add more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
== Technologies ==&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
== Expected Results ==&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
== Students Requirements ==&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
== Mentors and Leaders ==&lt;br /&gt;
&lt;br /&gt;
...&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ZSC_Tool_Project&amp;diff=242517</id>
		<title>OWASP ZSC Tool Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ZSC_Tool_Project&amp;diff=242517"/>
				<updated>2018-08-14T19:24:26Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: events&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ZSC Tool Project==&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Donate to OWASP ZSC''' {{#widget:PayPal Donation |target=_blank |budget=OWASP ZSC }}&lt;br /&gt;
&lt;br /&gt;
====What is OWASP ZSC ?====&lt;br /&gt;
http://zsc.z3r0d4y.com/images/Snapshot_2015-07-26_191951-half.png&lt;br /&gt;
&lt;br /&gt;
'''OWASP ZSC''' is an open source software in Python language which lets you '''generate customized shellcodes''' and '''convert scripts to an obfuscated script'''. This software can be run on Windows/Linux/OSX under Python.&lt;br /&gt;
&lt;br /&gt;
[[File:Zsc1.png|200px]]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
====Usage of shellcodes====&lt;br /&gt;
&lt;br /&gt;
Shellcodes are small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malwares, bypassing antiviruses, obfuscated codes and etc.&lt;br /&gt;
&lt;br /&gt;
====DISCLAIMER====&lt;br /&gt;
This tool is related to IT, Hacking, Programming and Computer|Network|Software Security. The word “Hack”, &amp;quot;Pen testing&amp;quot;,“Hacking” that is used on these project pages shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively. This is not a tool that provides any illegal information.We do not promote hacking or software cracking. All the information provided on these pages is for educational purposes only.&lt;br /&gt;
&lt;br /&gt;
The authors of this tool are not responsible for any misuse of the information.You shall not misuse the information to gain unauthorized access and/or write malicious programs.This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.You may try all of these techniques on your own computer at your own risk.Performing any hack attempts/tests without written permission from the owner of the computer system is illegal.&lt;br /&gt;
&lt;br /&gt;
IN NO EVENT SHALL THE CREATORS, OWNER, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.&lt;br /&gt;
&lt;br /&gt;
====Usage of Obfuscate Codes====&lt;br /&gt;
&lt;br /&gt;
Can be used for bypassing antiviruses, code protections, same stuff etc … &lt;br /&gt;
&lt;br /&gt;
====Why use OWASP ZSC ?====&lt;br /&gt;
&lt;br /&gt;
Another good reason for obfuscating files or generating shellcode with ZSC is that it can be used during your pen-testing. Malicious hackers use these techniques to bypass anti-virus and load malicious files in systems they have hacked using customized shellcode generators.&lt;br /&gt;
Anti-virus work with signatures in order to identify harmful files. When using very well known encoders such as msfvenom, files generated by this program might be already flagged by Anti-virus programs.&lt;br /&gt;
&lt;br /&gt;
Our purpose is not to provide a way to bypass anti-virus with malicious intentions, instead, we want to provide pen-testers a way to challenge the security provided by Anti-virus programs and Intrusion Detection systems during a pen test.In this way, they can verify the security just as a black-hat will do.&lt;br /&gt;
&lt;br /&gt;
According to other shellcode generators same as Metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won't detect.&lt;br /&gt;
OWASP ZSC encoders are able to generate shell codes with random encodes and that allows you to generate thousands of new dynamic shellcodes with the same job in just a second, that means, you will not get the same code if you use random encodes with same commands, And that make OWASP ZSC one of the best! &lt;br /&gt;
During the Google Summer of Code we are working on to generate Windows Shellcode and new obfuscation methods.&lt;br /&gt;
We are working on the next version that will allow you to generate OSX.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
====GNU GENERAL PUBLIC LICENSE , Version 3, 29 June 2007====&lt;br /&gt;
&lt;br /&gt;
Copyright (C) 2007 Free Software Foundation, Inc. http://fsf.org/ Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [https://github.com/Ali-Razmjoo/OWASP-ZSC/blob/master/LICENSE.md Click to see the full license]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact it is encouraged!!!&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ali_Razmjoo Ali Razmjoo]&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Johanna_Curiel Johanna Curiel]&lt;br /&gt;
&lt;br /&gt;
== Contributors &amp;amp; Main Developers ==&lt;br /&gt;
&lt;br /&gt;
* [http://pratikpatelp.blogspot.in Pratik Patel] (Google Summer of Code student 2016) &lt;br /&gt;
* [https://codemaxx.github.io Akash Trehan] (CodeMaxx)&lt;br /&gt;
* [https://paraschetal.in Paras Chetal] (Gsoc candidate 2016)&lt;br /&gt;
* Brian Beaudry (Gsoc Mentor 2016)&lt;br /&gt;
* Hamid Zamani (HAMIDx9)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [http://api.z3r0d4y.com/ API]&lt;br /&gt;
* [https://github.com/Ali-Razmjoo/OWASP-ZSC Project on Github]&lt;br /&gt;
* [https://groups.google.com/d/forum/owasp-zsc Mailing List]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/ OWASP ZSC Home]&lt;br /&gt;
* [https://www.openhub.net/p/OWASP-ZSC OpenHub]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/table.html Last Version Features]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/wiki Wiki]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/download Download]&lt;br /&gt;
* [https://github.com/Ali-Razmjoo/ZCR-Shellcoder-Archive Archive]&lt;br /&gt;
&lt;br /&gt;
== Shellcode Generating ==&lt;br /&gt;
With using '''OWASP ZSC''' you would be able to generate any customized '''Shellcode''' in your mind including encodes and Disassembly code in few seconds.&lt;br /&gt;
&lt;br /&gt;
== Be an OWASP ZSC developer ==&lt;br /&gt;
* [https://www.owasp.org/index.php?title=OWASP_ZSC_Tool_Project&amp;amp;action=submit#Developers Quick Developing Help]&lt;br /&gt;
&lt;br /&gt;
== Last Tricks in Home ==&lt;br /&gt;
* [http://zsc.z3r0d4y.com/blog/archives/ All Tricks]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/blog/2015/08/01/generate-pe-file-with-zsc-shellcodes/ Shellcode to PE File]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/blog/2015/07/27/video-how-to-install-and-generate-shellcode-using-zsc/ Video: Install&amp;amp;Generate Shellcode]&lt;br /&gt;
&lt;br /&gt;
==Related links==&lt;br /&gt;
*[https://www.youtube.com/watch?v=nkx0HQhYdmY| Appsec Presentation 2013 Beef and Custome shellcodes]&lt;br /&gt;
*[https://www.owasp.org/index.php/File:Introduction_to_shellcode_development.pdf| Introduction to Shellcode Development]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zscproject/OWASP-ZSC Github Page.]&lt;br /&gt;
&lt;br /&gt;
[http://zsc.z3r0d4y.com/download/ Download Page.]&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zscproject/OWASP-ZSC/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/zscproject/OWASP-ZSC/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [https://www.owasp.org/index.php/Iran#tab=Past_Events OWASP Nettacker Presented By Ali Razmjoo in OWASP Iran Chapter Meeting July 2018]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Code_Sprint_2017#OWASP_ZSC OWASP ZSC in OWASP Code Sprint 2017]&lt;br /&gt;
* [http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/ OWASP ZSC Selected as Top 10 Security tools in 2016 By ToolsWatch]&lt;br /&gt;
* [https://groups.google.com/forum/#!topic/owasp-zsc/t12M2fxn78k OWASP ZSC Presented in OFFSECONF 2016]&lt;br /&gt;
* [https://www.blackhat.com/eu-16/arsenal.html#brian-beaudry Been Selected for Blackhat EU Arsenal 2016]&lt;br /&gt;
* [https://www.defcon.org/html/defcon-24/dc-24-demolabs.html#Curiel  OWASP ZSC has been selected for Defcon Demo Lab 2016]&lt;br /&gt;
* [https://summerofcode.withgoogle.com/archive/2016/projects/5969824152813568/ OWASP ZSC applied and was selected to participate in the Google Summer of Code 2016]&lt;br /&gt;
* [https://www.linkedin.com/pulse/lessons-from-cyber-underworld-how-understand-software-ali-razmjoo Press Release 12th February 2015 ]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/ OWASP ZSC Version 1.0.9.1 Released!]&lt;br /&gt;
* [https://github.com/longld/peda OWASP ZSC in GDB-PEDA]&lt;br /&gt;
&lt;br /&gt;
== Docs ==&lt;br /&gt;
* [https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc Developers and Users Documents].&lt;br /&gt;
* [http://zsc.z3r0d4y.com/ OWASP ZSC Home]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
To see full guides please visit our [http://zsc.z3r0d4y.com/wiki wiki page].&lt;br /&gt;
&lt;br /&gt;
====Help Menu====&lt;br /&gt;
&lt;br /&gt;
'''PLEASE CLICK [https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc HERE] TO SEE FULL DEVELOPERS AND USERS DOCUMENTS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======OWASP ZSC Project======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in Python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Usage of shellcodes======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Shellcodes are small codes in Assembly Languagewhich could be used as the payload in software exploiting. Other usages are in malwares, bypassing anti viruses, obfuscated codes and etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Usage of Obfuscate Codes======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Can be used for bypassing antiviruses, code protections, same stuff etc … &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Why use OWASP ZSC ?======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
According to other shellcode generators such as Metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won't detect. OWASP ZSC encoders are able to generate shell codes with random encodes that allows you to generate thousands of new dynamic shell codes with the same job in just a second, it means you will not get the same code if you use random encodes with the same commands, and that makes OWASP ZSC one of the best! &lt;br /&gt;
OWASP ZSC can generate shellcode for Linux and Windows _x86&lt;br /&gt;
Upcoming features will allow generating shellcodes for OSX &lt;br /&gt;
And new encodes for the code obfuscation.&lt;br /&gt;
&lt;br /&gt;
======User Guides======&lt;br /&gt;
&lt;br /&gt;
To run '''OWASP ZSC''', You need to install python `2.x|3.x` on your operation system `Windows|Linux|OSX`, Then it could be run directly with executing `zsc.py` or run the software after you installed it! To see the user manuals, Please follow the next steps!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Generating Shellcode======&lt;br /&gt;
&lt;br /&gt;
Via `zsc` command, you are able to enter the software [or run python zsc.py if you don’t want to install it], Then you can have a list of menu with entering `help`. You can have your choices with pressing `tab` key on each step. To generate shellcode, you have to type `shellcode` and then press enter, after that, you can see what’s available in `shellcode` section. There is `generate` , `search` and `download` choices in here which use for `generate shellcodes`, `search` and `download` shellcode from shellstorm.  To generate a shellcode, type `generate` and press enter, after that with a `tab` key, you can have list of operation systems available in there. With pressing `tab` key again, functions will be shown for you in this step [ such as `exec` ,`systm`,`write` and `etc`]. choose your function by writing the name `example: exec` and press inter. In the next section you have to fill the argv of function which exec() function have one `example: exec(&amp;quot;/bin/bash&amp;quot;)`, all you need in this section is pressing a `tab` and then `enter` key, software will automatically ask you for function argv. Fill them and next section software will ask you for shellcode type which can be `none` or choose one of listed encoding types. After entering that, your shellcode is ready!&lt;br /&gt;
There is one more way to have a shellcode from software, which is using shellstorm API. Following the `shellcode`, and then `search` commands to search for a shellcode. After that shellcodes will be listed for you with title name , ID and etc. you can download them with  following `shellcode` and then `download` command to download them with the ID which shown to you in the past section! For canceling each section, you can use `restart` command to restart the software and start new task!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Generating Obfuscate Code======&lt;br /&gt;
&lt;br /&gt;
With the following `obfuscate` command, you can begin the step for obfuscating a code. With a `tab` key , you can see the list of languages along with the obfuscating module ready. After choosing the language software will ask you for a filename which is a filename of file you want to obfuscate that! Next step software will ask you for encode type. With a `tab` key list the encode modules and choose your encode name. your file rewrited and converted to a obfuscate with encode type you chosen. And do not worry about your original code, it’s saved in file as a comment!&lt;br /&gt;
&lt;br /&gt;
Please click '''[https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc HERE]''' to read more!&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
Go to download page, and download last version in github. Extract and run installer.py, then you are able to run software with OWASP ZSC command or you can directly execute zsc.py without installing it.or you can follow these commands to install the last version:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;lt;nowiki&amp;gt;wget https://github.com/Ali-Razmjoo/OWASP-ZSC/archive/master.zip -O owasp-zsc.zip &amp;amp;&amp;amp; unzip owasp-zsc.zip &amp;amp;&amp;amp; &lt;br /&gt;
rm -rf owasp-zsc.zip &amp;amp;&amp;amp; mv OWASP-ZSC-master owasp-zsc &amp;amp;&amp;amp; cd owasp-zsc &amp;amp;&amp;amp; python installer.py&amp;lt;/nowiki&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://zsc.z3r0d4y.com/images/Snapshot_2015-07-27_114843.png&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Note''': Software could be '''uninstall''' with executing '''uninstaller.py'''&lt;br /&gt;
&lt;br /&gt;
'''Note''': Software installation directory is &amp;quot;'''/usr/share/owasp-zsc'''&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Note''': &amp;lt;strong&amp;gt;OWASP ZSC&amp;lt;/strong&amp;gt; Tool could be execute on &amp;lt;strong&amp;gt;Linux&amp;lt;/strong&amp;gt; and &amp;lt;strong&amp;gt;Python 2.7.x &amp;lt;/strong&amp;gt;is required.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;August, 2016, the highest priorities for the next one year&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Develop future [http://zsc.z3r0d4y.com/table.html features] list , Add Operation Systems and new encode types&lt;br /&gt;
* Planing for activate features&lt;br /&gt;
* Build ZSC API&lt;br /&gt;
* Find developers to get better performance, quality, optimizing and best improvement in minimum possible time&lt;br /&gt;
* Get other people to review the ZSC Tool Project provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project and the features&lt;br /&gt;
* Keep test, developing and updating with best new methods&lt;br /&gt;
* Build and update documents in several languages for developers/users guiding &lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
OWASP ZSC could be improving with handling module [http://zsc.z3r0d4y.com/table.html features]. MVP of this project is build and active the first module which could be usable to generate/encode Shellcode which already some of them [modules] activated.&lt;br /&gt;
&lt;br /&gt;
Highest usage of OWASP ZSC Tool could be when users are able to use all [http://zsc.z3r0d4y.com/table.html features] with best User Interface and &amp;lt;strong&amp;gt;API&amp;lt;/strong&amp;gt; performance.&lt;br /&gt;
https://www.owasp.org/images/3/33/Zsc.png&lt;br /&gt;
&lt;br /&gt;
= Developers =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Developers==&lt;br /&gt;
Architect &amp;amp; Creator: Ali Razmjoo&lt;br /&gt;
* Pratik Patel (Google Summer of Code student 2016)&lt;br /&gt;
* Akash Trehan (CodeMaxx)&lt;br /&gt;
* Paras Chetal (Google Summer of Code candidate 2016)&lt;br /&gt;
* Hamid Samani (HAMIDx9)&lt;br /&gt;
&lt;br /&gt;
==Testers ==&lt;br /&gt;
*Johanna Curiel&lt;br /&gt;
*Brian Beaudry&lt;br /&gt;
&lt;br /&gt;
===Be an OWASP ZSC developer===&lt;br /&gt;
&lt;br /&gt;
Developers can add new features and if you don’t have an idea but like to develop, you can submit the issue, which software needs to be fix/add/done in [https://github.com/zscproject/OWASP-ZSC/issues HERE].&lt;br /&gt;
&lt;br /&gt;
After fix/add or develop something, please send your pull request and remember that your code must be compatible with python2 and python3.&lt;br /&gt;
If you have any question you can open an issue or just [mailto:owasp-zsc-tool-project@lists.owasp.org mail us]. do not forget to register on our [https://lists.owasp.org/mailman/listinfo/owasp-zsc-tool-project mailing list].&lt;br /&gt;
&lt;br /&gt;
'''AND DON'T FORGET TO READ [https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc DEVELOPERS DOCUMENTS]'''&lt;br /&gt;
&lt;br /&gt;
Also this [https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details GitBook]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_ZSC_Tool_Project}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]]  [[Category:OWASP_Code]] [[Category:OWASP_Tool]] [[Category:OWASP_Download]] [[Category:Shellcode]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ZSC_Tool_Project&amp;diff=242515</id>
		<title>OWASP ZSC Tool Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ZSC_Tool_Project&amp;diff=242515"/>
				<updated>2018-08-14T19:23:57Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: event&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ZSC Tool Project==&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Donate to OWASP ZSC''' {{#widget:PayPal Donation |target=_blank |budget=OWASP ZSC }}&lt;br /&gt;
&lt;br /&gt;
====What is OWASP ZSC ?====&lt;br /&gt;
http://zsc.z3r0d4y.com/images/Snapshot_2015-07-26_191951-half.png&lt;br /&gt;
&lt;br /&gt;
'''OWASP ZSC''' is an open source software in Python language which lets you '''generate customized shellcodes''' and '''convert scripts to an obfuscated script'''. This software can be run on Windows/Linux/OSX under Python.&lt;br /&gt;
&lt;br /&gt;
[[File:Zsc1.png|200px]]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
====Usage of shellcodes====&lt;br /&gt;
&lt;br /&gt;
Shellcodes are small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malwares, bypassing antiviruses, obfuscated codes and etc.&lt;br /&gt;
&lt;br /&gt;
====DISCLAIMER====&lt;br /&gt;
This tool is related to IT, Hacking, Programming and Computer|Network|Software Security. The word “Hack”, &amp;quot;Pen testing&amp;quot;,“Hacking” that is used on these project pages shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively. This is not a tool that provides any illegal information.We do not promote hacking or software cracking. All the information provided on these pages is for educational purposes only.&lt;br /&gt;
&lt;br /&gt;
The authors of this tool are not responsible for any misuse of the information.You shall not misuse the information to gain unauthorized access and/or write malicious programs.This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.You may try all of these techniques on your own computer at your own risk.Performing any hack attempts/tests without written permission from the owner of the computer system is illegal.&lt;br /&gt;
&lt;br /&gt;
IN NO EVENT SHALL THE CREATORS, OWNER, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.&lt;br /&gt;
&lt;br /&gt;
====Usage of Obfuscate Codes====&lt;br /&gt;
&lt;br /&gt;
Can be used for bypassing antiviruses, code protections, same stuff etc … &lt;br /&gt;
&lt;br /&gt;
====Why use OWASP ZSC ?====&lt;br /&gt;
&lt;br /&gt;
Another good reason for obfuscating files or generating shellcode with ZSC is that it can be used during your pen-testing. Malicious hackers use these techniques to bypass anti-virus and load malicious files in systems they have hacked using customized shellcode generators.&lt;br /&gt;
Anti-virus work with signatures in order to identify harmful files. When using very well known encoders such as msfvenom, files generated by this program might be already flagged by Anti-virus programs.&lt;br /&gt;
&lt;br /&gt;
Our purpose is not to provide a way to bypass anti-virus with malicious intentions, instead, we want to provide pen-testers a way to challenge the security provided by Anti-virus programs and Intrusion Detection systems during a pen test.In this way, they can verify the security just as a black-hat will do.&lt;br /&gt;
&lt;br /&gt;
According to other shellcode generators same as Metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won't detect.&lt;br /&gt;
OWASP ZSC encoders are able to generate shell codes with random encodes and that allows you to generate thousands of new dynamic shellcodes with the same job in just a second, that means, you will not get the same code if you use random encodes with same commands, And that make OWASP ZSC one of the best! &lt;br /&gt;
During the Google Summer of Code we are working on to generate Windows Shellcode and new obfuscation methods.&lt;br /&gt;
We are working on the next version that will allow you to generate OSX.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
====GNU GENERAL PUBLIC LICENSE , Version 3, 29 June 2007====&lt;br /&gt;
&lt;br /&gt;
Copyright (C) 2007 Free Software Foundation, Inc. http://fsf.org/ Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [https://github.com/Ali-Razmjoo/OWASP-ZSC/blob/master/LICENSE.md Click to see the full license]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact it is encouraged!!!&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ali_Razmjoo Ali Razmjoo]&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Johanna_Curiel Johanna Curiel]&lt;br /&gt;
&lt;br /&gt;
== Contributors &amp;amp; Main Developers ==&lt;br /&gt;
&lt;br /&gt;
* [http://pratikpatelp.blogspot.in Pratik Patel] (Google Summer of Code student 2016) &lt;br /&gt;
