<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Marcin</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Marcin"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Marcin"/>
		<updated>2026-05-09T11:53:34Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Connections_Committee_-_Application_3&amp;diff=75868</id>
		<title>OWASP Connections Committee - Application 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Connections_Committee_-_Application_3&amp;diff=75868"/>
				<updated>2010-01-07T22:32:49Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Justin Clarke&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | London Chapter Leader. Speaker at OWASP Ireland and IBWAS conferences in 2009.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Connection Committee&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''1''' &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Martin Knobloch&lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Dutch Chapter Board/GEC&lt;br /&gt;
| style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Justin is definitely the man with experience and is driven to get this going!&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''2''' &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Colin Watson&lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Global Industry Committee&lt;br /&gt;
| style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Justin is an ardent OWASP supporter and contributes very widely to the application security community.  He has demonstrated his communication and collaboration skills while being London Chapter Leader and I therefore think he will be able to make a great contribution to this OWASP committee.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''3''' &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Fabio Cerullo&lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Global Education Committee&lt;br /&gt;
| style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Justin is a passionate person about application security. He not only contributes within the OWASP community but also with the wider application security industry and academia. I strongly believe he will be a great addition to the OWASP Connections Committee. &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''4''' &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Yiannis Pavlosoglou&lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Global Industry Committee&lt;br /&gt;
| style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Few people can offer web application security the professional/personal drive and mentality of getting things done, as required, in the manner that Justin operates. Looking forward to seeing your work on this committee.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''5''' &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Marcin Wielgoszewski&lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | NYNJ Metro Chapter&lt;br /&gt;
| style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Justin is one of few people I know to give it their all to produce quality results, and his work ethic shows.  He is able to work with a variety of people and personalities, listen, and present his thoughts in an articulate manner.  I have no doubt in my mind that Justin will make an excellent fit for the OWASP Connections committee.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Podcast&amp;diff=61705</id>
		<title>OWASP Podcast</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Podcast&amp;diff=61705"/>
				<updated>2009-05-24T17:10:15Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About ====&lt;br /&gt;
&lt;br /&gt;
'''OWASP Podcast Series Hosted by Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
* The OWASP foundation presents the OWASP PODCAST SERIES hosted by [[User:Jmanico|Jim Manico]] from Aspect Security.&lt;br /&gt;
* Listen as Jim interviews OWASP volunteers, industry experts and leaders within the field of web application security. &lt;br /&gt;
* Questions? Comments? Please email [mailto:podcast@owasp.org podcast@owasp.org]&lt;br /&gt;
* Want to see the process and equipment behind the show? [https://www.owasp.org/index.php/Talk:OWASP_Podcast click here] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
[http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=300769012 http://www.owasp.org/download/jmanico/OWASP_Podcast_200x200.jpg]&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot;&amp;gt;&lt;br /&gt;
Subscribe&amp;lt;br/&amp;gt;[http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=300769012 http://images.apple.com/itunes/overview/images/overview-icon-itunes20081106.jpg] [http://www.owasp.org/download/jmanico/podcast.xml https://www.owasp.org/images/d/d3/Feed-icon-32x32.png]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Podcast&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Latest Shows====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;0&amp;quot; class=&amp;quot;wikitable&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;#&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Date&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Actions&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Description&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;22&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;May 22, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_22.mp3 Listen Now] | [[Podcast_22|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Dan Cornell&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;21&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;May 20, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_21.ogg Listen Now] | [[Podcast_21|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Richard Stallman&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;20&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;May 13, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_20.mp3 Listen Now] | [[Podcast_20|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Mike Bailey&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;19&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;May 11, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_19.mp3 Listen Now] | [[Podcast_19|Show Notes]] &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 2009 News Commentary by Arshan Dabirsiaghi, Andre Gironda, Jim Manico and Jeff Williams (part 2)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;18&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 30, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_18.mp3 Listen Now] | [[Podcast_18|Show Notes]] &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Jeremiah Grossman&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;17&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 21, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_17.mp3 Listen Now] | [[Podcast_17|Show Notes]] &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Robert Hansen&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;16&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 9, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_16.mp3 Listen Now] | [[Podcast_16|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Dave Aitel demonstrates cool&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;15&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;April 4, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_15.mp3 Listen Now] | [[Podcast_15|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Brian Chess talks about BSIMM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;14&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 25, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_14.mp3 Listen Now] | [[Podcast_14|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Pravir Chandra talks about OWASP SAMM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;13&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 23, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_13.mp3 Listen Now] | [[Podcast_13|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 2009 News Commentary by Arshan Dabirsiaghi, Andre Gironda, Jim Manico and Jeff Williams (part 1)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;12&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 11, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_12.mp3 Listen Now] | [[Podcast_12|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Ryan Barnett (OWASP ModSecurity Core Ruleset)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;11&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;March 4, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_11.mp3 Listen Now] | [[Podcast_11|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with MITRE (Steve Christey and Bob Martin)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;10&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;February 26, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_10.mp3 Listen Now] | [[Podcast_10|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Ken van Wyk&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;February 20, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_9.mp3 Listen Now] | [[Podcast_9|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;February 2009 News Commentary by Arshan Dabirsiaghi, Andre Gironda, Jim Manico and Jeff Williams (part 2)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;8&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;February 20, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_8.mp3 Listen Now] | [[Podcast_8|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;February 2009 News Commentary by Arshan Dabirsiaghi, Andre Gironda, Jim Manico and Jeff Williams (part 1)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;7&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;January 30, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_7.mp3 Listen Now] | [[Podcast_7|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Jeff Williams&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;6&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;January 24, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_6.mp3 Listen Now] | [[Podcast_6|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Roundtable with Andre Gironda, Brian Holyfield, Jim Manico, Marcin Wielgoszewski&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;January 15, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_5.mp3 Listen Now] | [[Podcast_5|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Gary McGraw&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;4&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;January 13, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_4.mp3 Listen Now] | [[Podcast_4|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Andrew van der Stock (OWASP Developers Guide)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;December 30, 2009&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_3.mp3 Listen Now] | [[Podcast_3|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Matt Tesauro (OWASP Live CD)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;December 20, 2008&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_2.mp3 Listen Now] | [[Podcast_2|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;Interview with Stephen Craig Evans (OWASP WebGoat/ModSecurity Project)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;November 21, 2008&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td NOWRAP VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;[http://www.owasp.org/download/jmanico/owasp_podcast_1.mp3 Listen Now] | [[Podcast_1|Show Notes]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td VALIGN=&amp;quot;TOP&amp;quot;&amp;gt;News Commentary by Arshan Dabirsiaghi, Jeremiah Grossman, Jim Manico and Jeff Williams&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Contributors and Sponsors ====&lt;br /&gt;
&lt;br /&gt;
'''Host and Co-Producer'''&lt;br /&gt;
* [[User:Jmanico|Jim Manico]]&lt;br /&gt;
&lt;br /&gt;
'''Mastering and Co-Producer'''&lt;br /&gt;
* Kevin Coons from ManaTribe &lt;br /&gt;
&lt;br /&gt;
'''News Commentary Copy Editor'''&lt;br /&gt;
* [[User:dre|Andre Gironda]] &lt;br /&gt;
&lt;br /&gt;
'''Audio Editing Team'''&lt;br /&gt;
* [[User:Jmanico|Jim Manico]]&lt;br /&gt;
* [[User:Marcin|Marcin Wielgoszewski]]&lt;br /&gt;
* Kevin Coons from ManaTribe &lt;br /&gt;
&lt;br /&gt;
'''News Commentary Team'''&lt;br /&gt;
* Andre Gironda&lt;br /&gt;
* [[User:Jmanico|Jim Manico]]&lt;br /&gt;
* Jeff Williams&lt;br /&gt;
* Arshan Dabirsiaghi&lt;br /&gt;
&lt;br /&gt;
'''Artwork'''&lt;br /&gt;
* Larry Casey&lt;br /&gt;
* Gareth Heyes&lt;br /&gt;
&lt;br /&gt;
'''Sponsors'''&lt;br /&gt;
* The OWASP Foundation&lt;br /&gt;
* Music by [http://www.twistedmusic.com/artists/shpongle/ Shpongle] courtesy of [http://www.twistedmusic.com/ Twisted Records]&lt;br /&gt;
&lt;br /&gt;
'''Illuminati-like influence over the Podcast'''&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Jeff Williams&lt;br /&gt;
* Dinis Druz&lt;br /&gt;
* Kate Hartmann&lt;br /&gt;
* [[User:Marcin|Marcin Wielgoszewski]]&lt;br /&gt;
* Tracey Schavone&lt;br /&gt;
* The OWASP Leadership eList&lt;br /&gt;
&lt;br /&gt;
==== Twitter ====&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/manicode http://twitter.com/manicode]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;twitter&amp;gt;manicode&amp;lt;/twitter&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Platinum Lounge ====&lt;br /&gt;
&lt;br /&gt;
The OWASP Podcast Platinum Lounge is reserved for individuals who have participated in 5 or more podcasts. :)&lt;br /&gt;
&lt;br /&gt;
* Jeff Williams (6 shows)&amp;lt;br/&amp;gt;&lt;br /&gt;
* Andre Gironda (5 shows)&amp;lt;br/&amp;gt;&lt;br /&gt;
* Arshan (5 shows)&amp;lt;br/&amp;gt; &lt;br /&gt;
* Jim (22 shows)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Marcin&amp;diff=61704</id>
		<title>User:Marcin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Marcin&amp;diff=61704"/>
				<updated>2009-05-24T17:08:17Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Marcin is an OWASP contributor, evangelist, and chairman for the [[NYNJMetro | OWASP NY/NJ Metro Chapter]] &amp;quot;Special Projects Committee.&amp;quot;  He is part of the audio editing team and exhibits Illuminati-like influence over the [[OWASP_Podcast | OWASP Podcast Series]].&lt;br /&gt;
&lt;br /&gt;
Marcin Wielgoszewski is a Security Engineer and Software Security Consultant for [http://www.gdssecurity.com Gotham Digital Science].  He is also blogger and owner of [http://www.tssci-security.com tssci-security], a blog dedicated to web application security, server and infrastructure virtualization, cloud computing, trusted systems, and software security and assurance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
* [http://www.tssci-security.com/pub/2008_OWASP_EU_Summit-Wielgoszewski-AntiSamydotNET.pdf AntiSamy.NET: Fighting XSS the .NET Way]&lt;br /&gt;
* [http://tssci-security.com/pub/2008_ShmooCon_DC-Gironda-Wielgoszewski-Path_X.pdf Path X: Explosive Security Testing Tools with XPath]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Links==&lt;br /&gt;
* [http://www.gdssecurity.com Gotham Digital Science]&lt;br /&gt;
* [http://www.tssci-security.com tssci-security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==PGP Key==&lt;br /&gt;
&lt;br /&gt;
pub KeyID = [http://pgp.mit.edu:11371/pks/lookup?op=get&amp;amp;search=0xB0D446C3 B0D446C3]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN PGP PUBLIC KEY BLOCK-----&lt;br /&gt;
Version: PGP Key Server 0.9.6&lt;br /&gt;
&lt;br /&gt;
mQGiBEX7TagRBAClwMBiWMHIDHRGhfh4733jkkR/StyQwFfyQAcQERJ1fqBUwoUt&lt;br /&gt;
Ei4vX7ZC9q1AFGhUD+ASEr6iMHPnQmMiy4gUgXoRarIeFVMI89my4qX13GweMjMD&lt;br /&gt;
Dq+MH3BDYIObp47tN+x+imoxsRXgS/sHbJmQGM3/77uKQZuYOOtpQ+HKPwCg2tof&lt;br /&gt;
Ry9Nm/W8UBZTnUNm739T5X0D/R3oCMfsuSasMgcuEQqsnNDTSIc7MmEf1BHWsieu&lt;br /&gt;
D3QvptzN0MhFemWwzF2ureTh4trKLhGhP9u14/DYStRu10iBBe6nSZv6R2aig3ll&lt;br /&gt;
ytXmB4A1X9Q5WH00qalqmpZa5/1frMT+Wcp6knioZQDmiNEZFVi/fOpY/g5mKJKh&lt;br /&gt;
MPqZA/96lww3t+WUwCadVUX781SIXQzzQLkhQxjR60oy6aHAQ7lss39VFIES383z&lt;br /&gt;
4MJdyOKOwpwJbIeZaXDfeDRNT1vwswFLrGD2Rs1nYNZU6/sbdMo7xD1SZDGh6rbC&lt;br /&gt;
ikCICwBWcpiFkZwbkqkT9lUcPN9ql4BiLUZGbB2QCI+6TC9ay7RDTWFyY2luIFdp&lt;br /&gt;
ZWxnb3N6ZXdza2kgKE1hcmNpbidzIFBHUCBLZXkpIDxtYXJjaW5AdHNzY2ktc2Vj&lt;br /&gt;
dXJpdHkuY29tPohgBBMRAgAgAhsDBgsJCAcDAgQVAggDBBYCAwECHgECF4AFAkat&lt;br /&gt;
ZLkACgkQ3U7hhbDURsPvbwCfeh117AnipildPSiq7JDMxKz49KgAn1VgJivZV+7J&lt;br /&gt;
jW179PWXOVmtfKIriGYEExECACYFAkX7TagCGwMFCQHhM4AGCwkIBwMCBBUCCAME&lt;br /&gt;
FgIDAQIeAQIXgAAKCRDdTuGFsNRGw5InAJ0eDmApcw7IZv0601vtCfFO9sQUrwCf&lt;br /&gt;
V7251oQTKqXANLP/foQrhePC7iu5Ag0ERftNuhAIAOIgbIgxxeG3lVJrar7qKHsT&lt;br /&gt;
UgwdnL13ksIP407L4DwFEzUdtzTeZfQlHvtRJK7BeCtLDpvqjBdX2vKioJg+p2PS&lt;br /&gt;
W/30CcwxL3NviQ7+Zd6UOzz/01+1k9IM9k+heDKHit4t9vZW/nxLLQCTIQ8vATxe&lt;br /&gt;
hzfQRySGtHqyr5Ys8hOiTaU9WmiKzMMoc1+4TdhP8Ytn32ji6Pc+nydhCriE7/Fg&lt;br /&gt;
rTLybaNaw9TGvg8Ramq0V/aDHGltCLZEbsdIPGtvDfwy/M6FyG5zujsLalFFR3OD&lt;br /&gt;
hXaMZ9RQSQQWnap55V59hhsvlHboFbOT2ob3Q+k2HYJLayv6xzKq7pdJM9sv7CcA&lt;br /&gt;
BREH/jQ+HAKTTHkt2t9D+weVoMBLsTejT8RFZWF2RuF+4zfuMaySInjXt8AZjxhf&lt;br /&gt;
QupNbtgjUZzAmKZoQ9MWyKU+6y5lldbxXGsp+BGcILgimcG6b3ceA43nVACR9o3O&lt;br /&gt;
dJvGV0/QNOGkXLui0BOsZqOJ6otb3ancC3IR9TNzELaNFZKX+s7m5XHQnywxcu7q&lt;br /&gt;
iTOYEBPlZJGSsA6k3ej4IcPGa90kJmdOX7FC1VQCRYo7OdA4AuQYq94ypWaaGWKm&lt;br /&gt;
oJ45ix9/OG/PRdBHxfxbz0z4YeY34gw7Tv6Z5yiiJh1Cfo8bH7RZbRLb/+yI52Lx&lt;br /&gt;
/YojQ3KOuF6aLs86DgSKhTrsgdWISQQYEQIACQIbDAUCRq1kwwAKCRDdTuGFsNRG&lt;br /&gt;
w+OBAKCoXC7hlzO5ftleqHVVLZsJ6nfQeQCgzgUaxNN67W7s0XQaEaa2c+0F0w4=&lt;br /&gt;
=anSp&lt;br /&gt;
-----END PGP PUBLIC KEY BLOCK-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Podcast&amp;diff=60328</id>
		<title>OWASP Podcast</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Podcast&amp;diff=60328"/>
				<updated>2009-05-07T21:25:14Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;th width=&amp;quot;50%&amp;quot;&amp;gt; &amp;lt;/th&amp;gt;&amp;lt;th&amp;gt; &amp;lt;/th&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
''OWASP Podcast''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Podcast Series Hosted by Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
The OWASP foundation presents the OWASP PODCAST SERIES hosted by [[User:Jmanico|Jim Manico]]. Listen as Jim interviews OWASP volunteers, industry experts and leaders within the field of web application security. &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Questions? Comments? Please contact [mailto:podcast@owasp.org podcast@owasp.org]&amp;lt;br/&amp;gt;&lt;br /&gt;
Want to see the process and equipment behind the show? [https://www.owasp.org/index.php/Talk:OWASP_Podcast click here] &lt;br /&gt;
&amp;lt;table border=0&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=300769012 http://www.owasp.org/download/jmanico/OWASP_Podcast_200x200.jpg]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot;&amp;gt;&lt;br /&gt;
Subscribe&amp;lt;br/&amp;gt;[http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=300769012 http://images.apple.com/itunes/overview/images/overview-icon-itunes20081106.jpg] [http://www.owasp.org/download/jmanico/podcast.xml https://www.owasp.org/images/d/d3/Feed-icon-32x32.png]&amp;lt;br/&amp;gt;&lt;br /&gt;
[http://www.owasp.org/download/jmanico/podcast.xml Archives]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Podcast&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;td&amp;gt;&lt;br /&gt;
; &lt;br /&gt;
&amp;lt;br&amp;gt;'''Latest Shows'''&lt;br /&gt;
* April 30, 2009 Podcast #18 - [http://www.owasp.org/download/jmanico/owasp_podcast_18.mp3 Listen Now] - [[Podcast_18|Show Notes]] - Interview with Jeremiah Grossman.&lt;br /&gt;
&lt;br /&gt;
* April 21, 2009 Podcast #17 - [http://www.owasp.org/download/jmanico/owasp_podcast_17.mp3 Listen Now] - [[Podcast_17|Show Notes]] - Interview with Robert Hansen.&lt;br /&gt;
&lt;br /&gt;