* [https://codemaxx.github.io Akash Trehan] (CodeMaxx)&lt;br /&gt;
* [https://paraschetal.in Paras Chetal] (Gsoc candidate 2016)&lt;br /&gt;
* Brian Beaudry (Gsoc Mentor 2016)&lt;br /&gt;
* Hamid Zamani (HAMIDx9)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [http://api.z3r0d4y.com/ API]&lt;br /&gt;
* [https://github.com/Ali-Razmjoo/OWASP-ZSC Project on Github]&lt;br /&gt;
* [https://groups.google.com/d/forum/owasp-zsc Mailing List]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/ OWASP ZSC Home]&lt;br /&gt;
* [https://www.openhub.net/p/OWASP-ZSC OpenHub]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/table.html Last Version Features]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/wiki Wiki]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/download Download]&lt;br /&gt;
* [https://github.com/Ali-Razmjoo/ZCR-Shellcoder-Archive Archive]&lt;br /&gt;
&lt;br /&gt;
== Shellcode Generating ==&lt;br /&gt;
With using '''OWASP ZSC''' you would be able to generate any customized '''Shellcode''' in your mind including encodes and Disassembly code in few seconds.&lt;br /&gt;
&lt;br /&gt;
== Be an OWASP ZSC developer ==&lt;br /&gt;
* [https://www.owasp.org/index.php?title=OWASP_ZSC_Tool_Project&amp;amp;action=submit#Developers Quick Developing Help]&lt;br /&gt;
&lt;br /&gt;
== Last Tricks in Home ==&lt;br /&gt;
* [http://zsc.z3r0d4y.com/blog/archives/ All Tricks]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/blog/2015/08/01/generate-pe-file-with-zsc-shellcodes/ Shellcode to PE File]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/blog/2015/07/27/video-how-to-install-and-generate-shellcode-using-zsc/ Video: Install&amp;amp;Generate Shellcode]&lt;br /&gt;
&lt;br /&gt;
==Related links==&lt;br /&gt;
*[https://www.youtube.com/watch?v=nkx0HQhYdmY| Appsec Presentation 2013 Beef and Custome shellcodes]&lt;br /&gt;
*[https://www.owasp.org/index.php/File:Introduction_to_shellcode_development.pdf| Introduction to Shellcode Development]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zscproject/OWASP-ZSC Github Page.]&lt;br /&gt;
&lt;br /&gt;
[http://zsc.z3r0d4y.com/download/ Download Page.]&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zscproject/OWASP-ZSC/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/zscproject/OWASP-ZSC/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* OWASP Nettacker Presented By Ali Razmjoo in OWASP Iran Chapter Meeting July 2018 [https://www.owasp.org/index.php/Iran#tab=Past_Events 1]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Code_Sprint_2017#OWASP_ZSC OWASP ZSC in OWASP Code Sprint 2017]&lt;br /&gt;
* [http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/ OWASP ZSC Selected as Top 10 Security tools in 2016 By ToolsWatch]&lt;br /&gt;
* [https://groups.google.com/forum/#!topic/owasp-zsc/t12M2fxn78k OWASP ZSC Presented in OFFSECONF 2016]&lt;br /&gt;
* [https://www.blackhat.com/eu-16/arsenal.html#brian-beaudry Been Selected for Blackhat EU Arsenal 2016]&lt;br /&gt;
* [https://www.defcon.org/html/defcon-24/dc-24-demolabs.html#Curiel  OWASP ZSC has been selected for Defcon Demo Lab 2016]&lt;br /&gt;
* [https://summerofcode.withgoogle.com/archive/2016/projects/5969824152813568/ OWASP ZSC applied and was selected to participate in the Google Summer of Code 2016]&lt;br /&gt;
* [https://www.linkedin.com/pulse/lessons-from-cyber-underworld-how-understand-software-ali-razmjoo Press Release 12th February 2015 ]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/ OWASP ZSC Version 1.0.9.1 Released!]&lt;br /&gt;
* [https://github.com/longld/peda OWASP ZSC in GDB-PEDA]&lt;br /&gt;
&lt;br /&gt;
== Docs ==&lt;br /&gt;
* [https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc Developers and Users Documents].&lt;br /&gt;
* [http://zsc.z3r0d4y.com/ OWASP ZSC Home]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
To see full guides please visit our [http://zsc.z3r0d4y.com/wiki wiki page].&lt;br /&gt;
&lt;br /&gt;
====Help Menu====&lt;br /&gt;
&lt;br /&gt;
'''PLEASE CLICK [https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc HERE] TO SEE FULL DEVELOPERS AND USERS DOCUMENTS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======OWASP ZSC Project======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in Python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Usage of shellcodes======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Shellcodes are small codes in Assembly Languagewhich could be used as the payload in software exploiting. Other usages are in malwares, bypassing anti viruses, obfuscated codes and etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Usage of Obfuscate Codes======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Can be used for bypassing antiviruses, code protections, same stuff etc … &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Why use OWASP ZSC ?======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
According to other shellcode generators such as Metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won't detect. OWASP ZSC encoders are able to generate shell codes with random encodes that allows you to generate thousands of new dynamic shell codes with the same job in just a second, it means you will not get the same code if you use random encodes with the same commands, and that makes OWASP ZSC one of the best! &lt;br /&gt;
OWASP ZSC can generate shellcode for Linux and Windows _x86&lt;br /&gt;
Upcoming features will allow generating shellcodes for OSX &lt;br /&gt;
And new encodes for the code obfuscation.&lt;br /&gt;
&lt;br /&gt;
======User Guides======&lt;br /&gt;
&lt;br /&gt;
To run '''OWASP ZSC''', You need to install python `2.x|3.x` on your operation system `Windows|Linux|OSX`, Then it could be run directly with executing `zsc.py` or run the software after you installed it! To see the user manuals, Please follow the next steps!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Generating Shellcode======&lt;br /&gt;
&lt;br /&gt;
Via `zsc` command, you are able to enter the software [or run python zsc.py if you don’t want to install it], Then you can have a list of menu with entering `help`. You can have your choices with pressing `tab` key on each step. To generate shellcode, you have to type `shellcode` and then press enter, after that, you can see what’s available in `shellcode` section. There is `generate` , `search` and `download` choices in here which use for `generate shellcodes`, `search` and `download` shellcode from shellstorm.  To generate a shellcode, type `generate` and press enter, after that with a `tab` key, you can have list of operation systems available in there. With pressing `tab` key again, functions will be shown for you in this step [ such as `exec` ,`systm`,`write` and `etc`]. choose your function by writing the name `example: exec` and press inter. In the next section you have to fill the argv of function which exec() function have one `example: exec(&amp;quot;/bin/bash&amp;quot;)`, all you need in this section is pressing a `tab` and then `enter` key, software will automatically ask you for function argv. Fill them and next section software will ask you for shellcode type which can be `none` or choose one of listed encoding types. After entering that, your shellcode is ready!&lt;br /&gt;
There is one more way to have a shellcode from software, which is using shellstorm API. Following the `shellcode`, and then `search` commands to search for a shellcode. After that shellcodes will be listed for you with title name , ID and etc. you can download them with  following `shellcode` and then `download` command to download them with the ID which shown to you in the past section! For canceling each section, you can use `restart` command to restart the software and start new task!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Generating Obfuscate Code======&lt;br /&gt;
&lt;br /&gt;
With the following `obfuscate` command, you can begin the step for obfuscating a code. With a `tab` key , you can see the list of languages along with the obfuscating module ready. After choosing the language software will ask you for a filename which is a filename of file you want to obfuscate that! Next step software will ask you for encode type. With a `tab` key list the encode modules and choose your encode name. your file rewrited and converted to a obfuscate with encode type you chosen. And do not worry about your original code, it’s saved in file as a comment!&lt;br /&gt;
&lt;br /&gt;
Please click '''[https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc HERE]''' to read more!&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
Go to download page, and download last version in github. Extract and run installer.py, then you are able to run software with OWASP ZSC command or you can directly execute zsc.py without installing it.or you can follow these commands to install the last version:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;lt;nowiki&amp;gt;wget https://github.com/Ali-Razmjoo/OWASP-ZSC/archive/master.zip -O owasp-zsc.zip &amp;amp;&amp;amp; unzip owasp-zsc.zip &amp;amp;&amp;amp; &lt;br /&gt;
rm -rf owasp-zsc.zip &amp;amp;&amp;amp; mv OWASP-ZSC-master owasp-zsc &amp;amp;&amp;amp; cd owasp-zsc &amp;amp;&amp;amp; python installer.py&amp;lt;/nowiki&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://zsc.z3r0d4y.com/images/Snapshot_2015-07-27_114843.png&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Note''': Software could be '''uninstall''' with executing '''uninstaller.py'''&lt;br /&gt;
&lt;br /&gt;
'''Note''': Software installation directory is &amp;quot;'''/usr/share/owasp-zsc'''&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Note''': &amp;lt;strong&amp;gt;OWASP ZSC&amp;lt;/strong&amp;gt; Tool could be execute on &amp;lt;strong&amp;gt;Linux&amp;lt;/strong&amp;gt; and &amp;lt;strong&amp;gt;Python 2.7.x &amp;lt;/strong&amp;gt;is required.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;August, 2016, the highest priorities for the next one year&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Develop future [http://zsc.z3r0d4y.com/table.html features] list , Add Operation Systems and new encode types&lt;br /&gt;
* Planing for activate features&lt;br /&gt;
* Build ZSC API&lt;br /&gt;
* Find developers to get better performance, quality, optimizing and best improvement in minimum possible time&lt;br /&gt;
* Get other people to review the ZSC Tool Project provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project and the features&lt;br /&gt;
* Keep test, developing and updating with best new methods&lt;br /&gt;
* Build and update documents in several languages for developers/users guiding &lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
OWASP ZSC could be improving with handling module [http://zsc.z3r0d4y.com/table.html features]. MVP of this project is build and active the first module which could be usable to generate/encode Shellcode which already some of them [modules] activated.&lt;br /&gt;
&lt;br /&gt;
Highest usage of OWASP ZSC Tool could be when users are able to use all [http://zsc.z3r0d4y.com/table.html features] with best User Interface and &amp;lt;strong&amp;gt;API&amp;lt;/strong&amp;gt; performance.&lt;br /&gt;
https://www.owasp.org/images/3/33/Zsc.png&lt;br /&gt;
&lt;br /&gt;
= Developers =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Developers==&lt;br /&gt;
Architect &amp;amp; Creator: Ali Razmjoo&lt;br /&gt;
* Pratik Patel (Google Summer of Code student 2016)&lt;br /&gt;
* Akash Trehan (CodeMaxx)&lt;br /&gt;
* Paras Chetal (Google Summer of Code candidate 2016)&lt;br /&gt;
* Hamid Samani (HAMIDx9)&lt;br /&gt;
&lt;br /&gt;
==Testers ==&lt;br /&gt;
*Johanna Curiel&lt;br /&gt;
*Brian Beaudry&lt;br /&gt;
&lt;br /&gt;
===Be an OWASP ZSC developer===&lt;br /&gt;
&lt;br /&gt;
Developers can add new features and if you don’t have an idea but like to develop, you can submit the issue, which software needs to be fix/add/done in [https://github.com/zscproject/OWASP-ZSC/issues HERE].&lt;br /&gt;
&lt;br /&gt;
After fix/add or develop something, please send your pull request and remember that your code must be compatible with python2 and python3.&lt;br /&gt;
If you have any question you can open an issue or just [mailto:owasp-zsc-tool-project@lists.owasp.org mail us]. do not forget to register on our [https://lists.owasp.org/mailman/listinfo/owasp-zsc-tool-project mailing list].&lt;br /&gt;
&lt;br /&gt;
'''AND DON'T FORGET TO READ [https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc DEVELOPERS DOCUMENTS]'''&lt;br /&gt;
&lt;br /&gt;
Also this [https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details GitBook]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_ZSC_Tool_Project}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]]  [[Category:OWASP_Code]] [[Category:OWASP_Tool]] [[Category:OWASP_Download]] [[Category:Shellcode]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=242511</id>
		<title>OWASP Nettacker</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=242511"/>
				<updated>2018-08-14T19:15:05Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: add contributors link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker Project==&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Donate to OWASP Nettacker''' {{#widget:PayPal Donation |target=_blank |budget=OWASP Nettacker }}&lt;br /&gt;
====What is OWASP Nettacker ?====&lt;br /&gt;
https://www.owasp.org/images/1/1a/Nettacker_Demp.png&lt;br /&gt;
&lt;br /&gt;
'''OWASP Nettacker''' is an open source software in Python language which lets you '''automated penetration testing''' and '''automated Information Gathering'''. This software can be run on Windows/Linux/OSX under Python.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Nettacker project was created to automated for information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and information. This software is able to use SYN, ACK, TCP, ICMP and many other protocols to detect and bypass the Firewalls/IDS/IPS and devices. By using a unique solution in Nettacker to find protected services such as SCADA We could make a point to be one of the bests of scanners.&lt;br /&gt;
&lt;br /&gt;
====DISCLAIMER====&lt;br /&gt;
This tool is related to IT, Hacking, Programming, and Computer|Network|Software Security. The word “Hack”, &amp;quot;Pen testing&amp;quot;,“Hacking” that is used on these project pages shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively. This is not a tool that provides any illegal information.We do not promote hacking or software cracking. All the information provided on these pages is for educational purposes only.&lt;br /&gt;
&lt;br /&gt;
The authors of this tool are not responsible for any misuse of the information.You shall not misuse the information to gain unauthorized access and/or write malicious programs.This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.You may try all of these techniques on your own computer at your own risk.Performing any hack attempts/tests without written permission from the owner of the computer system is illegal.&lt;br /&gt;
&lt;br /&gt;
IN NO EVENT SHALL THE CREATORS, OWNER, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Features ====&lt;br /&gt;
&lt;br /&gt;
'''IoT Scanner'''&amp;lt;br&amp;gt;&lt;br /&gt;
Python Multi-Thread &amp;amp; Multi Process Network Information Gathering Vulnerability Scanner&amp;lt;br&amp;gt;&lt;br /&gt;
Service and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and much more… )&amp;lt;br&amp;gt;&lt;br /&gt;
Network Service Analysis&amp;lt;br&amp;gt;&lt;br /&gt;
Services Brute Force Testing&amp;lt;br&amp;gt;&lt;br /&gt;
Services Vulnerability Testing&amp;lt;br&amp;gt;&lt;br /&gt;
HTTP/HTTPS Crawling, Fuzzing, Information Gathering and …&amp;lt;br&amp;gt;&lt;br /&gt;
HTML and Text Outputs&amp;lt;br&amp;gt;&lt;br /&gt;
This project is at the moment in research and development phase and most of results/codes are not published yet.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
====Apache License Version 2.0, January 2004====&lt;br /&gt;
&lt;br /&gt;
The OWASP Nettacker is free to use and is licensed under the Apache 2 License. [https://github.com/zdresearch/OWASP-Nettacker/blob/master/LICENSE Click to see the full license]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact, it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders &amp;amp; Mentors &amp;amp; Contributors ==&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Mohammad Reza Espargham]&lt;br /&gt;
* [mailto:johanna.curiel@owasp.org Johanna Curiel]&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi Afooshteh]&lt;br /&gt;
* [mailto:sriharsha.g15@ii Sri Harsha Gajavalli]&lt;br /&gt;
* [mailto:bran0793@umn.edu Hannah Brand]&lt;br /&gt;
* [mailto:shaddygarg1@gmail.com Shaddy Garg]&lt;br /&gt;
* [mailto:pradeepjairamani22@gmail.com Pradeep Jairamani]&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mr.zamiri@ieee.org Mohammad Reza Zamiri]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* Click for [https://github.com/zdresearch/OWASP-Nettacker/wiki/Contributors FULL LIST]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker on Github]&lt;br /&gt;
* [https://groups.google.com/forum/#!forum/owasp-nettacker Mailing List]&lt;br /&gt;
* [http://nettacker.z3r0d4y.com/ OWASP Nettacker Home]&lt;br /&gt;
&lt;br /&gt;
== Be an OWASP Nettacker Developer ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Nettacker#Developers Quick Developing Help]&lt;br /&gt;
&lt;br /&gt;
==Related links==&lt;br /&gt;
*[https://github.com/zdresearch/OWASP-Nettacker Github]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zdresearch/OWASP-Nettacker Github Page.]&lt;br /&gt;
&lt;br /&gt;
[Download Page.]&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/wiki/Events ALL EVENTS AND NEWS]&lt;br /&gt;
&lt;br /&gt;
== Docs ==&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/wiki Wiki].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
To see full guides please visit our [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
You can install OWASP Nettacker by using pip install -r requirements.txt &amp;amp;&amp;amp; python setup.py install. In the feature, you will be able to install this tools from PyPi library by pip install OWASP-Nettacker (It's not available yet!). After the installation, you can run the software by using the nettacker command line on Windows, Mac OS X, Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;October, 2017, the highest priorities for the next one year&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Planning for activating features&lt;br /&gt;
* Build Nettacker API&lt;br /&gt;
* Find developers to get better performance, quality, optimizing and best improvement in minimum possible time&lt;br /&gt;
* Get other people to review the OWASP Nettacker Project provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Project and the features&lt;br /&gt;
* Keep test, developing and updating with best new methods&lt;br /&gt;
* Build and update documents in several languages for developers/users guiding &lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Developers =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Be an OWASP Nettacker developer===&lt;br /&gt;
&lt;br /&gt;
Developers can add new features and if you don’t have an idea but like to develop, you can submit the issue, which software needs to be fix/add/done in [https://github.com/zdresearch/OWASP-Nettacker/issues HERE].&lt;br /&gt;
&lt;br /&gt;
After fix/add or develop something, please send your pull request and remember that your code must be compatible with python2 and python3.&lt;br /&gt;
If you have any question you can open an issue or just [mailto:owasp-nettacker@googlegroups.com mail us]. do not forget to register on our [https://groups.google.com/forum/#!forum/owasp-nettacker mailing list].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Nettacker_About_Page}}&lt;br /&gt;
&lt;br /&gt;
Please check the project [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki] on Github.&lt;br /&gt;
&lt;br /&gt;
[[File:2018-01-19 0-45-07.gif|OWASP Nettacker Demo]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Code]] &lt;br /&gt;
[[Category:OWASP_Tool]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:Shellcode]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Iran&amp;diff=242509</id>
		<title>Iran</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Iran&amp;diff=242509"/>
				<updated>2018-08-14T19:09:53Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Chapter Information =&lt;br /&gt;
{{Chapter Template|chaptername=Iran|extra=The chapter leaders are [mailto:abiusx@owasp.org Abbas Naderi], [mailto:Ali.Razmjoo@owasp.org Ali Ramjoo] and [mailto:Reza.Espargham@owasp.org MohammadReza Espargham].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-iran|emailarchives=http://lists.owasp.org/pipermail/owasp-iran}}&lt;br /&gt;
&lt;br /&gt;
== Incoming Events ==&lt;br /&gt;
OWASP Iran Chapter Meeting (Public Meeting) 2018 - (Details will be published soon)&lt;br /&gt;
&lt;br /&gt;
=Membership=&lt;br /&gt;
== Sponsorship/Membership  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Btn_donate_SM.gif|link=http://www.regonline.com/donation_1044369]] to this chapter or become a local chapter supporter.&lt;br /&gt;
&lt;br /&gt;
Or consider the value of [[Membership | Individual, Corporate, or Academic Supporter membership]]. Ready to become a member? [[Image:Join_Now_BlueIcon.JPG|75px|link=https://myowasp.force.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Chapter News =&lt;br /&gt;
&lt;br /&gt;
==Sponsorship/Membership==&lt;br /&gt;
After months of exhaustive work, a new membership approach is available for Iranians. Check the membership tab.&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting ==&lt;br /&gt;
The next chapter meeting would be in upcoming month. More information in the mailing list and here alter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Active Projects =&lt;br /&gt;
== OWASP Nettacker ==&lt;br /&gt;
'''[https://www.owasp.org/index.php/OWASP_Nettacker OWASP Nettacker]''' project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
== OWASP JoomScan Project ==&lt;br /&gt;
'''[https://github.com/rezasp/joomscan OWASP JoomScan]''' (short for [Joom]la Vulnerability [Scan]ner) is an opensource project in Perl programming language to detect Joomla CMS vulnerabilities and analyses them.&lt;br /&gt;
&lt;br /&gt;
== OWASP VBScan Project ==&lt;br /&gt;
&lt;br /&gt;