* April 9, 2009 Podcast #16 - [http://www.owasp.org/download/jmanico/owasp_podcast_16.mp3 Listen Now] - [[Podcast_16|Show Notes]] - Dave Aitel demonstrates cool.&lt;br /&gt;
&lt;br /&gt;
* April 4, 2009 Podcast #15 - [http://www.owasp.org/download/jmanico/owasp_podcast_15.mp3 Listen Now] - [[Podcast_15|Show Notes]] - Brian Chess talks about BSIMM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== News ====&lt;br /&gt;
&lt;br /&gt;
'''Twitter from Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;twitter&amp;gt;manicode&amp;lt;/twitter&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Contributors and Sponsors ====&lt;br /&gt;
&lt;br /&gt;
'''Host and Co-Producer'''&lt;br /&gt;
* [[User:Jmanico|Jim Manico]]&lt;br /&gt;
&lt;br /&gt;
'''Mastering and Co-Producer'''&lt;br /&gt;
* Kevin Coons from ManaTribe &lt;br /&gt;
&lt;br /&gt;
'''News Copy Editor'''&lt;br /&gt;
* Andre Gironda&lt;br /&gt;
&lt;br /&gt;
'''Audio Editing Team'''&lt;br /&gt;
* [[User:Jmanico|Jim Manico]]&lt;br /&gt;
* Marcin Wielgoszewski&lt;br /&gt;
* Kevin Coons from ManaTribe &lt;br /&gt;
&lt;br /&gt;
'''News Team'''&lt;br /&gt;
* Andre Gironda&lt;br /&gt;
* [[User:Jmanico|Jim Manico]]&lt;br /&gt;
* Jeff Williams&lt;br /&gt;
* Arshan Dabirsiaghi&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_AntiSamy_Project_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=57508</id>
		<title>Project Information:template AntiSamy Project - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_AntiSamy_Project_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=57508"/>
				<updated>2009-03-29T05:29:22Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template AntiSamy Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#OWASP AntiSamy .NET| OWASP AntiSamy .NET Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP AntiSamy .NET|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The OWASP AntiSamy.NET project is aimed to provide an API for .NET applications  for validating rich HTML/CSS input from users without exposing the web application to cross site scripting and phishing attacks.  The project is a direct port of the AntiSamy Java API. Currently, the project has one outstanding feature left to be implemented – Cascading Style Sheet (CSS) support.  Support for CSS would allow users to wrap input within inline style and div elements.  Arshan Dabirsiaghi stated that at the beginning of the project, it would not include support for CSS by the conclusion of Summer of Code 2008.  This is noted here for reference as it is not stated on the project site.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP AntiSamy .NET|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Overall, AntiSamy.NET is 100% complete.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The offsiteURL regular expression in the policy files could be more restrictive.  Looking up until the TLD, there are several characters, such as Unicode characters allowed within the FQDN where it should only be allowed in the path and the colon (:) character allowed outside of the FQDN.  More time should be allotted to look at the regular expression pattern -- http://www.w3.org/Addressing/URL/uri-spec.html should be consulted.  There are no performance measurements that show how much impact AntiSamy.NET puts on processing of input.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
All project criteria to meet Alpha Quality status have been fulfilled.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
AntiSamy.NET is an API for .NET projects.  There is no “installer” associated with such a project.  Basic usage instructions are included on the wiki, but there could be more effort put here.  See below for more.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
All features have been implemented, including CSS support.  A Fortify open review scan was completed and no issues were found.&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
It would be nice to see all functions documented and a data flow graph that shows how input flows through the API and is acted on.  I (Marcin Wielgoszewski) would be willing to create this documentation for the project.  See http://osteele.com/tools/reanimator and http://osteele.com/archives/2006/02/reanimator.  Also, with regards to unit testing, see the chapter on &amp;quot;Code Coverage&amp;quot; written by Charlie Miller in &amp;quot;Open Source Fuzzing Tools.&amp;quot;  It discusses how to increase code coverage with fuzzing.  This directly relates to the unit tests as we cannot guarantee they test all functionality implemented within AntiSamy.NET.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_AntiSamy_Project_.NET&amp;diff=56754</id>
		<title>Category:OWASP AntiSamy Project .NET</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_AntiSamy_Project_.NET&amp;diff=56754"/>
				<updated>2009-03-16T02:27:31Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: /* Limitations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template AntiSamy Project}}&lt;br /&gt;
[[Category:OWASP_AntiSamy_Project]]&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Beta Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
== What is AntiSamy .NET? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP AntiSamy .NET project is a few things. Technically, it is an API for ensuring user-supplied HTML/CSS is in compliance within an application's rules. Another way of saying that could be: It's an API that helps you make sure that clients don't supply malicious cargo code in the HTML they supply for their profile, comments, etc. that gets persisted on the server. The term malicious code in terms of web applications is usually regarded only as JavaScript. Cascading Stylesheets are only considered malicious when they invoke the JavaScript engine. However, there are many situations where &amp;quot;normal&amp;quot; HTML and CSS can be used in a malicious manner.&lt;br /&gt;
&lt;br /&gt;
Philosophically, AntiSamy .NET is a departure from all contemporary security mechanisms. Generally, the security mechanism and user have a communication that is virtually one way, for good reason. Letting the potential attacker know details about the validation is considered unwise as it allows the attacker to &amp;quot;learn&amp;quot; and &amp;quot;recon&amp;quot; the mechanism for weaknesses. These types of information leaks can also hurt in ways you don't expect. A login mechanism that tells the user, &amp;quot;Username invalid&amp;quot; leaks the fact that a user by that name does not exist. A user could use a dictionary or phone book or both to remotely come up with a list of valid usernames. Using this information, an attacker could launch a brute force attack or massive account lock denial-of-service. So, we get that.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, that's just not very usable in this situation. Typical Internet users are largely ineffective when it comes to writing HTML/CSS, so where do they get their HTML from? Usually they copy it from somewhere out on the web. Simply rejecting their input without any clue as to why is jolting and annoying. Annoyed users go somewhere else to do their social networking.&lt;br /&gt;
&lt;br /&gt;
Socioeconomically, AntiSamy .NET is a have-not enabler. Private companies like Google, MySpace, eBay, etc. have come up with proprietary solutions for solving this problem. This introduces two problems. One is that proprietary solutions are not usually all that good, and even if they are, well - naturally they're reluctant to share this hard-earned IP for free. Fortunately, we just don't care. We don't see any reason why only these private companies should have this functionality, so we are releasing this for free. &lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/OWASP_Licenses OWASP licensing policy] (further explained in the [http://www.owasp.org/index.php/Membership membership FAQ]) allows OWASP projects to be released under any [http://www.opensource.org/licenses/alphabetical approved open source license]. Under these guidelines, AntiSamy .NET is distributed under a [http://www.opensource.org/licenses/bsd-license.php BSD license].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Getting Started ==&lt;br /&gt;
&lt;br /&gt;
There's 4 steps in the process of integrating AntiSamy. Each step is detailed in the next section, but the high level overview follows:&lt;br /&gt;
&lt;br /&gt;
# Download AntiSamy from its home on Google Code&lt;br /&gt;
# Choose one of the standard policy files that matches as close to the functionality you need:&lt;br /&gt;
#* antisamy-slashdot.xml&lt;br /&gt;
#* (more to come in the near future)&lt;br /&gt;
# Tailor the policy file according to your site's rules&lt;br /&gt;
# Call the API from the code &lt;br /&gt;
&lt;br /&gt;
=== Downloading ===&lt;br /&gt;
&lt;br /&gt;
Currently, you can download the code using SVN from [http://code.google.com/p/owaspantisamy/source/browse/#svn/trunk/dotNet AntiSamy .NET Google Code SVN]&lt;br /&gt;
&lt;br /&gt;
In the future the source code and the compiled .dll can be found at [http://code.google.com/p/owaspantisamy/downloads/list Google Code]&lt;br /&gt;
&lt;br /&gt;
=== Installing ===&lt;br /&gt;
&lt;br /&gt;
There is no installation needed to get AntiSamy .NET to run.  Simply reference the .dll in your code, make sure the dependencies are present, and you are good to go.&lt;br /&gt;
&lt;br /&gt;
Currently, there is only one dependency, HtmlAgilityPack.dll.  To run the unit tests, you will also need:&lt;br /&gt;
#nunit.core.dll&lt;br /&gt;
#nunit.core.interfaces.dll&lt;br /&gt;
#nunit.framework.dll&lt;br /&gt;
&lt;br /&gt;
=== Tailoring the policy file ===&lt;br /&gt;
&lt;br /&gt;
Smaller organizations may want to deploy AntiSamy in a default configuration, but it's equally likely that a site may want to have strict, business-driven rules for what users can allow. The discussion that decides the tailoring should also consider attack surface - which grows in relative proportion to the policy file.&lt;br /&gt;
&lt;br /&gt;
=== Running ===&lt;br /&gt;
&lt;br /&gt;