'''[https://www.owasp.org/index.php/OWASP_VBScan_Project OWASP VBScan]''' is an opensource project in Perl programming language to detect VBulletin CMS vulnerabilities and analyses them.&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC Project ==&lt;br /&gt;
'''[https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project OWASP ZSC]''' is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script.&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
&lt;br /&gt;
=== OWASP Iran Chapter Meeting July 2018 ===&lt;br /&gt;
OWASP Nettacker, OWASP JoomScan, OWASP VBScan, OWASP ZSC, OWASP Honeypot, OWASP PHP Security, OWASP WebgoatPHP, OWASP RBAC and etc presented in the small meeting, and we decided to organize a public meeting at the end of 2018.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Nettacker ICS Section will be presented in KasperSky Industrial Cybersecurity ===&lt;br /&gt;
OWASP Nettacker ICS Section will be presented in KasperSky Industrial Cybersecurity: Opportunities and challenges in Digital Transformation 2018 by Mohammad Reza Zamiri&lt;br /&gt;
( [https://github.com/zdresearch/OWASP-Nettacker/tree/master/lib/payload/scanner/ics_honeypot 1] )  ( [https://ics.kaspersky.com/conference/ 2] )&lt;br /&gt;
&lt;br /&gt;
=== OWASP JoomScan at Blackhat Arsenal - USA 2018 ===&lt;br /&gt;
OWASP JoomScan at OWASP Blackhat Arsenal - Las Vegas 2018.  This project will present on 8 August 10am to 11:20am by Mohammad Reza Espargham, Babak Amin Azad, Vahid Behzadan. &lt;br /&gt;
( [https://www.blackhat.com/us-18/arsenal/schedule/index.html#owasp-joomscan-project-10824 1] )  ( [https://www.blackhat.com/us-18/arsenal.html#owasp-joomscan-project 2] )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP Nettacker in OWASP Bay Area meetup 2018 ===&lt;br /&gt;
OWASP Nettacker Tutorial by at OWASP Bay Area meetup.  Thanks to Vahid Behzadan for the presentation and OWASP Bay Area for hosting and sponsoring us. &lt;br /&gt;
( [https://www.youtube.com/watch?v=4pu4hJMk6m8 1] )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP JoomScan at Blackhat Arsenal - Asia 2018 ===&lt;br /&gt;
OWASP JoomScan at OWASP Blackhat Arsenal - Singapore 2018.  Presented by Mohammad Reza Espargham, Esmaeil Rahimian. and Blackhat for hosting.&lt;br /&gt;
( [http://lists.owasp.org/pipermail/owasp-leaders/2018-March/019076.html Experiences and Pictures] )  ( [https://www.blackhat.com/asia-18/arsenal.html#mohammad-reza-espargham 1] )  ( [https://www.blackhat.com/asia-18/arsenal/schedule/index.html#owasp-joomscan-project-9875 1] )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP Nettacker Accepted for Google Summer of Code 2018 ===&lt;br /&gt;
( [https://www.owasp.org/index.php/GSOC2018_Ideas 1] )  ( [https://summerofcode.withgoogle.com/organizations/6664778743808000/ 2] ) &amp;lt;br&amp;gt;&lt;br /&gt;
OWASP Nettacker Video Conference/Webinar for GSoC Team 1 May 2018 - Vahid Behzadan - ML/AI in CyberSecurity  ( [https://www.youtube.com/watch?v=7RQH8oECSyg 1] ) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP Nettacker in OFFSECONF 2017 ===&lt;br /&gt;
OWASP Nettacker was introduced in OFFSECONF 2017. ([https://groups.google.com/forum/#!topic/owasp-nettacker/3gscDww2sf4 Experiences and Pictures])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP VBScan in OFFSECONF 2017 ===&lt;br /&gt;
OWASP VBScan presented in OFFSECONF 2017. Click [https://www.owasp.org/index.php/OWASP_VBScan_Project here] for additional information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZSC in OFFSECONF 2016 ===&lt;br /&gt;
OWASP ZSC project presented in OFFSECONF 2016 K. N. Toosi University of Technology in Tehran ([https://groups.google.com/forum/#!topic/owasp-zsc/t12M2fxn78k Experiences and Pictures])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== the First National Web Application Security Conference ===&lt;br /&gt;
[http://wasc.ir WASC.ir]&lt;br /&gt;
April 2011, Shahid Beheshti University&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 4th Intl. Digital Media Fair ===&lt;br /&gt;
Tehran, Great Mosalla of Imam Khomeini, '''October 7th-16th'''&lt;br /&gt;
Two workshops by Abbas Naderi (aka) AbiusX :&lt;br /&gt;
* Common Web Security for People (including Social Engineering issues)&lt;br /&gt;
* Cryptography and Cryptanalysis&lt;br /&gt;
&lt;br /&gt;
Both being held at October 9th &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 3rd Intl. Digital Media Fair ===&lt;br /&gt;
Tehran , Great Mosalla of Imam Khomeini, '''October 01st-8th'''&lt;br /&gt;
&lt;br /&gt;
سومین نمایشگاه بین‌المللی رسانه‌های دیجیتال، ۸ الی ۱۵، مصلی امام خمینی&lt;br /&gt;
&lt;br /&gt;
Two security related presentations by '''Abbas Naderi (aka AbiusX)''':&lt;br /&gt;
* OWASP Top Ten in Persian for common web developers (2 Oct, 19-21 local time) ([http://abiusx.com/archive/presentation/OWASP_Top_10_Farsi.pptx download link])&lt;br /&gt;
* General Security and Privacy for the public (3 Oct, 19-21 local time) ([http://abiusx.com/archive/presentation/security-privacy2.pptx download link])&lt;br /&gt;
 (Powerpoint and OpenOffice slides would be uploaded asap.)&lt;br /&gt;
* ۱۰ خطر اصلی در نرم افزارهای تحت وب - برای توسعه دهندگان وب&lt;br /&gt;
* امنیت عمومی در وب، حفاظت از اطلاعات شخصی برای عموم مردم&lt;br /&gt;
&lt;br /&gt;
Attendance is free of charge.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Software security vulnerabilities and defense ===&lt;br /&gt;
 seminar presented in YAZD University by Hamid kashfi (26 June 2008). ([http://strcpy.persiangig.com/Attacking_Software.ppt download link] ) &lt;br /&gt;
&lt;br /&gt;
= Volunteer Events =&lt;br /&gt;
از کسانی که دوست دارند داوطلبانه پروژه های این بنیاد را ارائه دارند دعوت میشود، جهت هماهنگی به یکی از مدیران ایرانی پیغام دهند. متشکرم.&lt;br /&gt;
&lt;br /&gt;
*  '''[[http://bostandoust.ir/wp-content/uploads/2018/07/0853.pdf 1]] نشست امنیت نرم افزار های وب'''&lt;br /&gt;
این نشست در دانشگاه فنی مهندسی شیراز با همکاری لاگ شیراز مورخ 4 تیر 97 تشکیل شد و آسیب پذیری های پی اچ پی توسط سعید بستان دوست ارائه گردیده.&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
== OWASP Top 10 Persian ==&lt;br /&gt;
(24/09/2009) Persian translation of OWASP TOP 10 Project is published by &amp;quot;Mitra Moosavi&amp;quot; and &amp;quot;Anahita Taheri&amp;quot;. ([http://www.scribd.com/doc/20164417/OWASP-Top-10-2007-Persian download link])&lt;br /&gt;
&lt;br /&gt;
لطفا پيشنهادات يا اصلاحات احتمالی را از طريق ايميل به تهيه کنندگان اين سند ارسال نماييد&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;br /&gt;
[[Category:Asia/Pacific/Middle East]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Iran&amp;diff=241742</id>
		<title>Iran</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Iran&amp;diff=241742"/>
				<updated>2018-07-10T11:03:10Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Chapter Information =&lt;br /&gt;
{{Chapter Template|chaptername=Iran|extra=The chapter leaders are [mailto:abiusx@owasp.org Abbas Naderi], [mailto:Ali.Razmjoo@owasp.org Ali Ramjoo] and [mailto:Reza.Espargham@owasp.org MohammadReza Espargham].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-iran|emailarchives=http://lists.owasp.org/pipermail/owasp-iran}}&lt;br /&gt;
&lt;br /&gt;
== Incoming Events ==&lt;br /&gt;
OWASP Iran Chapter Meeting - (Details will be published soon)&lt;br /&gt;
&lt;br /&gt;
=Membership=&lt;br /&gt;
== Sponsorship/Membership  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Btn_donate_SM.gif|link=http://www.regonline.com/donation_1044369]] to this chapter or become a local chapter supporter.&lt;br /&gt;
&lt;br /&gt;
Or consider the value of [[Membership | Individual, Corporate, or Academic Supporter membership]]. Ready to become a member? [[Image:Join_Now_BlueIcon.JPG|75px|link=https://myowasp.force.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Chapter News =&lt;br /&gt;
&lt;br /&gt;
==Sponsorship/Membership==&lt;br /&gt;
After months of exhaustive work, a new membership approach is available for Iranians. Check the membership tab.&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting ==&lt;br /&gt;
The next chapter meeting would be in upcoming month. More information in the mailing list and here alter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Active Projects =&lt;br /&gt;
== OWASP Nettacker ==&lt;br /&gt;
'''[https://www.owasp.org/index.php/OWASP_Nettacker OWASP Nettacker]''' project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
== OWASP JoomScan Project ==&lt;br /&gt;
'''[https://github.com/rezasp/joomscan OWASP JoomScan]''' (short for [Joom]la Vulnerability [Scan]ner) is an opensource project in Perl programming language to detect Joomla CMS vulnerabilities and analyses them.&lt;br /&gt;
&lt;br /&gt;
== OWASP VBScan Project ==&lt;br /&gt;
&lt;br /&gt;
'''[https://www.owasp.org/index.php/OWASP_VBScan_Project OWASP VBScan]''' is an opensource project in Perl programming language to detect VBulletin CMS vulnerabilities and analyses them.&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC Project ==&lt;br /&gt;
'''[https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project OWASP ZSC]''' is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script.&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
&lt;br /&gt;
=== OWASP Nettacker ICS Section will be presented in KasperSky Industrial Cybersecurity ===&lt;br /&gt;
OWASP Nettacker ICS Section will be presented in KasperSky Industrial Cybersecurity: Opportunities and challenges in Digital Transformation 2018 by Mohammad Reza Zamiri&lt;br /&gt;
( [https://github.com/zdresearch/OWASP-Nettacker/tree/master/lib/payload/scanner/ics_honeypot 1] )  ( [https://ics.kaspersky.com/conference/ 2] )&lt;br /&gt;
&lt;br /&gt;
=== OWASP JoomScan at Blackhat Arsenal - USA 2018 ===&lt;br /&gt;
OWASP JoomScan at OWASP Blackhat Arsenal - Las Vegas 2018.  This project will present on 8 August 10am to 11:20am by Mohammad Reza Espargham, Babak Amin Azad, Vahid Behzadan. &lt;br /&gt;
( [https://www.blackhat.com/us-18/arsenal/schedule/index.html#owasp-joomscan-project-10824 1] )  ( [https://www.blackhat.com/us-18/arsenal.html#owasp-joomscan-project 2] )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP Nettacker in OWASP Bay Area meetup 2018 ===&lt;br /&gt;
OWASP Nettacker Tutorial by at OWASP Bay Area meetup.  Thanks to Vahid Behzadan for the presentation and OWASP Bay Area for hosting and sponsoring us. &lt;br /&gt;
( [https://www.youtube.com/watch?v=4pu4hJMk6m8 1] )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP JoomScan at Blackhat Arsenal - Asia 2018 ===&lt;br /&gt;
OWASP JoomScan at OWASP Blackhat Arsenal - Singapore 2018.  Presented by Mohammad Reza Espargham, Esmaeil Rahimian. and Blackhat for hosting.&lt;br /&gt;
( [http://lists.owasp.org/pipermail/owasp-leaders/2018-March/019076.html Experiences and Pictures] )  ( [https://www.blackhat.com/asia-18/arsenal.html#mohammad-reza-espargham 1] )  ( [https://www.blackhat.com/asia-18/arsenal/schedule/index.html#owasp-joomscan-project-9875 1] )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP Nettacker Accepted for Google Summer of Code 2018 ===&lt;br /&gt;
( [https://www.owasp.org/index.php/GSOC2018_Ideas 1] )  ( [https://summerofcode.withgoogle.com/organizations/6664778743808000/ 2] ) &amp;lt;br&amp;gt;&lt;br /&gt;
OWASP Nettacker Video Conference/Webinar for GSoC Team 1 May 2018 - Vahid Behzadan - ML/AI in CyberSecurity  ( [https://www.youtube.com/watch?v=7RQH8oECSyg 1] ) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP Nettacker in OFFSECONF 2017 ===&lt;br /&gt;
OWASP Nettacker was introduced in OFFSECONF 2017. ([https://groups.google.com/forum/#!topic/owasp-nettacker/3gscDww2sf4 Experiences and Pictures])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP VBScan in OFFSECONF 2017 ===&lt;br /&gt;
OWASP VBScan presented in OFFSECONF 2017. Click [https://www.owasp.org/index.php/OWASP_VBScan_Project here] for additional information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZSC in OFFSECONF 2016 ===&lt;br /&gt;
OWASP ZSC project presented in OFFSECONF 2016 K. N. Toosi University of Technology in Tehran ([https://groups.google.com/forum/#!topic/owasp-zsc/t12M2fxn78k Experiences and Pictures])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== the First National Web Application Security Conference ===&lt;br /&gt;
[http://wasc.ir WASC.ir]&lt;br /&gt;
April 2011, Shahid Beheshti University&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 4th Intl. Digital Media Fair ===&lt;br /&gt;
Tehran, Great Mosalla of Imam Khomeini, '''October 7th-16th'''&lt;br /&gt;
Two workshops by Abbas Naderi (aka) AbiusX :&lt;br /&gt;
* Common Web Security for People (including Social Engineering issues)&lt;br /&gt;
* Cryptography and Cryptanalysis&lt;br /&gt;
&lt;br /&gt;
Both being held at October 9th &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 3rd Intl. Digital Media Fair ===&lt;br /&gt;
Tehran , Great Mosalla of Imam Khomeini, '''October 01st-8th'''&lt;br /&gt;
&lt;br /&gt;
سومین نمایشگاه بین‌المللی رسانه‌های دیجیتال، ۸ الی ۱۵، مصلی امام خمینی&lt;br /&gt;
&lt;br /&gt;
Two security related presentations by '''Abbas Naderi (aka AbiusX)''':&lt;br /&gt;
* OWASP Top Ten in Persian for common web developers (2 Oct, 19-21 local time) ([http://abiusx.com/archive/presentation/OWASP_Top_10_Farsi.pptx download link])&lt;br /&gt;
* General Security and Privacy for the public (3 Oct, 19-21 local time) ([http://abiusx.com/archive/presentation/security-privacy2.pptx download link])&lt;br /&gt;
 (Powerpoint and OpenOffice slides would be uploaded asap.)&lt;br /&gt;
* ۱۰ خطر اصلی در نرم افزارهای تحت وب - برای توسعه دهندگان وب&lt;br /&gt;
* امنیت عمومی در وب، حفاظت از اطلاعات شخصی برای عموم مردم&lt;br /&gt;
&lt;br /&gt;
Attendance is free of charge.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Software security vulnerabilities and defense ===&lt;br /&gt;
 seminar presented in YAZD University by Hamid kashfi (26 June 2008). ([http://strcpy.persiangig.com/Attacking_Software.ppt download link] ) &lt;br /&gt;
&lt;br /&gt;
= Volunteer Events =&lt;br /&gt;
از کسانی که دوست دارند داوطلبانه پروژه های این بنیاد را ارائه دارند دعوت میشود، جهت هماهنگی به یکی از مدیران ایرانی پیغام دهند. متشکرم.&lt;br /&gt;
&lt;br /&gt;
*  '''[[http://bostandoust.ir/wp-content/uploads/2018/07/0853.pdf 1]] نشست امنیت نرم افزار های وب'''&lt;br /&gt;
این نشست در دانشگاه فنی مهندسی شیراز با همکاری لاگ شیراز مورخ 4 تیر 97 تشکیل شد و آسیب پذیری های پی اچ پی توسط سعید بستان دوست ارائه گردیده.&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
== OWASP Top 10 Persian ==&lt;br /&gt;
(24/09/2009) Persian translation of OWASP TOP 10 Project is published by &amp;quot;Mitra Moosavi&amp;quot; and &amp;quot;Anahita Taheri&amp;quot;. ([http://www.scribd.com/doc/20164417/OWASP-Top-10-2007-Persian download link])&lt;br /&gt;
&lt;br /&gt;
لطفا پيشنهادات يا اصلاحات احتمالی را از طريق ايميل به تهيه کنندگان اين سند ارسال نماييد&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;br /&gt;
[[Category:Asia/Pacific/Middle East]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Iran&amp;diff=241741</id>
		<title>Iran</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Iran&amp;diff=241741"/>
				<updated>2018-07-10T10:57:49Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: add description&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Chapter Information =&lt;br /&gt;
{{Chapter Template|chaptername=Iran|extra=The chapter leaders are [mailto:abiusx@owasp.org Abbas Naderi], [mailto:Ali.Razmjoo@owasp.org Ali Ramjoo] and [mailto:Reza.Espargham@owasp.org MohammadReza Espargham].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-iran|emailarchives=http://lists.owasp.org/pipermail/owasp-iran}}&lt;br /&gt;
&lt;br /&gt;
== Incoming Events ==&lt;br /&gt;
OWASP Iran Chapter Meeting - (Details will be published soon)&lt;br /&gt;
&lt;br /&gt;
=Membership=&lt;br /&gt;
== Sponsorship/Membership  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Btn_donate_SM.gif|link=http://www.regonline.com/donation_1044369]] to this chapter or become a local chapter supporter.&lt;br /&gt;
&lt;br /&gt;
Or consider the value of [[Membership | Individual, Corporate, or Academic Supporter membership]]. Ready to become a member? [[Image:Join_Now_BlueIcon.JPG|75px|link=https://myowasp.force.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Chapter News =&lt;br /&gt;
&lt;br /&gt;
==Sponsorship/Membership==&lt;br /&gt;
After months of exhaustive work, a new membership approach is available for Iranians. Check the membership tab.&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting ==&lt;br /&gt;
The next chapter meeting would be in upcoming month. More information in the mailing list and here alter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Active Projects =&lt;br /&gt;
== OWASP Nettacker ==&lt;br /&gt;
'''[https://www.owasp.org/index.php/OWASP_Nettacker OWASP Nettacker]''' project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
== OWASP JoomScan Project ==&lt;br /&gt;
'''[https://github.com/rezasp/joomscan OWASP JoomScan]''' (short for [Joom]la Vulnerability [Scan]ner) is an opensource project in Perl programming language to detect Joomla CMS vulnerabilities and analyses them.&lt;br /&gt;
&lt;br /&gt;
== OWASP VBScan Project ==&lt;br /&gt;
&lt;br /&gt;
'''[https://www.owasp.org/index.php/OWASP_VBScan_Project OWASP VBScan]''' is an opensource project in Perl programming language to detect VBulletin CMS vulnerabilities and analyses them.&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC Project ==&lt;br /&gt;
'''[https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project OWASP ZSC]''' is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script.&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
&lt;br /&gt;
=== '''OWASP Nettacker ICS Section will be presented in KasperSky Industrial Cybersecurity''' ===&lt;br /&gt;
OWASP Nettacker ICS Section will be presented in KasperSky Industrial Cybersecurity: Opportunities and challenges in Digital Transformation 2018 by Mohammad Reza Zamiri&lt;br /&gt;
( [https://github.com/zdresearch/OWASP-Nettacker/tree/master/lib/payload/scanner/ics_honeypot 1] )  ( [https://ics.kaspersky.com/conference/ 2] )&lt;br /&gt;
&lt;br /&gt;
=== '''OWASP JoomScan at Blackhat Arsenal - USA 2018''' ===&lt;br /&gt;
OWASP JoomScan at OWASP Blackhat Arsenal - Las Vegas 2018.  This project will present on 8 August 10am to 11:20am by Mohammad Reza Espargham, Babak Amin Azad, Vahid Behzadan. &lt;br /&gt;
( [https://www.blackhat.com/us-18/arsenal/schedule/index.html#owasp-joomscan-project-10824 1] )  ( [https://www.blackhat.com/us-18/arsenal.html#owasp-joomscan-project 2] )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''OWASP Nettacker in OWASP Bay Area meetup 2018''' ===&lt;br /&gt;
OWASP Nettacker Tutorial by at OWASP Bay Area meetup.  Thanks to Vahid Behzadan for the presentation and OWASP Bay Area for hosting and sponsoring us. &lt;br /&gt;
( [https://www.youtube.com/watch?v=4pu4hJMk6m8 1] )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''OWASP JoomScan at Blackhat Arsenal - Asia 2018''' ===&lt;br /&gt;
OWASP JoomScan at OWASP Blackhat Arsenal - Singapore 2018.  Presented by Mohammad Reza Espargham, Esmaeil Rahimian. and Blackhat for hosting.&lt;br /&gt;
( [http://lists.owasp.org/pipermail/owasp-leaders/2018-March/019076.html Experiences and Pictures] )  ( [https://www.blackhat.com/asia-18/arsenal.html#mohammad-reza-espargham 1] )  ( [https://www.blackhat.com/asia-18/arsenal/schedule/index.html#owasp-joomscan-project-9875 1] )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''OWASP Nettacker Accepted for Google Summer of Code 2018''' ===&lt;br /&gt;
( [https://www.owasp.org/index.php/GSOC2018_Ideas 1] )  ( [https://summerofcode.withgoogle.com/organizations/6664778743808000/ 2] ) &amp;lt;br&amp;gt;&lt;br /&gt;
OWASP Nettacker Video Conference/Webinar for GSoC Team 1 May 2018 - Vahid Behzadan - ML/AI in CyberSecurity  ( [https://www.youtube.com/watch?v=7RQH8oECSyg 1] ) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP Nettacker in OFFSECONF 2017 ===&lt;br /&gt;
OWASP Nettacker was introduced in OFFSECONF 2017. ([https://groups.google.com/forum/#!topic/owasp-nettacker/3gscDww2sf4 Experiences and Pictures])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP VBScan in OFFSECONF 2017 ===&lt;br /&gt;
OWASP VBScan presented in OFFSECONF 2017. Click [https://www.owasp.org/index.php/OWASP_VBScan_Project here] for additional information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZSC in OFFSECONF 2016 ===&lt;br /&gt;
OWASP ZSC project presented in OFFSECONF 2016 K. N. Toosi University of Technology in Tehran ([https://groups.google.com/forum/#!topic/owasp-zsc/t12M2fxn78k Experiences and Pictures])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== the First National Web Application Security Conference ===&lt;br /&gt;
[http://wasc.ir WASC.ir]&lt;br /&gt;
April 2011, Shahid Beheshti University&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 4th Intl. Digital Media Fair ===&lt;br /&gt;
Tehran, Great Mosalla of Imam Khomeini, '''October 7th-16th'''&lt;br /&gt;
Two workshops by Abbas Naderi (aka) AbiusX :&lt;br /&gt;
* Common Web Security for People (including Social Engineering issues)&lt;br /&gt;
* Cryptography and Cryptanalysis&lt;br /&gt;
&lt;br /&gt;
Both being held at October 9th &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 3rd Intl. Digital Media Fair ===&lt;br /&gt;
Tehran , Great Mosalla of Imam Khomeini, '''October 01st-8th'''&lt;br /&gt;
&lt;br /&gt;
سومین نمایشگاه بین‌المللی رسانه‌های دیجیتال، ۸ الی ۱۵، مصلی امام خمینی&lt;br /&gt;
&lt;br /&gt;
Two security related presentations by '''Abbas Naderi (aka AbiusX)''':&lt;br /&gt;
* OWASP Top Ten in Persian for common web developers (2 Oct, 19-21 local time) ([http://abiusx.com/archive/presentation/OWASP_Top_10_Farsi.pptx download link])&lt;br /&gt;
* General Security and Privacy for the public (3 Oct, 19-21 local time) ([http://abiusx.com/archive/presentation/security-privacy2.pptx download link])&lt;br /&gt;
 (Powerpoint and OpenOffice slides would be uploaded asap.)&lt;br /&gt;
* ۱۰ خطر اصلی در نرم افزارهای تحت وب - برای توسعه دهندگان وب&lt;br /&gt;
* امنیت عمومی در وب، حفاظت از اطلاعات شخصی برای عموم مردم&lt;br /&gt;
&lt;br /&gt;
Attendance is free of charge.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Software security vulnerabilities and defense ===&lt;br /&gt;
 seminar presented in YAZD University by Hamid kashfi (26 June 2008). ([http://strcpy.persiangig.com/Attacking_Software.ppt download link] ) &lt;br /&gt;
&lt;br /&gt;
= Volunteer Events =&lt;br /&gt;
از کسانی که دوست دارند داوطلبانه پروژه های این بنیاد را ارائه دارند دعوت میشود، جهت هماهنگی به یکی از مدیران ایرانی پیغام دهند. متشکرم.&lt;br /&gt;
&lt;br /&gt;
*  '''[[http://bostandoust.ir/wp-content/uploads/2018/07/0853.pdf 1]] نشست امنیت نرم افزار های وب'''&lt;br /&gt;
این نشست در دانشگاه فنی مهندسی شیراز با همکاری لاگ شیراز مورخ 4 تیر 97 تشکیل شد و آسیب پذیری های پی اچ پی توسط سعید بستان دوست ارائه گردیده.&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
== OWASP Top 10 Persian ==&lt;br /&gt;
(24/09/2009) Persian translation of OWASP TOP 10 Project is published by &amp;quot;Mitra Moosavi&amp;quot; and &amp;quot;Anahita Taheri&amp;quot;. ([http://www.scribd.com/doc/20164417/OWASP-Top-10-2007-Persian download link])&lt;br /&gt;
&lt;br /&gt;
لطفا پيشنهادات يا اصلاحات احتمالی را از طريق ايميل به تهيه کنندگان اين سند ارسال نماييد&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;br /&gt;
[[Category:Asia/Pacific/Middle East]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Iran&amp;diff=241740</id>
		<title>Iran</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Iran&amp;diff=241740"/>
				<updated>2018-07-10T10:51:56Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: volunteer events&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Chapter Information =&lt;br /&gt;
{{Chapter Template|chaptername=Iran|extra=The chapter leaders are [mailto:abiusx@owasp.org Abbas Naderi], [mailto:Ali.Razmjoo@owasp.org Ali Ramjoo] and [mailto:Reza.Espargham@owasp.org MohammadReza Espargham].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-iran|emailarchives=http://lists.owasp.org/pipermail/owasp-iran}}&lt;br /&gt;
&lt;br /&gt;
== Incoming Events ==&lt;br /&gt;
OWASP Iran Chapter Meeting - (Details will be published soon)&lt;br /&gt;
&lt;br /&gt;
=Membership=&lt;br /&gt;
== Sponsorship/Membership  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Btn_donate_SM.gif|link=http://www.regonline.com/donation_1044369]] to this chapter or become a local chapter supporter.&lt;br /&gt;
&lt;br /&gt;
Or consider the value of [[Membership | Individual, Corporate, or Academic Supporter membership]]. Ready to become a member? [[Image:Join_Now_BlueIcon.JPG|75px|link=https://myowasp.force.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Chapter News =&lt;br /&gt;
&lt;br /&gt;
==Sponsorship/Membership==&lt;br /&gt;
After months of exhaustive work, a new membership approach is available for Iranians. Check the membership tab.&lt;br /&gt;
&lt;br /&gt;
== Chapter Meeting ==&lt;br /&gt;
The next chapter meeting would be in upcoming month. More information in the mailing list and here alter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Active Projects =&lt;br /&gt;
== OWASP Nettacker ==&lt;br /&gt;
'''[https://www.owasp.org/index.php/OWASP_Nettacker OWASP Nettacker]''' project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
== OWASP JoomScan Project ==&lt;br /&gt;
'''[https://github.com/rezasp/joomscan OWASP JoomScan]''' (short for [Joom]la Vulnerability [Scan]ner) is an opensource project in Perl programming language to detect Joomla CMS vulnerabilities and analyses them.&lt;br /&gt;
&lt;br /&gt;
== OWASP VBScan Project ==&lt;br /&gt;
&lt;br /&gt;
'''[https://www.owasp.org/index.php/OWASP_VBScan_Project OWASP VBScan]''' is an opensource project in Perl programming language to detect VBulletin CMS vulnerabilities and analyses them.&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC Project ==&lt;br /&gt;
'''[https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project OWASP ZSC]''' is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script.&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
&lt;br /&gt;
=== '''OWASP Nettacker ICS Section will be presented in KasperSky Industrial Cybersecurity''' ===&lt;br /&gt;
OWASP Nettacker ICS Section will be presented in KasperSky Industrial Cybersecurity: Opportunities and challenges in Digital Transformation 2018 by Mohammad Reza Zamiri&lt;br /&gt;
( [https://github.com/zdresearch/OWASP-Nettacker/tree/master/lib/payload/scanner/ics_honeypot 1] )  ( [https://ics.kaspersky.com/conference/ 2] )&lt;br /&gt;
&lt;br /&gt;
=== '''OWASP JoomScan at Blackhat Arsenal - USA 2018''' ===&lt;br /&gt;
OWASP JoomScan at OWASP Blackhat Arsenal - Las Vegas 2018.  This project will present on 8 August 10am to 11:20am by Mohammad Reza Espargham, Babak Amin Azad, Vahid Behzadan. &lt;br /&gt;
( [https://www.blackhat.com/us-18/arsenal/schedule/index.html#owasp-joomscan-project-10824 1] )  ( [https://www.blackhat.com/us-18/arsenal.html#owasp-joomscan-project 2] )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''OWASP Nettacker in OWASP Bay Area meetup 2018''' ===&lt;br /&gt;
OWASP Nettacker Tutorial by at OWASP Bay Area meetup.  Thanks to Vahid Behzadan for the presentation and OWASP Bay Area for hosting and sponsoring us. &lt;br /&gt;
( [https://www.youtube.com/watch?v=4pu4hJMk6m8 1] )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''OWASP JoomScan at Blackhat Arsenal - Asia 2018''' ===&lt;br /&gt;
OWASP JoomScan at OWASP Blackhat Arsenal - Singapore 2018.  Presented by Mohammad Reza Espargham, Esmaeil Rahimian. and Blackhat for hosting.&lt;br /&gt;
( [http://lists.owasp.org/pipermail/owasp-leaders/2018-March/019076.html Experiences and Pictures] )  ( [https://www.blackhat.com/asia-18/arsenal.html#mohammad-reza-espargham 1] )  ( [https://www.blackhat.com/asia-18/arsenal/schedule/index.html#owasp-joomscan-project-9875 1] )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''OWASP Nettacker Accepted for Google Summer of Code 2018''' ===&lt;br /&gt;
( [https://www.owasp.org/index.php/GSOC2018_Ideas 1] )  ( [https://summerofcode.withgoogle.com/organizations/6664778743808000/ 2] ) &amp;lt;br&amp;gt;&lt;br /&gt;
OWASP Nettacker Video Conference/Webinar for GSoC Team 1 May 2018 - Vahid Behzadan - ML/AI in CyberSecurity  ( [https://www.youtube.com/watch?v=7RQH8oECSyg 1] ) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP Nettacker in OFFSECONF 2017 ===&lt;br /&gt;
OWASP Nettacker was introduced in OFFSECONF 2017. ([https://groups.google.com/forum/#!topic/owasp-nettacker/3gscDww2sf4 Experiences and Pictures])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP VBScan in OFFSECONF 2017 ===&lt;br /&gt;
OWASP VBScan presented in OFFSECONF 2017. Click [https://www.owasp.org/index.php/OWASP_VBScan_Project here] for additional information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP ZSC in OFFSECONF 2016 ===&lt;br /&gt;
OWASP ZSC project presented in OFFSECONF 2016 K. N. Toosi University of Technology in Tehran ([https://groups.google.com/forum/#!topic/owasp-zsc/t12M2fxn78k Experiences and Pictures])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== the First National Web Application Security Conference ===&lt;br /&gt;
[http://wasc.ir WASC.ir]&lt;br /&gt;
April 2011, Shahid Beheshti University&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 4th Intl. Digital Media Fair ===&lt;br /&gt;
Tehran, Great Mosalla of Imam Khomeini, '''October 7th-16th'''&lt;br /&gt;
Two workshops by Abbas Naderi (aka) AbiusX :&lt;br /&gt;
* Common Web Security for People (including Social Engineering issues)&lt;br /&gt;
* Cryptography and Cryptanalysis&lt;br /&gt;
&lt;br /&gt;
Both being held at October 9th &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 3rd Intl. Digital Media Fair ===&lt;br /&gt;
Tehran , Great Mosalla of Imam Khomeini, '''October 01st-8th'''&lt;br /&gt;
&lt;br /&gt;
سومین نمایشگاه بین‌المللی رسانه‌های دیجیتال، ۸ الی ۱۵، مصلی امام خمینی&lt;br /&gt;
&lt;br /&gt;
Two security related presentations by '''Abbas Naderi (aka AbiusX)''':&lt;br /&gt;
* OWASP Top Ten in Persian for common web developers (2 Oct, 19-21 local time) ([http://abiusx.com/archive/presentation/OWASP_Top_10_Farsi.pptx download link])&lt;br /&gt;
* General Security and Privacy for the public (3 Oct, 19-21 local time) ([http://abiusx.com/archive/presentation/security-privacy2.pptx download link])&lt;br /&gt;
 (Powerpoint and OpenOffice slides would be uploaded asap.)&lt;br /&gt;
* ۱۰ خطر اصلی در نرم افزارهای تحت وب - برای توسعه دهندگان وب&lt;br /&gt;
* امنیت عمومی در وب، حفاظت از اطلاعات شخصی برای عموم مردم&lt;br /&gt;
&lt;br /&gt;
Attendance is free of charge.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Software security vulnerabilities and defense ===&lt;br /&gt;
 seminar presented in YAZD University by Hamid kashfi (26 June 2008). ([http://strcpy.persiangig.com/Attacking_Software.ppt download link] ) &lt;br /&gt;
&lt;br /&gt;
= Volunteer Events =&lt;br /&gt;
*  [[http://bostandoust.ir/wp-content/uploads/2018/07/0853.pdf 1]] نشست امنیت نرم افزار های وب&lt;br /&gt;
این نشست در دانشگاه فنی مهندسی شیراز با همکاری لاگ شیراز مورخ 4 تیر 97 تشکیل شد و آسیب پذیری های پی اچ پی توسط سعید بستان دوست ارائه گردیده.&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
== OWASP Top 10 Persian ==&lt;br /&gt;
(24/09/2009) Persian translation of OWASP TOP 10 Project is published by &amp;quot;Mitra Moosavi&amp;quot; and &amp;quot;Anahita Taheri&amp;quot;. ([http://www.scribd.com/doc/20164417/OWASP-Top-10-2007-Persian download link])&lt;br /&gt;
&lt;br /&gt;
لطفا پيشنهادات يا اصلاحات احتمالی را از طريق ايميل به تهيه کنندگان اين سند ارسال نماييد&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;br /&gt;
[[Category:Asia/Pacific/Middle East]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=241593</id>
		<title>OWASP Nettacker</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=241593"/>
				<updated>2018-07-02T09:29:57Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: add m r z&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker Project==&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Donate to OWASP Nettacker''' {{#widget:PayPal Donation |target=_blank |budget=OWASP Nettacker }}&lt;br /&gt;
====What is OWASP Nettacker ?====&lt;br /&gt;
https://www.owasp.org/images/1/1a/Nettacker_Demp.png&lt;br /&gt;
&lt;br /&gt;
'''OWASP Nettacker''' is an open source software in Python language which lets you '''automated penetration testing''' and '''automated Information Gathering'''. This software can be run on Windows/Linux/OSX under Python.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Nettacker project was created to automated for information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and information. This software is able to use SYN, ACK, TCP, ICMP and many other protocols to detect and bypass the Firewalls/IDS/IPS and devices. By using a unique solution in Nettacker to find protected services such as SCADA We could make a point to be one of the bests of scanners.&lt;br /&gt;
&lt;br /&gt;
====DISCLAIMER====&lt;br /&gt;
This tool is related to IT, Hacking, Programming, and Computer|Network|Software Security. The word “Hack”, &amp;quot;Pen testing&amp;quot;,“Hacking” that is used on these project pages shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively. This is not a tool that provides any illegal information.We do not promote hacking or software cracking. All the information provided on these pages is for educational purposes only.&lt;br /&gt;
&lt;br /&gt;
The authors of this tool are not responsible for any misuse of the information.You shall not misuse the information to gain unauthorized access and/or write malicious programs.This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.You may try all of these techniques on your own computer at your own risk.Performing any hack attempts/tests without written permission from the owner of the computer system is illegal.&lt;br /&gt;
&lt;br /&gt;
IN NO EVENT SHALL THE CREATORS, OWNER, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Features ====&lt;br /&gt;
&lt;br /&gt;
'''IoT Scanner'''&amp;lt;br&amp;gt;&lt;br /&gt;
Python Multi-Thread &amp;amp; Multi Process Network Information Gathering Vulnerability Scanner&amp;lt;br&amp;gt;&lt;br /&gt;
Service and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and much more… )&amp;lt;br&amp;gt;&lt;br /&gt;
Network Service Analysis&amp;lt;br&amp;gt;&lt;br /&gt;
Services Brute Force Testing&amp;lt;br&amp;gt;&lt;br /&gt;
Services Vulnerability Testing&amp;lt;br&amp;gt;&lt;br /&gt;
HTTP/HTTPS Crawling, Fuzzing, Information Gathering and …&amp;lt;br&amp;gt;&lt;br /&gt;
HTML and Text Outputs&amp;lt;br&amp;gt;&lt;br /&gt;
This project is at the moment in research and development phase and most of results/codes are not published yet.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
====Apache License Version 2.0, January 2004====&lt;br /&gt;
&lt;br /&gt;
The OWASP Nettacker is free to use and is licensed under the Apache 2 License. [https://github.com/zdresearch/OWASP-Nettacker/blob/master/LICENSE Click to see the full license]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact, it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders &amp;amp; Mentors ==&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Mohammad Reza Espargham]&lt;br /&gt;
* [mailto:johanna.curiel@owasp.org Johanna Curiel]&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi Afooshteh]&lt;br /&gt;
* [mailto:sriharsha.g15@ii Sri Harsha Gajavalli]&lt;br /&gt;
&lt;br /&gt;
== GSoC Interns ==&lt;br /&gt;
* [mailto:bran0793@umn.edu Hannah Brand]&lt;br /&gt;
* [mailto:shaddygarg1@gmail.com Shaddy Garg]&lt;br /&gt;
* [mailto:pradeepjairamani22@gmail.com Pradeep Jairamani]&lt;br /&gt;
&lt;br /&gt;
== Contributors &amp;amp; Main Developers ==&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mr.zamiri@ieee.org Mohammad Reza Zamiri]&lt;br /&gt;
* [mailto:mojtaba6892@gmail.com Mojtaba MasoumPour]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* [https://github.com/camel32bit camel32bit]&lt;br /&gt;
* [mailto:sha.ravindra1307@gmail.com Ravindra Sharma]&lt;br /&gt;
* [mailto:harsha010@outlook.com Harshavardhan Reddy]&lt;br /&gt;
* [mailto:pandkhahiarian@gmail.com ArianPH]&lt;br /&gt;
* [mailto:om.mo1375@gmail.com omdmhd]&lt;br /&gt;
* [mailto:mahdirasouli007@gmail.com Mahdi Rasouli]&lt;br /&gt;
* [mailto:timonalma81@gmail.com Tikam Singh Alma]&lt;br /&gt;
* [mailto:mailto:ht974@nyu.edu Jecky]&lt;br /&gt;
* [https://github.com/VictorSuraj VictorSuraj]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker on Github]&lt;br /&gt;
* [https://groups.google.com/forum/#!forum/owasp-nettacker Mailing List]&lt;br /&gt;
* [http://nettacker.z3r0d4y.com/ OWASP Nettacker Home]&lt;br /&gt;
&lt;br /&gt;
== Be an OWASP Nettacker Developer ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Nettacker#Developers Quick Developing Help]&lt;br /&gt;
&lt;br /&gt;
==Related links==&lt;br /&gt;
*[https://github.com/zdresearch/OWASP-Nettacker Github]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zdresearch/OWASP-Nettacker Github Page.]&lt;br /&gt;
&lt;br /&gt;
[Download Page.]&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/wiki/Events ALL EVENTS AND NEWS]&lt;br /&gt;
&lt;br /&gt;
== Docs ==&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/wiki Wiki].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
To see full guides please visit our [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
You can install OWASP Nettacker by using pip install -r requirements.txt &amp;amp;&amp;amp; python setup.py install. In the feature, you will be able to install this tools from PyPi library by pip install OWASP-Nettacker (It's not available yet!). After the installation, you can run the software by using the nettacker command line on Windows, Mac OS X, Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;October, 2017, the highest priorities for the next one year&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Planning for activating features&lt;br /&gt;
* Build Nettacker API&lt;br /&gt;
* Find developers to get better performance, quality, optimizing and best improvement in minimum possible time&lt;br /&gt;
* Get other people to review the OWASP Nettacker Project provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Project and the features&lt;br /&gt;
* Keep test, developing and updating with best new methods&lt;br /&gt;
* Build and update documents in several languages for developers/users guiding &lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Developers =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
* Ali Razmjoo&lt;br /&gt;
* Mohammad Reza Espargham&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mojtaba6892@gmail.com Mojtaba MasoumPour]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* [https://github.com/camel32bit camel32bit]&lt;br /&gt;
* [mailto:sha.ravindra1307@gmail.com Ravindra Sharma]&lt;br /&gt;
* [https://github.com/avhvr Harshavardhan Reddy]&lt;br /&gt;
* [mailto:pandkhahiarian@gmail.com ArianPH]&lt;br /&gt;
* [mailto:om.mo1375@gmail.com omdmhd]&lt;br /&gt;
&lt;br /&gt;
===Be an OWASP Nettacker developer===&lt;br /&gt;
&lt;br /&gt;
Developers can add new features and if you don’t have an idea but like to develop, you can submit the issue, which software needs to be fix/add/done in [https://github.com/zdresearch/OWASP-Nettacker/issues HERE].&lt;br /&gt;
&lt;br /&gt;
After fix/add or develop something, please send your pull request and remember that your code must be compatible with python2 and python3.&lt;br /&gt;
If you have any question you can open an issue or just [mailto:owasp-nettacker@googlegroups.com mail us]. do not forget to register on our [https://groups.google.com/forum/#!forum/owasp-nettacker mailing list].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Nettacker_About_Page}}&lt;br /&gt;
&lt;br /&gt;
Please check the project [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki] on Github.&lt;br /&gt;
&lt;br /&gt;
[[File:2018-01-19 0-45-07.gif|OWASP Nettacker Demo]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Code]] &lt;br /&gt;
[[Category:OWASP_Tool]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:Shellcode]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=240530</id>
		<title>OWASP Nettacker</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=240530"/>
				<updated>2018-05-08T16:26:17Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: events&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker Project==&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Donate to OWASP Nettacker''' {{#widget:PayPal Donation |target=_blank |budget=OWASP Nettacker }}&lt;br /&gt;
====What is OWASP Nettacker ?====&lt;br /&gt;
https://www.owasp.org/images/1/1a/Nettacker_Demp.png&lt;br /&gt;
&lt;br /&gt;
'''OWASP Nettacker''' is an open source software in Python language which lets you '''automated penetration testing''' and '''automated Information Gathering'''. This software can be run on Windows/Linux/OSX under Python.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Nettacker project was created to automated for information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and information. This software is able to use SYN, ACK, TCP, ICMP and many other protocols to detect and bypass the Firewalls/IDS/IPS and devices. By using a unique solution in Nettacker to find protected services such as SCADA We could make a point to be one of the bests of scanners.&lt;br /&gt;
&lt;br /&gt;
====DISCLAIMER====&lt;br /&gt;
This tool is related to IT, Hacking, Programming, and Computer|Network|Software Security. The word “Hack”, &amp;quot;Pen testing&amp;quot;,“Hacking” that is used on these project pages shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively. This is not a tool that provides any illegal information.We do not promote hacking or software cracking. All the information provided on these pages is for educational purposes only.&lt;br /&gt;
&lt;br /&gt;
The authors of this tool are not responsible for any misuse of the information.You shall not misuse the information to gain unauthorized access and/or write malicious programs.This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.You may try all of these techniques on your own computer at your own risk.Performing any hack attempts/tests without written permission from the owner of the computer system is illegal.&lt;br /&gt;
&lt;br /&gt;
IN NO EVENT SHALL THE CREATORS, OWNER, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Features ====&lt;br /&gt;
&lt;br /&gt;
'''IoT Scanner'''&amp;lt;br&amp;gt;&lt;br /&gt;
Python Multi-Thread &amp;amp; Multi Process Network Information Gathering Vulnerability Scanner&amp;lt;br&amp;gt;&lt;br /&gt;
Service and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and much more… )&amp;lt;br&amp;gt;&lt;br /&gt;
Network Service Analysis&amp;lt;br&amp;gt;&lt;br /&gt;
Services Brute Force Testing&amp;lt;br&amp;gt;&lt;br /&gt;
Services Vulnerability Testing&amp;lt;br&amp;gt;&lt;br /&gt;
HTTP/HTTPS Crawling, Fuzzing, Information Gathering and …&amp;lt;br&amp;gt;&lt;br /&gt;
HTML and Text Outputs&amp;lt;br&amp;gt;&lt;br /&gt;
This project is at the moment in research and development phase and most of results/codes are not published yet.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
====Apache License Version 2.0, January 2004====&lt;br /&gt;
&lt;br /&gt;
The OWASP Nettacker is free to use and is licensed under the Apache 2 License. [https://github.com/zdresearch/OWASP-Nettacker/blob/master/LICENSE Click to see the full license]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact, it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders &amp;amp; Mentors ==&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Mohammad Reza Espargham]&lt;br /&gt;
* [mailto:johanna.curiel@owasp.org Johanna Curiel]&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi Afooshteh]&lt;br /&gt;
* [mailto:sriharsha.g15@ii Sri Harsha Gajavalli]&lt;br /&gt;
&lt;br /&gt;
== GSoC Interns ==&lt;br /&gt;
* [mailto:bran0793@umn.edu Hannah Brand]&lt;br /&gt;
* [mailto:shaddygarg1@gmail.com Shaddy Garg]&lt;br /&gt;
* [mailto:pradeepjairamani22@gmail.com Pradeep Jairamani]&lt;br /&gt;
&lt;br /&gt;
== Contributors &amp;amp; Main Developers ==&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mojtaba6892@gmail.com Mojtaba MasoumPour]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* [https://github.com/camel32bit camel32bit]&lt;br /&gt;
* [mailto:sha.ravindra1307@gmail.com Ravindra Sharma]&lt;br /&gt;
* [mailto:harsha010@outlook.com Harshavardhan Reddy]&lt;br /&gt;
* [mailto:pandkhahiarian@gmail.com ArianPH]&lt;br /&gt;
* [mailto:om.mo1375@gmail.com omdmhd]&lt;br /&gt;
* [mailto:mahdirasouli007@gmail.com Mahdi Rasouli]&lt;br /&gt;
* [mailto:timonalma81@gmail.com Tikam Singh Alma]&lt;br /&gt;
* [mailto:mailto:ht974@nyu.edu Jecky]&lt;br /&gt;
* [https://github.com/VictorSuraj VictorSuraj]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker on Github]&lt;br /&gt;
* [https://groups.google.com/forum/#!forum/owasp-nettacker Mailing List]&lt;br /&gt;
* [http://nettacker.z3r0d4y.com/ OWASP Nettacker Home]&lt;br /&gt;
&lt;br /&gt;