Using AntiSamy is abnormally easy. Here is an example of invoking AntiSamy with a policy file: &lt;br /&gt;
&lt;br /&gt;
        AntiSamy _as = new AntiSamy();&lt;br /&gt;
        string filename = Server.MapPath(&amp;quot;./properties/antisamy-slashdot.xml&amp;quot;);&lt;br /&gt;
        Policy policy = Policy.getInstance(filename);&lt;br /&gt;
        CleanResults results = _as.scan(txtInput.Text, policy);&lt;br /&gt;
&lt;br /&gt;
And here is an example of using both the clean HTML and the error messages:&lt;br /&gt;
&lt;br /&gt;
        lblOutput.Text = results.getCleanHTML();&lt;br /&gt;
        string s = &amp;quot;&amp;quot;;&lt;br /&gt;
        for (int i = 0; i &amp;lt; results.getErrorMessages().Count; i++)&lt;br /&gt;
        {&lt;br /&gt;
            s += results.getErrorMessages()[i].ToString() + &amp;quot;&amp;lt;p/&amp;gt;&amp;quot;; &lt;br /&gt;
        }&lt;br /&gt;
        lblErrors.Text = s;&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
&lt;br /&gt;
No CSS support has been included yet in AntiSamy .NET.  It will be added hopefully within the next few months.  With the default stylesheet, style tags are not allowed and are stripped out, as is the style attribute.&lt;br /&gt;
&lt;br /&gt;
'''Update 03/15/2009''': CSS support has been implemented in the latest revision (r95) of AntiSamy.NET, and can be checked out from the SVN.&lt;br /&gt;
&lt;br /&gt;
== Contacting us ==&lt;br /&gt;
There are two ways of getting information on AntiSamy. The mailing list, and contacting the project lead directly.&lt;br /&gt;
&lt;br /&gt;
=== OWASP AntiSamy mailing list ===&lt;br /&gt;
The first is the mailing list which is located at https://lists.owasp.org/mailman/listinfo/owasp-antisamy. The list was previously private and the archives have been cleared with the release of version 1.0. We encourage all prospective and current users and bored attackers to join in the conversation. We're happy to brainstorm attack scenarios, discuss regular expressions and help with integration.&lt;br /&gt;
&lt;br /&gt;
=== Emailing the project lead ===&lt;br /&gt;
&lt;br /&gt;
For content which is not appropriate for the public mailing list, you can alternatively contact Jerry Hoff, at [jerry.hoff] at the [aspectsecurity.com] (s/ at the /@/).&lt;br /&gt;
&lt;br /&gt;
=== Issue tracking ===&lt;br /&gt;
&lt;br /&gt;
Visit the [http://code.google.com/p/owaspantisamy/issues/list Google Code issue tracker]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Visit the Google Code issue tracker&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_AntiSamy_Project_.NET&amp;diff=56753</id>
		<title>Category:OWASP AntiSamy Project .NET</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_AntiSamy_Project_.NET&amp;diff=56753"/>
				<updated>2009-03-16T02:27:03Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: /* Limitations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Project Information:template AntiSamy Project}}&lt;br /&gt;
[[Category:OWASP_AntiSamy_Project]]&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Beta Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
== What is AntiSamy .NET? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP AntiSamy .NET project is a few things. Technically, it is an API for ensuring user-supplied HTML/CSS is in compliance within an application's rules. Another way of saying that could be: It's an API that helps you make sure that clients don't supply malicious cargo code in the HTML they supply for their profile, comments, etc. that gets persisted on the server. The term malicious code in terms of web applications is usually regarded only as JavaScript. Cascading Stylesheets are only considered malicious when they invoke the JavaScript engine. However, there are many situations where &amp;quot;normal&amp;quot; HTML and CSS can be used in a malicious manner.&lt;br /&gt;
&lt;br /&gt;
Philosophically, AntiSamy .NET is a departure from all contemporary security mechanisms. Generally, the security mechanism and user have a communication that is virtually one way, for good reason. Letting the potential attacker know details about the validation is considered unwise as it allows the attacker to &amp;quot;learn&amp;quot; and &amp;quot;recon&amp;quot; the mechanism for weaknesses. These types of information leaks can also hurt in ways you don't expect. A login mechanism that tells the user, &amp;quot;Username invalid&amp;quot; leaks the fact that a user by that name does not exist. A user could use a dictionary or phone book or both to remotely come up with a list of valid usernames. Using this information, an attacker could launch a brute force attack or massive account lock denial-of-service. So, we get that.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, that's just not very usable in this situation. Typical Internet users are largely ineffective when it comes to writing HTML/CSS, so where do they get their HTML from? Usually they copy it from somewhere out on the web. Simply rejecting their input without any clue as to why is jolting and annoying. Annoyed users go somewhere else to do their social networking.&lt;br /&gt;
&lt;br /&gt;
Socioeconomically, AntiSamy .NET is a have-not enabler. Private companies like Google, MySpace, eBay, etc. have come up with proprietary solutions for solving this problem. This introduces two problems. One is that proprietary solutions are not usually all that good, and even if they are, well - naturally they're reluctant to share this hard-earned IP for free. Fortunately, we just don't care. We don't see any reason why only these private companies should have this functionality, so we are releasing this for free. &lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/OWASP_Licenses OWASP licensing policy] (further explained in the [http://www.owasp.org/index.php/Membership membership FAQ]) allows OWASP projects to be released under any [http://www.opensource.org/licenses/alphabetical approved open source license]. Under these guidelines, AntiSamy .NET is distributed under a [http://www.opensource.org/licenses/bsd-license.php BSD license].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Getting Started ==&lt;br /&gt;
&lt;br /&gt;
There's 4 steps in the process of integrating AntiSamy. Each step is detailed in the next section, but the high level overview follows:&lt;br /&gt;
&lt;br /&gt;
# Download AntiSamy from its home on Google Code&lt;br /&gt;
# Choose one of the standard policy files that matches as close to the functionality you need:&lt;br /&gt;
#* antisamy-slashdot.xml&lt;br /&gt;
#* (more to come in the near future)&lt;br /&gt;
# Tailor the policy file according to your site's rules&lt;br /&gt;
# Call the API from the code &lt;br /&gt;
&lt;br /&gt;
=== Downloading ===&lt;br /&gt;
&lt;br /&gt;
Currently, you can download the code using SVN from [http://code.google.com/p/owaspantisamy/source/browse/#svn/trunk/dotNet AntiSamy .NET Google Code SVN]&lt;br /&gt;
&lt;br /&gt;
In the future the source code and the compiled .dll can be found at [http://code.google.com/p/owaspantisamy/downloads/list Google Code]&lt;br /&gt;
&lt;br /&gt;
=== Installing ===&lt;br /&gt;
&lt;br /&gt;
There is no installation needed to get AntiSamy .NET to run.  Simply reference the .dll in your code, make sure the dependencies are present, and you are good to go.&lt;br /&gt;
&lt;br /&gt;
Currently, there is only one dependency, HtmlAgilityPack.dll.  To run the unit tests, you will also need:&lt;br /&gt;
#nunit.core.dll&lt;br /&gt;
#nunit.core.interfaces.dll&lt;br /&gt;
#nunit.framework.dll&lt;br /&gt;
&lt;br /&gt;
=== Tailoring the policy file ===&lt;br /&gt;
&lt;br /&gt;
Smaller organizations may want to deploy AntiSamy in a default configuration, but it's equally likely that a site may want to have strict, business-driven rules for what users can allow. The discussion that decides the tailoring should also consider attack surface - which grows in relative proportion to the policy file.&lt;br /&gt;
&lt;br /&gt;
=== Running ===&lt;br /&gt;
&lt;br /&gt;
Using AntiSamy is abnormally easy. Here is an example of invoking AntiSamy with a policy file: &lt;br /&gt;
&lt;br /&gt;
        AntiSamy _as = new AntiSamy();&lt;br /&gt;
        string filename = Server.MapPath(&amp;quot;./properties/antisamy-slashdot.xml&amp;quot;);&lt;br /&gt;
        Policy policy = Policy.getInstance(filename);&lt;br /&gt;
        CleanResults results = _as.scan(txtInput.Text, policy);&lt;br /&gt;
&lt;br /&gt;
And here is an example of using both the clean HTML and the error messages:&lt;br /&gt;
&lt;br /&gt;
        lblOutput.Text = results.getCleanHTML();&lt;br /&gt;
        string s = &amp;quot;&amp;quot;;&lt;br /&gt;
        for (int i = 0; i &amp;lt; results.getErrorMessages().Count; i++)&lt;br /&gt;
        {&lt;br /&gt;
            s += results.getErrorMessages()[i].ToString() + &amp;quot;&amp;lt;p/&amp;gt;&amp;quot;; &lt;br /&gt;
        }&lt;br /&gt;
        lblErrors.Text = s;&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
&lt;br /&gt;
No CSS support has been included yet in AntiSamy .NET.  It will be added hopefully within the next few months.  With the default stylesheet, style tags are not allowed and are stripped out, as is the style attribute.&lt;br /&gt;
&lt;br /&gt;
Update 03/15/2009: CSS support has been implemented in the latest revision (r95) of AntiSamy.NET, and can be checked out from the SVN.&lt;br /&gt;
&lt;br /&gt;
== Contacting us ==&lt;br /&gt;
There are two ways of getting information on AntiSamy. The mailing list, and contacting the project lead directly.&lt;br /&gt;
&lt;br /&gt;
=== OWASP AntiSamy mailing list ===&lt;br /&gt;
The first is the mailing list which is located at https://lists.owasp.org/mailman/listinfo/owasp-antisamy. The list was previously private and the archives have been cleared with the release of version 1.0. We encourage all prospective and current users and bored attackers to join in the conversation. We're happy to brainstorm attack scenarios, discuss regular expressions and help with integration.&lt;br /&gt;