== Be an OWASP Nettacker Developer ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Nettacker#Developers Quick Developing Help]&lt;br /&gt;
&lt;br /&gt;
==Related links==&lt;br /&gt;
*[https://github.com/zdresearch/OWASP-Nettacker Github]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zdresearch/OWASP-Nettacker Github Page.]&lt;br /&gt;
&lt;br /&gt;
[Download Page.]&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/wiki/Events ALL EVENTS AND NEWS]&lt;br /&gt;
&lt;br /&gt;
== Docs ==&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/wiki Wiki].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
To see full guides please visit our [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
You can install OWASP Nettacker by using pip install -r requirements.txt &amp;amp;&amp;amp; python setup.py install. In the feature, you will be able to install this tools from PyPi library by pip install OWASP-Nettacker (It's not available yet!). After the installation, you can run the software by using the nettacker command line on Windows, Mac OS X, Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;October, 2017, the highest priorities for the next one year&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Planning for activating features&lt;br /&gt;
* Build Nettacker API&lt;br /&gt;
* Find developers to get better performance, quality, optimizing and best improvement in minimum possible time&lt;br /&gt;
* Get other people to review the OWASP Nettacker Project provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Project and the features&lt;br /&gt;
* Keep test, developing and updating with best new methods&lt;br /&gt;
* Build and update documents in several languages for developers/users guiding &lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Developers =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
* Ali Razmjoo&lt;br /&gt;
* Mohammad Reza Espargham&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mojtaba6892@gmail.com Mojtaba MasoumPour]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* [https://github.com/camel32bit camel32bit]&lt;br /&gt;
* [mailto:sha.ravindra1307@gmail.com Ravindra Sharma]&lt;br /&gt;
* [https://github.com/avhvr Harshavardhan Reddy]&lt;br /&gt;
* [mailto:pandkhahiarian@gmail.com ArianPH]&lt;br /&gt;
* [mailto:om.mo1375@gmail.com omdmhd]&lt;br /&gt;
&lt;br /&gt;
===Be an OWASP Nettacker developer===&lt;br /&gt;
&lt;br /&gt;
Developers can add new features and if you don’t have an idea but like to develop, you can submit the issue, which software needs to be fix/add/done in [https://github.com/zdresearch/OWASP-Nettacker/issues HERE].&lt;br /&gt;
&lt;br /&gt;
After fix/add or develop something, please send your pull request and remember that your code must be compatible with python2 and python3.&lt;br /&gt;
If you have any question you can open an issue or just [mailto:owasp-nettacker@googlegroups.com mail us]. do not forget to register on our [https://groups.google.com/forum/#!forum/owasp-nettacker mailing list].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Nettacker_About_Page}}&lt;br /&gt;
&lt;br /&gt;
Please check the project [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki] on Github.&lt;br /&gt;
&lt;br /&gt;
[[File:2018-01-19 0-45-07.gif|OWASP Nettacker Demo]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Code]] &lt;br /&gt;
[[Category:OWASP_Tool]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:Shellcode]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=240184</id>
		<title>OWASP Nettacker</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=240184"/>
				<updated>2018-04-23T18:32:27Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker Project==&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Donate to OWASP Nettacker''' {{#widget:PayPal Donation |target=_blank |budget=OWASP Nettacker }}&lt;br /&gt;
====What is OWASP Nettacker ?====&lt;br /&gt;
https://www.owasp.org/images/1/1a/Nettacker_Demp.png&lt;br /&gt;
&lt;br /&gt;
'''OWASP Nettacker''' is an open source software in Python language which lets you '''automated penetration testing''' and '''automated Information Gathering'''. This software can be run on Windows/Linux/OSX under Python.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Nettacker project was created to automated for information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and information. This software is able to use SYN, ACK, TCP, ICMP and many other protocols to detect and bypass the Firewalls/IDS/IPS and devices. By using a unique solution in Nettacker to find protected services such as SCADA We could make a point to be one of the bests of scanners.&lt;br /&gt;
&lt;br /&gt;
====DISCLAIMER====&lt;br /&gt;
This tool is related to IT, Hacking, Programming, and Computer|Network|Software Security. The word “Hack”, &amp;quot;Pen testing&amp;quot;,“Hacking” that is used on these project pages shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively. This is not a tool that provides any illegal information.We do not promote hacking or software cracking. All the information provided on these pages is for educational purposes only.&lt;br /&gt;
&lt;br /&gt;
The authors of this tool are not responsible for any misuse of the information.You shall not misuse the information to gain unauthorized access and/or write malicious programs.This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.You may try all of these techniques on your own computer at your own risk.Performing any hack attempts/tests without written permission from the owner of the computer system is illegal.&lt;br /&gt;
&lt;br /&gt;
IN NO EVENT SHALL THE CREATORS, OWNER, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Features ====&lt;br /&gt;
&lt;br /&gt;
'''IoT Scanner'''&amp;lt;br&amp;gt;&lt;br /&gt;
Python Multi-Thread &amp;amp; Multi Process Network Information Gathering Vulnerability Scanner&amp;lt;br&amp;gt;&lt;br /&gt;
Service and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and much more… )&amp;lt;br&amp;gt;&lt;br /&gt;
Network Service Analysis&amp;lt;br&amp;gt;&lt;br /&gt;
Services Brute Force Testing&amp;lt;br&amp;gt;&lt;br /&gt;
Services Vulnerability Testing&amp;lt;br&amp;gt;&lt;br /&gt;
HTTP/HTTPS Crawling, Fuzzing, Information Gathering and …&amp;lt;br&amp;gt;&lt;br /&gt;
HTML and Text Outputs&amp;lt;br&amp;gt;&lt;br /&gt;
This project is at the moment in research and development phase and most of results/codes are not published yet.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
====Apache License Version 2.0, January 2004====&lt;br /&gt;
&lt;br /&gt;
The OWASP Nettacker is free to use and is licensed under the Apache 2 License. [https://github.com/zdresearch/OWASP-Nettacker/blob/master/LICENSE Click to see the full license]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact, it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders &amp;amp; Mentors ==&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Mohammad Reza Espargham]&lt;br /&gt;
* [mailto:johanna.curiel@owasp.org Johanna Curiel]&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi Afooshteh]&lt;br /&gt;
* [mailto:sriharsha.g15@ii Sri Harsha Gajavalli]&lt;br /&gt;
&lt;br /&gt;
== GSoC Interns ==&lt;br /&gt;
* [mailto:bran0793@umn.edu Hannah Brand]&lt;br /&gt;
* [mailto:shaddygarg1@gmail.com Shaddy Garg]&lt;br /&gt;
* [mailto:pradeepjairamani22@gmail.com Pradeep Jairamani]&lt;br /&gt;
&lt;br /&gt;
== Contributors &amp;amp; Main Developers ==&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mojtaba6892@gmail.com Mojtaba MasoumPour]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* [https://github.com/camel32bit camel32bit]&lt;br /&gt;
* [mailto:sha.ravindra1307@gmail.com Ravindra Sharma]&lt;br /&gt;
* [mailto:harsha010@outlook.com Harshavardhan Reddy]&lt;br /&gt;
* [mailto:pandkhahiarian@gmail.com ArianPH]&lt;br /&gt;
* [mailto:om.mo1375@gmail.com omdmhd]&lt;br /&gt;
* [mailto:mahdirasouli007@gmail.com Mahdi Rasouli]&lt;br /&gt;
* [mailto:timonalma81@gmail.com Tikam Singh Alma]&lt;br /&gt;
* [mailto:mailto:ht974@nyu.edu Jecky]&lt;br /&gt;
* [https://github.com/VictorSuraj VictorSuraj]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker on Github]&lt;br /&gt;
* [https://groups.google.com/forum/#!forum/owasp-nettacker Mailing List]&lt;br /&gt;
* [http://nettacker.z3r0d4y.com/ OWASP Nettacker Home]&lt;br /&gt;
&lt;br /&gt;
== Be an OWASP Nettacker Developer ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Nettacker#Developers Quick Developing Help]&lt;br /&gt;
&lt;br /&gt;
==Related links==&lt;br /&gt;
*[https://github.com/zdresearch/OWASP-Nettacker Github]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zdresearch/OWASP-Nettacker Github Page.]&lt;br /&gt;
&lt;br /&gt;
[Download Page.]&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [https://groups.google.com/forum/#!topic/owasp-nettacker/3gscDww2sf4 OWASP Nettacker was introduced in OFFSECONF 2017]&lt;br /&gt;
* OWASP Nettacker Accepted for Google Summer of Code 2018 [[https://www.owasp.org/index.php/GSOC2018_Ideas 1]] [[https://summerofcode.withgoogle.com/organizations/6664778743808000/ 2]]&lt;br /&gt;
&lt;br /&gt;
== Docs ==&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/wiki Wiki].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
To see full guides please visit our [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
You can install OWASP Nettacker by using pip install -r requirements.txt &amp;amp;&amp;amp; python setup.py install. In the feature, you will be able to install this tools from PyPi library by pip install OWASP-Nettacker (It's not available yet!). After the installation, you can run the software by using the nettacker command line on Windows, Mac OS X, Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;October, 2017, the highest priorities for the next one year&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Planning for activating features&lt;br /&gt;
* Build Nettacker API&lt;br /&gt;
* Find developers to get better performance, quality, optimizing and best improvement in minimum possible time&lt;br /&gt;
* Get other people to review the OWASP Nettacker Project provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Project and the features&lt;br /&gt;
* Keep test, developing and updating with best new methods&lt;br /&gt;
* Build and update documents in several languages for developers/users guiding &lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Developers =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
* Ali Razmjoo&lt;br /&gt;
* Mohammad Reza Espargham&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mojtaba6892@gmail.com Mojtaba MasoumPour]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* [https://github.com/camel32bit camel32bit]&lt;br /&gt;
* [mailto:sha.ravindra1307@gmail.com Ravindra Sharma]&lt;br /&gt;
* [https://github.com/avhvr Harshavardhan Reddy]&lt;br /&gt;
* [mailto:pandkhahiarian@gmail.com ArianPH]&lt;br /&gt;
* [mailto:om.mo1375@gmail.com omdmhd]&lt;br /&gt;
&lt;br /&gt;
===Be an OWASP Nettacker developer===&lt;br /&gt;
&lt;br /&gt;
Developers can add new features and if you don’t have an idea but like to develop, you can submit the issue, which software needs to be fix/add/done in [https://github.com/zdresearch/OWASP-Nettacker/issues HERE].&lt;br /&gt;
&lt;br /&gt;
After fix/add or develop something, please send your pull request and remember that your code must be compatible with python2 and python3.&lt;br /&gt;
If you have any question you can open an issue or just [mailto:owasp-nettacker@googlegroups.com mail us]. do not forget to register on our [https://groups.google.com/forum/#!forum/owasp-nettacker mailing list].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Nettacker_About_Page}}&lt;br /&gt;
&lt;br /&gt;
Please check the project [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki] on Github.&lt;br /&gt;
&lt;br /&gt;
[[File:2018-01-19 0-45-07.gif|OWASP Nettacker Demo]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Code]] &lt;br /&gt;
[[Category:OWASP_Tool]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:Shellcode]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=240183</id>
		<title>OWASP Nettacker</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=240183"/>
				<updated>2018-04-23T18:30:50Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* Contributors &amp;amp; Main Developers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker Project==&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Donate to OWASP Nettacker''' {{#widget:PayPal Donation |target=_blank |budget=OWASP Nettacker }}&lt;br /&gt;
====What is OWASP Nettacker ?====&lt;br /&gt;
https://www.owasp.org/images/1/1a/Nettacker_Demp.png&lt;br /&gt;
&lt;br /&gt;
'''OWASP Nettacker''' is an open source software in Python language which lets you '''automated penetration testing''' and '''automated Information Gathering'''. This software can be run on Windows/Linux/OSX under Python.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Nettacker project was created to automated for information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and information. This software is able to use SYN, ACK, TCP, ICMP and many other protocols to detect and bypass the Firewalls/IDS/IPS and devices. By using a unique solution in Nettacker to find protected services such as SCADA We could make a point to be one of the bests of scanners.&lt;br /&gt;
&lt;br /&gt;
====DISCLAIMER====&lt;br /&gt;
This tool is related to IT, Hacking, Programming, and Computer|Network|Software Security. The word “Hack”, &amp;quot;Pen testing&amp;quot;,“Hacking” that is used on these project pages shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively. This is not a tool that provides any illegal information.We do not promote hacking or software cracking. All the information provided on these pages is for educational purposes only.&lt;br /&gt;
&lt;br /&gt;
The authors of this tool are not responsible for any misuse of the information.You shall not misuse the information to gain unauthorized access and/or write malicious programs.This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.You may try all of these techniques on your own computer at your own risk.Performing any hack attempts/tests without written permission from the owner of the computer system is illegal.&lt;br /&gt;
&lt;br /&gt;
IN NO EVENT SHALL THE CREATORS, OWNER, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Features ====&lt;br /&gt;
&lt;br /&gt;
'''IoT Scanner'''&amp;lt;br&amp;gt;&lt;br /&gt;
Python Multi-Thread &amp;amp; Multi Process Network Information Gathering Vulnerability Scanner&amp;lt;br&amp;gt;&lt;br /&gt;
Service and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and much more… )&amp;lt;br&amp;gt;&lt;br /&gt;
Network Service Analysis&amp;lt;br&amp;gt;&lt;br /&gt;
Services Brute Force Testing&amp;lt;br&amp;gt;&lt;br /&gt;
Services Vulnerability Testing&amp;lt;br&amp;gt;&lt;br /&gt;
HTTP/HTTPS Crawling, Fuzzing, Information Gathering and …&amp;lt;br&amp;gt;&lt;br /&gt;
HTML and Text Outputs&amp;lt;br&amp;gt;&lt;br /&gt;
This project is at the moment in research and development phase and most of results/codes are not published yet.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
====Apache License Version 2.0, January 2004====&lt;br /&gt;
&lt;br /&gt;
The OWASP Nettacker is free to use and is licensed under the Apache 2 License. [https://github.com/zdresearch/OWASP-Nettacker/blob/master/LICENSE Click to see the full license]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact, it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders &amp;amp; Mentors ==&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Mohammad Reza Espargham]&lt;br /&gt;
* [mailto:johanna.curiel@owasp.org Johanna Curiel]&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi Afooshteh]&lt;br /&gt;
* [mailto:sriharsha.g15@ii Sri Harsha Gajavalli]&lt;br /&gt;
&lt;br /&gt;
== Contributors &amp;amp; Main Developers ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mojtaba6892@gmail.com Mojtaba MasoumPour]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* [https://github.com/camel32bit camel32bit]&lt;br /&gt;
* [mailto:sha.ravindra1307@gmail.com Ravindra Sharma]&lt;br /&gt;
* [mailto:harsha010@outlook.com Harshavardhan Reddy]&lt;br /&gt;
* [mailto:pandkhahiarian@gmail.com ArianPH]&lt;br /&gt;
* [mailto:om.mo1375@gmail.com omdmhd]&lt;br /&gt;
* [mailto:mahdirasouli007@gmail.com Mahdi Rasouli]&lt;br /&gt;
* [mailto:timonalma81@gmail.com Tikam Singh Alma]&lt;br /&gt;
* [mailto:mailto:ht974@nyu.edu Jecky]&lt;br /&gt;
* [https://github.com/VictorSuraj VictorSuraj]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker on Github]&lt;br /&gt;
* [https://groups.google.com/forum/#!forum/owasp-nettacker Mailing List]&lt;br /&gt;
* [http://nettacker.z3r0d4y.com/ OWASP Nettacker Home]&lt;br /&gt;
&lt;br /&gt;
== Be an OWASP Nettacker Developer ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Nettacker#Developers Quick Developing Help]&lt;br /&gt;
&lt;br /&gt;
==Related links==&lt;br /&gt;
*[https://github.com/zdresearch/OWASP-Nettacker Github]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zdresearch/OWASP-Nettacker Github Page.]&lt;br /&gt;
&lt;br /&gt;
[Download Page.]&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [https://groups.google.com/forum/#!topic/owasp-nettacker/3gscDww2sf4 OWASP Nettacker was introduced in OFFSECONF 2017]&lt;br /&gt;
* OWASP Nettacker Accepted for Google Summer of Code 2018 [[https://www.owasp.org/index.php/GSOC2018_Ideas 1]] [[https://summerofcode.withgoogle.com/organizations/6664778743808000/ 2]]&lt;br /&gt;
&lt;br /&gt;
== Docs ==&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/wiki Wiki].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
To see full guides please visit our [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
You can install OWASP Nettacker by using pip install -r requirements.txt &amp;amp;&amp;amp; python setup.py install. In the feature, you will be able to install this tools from PyPi library by pip install OWASP-Nettacker (It's not available yet!). After the installation, you can run the software by using the nettacker command line on Windows, Mac OS X, Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;October, 2017, the highest priorities for the next one year&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Planning for activating features&lt;br /&gt;
* Build Nettacker API&lt;br /&gt;
* Find developers to get better performance, quality, optimizing and best improvement in minimum possible time&lt;br /&gt;
* Get other people to review the OWASP Nettacker Project provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Project and the features&lt;br /&gt;
* Keep test, developing and updating with best new methods&lt;br /&gt;
* Build and update documents in several languages for developers/users guiding &lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Developers =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
* Ali Razmjoo&lt;br /&gt;
* Mohammad Reza Espargham&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mojtaba6892@gmail.com Mojtaba MasoumPour]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* [https://github.com/camel32bit camel32bit]&lt;br /&gt;
* [mailto:sha.ravindra1307@gmail.com Ravindra Sharma]&lt;br /&gt;
* [https://github.com/avhvr Harshavardhan Reddy]&lt;br /&gt;
* [mailto:pandkhahiarian@gmail.com ArianPH]&lt;br /&gt;
* [mailto:om.mo1375@gmail.com omdmhd]&lt;br /&gt;
&lt;br /&gt;
===Be an OWASP Nettacker developer===&lt;br /&gt;
&lt;br /&gt;
Developers can add new features and if you don’t have an idea but like to develop, you can submit the issue, which software needs to be fix/add/done in [https://github.com/zdresearch/OWASP-Nettacker/issues HERE].&lt;br /&gt;
&lt;br /&gt;
After fix/add or develop something, please send your pull request and remember that your code must be compatible with python2 and python3.&lt;br /&gt;
If you have any question you can open an issue or just [mailto:owasp-nettacker@googlegroups.com mail us]. do not forget to register on our [https://groups.google.com/forum/#!forum/owasp-nettacker mailing list].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Nettacker_About_Page}}&lt;br /&gt;
&lt;br /&gt;
Please check the project [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki] on Github.&lt;br /&gt;
&lt;br /&gt;
[[File:2018-01-19 0-45-07.gif|OWASP Nettacker Demo]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Code]] &lt;br /&gt;
[[Category:OWASP_Tool]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:Shellcode]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=240182</id>
		<title>OWASP Nettacker</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=240182"/>
				<updated>2018-04-23T18:28:41Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker Project==&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Donate to OWASP Nettacker''' {{#widget:PayPal Donation |target=_blank |budget=OWASP Nettacker }}&lt;br /&gt;
====What is OWASP Nettacker ?====&lt;br /&gt;
https://www.owasp.org/images/1/1a/Nettacker_Demp.png&lt;br /&gt;
&lt;br /&gt;
'''OWASP Nettacker''' is an open source software in Python language which lets you '''automated penetration testing''' and '''automated Information Gathering'''. This software can be run on Windows/Linux/OSX under Python.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Nettacker project was created to automated for information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and information. This software is able to use SYN, ACK, TCP, ICMP and many other protocols to detect and bypass the Firewalls/IDS/IPS and devices. By using a unique solution in Nettacker to find protected services such as SCADA We could make a point to be one of the bests of scanners.&lt;br /&gt;
&lt;br /&gt;
====DISCLAIMER====&lt;br /&gt;
This tool is related to IT, Hacking, Programming, and Computer|Network|Software Security. The word “Hack”, &amp;quot;Pen testing&amp;quot;,“Hacking” that is used on these project pages shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively. This is not a tool that provides any illegal information.We do not promote hacking or software cracking. All the information provided on these pages is for educational purposes only.&lt;br /&gt;
&lt;br /&gt;
The authors of this tool are not responsible for any misuse of the information.You shall not misuse the information to gain unauthorized access and/or write malicious programs.This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.You may try all of these techniques on your own computer at your own risk.Performing any hack attempts/tests without written permission from the owner of the computer system is illegal.&lt;br /&gt;
&lt;br /&gt;
IN NO EVENT SHALL THE CREATORS, OWNER, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Features ====&lt;br /&gt;
&lt;br /&gt;
'''IoT Scanner'''&amp;lt;br&amp;gt;&lt;br /&gt;
Python Multi-Thread &amp;amp; Multi Process Network Information Gathering Vulnerability Scanner&amp;lt;br&amp;gt;&lt;br /&gt;
Service and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and much more… )&amp;lt;br&amp;gt;&lt;br /&gt;
Network Service Analysis&amp;lt;br&amp;gt;&lt;br /&gt;
Services Brute Force Testing&amp;lt;br&amp;gt;&lt;br /&gt;
Services Vulnerability Testing&amp;lt;br&amp;gt;&lt;br /&gt;
HTTP/HTTPS Crawling, Fuzzing, Information Gathering and …&amp;lt;br&amp;gt;&lt;br /&gt;
HTML and Text Outputs&amp;lt;br&amp;gt;&lt;br /&gt;
This project is at the moment in research and development phase and most of results/codes are not published yet.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
====Apache License Version 2.0, January 2004====&lt;br /&gt;
&lt;br /&gt;
The OWASP Nettacker is free to use and is licensed under the Apache 2 License. [https://github.com/zdresearch/OWASP-Nettacker/blob/master/LICENSE Click to see the full license]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact, it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders &amp;amp; Mentors ==&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Mohammad Reza Espargham]&lt;br /&gt;
* [mailto:johanna.curiel@owasp.org Johanna Curiel]&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi Afooshteh]&lt;br /&gt;
* [mailto:sriharsha.g15@ii Sri Harsha Gajavalli]&lt;br /&gt;
&lt;br /&gt;
== Contributors &amp;amp; Main Developers ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mojtaba6892@gmail.com Mojtaba MasoumPour]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* [https://github.com/camel32bit camel32bit]&lt;br /&gt;
* [mailto:sha.ravindra1307@gmail.com Ravindra Sharma]&lt;br /&gt;
* [mailto:harsha010@outlook.com Harshavardhan Reddy]&lt;br /&gt;
* [mailto:pandkhahiarian@gmail.com ArianPH]&lt;br /&gt;
* [mailto:om.mo1375@gmail.com omdmhd]&lt;br /&gt;
* [mailto:mahdirasouli007@gmail.com Mahdi Rasouli]&lt;br /&gt;
* [mailto:shaddygarg1@gmail.com Shaddy Garg]&lt;br /&gt;
* [mailto:pradeepjairamani22@gmail.com Pradeep Jairamani]&lt;br /&gt;
* [mailto:timonalma81@gmail.com Tikam Singh Alma]&lt;br /&gt;
* [mailto:mailto:ht974@nyu.edu Jecky]&lt;br /&gt;
* [https://github.com/VictorSuraj VictorSuraj]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker on Github]&lt;br /&gt;
* [https://groups.google.com/forum/#!forum/owasp-nettacker Mailing List]&lt;br /&gt;
* [http://nettacker.z3r0d4y.com/ OWASP Nettacker Home]&lt;br /&gt;
&lt;br /&gt;
== Be an OWASP Nettacker Developer ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Nettacker#Developers Quick Developing Help]&lt;br /&gt;
&lt;br /&gt;
==Related links==&lt;br /&gt;
*[https://github.com/zdresearch/OWASP-Nettacker Github]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zdresearch/OWASP-Nettacker Github Page.]&lt;br /&gt;
&lt;br /&gt;
[Download Page.]&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [https://groups.google.com/forum/#!topic/owasp-nettacker/3gscDww2sf4 OWASP Nettacker was introduced in OFFSECONF 2017]&lt;br /&gt;
* OWASP Nettacker Accepted for Google Summer of Code 2018 [[https://www.owasp.org/index.php/GSOC2018_Ideas 1]] [[https://summerofcode.withgoogle.com/organizations/6664778743808000/ 2]]&lt;br /&gt;
&lt;br /&gt;
== Docs ==&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/wiki Wiki].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
To see full guides please visit our [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
You can install OWASP Nettacker by using pip install -r requirements.txt &amp;amp;&amp;amp; python setup.py install. In the feature, you will be able to install this tools from PyPi library by pip install OWASP-Nettacker (It's not available yet!). After the installation, you can run the software by using the nettacker command line on Windows, Mac OS X, Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;October, 2017, the highest priorities for the next one year&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Planning for activating features&lt;br /&gt;
* Build Nettacker API&lt;br /&gt;
* Find developers to get better performance, quality, optimizing and best improvement in minimum possible time&lt;br /&gt;
* Get other people to review the OWASP Nettacker Project provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Project and the features&lt;br /&gt;
* Keep test, developing and updating with best new methods&lt;br /&gt;
* Build and update documents in several languages for developers/users guiding &lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Developers =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
* Ali Razmjoo&lt;br /&gt;
* Mohammad Reza Espargham&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mojtaba6892@gmail.com Mojtaba MasoumPour]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* [https://github.com/camel32bit camel32bit]&lt;br /&gt;
* [mailto:sha.ravindra1307@gmail.com Ravindra Sharma]&lt;br /&gt;
* [https://github.com/avhvr Harshavardhan Reddy]&lt;br /&gt;
* [mailto:pandkhahiarian@gmail.com ArianPH]&lt;br /&gt;
* [mailto:om.mo1375@gmail.com omdmhd]&lt;br /&gt;
&lt;br /&gt;
===Be an OWASP Nettacker developer===&lt;br /&gt;
&lt;br /&gt;
Developers can add new features and if you don’t have an idea but like to develop, you can submit the issue, which software needs to be fix/add/done in [https://github.com/zdresearch/OWASP-Nettacker/issues HERE].&lt;br /&gt;
&lt;br /&gt;
After fix/add or develop something, please send your pull request and remember that your code must be compatible with python2 and python3.&lt;br /&gt;
If you have any question you can open an issue or just [mailto:owasp-nettacker@googlegroups.com mail us]. do not forget to register on our [https://groups.google.com/forum/#!forum/owasp-nettacker mailing list].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Nettacker_About_Page}}&lt;br /&gt;
&lt;br /&gt;
Please check the project [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki] on Github.&lt;br /&gt;
&lt;br /&gt;
[[File:2018-01-19 0-45-07.gif|OWASP Nettacker Demo]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Code]] &lt;br /&gt;
[[Category:OWASP_Tool]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:Shellcode]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=240181</id>
		<title>OWASP Nettacker</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=240181"/>
				<updated>2018-04-23T18:27:37Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: /* Project Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker Project==&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Donate to OWASP Nettacker''' {{#widget:PayPal Donation |target=_blank |budget=OWASP Nettacker }}&lt;br /&gt;
====What is OWASP Nettacker ?====&lt;br /&gt;
https://www.owasp.org/images/1/1a/Nettacker_Demp.png&lt;br /&gt;
&lt;br /&gt;
'''OWASP Nettacker''' is an open source software in Python language which lets you '''automated penetration testing''' and '''automated Information Gathering'''. This software can be run on Windows/Linux/OSX under Python.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Nettacker project was created to automated for information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and information. This software is able to use SYN, ACK, TCP, ICMP and many other protocols to detect and bypass the Firewalls/IDS/IPS and devices. By using a unique solution in Nettacker to find protected services such as SCADA We could make a point to be one of the bests of scanners.&lt;br /&gt;
&lt;br /&gt;
====DISCLAIMER====&lt;br /&gt;
This tool is related to IT, Hacking, Programming, and Computer|Network|Software Security. The word “Hack”, &amp;quot;Pen testing&amp;quot;,“Hacking” that is used on these project pages shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively. This is not a tool that provides any illegal information.We do not promote hacking or software cracking. All the information provided on these pages is for educational purposes only.&lt;br /&gt;
&lt;br /&gt;
The authors of this tool are not responsible for any misuse of the information.You shall not misuse the information to gain unauthorized access and/or write malicious programs.This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.You may try all of these techniques on your own computer at your own risk.Performing any hack attempts/tests without written permission from the owner of the computer system is illegal.&lt;br /&gt;
&lt;br /&gt;
IN NO EVENT SHALL THE CREATORS, OWNER, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Features ====&lt;br /&gt;
&lt;br /&gt;
'''IoT Scanner'''&amp;lt;br&amp;gt;&lt;br /&gt;
Python Multi-Thread &amp;amp; Multi Process Network Information Gathering Vulnerability Scanner&amp;lt;br&amp;gt;&lt;br /&gt;
Service and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and much more… )&amp;lt;br&amp;gt;&lt;br /&gt;
Network Service Analysis&amp;lt;br&amp;gt;&lt;br /&gt;
Services Brute Force Testing&amp;lt;br&amp;gt;&lt;br /&gt;
Services Vulnerability Testing&amp;lt;br&amp;gt;&lt;br /&gt;
HTTP/HTTPS Crawling, Fuzzing, Information Gathering and …&amp;lt;br&amp;gt;&lt;br /&gt;
HTML and Text Outputs&amp;lt;br&amp;gt;&lt;br /&gt;
This project is at the moment in research and development phase and most of results/codes are not published yet.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
====Apache License Version 2.0, January 2004====&lt;br /&gt;
&lt;br /&gt;
The OWASP Nettacker is free to use and is licensed under the Apache 2 License. [https://github.com/zdresearch/OWASP-Nettacker/blob/master/LICENSE Click to see the full license]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact, it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders &amp;amp; Mentors ==&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo]&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Mohammad Reza Espargham]&lt;br /&gt;
* [mailto:johanna.curiel@owasp.org Johanna Curiel]&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi Afooshteh]&lt;br /&gt;
* [mailto:sriharsha.g15@ii Sri Harsha Gajavalli]&lt;br /&gt;
&lt;br /&gt;
== Contributors &amp;amp; Main Developers ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mojtaba6892@gmail.com Mojtaba MasoumPour]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* [https://github.com/camel32bit camel32bit]&lt;br /&gt;
* [mailto:sha.ravindra1307@gmail.com Ravindra Sharma]&lt;br /&gt;
* [mailto:harsha010@outlook.com Harshavardhan Reddy]&lt;br /&gt;
* [mailto:pandkhahiarian@gmail.com ArianPH]&lt;br /&gt;
* [mailto:om.mo1375@gmail.com omdmhd]&lt;br /&gt;
* [mailto:mahdirasouli007@gmail.com Mahdi Rasouli]&lt;br /&gt;
* [mailto:shaddygarg1@gmail.com Shaddy Garg]&lt;br /&gt;
* [mailto:pradeepjairamani22@gmail.com Pradeep Jairamani]&lt;br /&gt;
* [mailto:timonalma81@gmail.com Tikam Singh Alma]&lt;br /&gt;
* [mailto:mailto:ht974@nyu.edu Jecky]&lt;br /&gt;
* [https://github.com/VictorSuraj VictorSuraj]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker on Github]&lt;br /&gt;
* [https://groups.google.com/forum/#!forum/owasp-nettacker Mailing List]&lt;br /&gt;
* [http://nettacker.z3r0d4y.com/ OWASP Nettacker Home]&lt;br /&gt;
&lt;br /&gt;
== Be an OWASP Nettacker Developer ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Nettacker#Developers Quick Developing Help]&lt;br /&gt;
&lt;br /&gt;
==Related links==&lt;br /&gt;
*[https://github.com/zdresearch/OWASP-Nettacker Github]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zdresearch/OWASP-Nettacker Github Page.]&lt;br /&gt;
&lt;br /&gt;
[Download Page.]&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [https://groups.google.com/forum/#!topic/owasp-nettacker/3gscDww2sf4 OWASP Nettacker was introduced in OFFSECONF 2017]&lt;br /&gt;
* OWASP Nettacker Accepted for Google Summer of Code 2018 [[https://www.owasp.org/index.php/GSOC2018_Ideas 1]]&lt;br /&gt;
&lt;br /&gt;
== Docs ==&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/wiki Wiki].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
To see full guides please visit our [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
You can install OWASP Nettacker by using pip install -r requirements.txt &amp;amp;&amp;amp; python setup.py install. In the feature, you will be able to install this tools from PyPi library by pip install OWASP-Nettacker (It's not available yet!). After the installation, you can run the software by using the nettacker command line on Windows, Mac OS X, Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;October, 2017, the highest priorities for the next one year&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Planning for activating features&lt;br /&gt;
* Build Nettacker API&lt;br /&gt;
* Find developers to get better performance, quality, optimizing and best improvement in minimum possible time&lt;br /&gt;
* Get other people to review the OWASP Nettacker Project provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Project and the features&lt;br /&gt;
* Keep test, developing and updating with best new methods&lt;br /&gt;
* Build and update documents in several languages for developers/users guiding &lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Developers =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
* Ali Razmjoo&lt;br /&gt;
* Mohammad Reza Espargham&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mojtaba6892@gmail.com Mojtaba MasoumPour]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* [https://github.com/camel32bit camel32bit]&lt;br /&gt;
* [mailto:sha.ravindra1307@gmail.com Ravindra Sharma]&lt;br /&gt;
* [https://github.com/avhvr Harshavardhan Reddy]&lt;br /&gt;
* [mailto:pandkhahiarian@gmail.com ArianPH]&lt;br /&gt;
* [mailto:om.mo1375@gmail.com omdmhd]&lt;br /&gt;
&lt;br /&gt;
===Be an OWASP Nettacker developer===&lt;br /&gt;
&lt;br /&gt;
Developers can add new features and if you don’t have an idea but like to develop, you can submit the issue, which software needs to be fix/add/done in [https://github.com/zdresearch/OWASP-Nettacker/issues HERE].&lt;br /&gt;
&lt;br /&gt;
After fix/add or develop something, please send your pull request and remember that your code must be compatible with python2 and python3.&lt;br /&gt;
If you have any question you can open an issue or just [mailto:owasp-nettacker@googlegroups.com mail us]. do not forget to register on our [https://groups.google.com/forum/#!forum/owasp-nettacker mailing list].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Nettacker_About_Page}}&lt;br /&gt;
&lt;br /&gt;
Please check the project [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki] on Github.&lt;br /&gt;
&lt;br /&gt;
[[File:2018-01-19 0-45-07.gif|OWASP Nettacker Demo]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Code]] &lt;br /&gt;
[[Category:OWASP_Tool]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:Shellcode]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=240171</id>
		<title>OWASP Nettacker</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=240171"/>
				<updated>2018-04-23T09:37:09Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: add developer&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker Project==&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Donate to OWASP Nettacker''' {{#widget:PayPal Donation |target=_blank |budget=OWASP Nettacker }}&lt;br /&gt;
====What is OWASP Nettacker ?====&lt;br /&gt;
https://www.owasp.org/images/1/1a/Nettacker_Demp.png&lt;br /&gt;
&lt;br /&gt;
'''OWASP Nettacker''' is an open source software in Python language which lets you '''automated penetration testing''' and '''automated Information Gathering'''. This software can be run on Windows/Linux/OSX under Python.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Nettacker project was created to automated for information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and information. This software is able to use SYN, ACK, TCP, ICMP and many other protocols to detect and bypass the Firewalls/IDS/IPS and devices. By using a unique solution in Nettacker to find protected services such as SCADA We could make a point to be one of the bests of scanners.&lt;br /&gt;
&lt;br /&gt;
====DISCLAIMER====&lt;br /&gt;
This tool is related to IT, Hacking, Programming, and Computer|Network|Software Security. The word “Hack”, &amp;quot;Pen testing&amp;quot;,“Hacking” that is used on these project pages shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively. This is not a tool that provides any illegal information.We do not promote hacking or software cracking. All the information provided on these pages is for educational purposes only.&lt;br /&gt;
&lt;br /&gt;
The authors of this tool are not responsible for any misuse of the information.You shall not misuse the information to gain unauthorized access and/or write malicious programs.This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.You may try all of these techniques on your own computer at your own risk.Performing any hack attempts/tests without written permission from the owner of the computer system is illegal.&lt;br /&gt;
&lt;br /&gt;
IN NO EVENT SHALL THE CREATORS, OWNER, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Features ====&lt;br /&gt;
&lt;br /&gt;
'''IoT Scanner'''&amp;lt;br&amp;gt;&lt;br /&gt;
Python Multi-Thread &amp;amp; Multi Process Network Information Gathering Vulnerability Scanner&amp;lt;br&amp;gt;&lt;br /&gt;
Service and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and much more… )&amp;lt;br&amp;gt;&lt;br /&gt;
Network Service Analysis&amp;lt;br&amp;gt;&lt;br /&gt;
Services Brute Force Testing&amp;lt;br&amp;gt;&lt;br /&gt;
Services Vulnerability Testing&amp;lt;br&amp;gt;&lt;br /&gt;
HTTP/HTTPS Crawling, Fuzzing, Information Gathering and …&amp;lt;br&amp;gt;&lt;br /&gt;
HTML and Text Outputs&amp;lt;br&amp;gt;&lt;br /&gt;
This project is at the moment in research and development phase and most of results/codes are not published yet.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
====Apache License Version 2.0, January 2004====&lt;br /&gt;
&lt;br /&gt;
The OWASP Nettacker is free to use and is licensed under the Apache 2 License. [https://github.com/zdresearch/OWASP-Nettacker/blob/master/LICENSE Click to see the full license]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact, it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ali_Razmjoo Ali Razmjoo]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rezasp Mohammad Reza Espargham]&lt;br /&gt;
* [mailto:johanna.curiel@owasp.org Johanna Curiel]&lt;br /&gt;
&lt;br /&gt;
== Contributors &amp;amp; Main Developers ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mojtaba6892@gmail.com Mojtaba MasoumPour]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* [https://github.com/camel32bit camel32bit]&lt;br /&gt;
* [mailto:sha.ravindra1307@gmail.com Ravindra Sharma]&lt;br /&gt;
* [mailto:harsha010@outlook.com Harshavardhan Reddy]&lt;br /&gt;
* [mailto:pandkhahiarian@gmail.com ArianPH]&lt;br /&gt;
* [mailto:om.mo1375@gmail.com omdmhd]&lt;br /&gt;
* [mailto:mahdirasouli007@gmail.com Mahdi Rasouli]&lt;br /&gt;
* [mailto:shaddygarg1@gmail.com Shaddy Garg]&lt;br /&gt;
* [mailto:pradeepjairamani22@gmail.com Pradeep Jairamani]&lt;br /&gt;
* [mailto:timonalma81@gmail.com Tikam Singh Alma]&lt;br /&gt;
* [mailto:mailto:ht974@nyu.edu Jecky]&lt;br /&gt;
* [https://github.com/VictorSuraj VictorSuraj]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker on Github]&lt;br /&gt;
* [https://groups.google.com/forum/#!forum/owasp-nettacker Mailing List]&lt;br /&gt;
* [http://nettacker.z3r0d4y.com/ OWASP Nettacker Home]&lt;br /&gt;
&lt;br /&gt;
== Be an OWASP Nettacker Developer ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Nettacker#Developers Quick Developing Help]&lt;br /&gt;
&lt;br /&gt;
==Related links==&lt;br /&gt;
*[https://github.com/zdresearch/OWASP-Nettacker Github]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zdresearch/OWASP-Nettacker Github Page.]&lt;br /&gt;
&lt;br /&gt;
[Download Page.]&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [https://groups.google.com/forum/#!topic/owasp-nettacker/3gscDww2sf4 OWASP Nettacker was introduced in OFFSECONF 2017]&lt;br /&gt;
* OWASP Nettacker Accepted for Google Summer of Code 2018 [[https://www.owasp.org/index.php/GSOC2018_Ideas 1]]&lt;br /&gt;
&lt;br /&gt;
== Docs ==&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/wiki Wiki].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
To see full guides please visit our [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
You can install OWASP Nettacker by using pip install -r requirements.txt &amp;amp;&amp;amp; python setup.py install. In the feature, you will be able to install this tools from PyPi library by pip install OWASP-Nettacker (It's not available yet!). After the installation, you can run the software by using the nettacker command line on Windows, Mac OS X, Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;October, 2017, the highest priorities for the next one year&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Planning for activating features&lt;br /&gt;
* Build Nettacker API&lt;br /&gt;
* Find developers to get better performance, quality, optimizing and best improvement in minimum possible time&lt;br /&gt;
* Get other people to review the OWASP Nettacker Project provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Project and the features&lt;br /&gt;
* Keep test, developing and updating with best new methods&lt;br /&gt;
* Build and update documents in several languages for developers/users guiding &lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Developers =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
* Ali Razmjoo&lt;br /&gt;
* Mohammad Reza Espargham&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mojtaba6892@gmail.com Mojtaba MasoumPour]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* [https://github.com/camel32bit camel32bit]&lt;br /&gt;
* [mailto:sha.ravindra1307@gmail.com Ravindra Sharma]&lt;br /&gt;
* [https://github.com/avhvr Harshavardhan Reddy]&lt;br /&gt;
* [mailto:pandkhahiarian@gmail.com ArianPH]&lt;br /&gt;
* [mailto:om.mo1375@gmail.com omdmhd]&lt;br /&gt;
&lt;br /&gt;
===Be an OWASP Nettacker developer===&lt;br /&gt;
&lt;br /&gt;
Developers can add new features and if you don’t have an idea but like to develop, you can submit the issue, which software needs to be fix/add/done in [https://github.com/zdresearch/OWASP-Nettacker/issues HERE].&lt;br /&gt;