&lt;br /&gt;
=== Emailing the project lead ===&lt;br /&gt;
&lt;br /&gt;
For content which is not appropriate for the public mailing list, you can alternatively contact Jerry Hoff, at [jerry.hoff] at the [aspectsecurity.com] (s/ at the /@/).&lt;br /&gt;
&lt;br /&gt;
=== Issue tracking ===&lt;br /&gt;
&lt;br /&gt;
Visit the [http://code.google.com/p/owaspantisamy/issues/list Google Code issue tracker]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Visit the Google Code issue tracker&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_AntiSamy_Project_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=56501</id>
		<title>Project Information:template AntiSamy Project - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_AntiSamy_Project_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=56501"/>
				<updated>2009-03-11T16:53:07Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template AntiSamy Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#OWASP AntiSamy .NET| OWASP AntiSamy .NET Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP AntiSamy .NET|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The OWASP AntiSamy.NET project is aimed to provide an API for .NET applications  for validating rich HTML/CSS input from users without exposing the web application to cross site scripting and phishing attacks.  The project is a direct port of the AntiSamy Java API. Currently, the project has one outstanding feature left to be implemented – Cascading Style Sheet (CSS) support.  Support for CSS would allow users to wrap input within inline style and div elements.  Arshan Dabirsiaghi stated that at the beginning of the project, it would not include support for CSS by the conclusion of Summer of Code 2008.  This is noted here for reference as it is not stated on the project site.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP AntiSamy .NET|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Overall, AntiSamy.NET is 100% complete.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The offsiteURL regular expression in the policy files could be more restrictive.  Looking up until the TLD, there are several characters, such as Unicode characters allowed within the FQDN where it should only be allowed in the path and the colon (:) character allowed outside of the FQDN.  More time should be allotted to look at the regular expression pattern -- http://www.w3.org/Addressing/URL/uri-spec.html should be consulted.  There are no performance measurements that show how much impact AntiSamy.NET puts on processing of input.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
All project criteria to meet Alpha Quality status have been fulfilled.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
AntiSamy.NET is an API for .NET projects.  There is no “installer” associated with such a project.  Basic usage instructions are included on the wiki, but there could be more effort put here.  See below for more.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
All features have been implemented, including CSS support.  One last pass through Fortify is required (pending).&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
It would be nice to see all functions documented and a data flow graph that shows how input flows through the API and is acted on.  I (Marcin Wielgoszewski) would be willing to create this documentation for the project.  See http://osteele.com/tools/reanimator and http://osteele.com/archives/2006/02/reanimator.  Also, with regards to unit testing, see the chapter on &amp;quot;Code Coverage&amp;quot; written by Charlie Miller in &amp;quot;Open Source Fuzzing Tools.&amp;quot;  It discusses how to increase code coverage with fuzzing.  This directly relates to the unit tests as we cannot guarantee they test all functionality implemented within AntiSamy.NET.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Podcast_6&amp;diff=53067</id>
		<title>Podcast 6</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Podcast_6&amp;diff=53067"/>
				<updated>2009-02-05T16:22:40Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[[OWASP_Podcast | OWASP Podcast Series]] #6'''&lt;br /&gt;
&amp;lt;br/&amp;gt;OWASP Roundtable&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Recorded January 24, 2009&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 [http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=300769012 http://images.apple.com/itunes/overview/images/overview-icon-itunes20081106.jpg] [http://www.owasp.org/download/jmanico/podcast.xml https://www.owasp.org/images/d/d3/Feed-icon-32x32.png] [http://www.owasp.org/download/jmanico/owasp_podcast_6.mp3 direct download]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;quot;Current WAF's are applying these old school&amp;lt;br/&amp;gt;&lt;br /&gt;
concepts, network security, to address software&amp;lt;br/&amp;gt;&lt;br /&gt;
security problems ... I think this is just&amp;lt;br/&amp;gt;&lt;br /&gt;
doomed to fail&amp;quot; - Marcin&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Participants&lt;br /&gt;
 - Brian Holyfield is a co-founder of Gotham Digital Science.&lt;br /&gt;
 - Marcin Wielgoszewski is a security consultant based out of New York City.&lt;br /&gt;
 - Andre Gironda is a web application security trainer in the Phoenix area.&lt;br /&gt;
&lt;br /&gt;
Links&lt;br /&gt;
* [http://www.gdssecurity.com/l/spf/ Secure Parameter Filter for IIS (SPF)]&lt;br /&gt;
* [http://www.tssci-security.com/ tssci-security]&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Scrubbr&amp;diff=53026</id>
		<title>Category:OWASP Scrubbr</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Scrubbr&amp;diff=53026"/>
				<updated>2009-02-05T05:27:12Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: /* Credits */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What is Scrubbr? =&lt;br /&gt;
Scrubbr is a BSD-licensed database scanning tool that checks numerous database&lt;br /&gt;
technologies for the presence of possible stored cross-site scripting attacks.&lt;br /&gt;
The tool was partialy inspired by &amp;quot;Scrawlr&amp;quot;, a trimmed-down version of HP's&lt;br /&gt;
WebInspect which was released for free after the so-called &amp;quot;asprox&amp;quot; mass-SQL&lt;br /&gt;
injection bot exploited hundreds of thousands of insecure ASP sites.&lt;br /&gt;
&lt;br /&gt;
In a similar vein, Aspect Security generously donated Scrubbr to OWASP to help&lt;br /&gt;
people get some visibility into their databases and check for malicious data.&lt;br /&gt;
&lt;br /&gt;
== What can Scrubbr do for me? ==&lt;br /&gt;
If you can tell Scrubbr how to access your database, it will search through&lt;br /&gt;
every field capable of holding strings in the database for malicious code. If&lt;br /&gt;
you want it to, it will search through every table, every row, and every column.&lt;br /&gt;
This will be very slow on large enterprise databases, but its very useful to &lt;br /&gt;
have assurance that there is no malicious data anywhere in the system.&lt;br /&gt;
&lt;br /&gt;
Scrubbr can detect input that doesn't match up with an AntiSamy policy file.&lt;br /&gt;
There is a subtle difference between &amp;quot;matching an AntiSamy policy&amp;quot; and being&lt;br /&gt;
&amp;quot;detected as an attack.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
There are numerous tools out that *detect* XSS attacks in different contexts&lt;br /&gt;
better than AntiSamy. The most prominent and peer-reviewed are NoScript&lt;br /&gt;
(http://noscript.net) and PHPIDS (http://php-ids.org/category/PHPIDS/). However,&lt;br /&gt;
this is not strictly what AntiSamy does. AntiSamy checks if rich input that is&lt;br /&gt;
passed in is allowed according to a policy file.&lt;br /&gt;
&lt;br /&gt;
Chances are that there is some input in your database that looks like rich input&lt;br /&gt;
how we in the web world think about it, but actualy isn't. For example, if&lt;br /&gt;
someone writes the following in their profile comment:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Hey, I sure am gonna miss seeing Sarah Palin on TV all the time &amp;lt;g&amp;gt;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Obviously the user intended the &amp;lt;g&amp;gt; string to express a grin emotion, but that&lt;br /&gt;
unfortunately looks like rich input, and since AntiSamy uses a whitelist for&lt;br /&gt;
higher assurance, it will be flagged.&lt;br /&gt;
&lt;br /&gt;
We are always looking to improve our engine, and we are working with the PHPIDS&lt;br /&gt;
group to possibly invoke their ruleset in order to provide less false positives.&lt;br /&gt;
&lt;br /&gt;
With all of that being said, AntiSamy does an excellent job in most situations&lt;br /&gt;
and will still detect the vast majority of stored XSS attacks, depending on the&lt;br /&gt;
injection context.&lt;br /&gt;
&lt;br /&gt;
== What can't Scrubbr do for me? ==&lt;br /&gt;
Scrubbr can't find XSS vulnerabilities in your web application. It can only&lt;br /&gt;
detect data that doesn't follow your site's policy for input that is in your &lt;br /&gt;
database. If you don't have a policy for rich input, then start with the&lt;br /&gt;
Slashdot policy file and add what you think you need from the other policy&lt;br /&gt;
files. More information on policy files can be found on the OWASP AntiSamy page:&lt;br /&gt;
&lt;br /&gt;
http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project&lt;br /&gt;
&lt;br /&gt;
Once you have a policy in place, then you can enfoce it with Scrubbr.&lt;br /&gt;
&lt;br /&gt;
= How do I get Scrubbr? =&lt;br /&gt;
&lt;br /&gt;
You can download the Scrubbr installer from the project's Google Code downloads page.&lt;br /&gt;
&lt;br /&gt;
= Contacting the Scrubbr group =&lt;br /&gt;
If you would like to request a feature, let us know about a bug, or provide a&lt;br /&gt;
patch, please let us know on the Google Code issue tracker for the project:&lt;br /&gt;
&lt;br /&gt;
http://code.google.com/p/owaspscrubbr/issues&lt;br /&gt;
&lt;br /&gt;
General questions can be e-mailed to the Scrubbr mailing list&lt;br /&gt;
owasp-scrubbr@lists.owasp.org. If you have a question about Scrubbr development,&lt;br /&gt;
contact the owasp-scrubbr-devel@lists.owasp.org mailing list.&lt;br /&gt;
&lt;br /&gt;
= Known weak points =&lt;br /&gt;
Scrubbr is a new open source project, and not surprisingly it has a few issues that we are working to address. If you have an issue that's not on this list, please add it to the issues list described in the previous section.&lt;br /&gt;
&lt;br /&gt;
== Uninstaller doesn't quite work in Vista ==&lt;br /&gt;
Microsoft Vista uses Virtual Paths (like Java servlets) to accommodate the diverge between UAC and Windows XP security, which makes uninstalling a manual process. &lt;br /&gt;
&lt;br /&gt;
When a user executes a setup executable (setup.exe, install.exe, etc.) Vista will prompt you with a security dialog before it allows the setup program to install files to a system directory like C:\Program Files. However, since Scrubbr uses [izPack http://izpack.org] as a cross-platform installer, the setup executable is actually a cross-platform JAR executable instead of an exe file. This does not trip the necessary Windows Vista UAC prompt and therefore silently fails to actually install to C:\Program Files. However, since Vista knew that this behavior would happen a lot, they compensated by redirecting the installation to another path, C:\Users\&amp;lt;your_username&amp;gt;\AppData\Local\VirtualStore\Program Files. Therefore, when the Uninstaller runs, it tries to delete C:\Program Files\Scrubbr, which doesn't exist, since it's unaware that Scrubbr has been installed to a virtual directory.&lt;br /&gt;
&lt;br /&gt;
This can be thought of as a bug in either Vista or in izPack, since neither accounts for the other. However, izPack allows us to install to many different platforms cleanly, so we don't think we're going to switch. That being said, uninstalling on Vista when the Uninstall option doesn't work is simple:&lt;br /&gt;
1. Open up Explorer&lt;br /&gt;
2. Navigate to C:\Users\&amp;lt;your_username&amp;gt;\AppData\Local\VirtualStore\Program Files&lt;br /&gt;
3. Delete the Scrubbr directory&lt;br /&gt;
4. Confirm that Scrubbr is no longer in your Start Menu or Program Files directory&lt;br /&gt;
&lt;br /&gt;
Scrubbr has an extremely small footprint. It installs a few files into Program Files and that is it. There is no user settings in your profile directory or registry values or anything of the sort. Simply deleting the directory makes it go away forever.&lt;br /&gt;
&lt;br /&gt;
= Credits =&lt;br /&gt;
Scrubbr was primarily developed by Arshan Dabirsiaghi&lt;br /&gt;
(arshan.dabirsiaghi@aspectsecurity.com) of Aspect Security with help from&lt;br /&gt;
Brandon DeVries (brd@jhu.edu). Other folks contributed in their&lt;br /&gt;
own ways, including:&lt;br /&gt;
&lt;br /&gt;
* Dave Wichers, COO, Aspect Security&lt;br /&gt;
* Jeff Williams, CEO, Aspect Security&lt;br /&gt;
* Mike Fauzy, Senior Application Security Engineer, Aspect Security&lt;br /&gt;
* Marcin Wielgoszewski, Security Consultant, Founder TSSCI-Security.com&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Podcast_2&amp;diff=49698</id>
		<title>Podcast 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Podcast_2&amp;diff=49698"/>
				<updated>2008-12-22T11:25:16Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: /* OWASP News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[https://www.owasp.org/index.php/Category:OWASP_PodCast OWASP Podcast Series] #2'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Recorded December 20, 2008&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For PCI Compliance,  its doesn't say that .. that your site has to be secure. It says you need to put in processes, and that you know, you have to act like you're trying...&amp;quot; - Stephen Craig Evans&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/download/jmanico/podcast.xml http://images.apple.com/itunes/overview/images/overview-icon-itunes20081106.jpg] [http://www.owasp.org/download/jmanico/podcast.xml https://www.owasp.org/images/d/d3/Feed-icon-32x32.png]&lt;br /&gt;
&lt;br /&gt;
== Participants ==&lt;br /&gt;
 - Stephen Craig Evans is an independent software security consultant based in southeast Asia.&lt;br /&gt;
 - Jim Manico is a Web Application Architect and Security Engineer for Aspect Security. &lt;br /&gt;
&lt;br /&gt;
== OWASP News == &lt;br /&gt;
&lt;br /&gt;
'''December 16, 2008''' - [http://securesoftware.blogspot.com/2008/12/owasp-security-testing-guide-vs-3.html OWASP testing guide version 3 has been officially released]&lt;br /&gt;
* The new testing guide is finally here!  Give it to your developers, testers, and anyone else responsible for ensuring the security of an application is built to spec through formal testing and observation.  Also great for the consultant, to brush up on testing techniques for a variety of technologies.  This Summer of Code 2008 Project was lead by [http://www.owasp.org/index.php/User:Mmeucci Matteo Meucci] and the following [[OWASP_Testing_Guide_Contributors|contributors]].&lt;br /&gt;
&lt;br /&gt;
'''December 15, 2008''' - [http://blog.watchfire.com/wfblog/2008/12/breaking-google-gears-cross-origin-communication-model.html Breaking Google Gears' Cross-Origin Communication Model]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 10, 2008''' - [http://www.microsoft.com/technet/security/advisory/961051.mspx Vulnerability in Internet Explorer Could Allow Remote Code Execution] and how the heck did this vuln [http://blogs.msdn.com/sdl/archive/2008/12/18/ms08-078-and-the-sdl.aspx slip through Microsoft's SDL?]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 10, 2008''' - Michael Zalewski, Googler, dumped core on his [http://googleonlinesecurity.blogspot.com/2008/12/announcing-browser-security-handbook.html browser security knowledge.]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 9-11, 2008''' - [http://www.owasp.org/index.php/ESAPI_Summit The first OWASP ESAPI Summit]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 8, 2008'''  - [http://blogs.zdnet.com/security/?p=2308 4 XSS flaws hit Facebook]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 8, 2008'''  - Safe ActiveX?  [http://googleonlinesecurity.blogspot.com/2008/12/native-client-technology-for-running.html Google wants to run native code over the web.]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Interview with Stephen Craig Evans == &lt;br /&gt;
 - OWASP Summer of Code project, [http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project &amp;quot;Securing WebGoat using ModSecurity&amp;quot;]&lt;br /&gt;
 - [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project OWASP Orizon Project]&lt;br /&gt;
 - Advice for those who want to contribute to a OWASP project&lt;br /&gt;
 - Status of Web App Sec in the Asia/Pacific region&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Podcast_2&amp;diff=49697</id>
		<title>Podcast 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Podcast_2&amp;diff=49697"/>
				<updated>2008-12-22T11:23:29Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: /* OWASP News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[https://www.owasp.org/index.php/Category:OWASP_PodCast OWASP Podcast Series] #2'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Recorded December 20, 2008&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For PCI Compliance,  its doesn't say that .. that your site has to be secure. It says you need to put in processes, and that you know, you have to act like you're trying...&amp;quot; - Stephen Craig Evans&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/download/jmanico/podcast.xml http://images.apple.com/itunes/overview/images/overview-icon-itunes20081106.jpg] [http://www.owasp.org/download/jmanico/podcast.xml https://www.owasp.org/images/d/d3/Feed-icon-32x32.png]&lt;br /&gt;
&lt;br /&gt;
== Participants ==&lt;br /&gt;
 - Stephen Craig Evans is an independent software security consultant based in southeast Asia.&lt;br /&gt;
 - Jim Manico is a Web Application Architect and Security Engineer for Aspect Security. &lt;br /&gt;
&lt;br /&gt;
== OWASP News == &lt;br /&gt;
&lt;br /&gt;
'''December 16, 2008''' - [http://securesoftware.blogspot.com/2008/12/owasp-security-testing-guide-vs-3.html OWASP testing guide version 3 has been officially released]&lt;br /&gt;
* The new testing guide is finally here!  Give it to your developers, testers, and anyone else responsible for ensuring the security of an application is built to spec through formal testing and observation.  Also great for the consultant, to brush up on testing techniques for a variety of technologies.  This Summer of Code 2008 Project was lead by [http://www.owasp.org/index.php/User:Mmeucci|Matteo Meucci] and the following [[OWASP_Testing_Guide_Contributors|contributors]].&lt;br /&gt;
&lt;br /&gt;
'''December 15, 2008''' - [http://blog.watchfire.com/wfblog/2008/12/breaking-google-gears-cross-origin-communication-model.html Breaking Google Gears' Cross-Origin Communication Model]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 10, 2008''' - [http://www.microsoft.com/technet/security/advisory/961051.mspx Vulnerability in Internet Explorer Could Allow Remote Code Execution] and how the heck did this vuln [http://blogs.msdn.com/sdl/archive/2008/12/18/ms08-078-and-the-sdl.aspx slip through Microsoft's SDL?]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 10, 2008''' - Michael Zalewski, Googler, dumped core on his [http://googleonlinesecurity.blogspot.com/2008/12/announcing-browser-security-handbook.html browser security knowledge.]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 9-11, 2008''' - [http://www.owasp.org/index.php/ESAPI_Summit The first OWASP ESAPI Summit]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 8, 2008'''  - [http://blogs.zdnet.com/security/?p=2308 4 XSS flaws hit Facebook]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 8, 2008'''  - Safe ActiveX?  [http://googleonlinesecurity.blogspot.com/2008/12/native-client-technology-for-running.html Google wants to run native code over the web.]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Interview with Stephen Craig Evans == &lt;br /&gt;