&lt;br /&gt;
After fix/add or develop something, please send your pull request and remember that your code must be compatible with python2 and python3.&lt;br /&gt;
If you have any question you can open an issue or just [mailto:owasp-nettacker@googlegroups.com mail us]. do not forget to register on our [https://groups.google.com/forum/#!forum/owasp-nettacker mailing list].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Nettacker_About_Page}}&lt;br /&gt;
&lt;br /&gt;
Please check the project [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki] on Github.&lt;br /&gt;
&lt;br /&gt;
[[File:2018-01-19 0-45-07.gif|OWASP Nettacker Demo]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Code]] &lt;br /&gt;
[[Category:OWASP_Tool]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:Shellcode]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ZSC_Tool_Project&amp;diff=240119</id>
		<title>OWASP ZSC Tool Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ZSC_Tool_Project&amp;diff=240119"/>
				<updated>2018-04-20T18:44:20Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ZSC Tool Project==&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Donate to OWASP ZSC''' {{#widget:PayPal Donation |target=_blank |budget=OWASP ZSC }}&lt;br /&gt;
&lt;br /&gt;
====What is OWASP ZSC ?====&lt;br /&gt;
http://zsc.z3r0d4y.com/images/Snapshot_2015-07-26_191951-half.png&lt;br /&gt;
&lt;br /&gt;
'''OWASP ZSC''' is an open source software in Python language which lets you '''generate customized shellcodes''' and '''convert scripts to an obfuscated script'''. This software can be run on Windows/Linux/OSX under Python.&lt;br /&gt;
&lt;br /&gt;
[[File:Zsc1.png|200px]]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
====Usage of shellcodes====&lt;br /&gt;
&lt;br /&gt;
Shellcodes are small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malwares, bypassing antiviruses, obfuscated codes and etc.&lt;br /&gt;
&lt;br /&gt;
====DISCLAIMER====&lt;br /&gt;
This tool is related to IT, Hacking, Programming and Computer|Network|Software Security. The word “Hack”, &amp;quot;Pen testing&amp;quot;,“Hacking” that is used on these project pages shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively. This is not a tool that provides any illegal information.We do not promote hacking or software cracking. All the information provided on these pages is for educational purposes only.&lt;br /&gt;
&lt;br /&gt;
The authors of this tool are not responsible for any misuse of the information.You shall not misuse the information to gain unauthorized access and/or write malicious programs.This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.You may try all of these techniques on your own computer at your own risk.Performing any hack attempts/tests without written permission from the owner of the computer system is illegal.&lt;br /&gt;
&lt;br /&gt;
IN NO EVENT SHALL THE CREATORS, OWNER, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.&lt;br /&gt;
&lt;br /&gt;
====Usage of Obfuscate Codes====&lt;br /&gt;
&lt;br /&gt;
Can be used for bypassing antiviruses, code protections, same stuff etc … &lt;br /&gt;
&lt;br /&gt;
====Why use OWASP ZSC ?====&lt;br /&gt;
&lt;br /&gt;
Another good reason for obfuscating files or generating shellcode with ZSC is that it can be used during your pen-testing. Malicious hackers use these techniques to bypass anti-virus and load malicious files in systems they have hacked using customized shellcode generators.&lt;br /&gt;
Anti-virus work with signatures in order to identify harmful files. When using very well known encoders such as msfvenom, files generated by this program might be already flagged by Anti-virus programs.&lt;br /&gt;
&lt;br /&gt;
Our purpose is not to provide a way to bypass anti-virus with malicious intentions, instead, we want to provide pen-testers a way to challenge the security provided by Anti-virus programs and Intrusion Detection systems during a pen test.In this way, they can verify the security just as a black-hat will do.&lt;br /&gt;
&lt;br /&gt;
According to other shellcode generators same as Metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won't detect.&lt;br /&gt;
OWASP ZSC encoders are able to generate shell codes with random encodes and that allows you to generate thousands of new dynamic shellcodes with the same job in just a second, that means, you will not get the same code if you use random encodes with same commands, And that make OWASP ZSC one of the best! &lt;br /&gt;
During the Google Summer of Code we are working on to generate Windows Shellcode and new obfuscation methods.&lt;br /&gt;
We are working on the next version that will allow you to generate OSX.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
====GNU GENERAL PUBLIC LICENSE , Version 3, 29 June 2007====&lt;br /&gt;
&lt;br /&gt;
Copyright (C) 2007 Free Software Foundation, Inc. http://fsf.org/ Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [https://github.com/Ali-Razmjoo/OWASP-ZSC/blob/master/LICENSE.md Click to see the full license]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact it is encouraged!!!&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ali_Razmjoo Ali Razmjoo]&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Johanna_Curiel Johanna Curiel]&lt;br /&gt;
&lt;br /&gt;
== Contributors &amp;amp; Main Developers ==&lt;br /&gt;
&lt;br /&gt;
* [http://pratikpatelp.blogspot.in Pratik Patel] (Google Summer of Code student 2016) &lt;br /&gt;
* [https://codemaxx.github.io Akash Trehan] (CodeMaxx)&lt;br /&gt;
* [https://paraschetal.in Paras Chetal] (Gsoc candidate 2016)&lt;br /&gt;
* Brian Beaudry (Gsoc Mentor 2016)&lt;br /&gt;
* Hamid Zamani (HAMIDx9)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [http://api.z3r0d4y.com/ API]&lt;br /&gt;
* [https://github.com/Ali-Razmjoo/OWASP-ZSC Project on Github]&lt;br /&gt;
* [https://groups.google.com/d/forum/owasp-zsc Mailing List]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/ OWASP ZSC Home]&lt;br /&gt;
* [https://www.openhub.net/p/OWASP-ZSC OpenHub]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/table.html Last Version Features]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/wiki Wiki]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/download Download]&lt;br /&gt;
* [https://github.com/Ali-Razmjoo/ZCR-Shellcoder-Archive Archive]&lt;br /&gt;
&lt;br /&gt;
== Shellcode Generating ==&lt;br /&gt;
With using '''OWASP ZSC''' you would be able to generate any customized '''Shellcode''' in your mind including encodes and Disassembly code in few seconds.&lt;br /&gt;
&lt;br /&gt;
== Be an OWASP ZSC developer ==&lt;br /&gt;
* [https://www.owasp.org/index.php?title=OWASP_ZSC_Tool_Project&amp;amp;action=submit#Developers Quick Developing Help]&lt;br /&gt;
&lt;br /&gt;
== Last Tricks in Home ==&lt;br /&gt;
* [http://zsc.z3r0d4y.com/blog/archives/ All Tricks]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/blog/2015/08/01/generate-pe-file-with-zsc-shellcodes/ Shellcode to PE File]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/blog/2015/07/27/video-how-to-install-and-generate-shellcode-using-zsc/ Video: Install&amp;amp;Generate Shellcode]&lt;br /&gt;
&lt;br /&gt;
==Related links==&lt;br /&gt;
*[https://www.youtube.com/watch?v=nkx0HQhYdmY| Appsec Presentation 2013 Beef and Custome shellcodes]&lt;br /&gt;
*[https://www.owasp.org/index.php/File:Introduction_to_shellcode_development.pdf| Introduction to Shellcode Development]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zscproject/OWASP-ZSC Github Page.]&lt;br /&gt;
&lt;br /&gt;
[http://zsc.z3r0d4y.com/download/ Download Page.]&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zscproject/OWASP-ZSC/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/zscproject/OWASP-ZSC/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Code_Sprint_2017#OWASP_ZSC OWASP ZSC in OWASP Code Sprint 2017]&lt;br /&gt;
* [http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/ OWASP ZSC Selected as Top 10 Security tools in 2016 By ToolsWatch]&lt;br /&gt;
* [https://groups.google.com/forum/#!topic/owasp-zsc/t12M2fxn78k OWASP ZSC Presented in OFFSECONF 2016]&lt;br /&gt;
* [https://www.blackhat.com/eu-16/arsenal.html#brian-beaudry Been Selected for Blackhat EU Arsenal 2016]&lt;br /&gt;
* [https://www.defcon.org/html/defcon-24/dc-24-demolabs.html#Curiel  OWASP ZSC has been selected for Defcon Demo Lab 2016]&lt;br /&gt;
* [https://summerofcode.withgoogle.com/archive/2016/projects/5969824152813568/ OWASP ZSC applied and was selected to participate in the Google Summer of Code 2016]&lt;br /&gt;
* [https://www.linkedin.com/pulse/lessons-from-cyber-underworld-how-understand-software-ali-razmjoo Press Release 12th February 2015 ]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/ OWASP ZSC Version 1.0.9.1 Released!]&lt;br /&gt;
* [https://github.com/longld/peda OWASP ZSC in GDB-PEDA]&lt;br /&gt;
&lt;br /&gt;
== Docs ==&lt;br /&gt;
* [https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc Developers and Users Documents].&lt;br /&gt;
* [http://zsc.z3r0d4y.com/ OWASP ZSC Home]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
To see full guides please visit our [http://zsc.z3r0d4y.com/wiki wiki page].&lt;br /&gt;
&lt;br /&gt;
====Help Menu====&lt;br /&gt;
&lt;br /&gt;
'''PLEASE CLICK [https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc HERE] TO SEE FULL DEVELOPERS AND USERS DOCUMENTS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======OWASP ZSC Project======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in Python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Usage of shellcodes======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Shellcodes are small codes in Assembly Languagewhich could be used as the payload in software exploiting. Other usages are in malwares, bypassing anti viruses, obfuscated codes and etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Usage of Obfuscate Codes======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Can be used for bypassing antiviruses, code protections, same stuff etc … &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Why use OWASP ZSC ?======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
According to other shellcode generators such as Metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won't detect. OWASP ZSC encoders are able to generate shell codes with random encodes that allows you to generate thousands of new dynamic shell codes with the same job in just a second, it means you will not get the same code if you use random encodes with the same commands, and that makes OWASP ZSC one of the best! &lt;br /&gt;
OWASP ZSC can generate shellcode for Linux and Windows _x86&lt;br /&gt;
Upcoming features will allow generating shellcodes for OSX &lt;br /&gt;
And new encodes for the code obfuscation.&lt;br /&gt;
&lt;br /&gt;
======User Guides======&lt;br /&gt;
&lt;br /&gt;
To run '''OWASP ZSC''', You need to install python `2.x|3.x` on your operation system `Windows|Linux|OSX`, Then it could be run directly with executing `zsc.py` or run the software after you installed it! To see the user manuals, Please follow the next steps!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Generating Shellcode======&lt;br /&gt;
&lt;br /&gt;
Via `zsc` command, you are able to enter the software [or run python zsc.py if you don’t want to install it], Then you can have a list of menu with entering `help`. You can have your choices with pressing `tab` key on each step. To generate shellcode, you have to type `shellcode` and then press enter, after that, you can see what’s available in `shellcode` section. There is `generate` , `search` and `download` choices in here which use for `generate shellcodes`, `search` and `download` shellcode from shellstorm.  To generate a shellcode, type `generate` and press enter, after that with a `tab` key, you can have list of operation systems available in there. With pressing `tab` key again, functions will be shown for you in this step [ such as `exec` ,`systm`,`write` and `etc`]. choose your function by writing the name `example: exec` and press inter. In the next section you have to fill the argv of function which exec() function have one `example: exec(&amp;quot;/bin/bash&amp;quot;)`, all you need in this section is pressing a `tab` and then `enter` key, software will automatically ask you for function argv. Fill them and next section software will ask you for shellcode type which can be `none` or choose one of listed encoding types. After entering that, your shellcode is ready!&lt;br /&gt;
There is one more way to have a shellcode from software, which is using shellstorm API. Following the `shellcode`, and then `search` commands to search for a shellcode. After that shellcodes will be listed for you with title name , ID and etc. you can download them with  following `shellcode` and then `download` command to download them with the ID which shown to you in the past section! For canceling each section, you can use `restart` command to restart the software and start new task!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Generating Obfuscate Code======&lt;br /&gt;
&lt;br /&gt;
With the following `obfuscate` command, you can begin the step for obfuscating a code. With a `tab` key , you can see the list of languages along with the obfuscating module ready. After choosing the language software will ask you for a filename which is a filename of file you want to obfuscate that! Next step software will ask you for encode type. With a `tab` key list the encode modules and choose your encode name. your file rewrited and converted to a obfuscate with encode type you chosen. And do not worry about your original code, it’s saved in file as a comment!&lt;br /&gt;
&lt;br /&gt;
Please click '''[https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc HERE]''' to read more!&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
Go to download page, and download last version in github. Extract and run installer.py, then you are able to run software with OWASP ZSC command or you can directly execute zsc.py without installing it.or you can follow these commands to install the last version:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;lt;nowiki&amp;gt;wget https://github.com/Ali-Razmjoo/OWASP-ZSC/archive/master.zip -O owasp-zsc.zip &amp;amp;&amp;amp; unzip owasp-zsc.zip &amp;amp;&amp;amp; &lt;br /&gt;
rm -rf owasp-zsc.zip &amp;amp;&amp;amp; mv OWASP-ZSC-master owasp-zsc &amp;amp;&amp;amp; cd owasp-zsc &amp;amp;&amp;amp; python installer.py&amp;lt;/nowiki&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://zsc.z3r0d4y.com/images/Snapshot_2015-07-27_114843.png&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Note''': Software could be '''uninstall''' with executing '''uninstaller.py'''&lt;br /&gt;
&lt;br /&gt;
'''Note''': Software installation directory is &amp;quot;'''/usr/share/owasp-zsc'''&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Note''': &amp;lt;strong&amp;gt;OWASP ZSC&amp;lt;/strong&amp;gt; Tool could be execute on &amp;lt;strong&amp;gt;Linux&amp;lt;/strong&amp;gt; and &amp;lt;strong&amp;gt;Python 2.7.x &amp;lt;/strong&amp;gt;is required.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;August, 2016, the highest priorities for the next one year&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Develop future [http://zsc.z3r0d4y.com/table.html features] list , Add Operation Systems and new encode types&lt;br /&gt;
* Planing for activate features&lt;br /&gt;
* Build ZSC API&lt;br /&gt;
* Find developers to get better performance, quality, optimizing and best improvement in minimum possible time&lt;br /&gt;
* Get other people to review the ZSC Tool Project provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project and the features&lt;br /&gt;
* Keep test, developing and updating with best new methods&lt;br /&gt;
* Build and update documents in several languages for developers/users guiding &lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
OWASP ZSC could be improving with handling module [http://zsc.z3r0d4y.com/table.html features]. MVP of this project is build and active the first module which could be usable to generate/encode Shellcode which already some of them [modules] activated.&lt;br /&gt;
&lt;br /&gt;
Highest usage of OWASP ZSC Tool could be when users are able to use all [http://zsc.z3r0d4y.com/table.html features] with best User Interface and &amp;lt;strong&amp;gt;API&amp;lt;/strong&amp;gt; performance.&lt;br /&gt;
https://www.owasp.org/images/3/33/Zsc.png&lt;br /&gt;
&lt;br /&gt;
= Developers =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Developers==&lt;br /&gt;
Architect &amp;amp; Creator: Ali Razmjoo&lt;br /&gt;
* Pratik Patel (Google Summer of Code student 2016)&lt;br /&gt;
* Akash Trehan (CodeMaxx)&lt;br /&gt;
* Paras Chetal (Google Summer of Code candidate 2016)&lt;br /&gt;
* Hamid Samani (HAMIDx9)&lt;br /&gt;
&lt;br /&gt;
==Testers ==&lt;br /&gt;
*Johanna Curiel&lt;br /&gt;
*Brian Beaudry&lt;br /&gt;
&lt;br /&gt;
===Be an OWASP ZSC developer===&lt;br /&gt;
&lt;br /&gt;
Developers can add new features and if you don’t have an idea but like to develop, you can submit the issue, which software needs to be fix/add/done in [https://github.com/zscproject/OWASP-ZSC/issues HERE].&lt;br /&gt;
&lt;br /&gt;
After fix/add or develop something, please send your pull request and remember that your code must be compatible with python2 and python3.&lt;br /&gt;
If you have any question you can open an issue or just [mailto:owasp-zsc-tool-project@lists.owasp.org mail us]. do not forget to register on our [https://lists.owasp.org/mailman/listinfo/owasp-zsc-tool-project mailing list].&lt;br /&gt;
&lt;br /&gt;
'''AND DON'T FORGET TO READ [https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc DEVELOPERS DOCUMENTS]'''&lt;br /&gt;
&lt;br /&gt;
Also this [https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details GitBook]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_ZSC_Tool_Project}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]]  [[Category:OWASP_Code]] [[Category:OWASP_Tool]] [[Category:OWASP_Download]] [[Category:Shellcode]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ZSC_Tool_Project&amp;diff=240118</id>
		<title>OWASP ZSC Tool Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ZSC_Tool_Project&amp;diff=240118"/>
				<updated>2018-04-20T18:44:08Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP ZSC Tool Project==&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Donate to OWASP Nettacker''' {{#widget:PayPal Donation |target=_blank |budget=OWASP ZSC }}&lt;br /&gt;
&lt;br /&gt;
====What is OWASP ZSC ?====&lt;br /&gt;
http://zsc.z3r0d4y.com/images/Snapshot_2015-07-26_191951-half.png&lt;br /&gt;
&lt;br /&gt;
'''OWASP ZSC''' is an open source software in Python language which lets you '''generate customized shellcodes''' and '''convert scripts to an obfuscated script'''. This software can be run on Windows/Linux/OSX under Python.&lt;br /&gt;
&lt;br /&gt;
[[File:Zsc1.png|200px]]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
====Usage of shellcodes====&lt;br /&gt;
&lt;br /&gt;
Shellcodes are small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malwares, bypassing antiviruses, obfuscated codes and etc.&lt;br /&gt;
&lt;br /&gt;
====DISCLAIMER====&lt;br /&gt;
This tool is related to IT, Hacking, Programming and Computer|Network|Software Security. The word “Hack”, &amp;quot;Pen testing&amp;quot;,“Hacking” that is used on these project pages shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively. This is not a tool that provides any illegal information.We do not promote hacking or software cracking. All the information provided on these pages is for educational purposes only.&lt;br /&gt;
&lt;br /&gt;
The authors of this tool are not responsible for any misuse of the information.You shall not misuse the information to gain unauthorized access and/or write malicious programs.This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.You may try all of these techniques on your own computer at your own risk.Performing any hack attempts/tests without written permission from the owner of the computer system is illegal.&lt;br /&gt;
&lt;br /&gt;
IN NO EVENT SHALL THE CREATORS, OWNER, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.&lt;br /&gt;
&lt;br /&gt;
====Usage of Obfuscate Codes====&lt;br /&gt;
&lt;br /&gt;
Can be used for bypassing antiviruses, code protections, same stuff etc … &lt;br /&gt;
&lt;br /&gt;
====Why use OWASP ZSC ?====&lt;br /&gt;
&lt;br /&gt;
Another good reason for obfuscating files or generating shellcode with ZSC is that it can be used during your pen-testing. Malicious hackers use these techniques to bypass anti-virus and load malicious files in systems they have hacked using customized shellcode generators.&lt;br /&gt;
Anti-virus work with signatures in order to identify harmful files. When using very well known encoders such as msfvenom, files generated by this program might be already flagged by Anti-virus programs.&lt;br /&gt;
&lt;br /&gt;
Our purpose is not to provide a way to bypass anti-virus with malicious intentions, instead, we want to provide pen-testers a way to challenge the security provided by Anti-virus programs and Intrusion Detection systems during a pen test.In this way, they can verify the security just as a black-hat will do.&lt;br /&gt;
&lt;br /&gt;
According to other shellcode generators same as Metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won't detect.&lt;br /&gt;
OWASP ZSC encoders are able to generate shell codes with random encodes and that allows you to generate thousands of new dynamic shellcodes with the same job in just a second, that means, you will not get the same code if you use random encodes with same commands, And that make OWASP ZSC one of the best! &lt;br /&gt;
During the Google Summer of Code we are working on to generate Windows Shellcode and new obfuscation methods.&lt;br /&gt;
We are working on the next version that will allow you to generate OSX.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
====GNU GENERAL PUBLIC LICENSE , Version 3, 29 June 2007====&lt;br /&gt;
&lt;br /&gt;
Copyright (C) 2007 Free Software Foundation, Inc. http://fsf.org/ Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [https://github.com/Ali-Razmjoo/OWASP-ZSC/blob/master/LICENSE.md Click to see the full license]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact it is encouraged!!!&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ali_Razmjoo Ali Razmjoo]&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Johanna_Curiel Johanna Curiel]&lt;br /&gt;
&lt;br /&gt;
== Contributors &amp;amp; Main Developers ==&lt;br /&gt;
&lt;br /&gt;
* [http://pratikpatelp.blogspot.in Pratik Patel] (Google Summer of Code student 2016) &lt;br /&gt;
* [https://codemaxx.github.io Akash Trehan] (CodeMaxx)&lt;br /&gt;
* [https://paraschetal.in Paras Chetal] (Gsoc candidate 2016)&lt;br /&gt;
* Brian Beaudry (Gsoc Mentor 2016)&lt;br /&gt;
* Hamid Zamani (HAMIDx9)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [http://api.z3r0d4y.com/ API]&lt;br /&gt;
* [https://github.com/Ali-Razmjoo/OWASP-ZSC Project on Github]&lt;br /&gt;
* [https://groups.google.com/d/forum/owasp-zsc Mailing List]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/ OWASP ZSC Home]&lt;br /&gt;
* [https://www.openhub.net/p/OWASP-ZSC OpenHub]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/table.html Last Version Features]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/wiki Wiki]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/download Download]&lt;br /&gt;
* [https://github.com/Ali-Razmjoo/ZCR-Shellcoder-Archive Archive]&lt;br /&gt;
&lt;br /&gt;
== Shellcode Generating ==&lt;br /&gt;
With using '''OWASP ZSC''' you would be able to generate any customized '''Shellcode''' in your mind including encodes and Disassembly code in few seconds.&lt;br /&gt;
&lt;br /&gt;
== Be an OWASP ZSC developer ==&lt;br /&gt;
* [https://www.owasp.org/index.php?title=OWASP_ZSC_Tool_Project&amp;amp;action=submit#Developers Quick Developing Help]&lt;br /&gt;
&lt;br /&gt;
== Last Tricks in Home ==&lt;br /&gt;
* [http://zsc.z3r0d4y.com/blog/archives/ All Tricks]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/blog/2015/08/01/generate-pe-file-with-zsc-shellcodes/ Shellcode to PE File]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/blog/2015/07/27/video-how-to-install-and-generate-shellcode-using-zsc/ Video: Install&amp;amp;Generate Shellcode]&lt;br /&gt;
&lt;br /&gt;
==Related links==&lt;br /&gt;
*[https://www.youtube.com/watch?v=nkx0HQhYdmY| Appsec Presentation 2013 Beef and Custome shellcodes]&lt;br /&gt;
*[https://www.owasp.org/index.php/File:Introduction_to_shellcode_development.pdf| Introduction to Shellcode Development]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zscproject/OWASP-ZSC Github Page.]&lt;br /&gt;
&lt;br /&gt;
[http://zsc.z3r0d4y.com/download/ Download Page.]&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zscproject/OWASP-ZSC/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/zscproject/OWASP-ZSC/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Code_Sprint_2017#OWASP_ZSC OWASP ZSC in OWASP Code Sprint 2017]&lt;br /&gt;
* [http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/ OWASP ZSC Selected as Top 10 Security tools in 2016 By ToolsWatch]&lt;br /&gt;
* [https://groups.google.com/forum/#!topic/owasp-zsc/t12M2fxn78k OWASP ZSC Presented in OFFSECONF 2016]&lt;br /&gt;
* [https://www.blackhat.com/eu-16/arsenal.html#brian-beaudry Been Selected for Blackhat EU Arsenal 2016]&lt;br /&gt;
* [https://www.defcon.org/html/defcon-24/dc-24-demolabs.html#Curiel  OWASP ZSC has been selected for Defcon Demo Lab 2016]&lt;br /&gt;
* [https://summerofcode.withgoogle.com/archive/2016/projects/5969824152813568/ OWASP ZSC applied and was selected to participate in the Google Summer of Code 2016]&lt;br /&gt;
* [https://www.linkedin.com/pulse/lessons-from-cyber-underworld-how-understand-software-ali-razmjoo Press Release 12th February 2015 ]&lt;br /&gt;
* [http://zsc.z3r0d4y.com/ OWASP ZSC Version 1.0.9.1 Released!]&lt;br /&gt;
* [https://github.com/longld/peda OWASP ZSC in GDB-PEDA]&lt;br /&gt;
&lt;br /&gt;
== Docs ==&lt;br /&gt;
* [https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc Developers and Users Documents].&lt;br /&gt;
* [http://zsc.z3r0d4y.com/ OWASP ZSC Home]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
To see full guides please visit our [http://zsc.z3r0d4y.com/wiki wiki page].&lt;br /&gt;
&lt;br /&gt;
====Help Menu====&lt;br /&gt;
&lt;br /&gt;
'''PLEASE CLICK [https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc HERE] TO SEE FULL DEVELOPERS AND USERS DOCUMENTS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======OWASP ZSC Project======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in Python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Usage of shellcodes======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Shellcodes are small codes in Assembly Languagewhich could be used as the payload in software exploiting. Other usages are in malwares, bypassing anti viruses, obfuscated codes and etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Usage of Obfuscate Codes======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Can be used for bypassing antiviruses, code protections, same stuff etc … &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Why use OWASP ZSC ?======&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
According to other shellcode generators such as Metasploit tools and etc, OWASP ZSC using new encodes and methods which antiviruses won't detect. OWASP ZSC encoders are able to generate shell codes with random encodes that allows you to generate thousands of new dynamic shell codes with the same job in just a second, it means you will not get the same code if you use random encodes with the same commands, and that makes OWASP ZSC one of the best! &lt;br /&gt;
OWASP ZSC can generate shellcode for Linux and Windows _x86&lt;br /&gt;
Upcoming features will allow generating shellcodes for OSX &lt;br /&gt;
And new encodes for the code obfuscation.&lt;br /&gt;
&lt;br /&gt;
======User Guides======&lt;br /&gt;
&lt;br /&gt;
To run '''OWASP ZSC''', You need to install python `2.x|3.x` on your operation system `Windows|Linux|OSX`, Then it could be run directly with executing `zsc.py` or run the software after you installed it! To see the user manuals, Please follow the next steps!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Generating Shellcode======&lt;br /&gt;
&lt;br /&gt;
Via `zsc` command, you are able to enter the software [or run python zsc.py if you don’t want to install it], Then you can have a list of menu with entering `help`. You can have your choices with pressing `tab` key on each step. To generate shellcode, you have to type `shellcode` and then press enter, after that, you can see what’s available in `shellcode` section. There is `generate` , `search` and `download` choices in here which use for `generate shellcodes`, `search` and `download` shellcode from shellstorm.  To generate a shellcode, type `generate` and press enter, after that with a `tab` key, you can have list of operation systems available in there. With pressing `tab` key again, functions will be shown for you in this step [ such as `exec` ,`systm`,`write` and `etc`]. choose your function by writing the name `example: exec` and press inter. In the next section you have to fill the argv of function which exec() function have one `example: exec(&amp;quot;/bin/bash&amp;quot;)`, all you need in this section is pressing a `tab` and then `enter` key, software will automatically ask you for function argv. Fill them and next section software will ask you for shellcode type which can be `none` or choose one of listed encoding types. After entering that, your shellcode is ready!&lt;br /&gt;
There is one more way to have a shellcode from software, which is using shellstorm API. Following the `shellcode`, and then `search` commands to search for a shellcode. After that shellcodes will be listed for you with title name , ID and etc. you can download them with  following `shellcode` and then `download` command to download them with the ID which shown to you in the past section! For canceling each section, you can use `restart` command to restart the software and start new task!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======Generating Obfuscate Code======&lt;br /&gt;
&lt;br /&gt;
With the following `obfuscate` command, you can begin the step for obfuscating a code. With a `tab` key , you can see the list of languages along with the obfuscating module ready. After choosing the language software will ask you for a filename which is a filename of file you want to obfuscate that! Next step software will ask you for encode type. With a `tab` key list the encode modules and choose your encode name. your file rewrited and converted to a obfuscate with encode type you chosen. And do not worry about your original code, it’s saved in file as a comment!&lt;br /&gt;
&lt;br /&gt;
Please click '''[https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc HERE]''' to read more!&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
Go to download page, and download last version in github. Extract and run installer.py, then you are able to run software with OWASP ZSC command or you can directly execute zsc.py without installing it.or you can follow these commands to install the last version:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;lt;nowiki&amp;gt;wget https://github.com/Ali-Razmjoo/OWASP-ZSC/archive/master.zip -O owasp-zsc.zip &amp;amp;&amp;amp; unzip owasp-zsc.zip &amp;amp;&amp;amp; &lt;br /&gt;
rm -rf owasp-zsc.zip &amp;amp;&amp;amp; mv OWASP-ZSC-master owasp-zsc &amp;amp;&amp;amp; cd owasp-zsc &amp;amp;&amp;amp; python installer.py&amp;lt;/nowiki&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://zsc.z3r0d4y.com/images/Snapshot_2015-07-27_114843.png&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Note''': Software could be '''uninstall''' with executing '''uninstaller.py'''&lt;br /&gt;
&lt;br /&gt;
'''Note''': Software installation directory is &amp;quot;'''/usr/share/owasp-zsc'''&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Note''': &amp;lt;strong&amp;gt;OWASP ZSC&amp;lt;/strong&amp;gt; Tool could be execute on &amp;lt;strong&amp;gt;Linux&amp;lt;/strong&amp;gt; and &amp;lt;strong&amp;gt;Python 2.7.x &amp;lt;/strong&amp;gt;is required.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;August, 2016, the highest priorities for the next one year&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Develop future [http://zsc.z3r0d4y.com/table.html features] list , Add Operation Systems and new encode types&lt;br /&gt;
* Planing for activate features&lt;br /&gt;
* Build ZSC API&lt;br /&gt;
* Find developers to get better performance, quality, optimizing and best improvement in minimum possible time&lt;br /&gt;
* Get other people to review the ZSC Tool Project provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project and the features&lt;br /&gt;
* Keep test, developing and updating with best new methods&lt;br /&gt;
* Build and update documents in several languages for developers/users guiding &lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
OWASP ZSC could be improving with handling module [http://zsc.z3r0d4y.com/table.html features]. MVP of this project is build and active the first module which could be usable to generate/encode Shellcode which already some of them [modules] activated.&lt;br /&gt;
&lt;br /&gt;
Highest usage of OWASP ZSC Tool could be when users are able to use all [http://zsc.z3r0d4y.com/table.html features] with best User Interface and &amp;lt;strong&amp;gt;API&amp;lt;/strong&amp;gt; performance.&lt;br /&gt;
https://www.owasp.org/images/3/33/Zsc.png&lt;br /&gt;
&lt;br /&gt;
= Developers =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Developers==&lt;br /&gt;
Architect &amp;amp; Creator: Ali Razmjoo&lt;br /&gt;
* Pratik Patel (Google Summer of Code student 2016)&lt;br /&gt;
* Akash Trehan (CodeMaxx)&lt;br /&gt;
* Paras Chetal (Google Summer of Code candidate 2016)&lt;br /&gt;
* Hamid Samani (HAMIDx9)&lt;br /&gt;
&lt;br /&gt;
==Testers ==&lt;br /&gt;
*Johanna Curiel&lt;br /&gt;
*Brian Beaudry&lt;br /&gt;
&lt;br /&gt;
===Be an OWASP ZSC developer===&lt;br /&gt;
&lt;br /&gt;
Developers can add new features and if you don’t have an idea but like to develop, you can submit the issue, which software needs to be fix/add/done in [https://github.com/zscproject/OWASP-ZSC/issues HERE].&lt;br /&gt;
&lt;br /&gt;
After fix/add or develop something, please send your pull request and remember that your code must be compatible with python2 and python3.&lt;br /&gt;
If you have any question you can open an issue or just [mailto:owasp-zsc-tool-project@lists.owasp.org mail us]. do not forget to register on our [https://lists.owasp.org/mailman/listinfo/owasp-zsc-tool-project mailing list].&lt;br /&gt;
&lt;br /&gt;
'''AND DON'T FORGET TO READ [https://github.com/Ali-Razmjoo/OWASP-ZSC/tree/master/doc DEVELOPERS DOCUMENTS]'''&lt;br /&gt;
&lt;br /&gt;
Also this [https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details GitBook]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_ZSC_Tool_Project}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Breakers]]  [[Category:OWASP_Code]] [[Category:OWASP_Tool]] [[Category:OWASP_Download]] [[Category:Shellcode]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=240117</id>
		<title>OWASP Nettacker</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Nettacker&amp;diff=240117"/>
				<updated>2018-04-20T18:41:55Z</updated>
		
		<summary type="html">&lt;p&gt;Ali Razmjoo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker Project==&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Donate to OWASP Nettacker''' {{#widget:PayPal Donation |target=_blank |budget=OWASP Nettacker }}&lt;br /&gt;
====What is OWASP Nettacker ?====&lt;br /&gt;
https://www.owasp.org/images/1/1a/Nettacker_Demp.png&lt;br /&gt;
&lt;br /&gt;
'''OWASP Nettacker''' is an open source software in Python language which lets you '''automated penetration testing''' and '''automated Information Gathering'''. This software can be run on Windows/Linux/OSX under Python.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Nettacker project was created to automated for information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and information. This software is able to use SYN, ACK, TCP, ICMP and many other protocols to detect and bypass the Firewalls/IDS/IPS and devices. By using a unique solution in Nettacker to find protected services such as SCADA We could make a point to be one of the bests of scanners.&lt;br /&gt;
&lt;br /&gt;
====DISCLAIMER====&lt;br /&gt;
This tool is related to IT, Hacking, Programming, and Computer|Network|Software Security. The word “Hack”, &amp;quot;Pen testing&amp;quot;,“Hacking” that is used on these project pages shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively. This is not a tool that provides any illegal information.We do not promote hacking or software cracking. All the information provided on these pages is for educational purposes only.&lt;br /&gt;
&lt;br /&gt;
The authors of this tool are not responsible for any misuse of the information.You shall not misuse the information to gain unauthorized access and/or write malicious programs.This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.You may try all of these techniques on your own computer at your own risk.Performing any hack attempts/tests without written permission from the owner of the computer system is illegal.&lt;br /&gt;
&lt;br /&gt;
IN NO EVENT SHALL THE CREATORS, OWNER, OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Features ====&lt;br /&gt;
&lt;br /&gt;
'''IoT Scanner'''&amp;lt;br&amp;gt;&lt;br /&gt;
Python Multi-Thread &amp;amp; Multi Process Network Information Gathering Vulnerability Scanner&amp;lt;br&amp;gt;&lt;br /&gt;
Service and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and much more… )&amp;lt;br&amp;gt;&lt;br /&gt;
Network Service Analysis&amp;lt;br&amp;gt;&lt;br /&gt;
Services Brute Force Testing&amp;lt;br&amp;gt;&lt;br /&gt;
Services Vulnerability Testing&amp;lt;br&amp;gt;&lt;br /&gt;
HTTP/HTTPS Crawling, Fuzzing, Information Gathering and …&amp;lt;br&amp;gt;&lt;br /&gt;
HTML and Text Outputs&amp;lt;br&amp;gt;&lt;br /&gt;
This project is at the moment in research and development phase and most of results/codes are not published yet.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
====Apache License Version 2.0, January 2004====&lt;br /&gt;
&lt;br /&gt;
The OWASP Nettacker is free to use and is licensed under the Apache 2 License. [https://github.com/zdresearch/OWASP-Nettacker/blob/master/LICENSE Click to see the full license]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The OWASP Security Principles are free to use. In fact, it is encouraged!!!'''&lt;br /&gt;
'' Additionally, I also encourage you to contribute back to the project. I have no monopoly on this knowledge; however, we all have pieces of this knowledge from our experience. Let's begin by putting our individual pieces together to make something great. Great things happen when people work together.''&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ali_Razmjoo Ali Razmjoo]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Rezasp Mohammad Reza Espargham]&lt;br /&gt;
* [mailto:johanna.curiel@owasp.org Johanna Curiel]&lt;br /&gt;
&lt;br /&gt;
== Contributors &amp;amp; Main Developers ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mojtaba6892@gmail.com Mojtaba MasoumPour]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* [https://github.com/camel32bit camel32bit]&lt;br /&gt;
* [mailto:sha.ravindra1307@gmail.com Ravindra Sharma]&lt;br /&gt;
* [mailto:harsha010@outlook.com Harshavardhan Reddy]&lt;br /&gt;
* [mailto:pandkhahiarian@gmail.com ArianPH]&lt;br /&gt;
* [mailto:om.mo1375@gmail.com omdmhd]&lt;br /&gt;
* [mailto:mahdirasouli007@gmail.com Mahdi Rasouli]&lt;br /&gt;
* [mailto:shaddygarg1@gmail.com Shaddy Garg]&lt;br /&gt;
* [mailto:pradeepjairamani22@gmail.com Pradeep Jairamani]&lt;br /&gt;
* [mailto:timonalma81@gmail.com Tikam Singh Alma]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker on Github]&lt;br /&gt;
* [https://groups.google.com/forum/#!forum/owasp-nettacker Mailing List]&lt;br /&gt;
* [http://nettacker.z3r0d4y.com/ OWASP Nettacker Home]&lt;br /&gt;
&lt;br /&gt;
== Be an OWASP Nettacker Developer ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Nettacker#Developers Quick Developing Help]&lt;br /&gt;
&lt;br /&gt;
==Related links==&lt;br /&gt;
*[https://github.com/zdresearch/OWASP-Nettacker Github]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/zdresearch/OWASP-Nettacker Github Page.]&lt;br /&gt;
&lt;br /&gt;
[Download Page.]&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/zipball/master .zip file.]&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/tarball/master .tgz file.]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [https://groups.google.com/forum/#!topic/owasp-nettacker/3gscDww2sf4 OWASP Nettacker was introduced in OFFSECONF 2017]&lt;br /&gt;
* OWASP Nettacker Accepted for Google Summer of Code 2018 [[https://www.owasp.org/index.php/GSOC2018_Ideas 1]]&lt;br /&gt;
&lt;br /&gt;
== Docs ==&lt;br /&gt;
* [https://github.com/zdresearch/OWASP-Nettacker/wiki Wiki].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
To see full guides please visit our [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Requirement / Installation=&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Installation'''&lt;br /&gt;
You can install OWASP Nettacker by using pip install -r requirements.txt &amp;amp;&amp;amp; python setup.py install. In the feature, you will be able to install this tools from PyPi library by pip install OWASP-Nettacker (It's not available yet!). After the installation, you can run the software by using the nettacker command line on Windows, Mac OS X, Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;October, 2017, the highest priorities for the next one year&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Planning for activating features&lt;br /&gt;
* Build Nettacker API&lt;br /&gt;
* Find developers to get better performance, quality, optimizing and best improvement in minimum possible time&lt;br /&gt;
* Get other people to review the OWASP Nettacker Project provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Project and the features&lt;br /&gt;
* Keep test, developing and updating with best new methods&lt;br /&gt;
* Build and update documents in several languages for developers/users guiding &lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Developers =&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject=OWASP_Nettacker&amp;amp;body=OWASP_Nettacker:%0Ahttps://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;t=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url=https://www.owasp.org/index.php/OWASP_Nettacker&amp;amp;title=OWASP+Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status=https://www.owasp.org/index.php/OWASP_Nettacker|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u=https://www.owasp.org/index.php/OWASP_Nettacker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
* Ali Razmjoo&lt;br /&gt;
* Mohammad Reza Espargham&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
* [mailto:behzadan@ksu.edu Vahid Behzadan]&lt;br /&gt;
* [mailto:mojtaba6892@gmail.com Mojtaba MasoumPour]&lt;br /&gt;
* [mailto:ehsan.empire1@gmail.com Ehsan Nezami]&lt;br /&gt;
* [https://github.com/camel32bit camel32bit]&lt;br /&gt;
* [mailto:sha.ravindra1307@gmail.com Ravindra Sharma]&lt;br /&gt;
* [https://github.com/avhvr Harshavardhan Reddy]&lt;br /&gt;
* [mailto:pandkhahiarian@gmail.com ArianPH]&lt;br /&gt;
* [mailto:om.mo1375@gmail.com omdmhd]&lt;br /&gt;
&lt;br /&gt;
===Be an OWASP Nettacker developer===&lt;br /&gt;
&lt;br /&gt;
Developers can add new features and if you don’t have an idea but like to develop, you can submit the issue, which software needs to be fix/add/done in [https://github.com/zdresearch/OWASP-Nettacker/issues HERE].&lt;br /&gt;
&lt;br /&gt;
After fix/add or develop something, please send your pull request and remember that your code must be compatible with python2 and python3.&lt;br /&gt;
If you have any question you can open an issue or just [mailto:owasp-nettacker@googlegroups.com mail us]. do not forget to register on our [https://groups.google.com/forum/#!forum/owasp-nettacker mailing list].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_Nettacker_About_Page}}&lt;br /&gt;
&lt;br /&gt;
Please check the project [https://github.com/zdresearch/OWASP-Nettacker/wiki wiki] on Github.&lt;br /&gt;
&lt;br /&gt;
[[File:2018-01-19 0-45-07.gif|OWASP Nettacker Demo]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Breakers]]  &lt;br /&gt;
[[Category:OWASP_Code]] &lt;br /&gt;
[[Category:OWASP_Tool]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:Shellcode]]&lt;/div&gt;</summary>
		<author><name>Ali Razmjoo</name></author>	</entry>

	</feed>