 - OWASP Summer of Code project, [http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project &amp;quot;Securing WebGoat using ModSecurity&amp;quot;]&lt;br /&gt;
 - [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project OWASP Orizon Project]&lt;br /&gt;
 - Advice for those who want to contribute to a OWASP project&lt;br /&gt;
 - Status of Web App Sec in the Asia/Pacific region&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Podcast_2&amp;diff=49696</id>
		<title>Podcast 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Podcast_2&amp;diff=49696"/>
				<updated>2008-12-22T11:22:55Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: /* OWASP News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[https://www.owasp.org/index.php/Category:OWASP_PodCast OWASP Podcast Series] #2'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Recorded December 20, 2008&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For PCI Compliance,  its doesn't say that .. that your site has to be secure. It says you need to put in processes, and that you know, you have to act like you're trying...&amp;quot; - Stephen Craig Evans&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/download/jmanico/podcast.xml http://images.apple.com/itunes/overview/images/overview-icon-itunes20081106.jpg] [http://www.owasp.org/download/jmanico/podcast.xml https://www.owasp.org/images/d/d3/Feed-icon-32x32.png]&lt;br /&gt;
&lt;br /&gt;
== Participants ==&lt;br /&gt;
 - Stephen Craig Evans is an independent software security consultant based in southeast Asia.&lt;br /&gt;
 - Jim Manico is a Web Application Architect and Security Engineer for Aspect Security. &lt;br /&gt;
&lt;br /&gt;
== OWASP News == &lt;br /&gt;
&lt;br /&gt;
'''December 16, 2008''' - [http://securesoftware.blogspot.com/2008/12/owasp-security-testing-guide-vs-3.html OWASP testing guide version 3 has been officially released]&lt;br /&gt;
* The new testing guide is finally here!  Give it to your developers, testers, and anyone else responsible for ensuring the security of an application is built to spec through formal testing and observation.  Also great for the consultant, to brush up on testing techniques for a variety of technologies.  This Summer of Code 2008 Project was lead by [[http://www.owasp.org/index.php/User:Mmeucci|Matteo Meucci]] and the following [[OWASP_Testing_Guide_Contributors|contributors]].&lt;br /&gt;
&lt;br /&gt;
'''December 15, 2008''' - [http://blog.watchfire.com/wfblog/2008/12/breaking-google-gears-cross-origin-communication-model.html Breaking Google Gears' Cross-Origin Communication Model]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 10, 2008''' - [http://www.microsoft.com/technet/security/advisory/961051.mspx Vulnerability in Internet Explorer Could Allow Remote Code Execution] and how the heck did this vuln [http://blogs.msdn.com/sdl/archive/2008/12/18/ms08-078-and-the-sdl.aspx slip through Microsoft's SDL?]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 10, 2008''' - Michael Zalewski, Googler, dumped core on his [http://googleonlinesecurity.blogspot.com/2008/12/announcing-browser-security-handbook.html browser security knowledge.]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 9-11, 2008''' - [http://www.owasp.org/index.php/ESAPI_Summit The first OWASP ESAPI Summit]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 8, 2008'''  - [http://blogs.zdnet.com/security/?p=2308 4 XSS flaws hit Facebook]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 8, 2008'''  - Safe ActiveX?  [http://googleonlinesecurity.blogspot.com/2008/12/native-client-technology-for-running.html Google wants to run native code over the web.]&lt;br /&gt;
* &amp;lt;short description goes here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Interview with Stephen Craig Evans == &lt;br /&gt;
 - OWASP Summer of Code project, [http://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project &amp;quot;Securing WebGoat using ModSecurity&amp;quot;]&lt;br /&gt;
 - [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project OWASP Orizon Project]&lt;br /&gt;
 - Advice for those who want to contribute to a OWASP project&lt;br /&gt;
 - Status of Web App Sec in the Asia/Pacific region&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=I%27ve_Been_Hacked-What_Now&amp;diff=46692</id>
		<title>I've Been Hacked-What Now</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=I%27ve_Been_Hacked-What_Now&amp;diff=46692"/>
				<updated>2008-11-21T14:56:11Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: /* My server has been hacked...what do I do now? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=My server has been hacked...what do I do now?=&lt;br /&gt;
&lt;br /&gt;
This page will offer suggestions and resources for identifying and eliminating threats to your web servers/applications after a suspected attack. &lt;br /&gt;
&lt;br /&gt;
Anyone interested in contributing is welcome.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Identification==&lt;br /&gt;
&lt;br /&gt;
Basic principles:&lt;br /&gt;
&lt;br /&gt;
* Incident identification/notification may occur from a number of information sources (events):&lt;br /&gt;
** Staff reporting unusual activity&lt;br /&gt;
** Staff, clients or public reporting a problem&lt;br /&gt;
** Technical teams/support discovering evidence of an incident on systems.&lt;br /&gt;
** Alerts from IDS, security monitoring systems or anti-virus software, Firewalls or WAFS.&lt;br /&gt;
&lt;br /&gt;
* Roles:&lt;br /&gt;
** A Security incident owner must be assigned.&lt;br /&gt;
** A point of contact must be available to respond to incidents at all times.&lt;br /&gt;
** A security incident owner must track the security incident to remediation and resolution.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Examples of an incident:&lt;br /&gt;
** Virus/malware infection&lt;br /&gt;
** Unauthorized system changes&lt;br /&gt;
** Unauthorized application/web site changes&lt;br /&gt;
** Unauthorized disclosure of client information or information leakage&lt;br /&gt;
** Theft or loss of company information/assets&lt;br /&gt;
&lt;br /&gt;
* Examples of an event:&lt;br /&gt;
** Reports from intrusion detection system/WAF/Firewall or log scraping system&lt;br /&gt;
** Reports from vulnerability scanning/traffic monitoring/performance monitoring&lt;br /&gt;
&lt;br /&gt;
==Assessment==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Incident severity :&lt;br /&gt;
&lt;br /&gt;
Risk Rating&lt;br /&gt;
&lt;br /&gt;
* '''Low''': &lt;br /&gt;
** Events that cannot be 100% identified as attacks and have no effect on operations; &lt;br /&gt;
** False activation of intrusion detection systems, WAF alerts etc&lt;br /&gt;
** Non-repeated scans or probing from an external uncontrolled network&lt;br /&gt;
&lt;br /&gt;
* '''Medium'''&lt;br /&gt;
** Incidents that have no negative impact on operations. Incidents identified but unsuccessful in an attempt to actively breach information security controls from external or internal standpoint&lt;br /&gt;
** Repeated active probing or parameter manipulation from an external or internal source.&lt;br /&gt;
** Malware/rogue code/virus that has been successfully contained or removed&lt;br /&gt;
&lt;br /&gt;
==Containment==&lt;br /&gt;
==Evidence Collection==&lt;br /&gt;
==Forensic Analysis==&lt;br /&gt;
==Investigation==&lt;br /&gt;
==Incident Follow-up==&lt;br /&gt;
==Lessons Learned==&lt;br /&gt;
==Event Correlation and Aggregation (Streamlining)==&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Marcin&amp;diff=46612</id>
		<title>User:Marcin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Marcin&amp;diff=46612"/>
				<updated>2008-11-20T15:03:16Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Projects==&lt;br /&gt;
[[:Category:OWASP AntiSamy Project .NET|OWASP AntiSamy .NET]]&amp;lt;br /&amp;gt;&lt;br /&gt;
[[:Category:Intrinsic_Security_Working_Group|Intrinsic Security Working Group]]&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Phoenix/Tools]]&lt;br /&gt;
&lt;br /&gt;
==My Website==&lt;br /&gt;
&lt;br /&gt;
[http://www.tssci-security.com tssci-security]&lt;br /&gt;
&lt;br /&gt;
==PGP Key==&lt;br /&gt;
&lt;br /&gt;
pub KeyID = [http://pgp.mit.edu:11371/pks/lookup?op=get&amp;amp;search=0xB0D446C3 B0D446C3]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN PGP PUBLIC KEY BLOCK-----&lt;br /&gt;
Version: PGP Key Server 0.9.6&lt;br /&gt;
&lt;br /&gt;
mQGiBEX7TagRBAClwMBiWMHIDHRGhfh4733jkkR/StyQwFfyQAcQERJ1fqBUwoUt&lt;br /&gt;
Ei4vX7ZC9q1AFGhUD+ASEr6iMHPnQmMiy4gUgXoRarIeFVMI89my4qX13GweMjMD&lt;br /&gt;
Dq+MH3BDYIObp47tN+x+imoxsRXgS/sHbJmQGM3/77uKQZuYOOtpQ+HKPwCg2tof&lt;br /&gt;
Ry9Nm/W8UBZTnUNm739T5X0D/R3oCMfsuSasMgcuEQqsnNDTSIc7MmEf1BHWsieu&lt;br /&gt;
D3QvptzN0MhFemWwzF2ureTh4trKLhGhP9u14/DYStRu10iBBe6nSZv6R2aig3ll&lt;br /&gt;
ytXmB4A1X9Q5WH00qalqmpZa5/1frMT+Wcp6knioZQDmiNEZFVi/fOpY/g5mKJKh&lt;br /&gt;
MPqZA/96lww3t+WUwCadVUX781SIXQzzQLkhQxjR60oy6aHAQ7lss39VFIES383z&lt;br /&gt;
4MJdyOKOwpwJbIeZaXDfeDRNT1vwswFLrGD2Rs1nYNZU6/sbdMo7xD1SZDGh6rbC&lt;br /&gt;
ikCICwBWcpiFkZwbkqkT9lUcPN9ql4BiLUZGbB2QCI+6TC9ay7RDTWFyY2luIFdp&lt;br /&gt;
ZWxnb3N6ZXdza2kgKE1hcmNpbidzIFBHUCBLZXkpIDxtYXJjaW5AdHNzY2ktc2Vj&lt;br /&gt;
dXJpdHkuY29tPohgBBMRAgAgAhsDBgsJCAcDAgQVAggDBBYCAwECHgECF4AFAkat&lt;br /&gt;
ZLkACgkQ3U7hhbDURsPvbwCfeh117AnipildPSiq7JDMxKz49KgAn1VgJivZV+7J&lt;br /&gt;
jW179PWXOVmtfKIriGYEExECACYFAkX7TagCGwMFCQHhM4AGCwkIBwMCBBUCCAME&lt;br /&gt;
FgIDAQIeAQIXgAAKCRDdTuGFsNRGw5InAJ0eDmApcw7IZv0601vtCfFO9sQUrwCf&lt;br /&gt;
V7251oQTKqXANLP/foQrhePC7iu5Ag0ERftNuhAIAOIgbIgxxeG3lVJrar7qKHsT&lt;br /&gt;
UgwdnL13ksIP407L4DwFEzUdtzTeZfQlHvtRJK7BeCtLDpvqjBdX2vKioJg+p2PS&lt;br /&gt;
W/30CcwxL3NviQ7+Zd6UOzz/01+1k9IM9k+heDKHit4t9vZW/nxLLQCTIQ8vATxe&lt;br /&gt;
hzfQRySGtHqyr5Ys8hOiTaU9WmiKzMMoc1+4TdhP8Ytn32ji6Pc+nydhCriE7/Fg&lt;br /&gt;
rTLybaNaw9TGvg8Ramq0V/aDHGltCLZEbsdIPGtvDfwy/M6FyG5zujsLalFFR3OD&lt;br /&gt;
hXaMZ9RQSQQWnap55V59hhsvlHboFbOT2ob3Q+k2HYJLayv6xzKq7pdJM9sv7CcA&lt;br /&gt;
BREH/jQ+HAKTTHkt2t9D+weVoMBLsTejT8RFZWF2RuF+4zfuMaySInjXt8AZjxhf&lt;br /&gt;
QupNbtgjUZzAmKZoQ9MWyKU+6y5lldbxXGsp+BGcILgimcG6b3ceA43nVACR9o3O&lt;br /&gt;
dJvGV0/QNOGkXLui0BOsZqOJ6otb3ancC3IR9TNzELaNFZKX+s7m5XHQnywxcu7q&lt;br /&gt;
iTOYEBPlZJGSsA6k3ej4IcPGa90kJmdOX7FC1VQCRYo7OdA4AuQYq94ypWaaGWKm&lt;br /&gt;
oJ45ix9/OG/PRdBHxfxbz0z4YeY34gw7Tv6Z5yiiJh1Cfo8bH7RZbRLb/+yI52Lx&lt;br /&gt;
/YojQ3KOuF6aLs86DgSKhTrsgdWISQQYEQIACQIbDAUCRq1kwwAKCRDdTuGFsNRG&lt;br /&gt;
w+OBAKCoXC7hlzO5ftleqHVVLZsJ6nfQeQCgzgUaxNN67W7s0XQaEaa2c+0F0w4=&lt;br /&gt;
=anSp&lt;br /&gt;
-----END PGP PUBLIC KEY BLOCK-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Marcin&amp;diff=46611</id>
		<title>User:Marcin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Marcin&amp;diff=46611"/>
				<updated>2008-11-20T14:51:52Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Projects==&lt;br /&gt;
[[:Category:OWASP AntiSamy Project .NET|OWASP AntiSamy .NET]]&amp;lt;br /&amp;gt;&lt;br /&gt;
[[:Category:Intrinsic_Security_Working_Group|Intrinsic Security Working Group]]&lt;br /&gt;
&lt;br /&gt;
==My Website==&lt;br /&gt;
&lt;br /&gt;
[http://www.tssci-security.com tssci-security]&lt;br /&gt;
&lt;br /&gt;
==PGP Key==&lt;br /&gt;
&lt;br /&gt;
pub KeyID = [http://pgp.mit.edu:11371/pks/lookup?op=get&amp;amp;search=0xB0D446C3 B0D446C3]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN PGP PUBLIC KEY BLOCK-----&lt;br /&gt;
Version: PGP Key Server 0.9.6&lt;br /&gt;
&lt;br /&gt;
mQGiBEX7TagRBAClwMBiWMHIDHRGhfh4733jkkR/StyQwFfyQAcQERJ1fqBUwoUt&lt;br /&gt;
Ei4vX7ZC9q1AFGhUD+ASEr6iMHPnQmMiy4gUgXoRarIeFVMI89my4qX13GweMjMD&lt;br /&gt;
Dq+MH3BDYIObp47tN+x+imoxsRXgS/sHbJmQGM3/77uKQZuYOOtpQ+HKPwCg2tof&lt;br /&gt;
Ry9Nm/W8UBZTnUNm739T5X0D/R3oCMfsuSasMgcuEQqsnNDTSIc7MmEf1BHWsieu&lt;br /&gt;
D3QvptzN0MhFemWwzF2ureTh4trKLhGhP9u14/DYStRu10iBBe6nSZv6R2aig3ll&lt;br /&gt;
ytXmB4A1X9Q5WH00qalqmpZa5/1frMT+Wcp6knioZQDmiNEZFVi/fOpY/g5mKJKh&lt;br /&gt;
MPqZA/96lww3t+WUwCadVUX781SIXQzzQLkhQxjR60oy6aHAQ7lss39VFIES383z&lt;br /&gt;
4MJdyOKOwpwJbIeZaXDfeDRNT1vwswFLrGD2Rs1nYNZU6/sbdMo7xD1SZDGh6rbC&lt;br /&gt;
ikCICwBWcpiFkZwbkqkT9lUcPN9ql4BiLUZGbB2QCI+6TC9ay7RDTWFyY2luIFdp&lt;br /&gt;
ZWxnb3N6ZXdza2kgKE1hcmNpbidzIFBHUCBLZXkpIDxtYXJjaW5AdHNzY2ktc2Vj&lt;br /&gt;
dXJpdHkuY29tPohgBBMRAgAgAhsDBgsJCAcDAgQVAggDBBYCAwECHgECF4AFAkat&lt;br /&gt;
ZLkACgkQ3U7hhbDURsPvbwCfeh117AnipildPSiq7JDMxKz49KgAn1VgJivZV+7J&lt;br /&gt;
jW179PWXOVmtfKIriGYEExECACYFAkX7TagCGwMFCQHhM4AGCwkIBwMCBBUCCAME&lt;br /&gt;
FgIDAQIeAQIXgAAKCRDdTuGFsNRGw5InAJ0eDmApcw7IZv0601vtCfFO9sQUrwCf&lt;br /&gt;
V7251oQTKqXANLP/foQrhePC7iu5Ag0ERftNuhAIAOIgbIgxxeG3lVJrar7qKHsT&lt;br /&gt;
UgwdnL13ksIP407L4DwFEzUdtzTeZfQlHvtRJK7BeCtLDpvqjBdX2vKioJg+p2PS&lt;br /&gt;
W/30CcwxL3NviQ7+Zd6UOzz/01+1k9IM9k+heDKHit4t9vZW/nxLLQCTIQ8vATxe&lt;br /&gt;
hzfQRySGtHqyr5Ys8hOiTaU9WmiKzMMoc1+4TdhP8Ytn32ji6Pc+nydhCriE7/Fg&lt;br /&gt;
rTLybaNaw9TGvg8Ramq0V/aDHGltCLZEbsdIPGtvDfwy/M6FyG5zujsLalFFR3OD&lt;br /&gt;
hXaMZ9RQSQQWnap55V59hhsvlHboFbOT2ob3Q+k2HYJLayv6xzKq7pdJM9sv7CcA&lt;br /&gt;
BREH/jQ+HAKTTHkt2t9D+weVoMBLsTejT8RFZWF2RuF+4zfuMaySInjXt8AZjxhf&lt;br /&gt;
QupNbtgjUZzAmKZoQ9MWyKU+6y5lldbxXGsp+BGcILgimcG6b3ceA43nVACR9o3O&lt;br /&gt;
dJvGV0/QNOGkXLui0BOsZqOJ6otb3ancC3IR9TNzELaNFZKX+s7m5XHQnywxcu7q&lt;br /&gt;
iTOYEBPlZJGSsA6k3ej4IcPGa90kJmdOX7FC1VQCRYo7OdA4AuQYq94ypWaaGWKm&lt;br /&gt;
oJ45ix9/OG/PRdBHxfxbz0z4YeY34gw7Tv6Z5yiiJh1Cfo8bH7RZbRLb/+yI52Lx&lt;br /&gt;
/YojQ3KOuF6aLs86DgSKhTrsgdWISQQYEQIACQIbDAUCRq1kwwAKCRDdTuGFsNRG&lt;br /&gt;
w+OBAKCoXC7hlzO5ftleqHVVLZsJ6nfQeQCgzgUaxNN67W7s0XQaEaa2c+0F0w4=&lt;br /&gt;
=anSp&lt;br /&gt;
-----END PGP PUBLIC KEY BLOCK-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008&amp;diff=46565</id>
		<title>OWASP EU Summit 2008</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008&amp;diff=46565"/>
				<updated>2008-11-19T21:16:41Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: /* ACTUAL AGENDA */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| &lt;br /&gt;
! width=&amp;quot;315&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
! width=&amp;quot;190&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;300&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot;|__TOC__&lt;br /&gt;
| align=&amp;quot;center&amp;quot;|[[Image:OWASP EU Summit Portugal 2008.jpg]]&amp;lt;br&amp;gt;''''SETTING THE WEB APPLICATION SECURITY AGENDA FOR 2009''''&amp;lt;br&amp;gt;4th - 7th November 2008&lt;br /&gt;
| align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* [[OWASP EU Summit 2008--PRESS|Press Information]]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_EU_Summit_2008_Media_Coverage Summit media coverage]&lt;br /&gt;
* [[:OWASP Working Session - Browser Security Letters|Open Letter to Browsers&amp;amp;Frameworks]] &lt;br /&gt;
* [http://spreadsheets.google.com/pub?key=pAX6n7m2zaTVLrPtR07riBA Confirmed Sponsored Participants]&lt;br /&gt;
* [[:OWASP Summit UALG 1 Day Conference|OWASP Summit UALG 1 Day Conference]]&lt;br /&gt;
* [http://twitter.com/OwaspEU08Summit OwaspEU08Summit on Twitter!]&lt;br /&gt;
* [[OWASP EU Summit 2008 Internals|OWASP EU Summit 2008 Internals]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;EU 08 Donation&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP EU SUMMIT 2008 OVERVIEW - [http://video.google.com/videoplay?docid=-7044581008789784268&amp;amp;hl=en  WATCH VIDEO]==&lt;br /&gt;
&lt;br /&gt;
* OWASP Summit EU 2008 is a worldwide gathering of OWASP leaders and Key Industry Players to present and discuss the latest OWASP Tools and documentation projects.&lt;br /&gt;
* In addition to 40+ presentations from the OWASP Leaders granted 250,000 USD for web application security research, the summit will host multiple Working Sessions designed to improve collaboration, achieve specific objectives and decide roadmaps for OWASP projects, chapters and for the OWASP community itself.  &lt;br /&gt;
* Containing both technical and business tracks, the Summit is the perfect place to learn what resources OWASP has available for use today.&lt;br /&gt;
* And with the confirmed presence of its most active leaders (OWASP is partially covering their expenses), the Summit will provide a relaxed but professional environment to meet the OWASP Leaders and to contribute to those project’s roadmaps for 2009.&lt;br /&gt;
* Following and expanding the tradition started at OWASP conferences, the Summit will also host the largest offering of training courses, covering multiple OWASP specific and Web Application Security Topics.&lt;br /&gt;
&lt;br /&gt;
Marketing information: [https://www.owasp.org/images/8/89/OWASP_EU_Summit_2008-Overview.pdf 6 page brochure] or this [https://www.owasp.org/images/3/3d/OWASP_EU_Summit_2008_-Full_Brochure.pdf 33 page brochure].&lt;br /&gt;
&lt;br /&gt;
== COST &amp;amp; REGISTRATION  ==&lt;br /&gt;
&lt;br /&gt;
There are multiple options available for participation (OWASP members get 20% Discount):&lt;br /&gt;
&lt;br /&gt;
* Working Sessions and Conference (4 days: 4th,5h,6th and 7th): €500 Euros ($700.00 USD) &lt;br /&gt;
* Conference only (2 days: 6th and 7th)  €350 Euros ($500 USD)&lt;br /&gt;
* Training:&lt;br /&gt;
** 2 days: €950 ($1350 USD)&lt;br /&gt;
** 1 day: €475 ($675 USD)&lt;br /&gt;
** 1/2 day €235 (335 USD) &lt;br /&gt;
* Students &lt;br /&gt;
** Working Session, and Conference: €150 Euros ($200 USD)&lt;br /&gt;
** Training: €100 Euros per day ($130 USD)&lt;br /&gt;
To register and pay for your participation please use: [http://guest.cvent.com/i.aspx?4W,M3,35818773-e14b-4d8e-8db8-5e14a6285a3d http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
 A currency converter can be found at [http://www.xe.com/ucc/ xe.com/ucc].&lt;br /&gt;
&lt;br /&gt;
== SPONSORSHIP OPPORTUNITIES ==&lt;br /&gt;
&lt;br /&gt;
For information on sponsoring see [[OWASP EU Summit 2008 Sponsors]].&lt;br /&gt;
&lt;br /&gt;
== SPONSORS ==&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot; | &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#FFDF80&amp;quot;; align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/5/5a/AOD_Logo_2c.gif https://www.owasp.org/images/9/9e/Mnemonic_logo.png    https://www.owasp.org/images/1/1a/Softtek_logo.gif  &lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
== FORMER AGENDA == &lt;br /&gt;
[[:OWASP EU Summit 2008 Former Agenda|Click here to see.]]&lt;br /&gt;
&lt;br /&gt;
== ACTUAL AGENDA == &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 | colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Agenda for Monday, November 3rd, 2008&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00 || colspan=&amp;quot;4&amp;quot; style=&amp;quot;width:80%; background:#B36B00&amp;quot; align=&amp;quot;center&amp;quot; | Lunch&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;4&amp;quot; style=&amp;quot;width:80%; background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; | Training Sessions&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00 to 17:00 ||  style=&amp;quot;width:30%; background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; |  Securing WebGoat with ModSecurity&lt;br /&gt;
Stephen Craig Evans&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; |  WebSec Apps for Managers and Executives&lt;br /&gt;
Mano Paul&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; |  OWASP Testing Guide&lt;br /&gt;
Matteo Meucci&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 19:00 || colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#FFFF00&amp;quot; align=&amp;quot;center&amp;quot; | Summit Briefing&lt;br /&gt;
Dinis Cruz and Summit Organization Team&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#7B8ABD&amp;quot; | 20:00 || colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#B36B00&amp;quot; align=&amp;quot;center&amp;quot; | OWASPers Dinner&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 | colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Agenda for Tuesday, November 4th, 2008&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00 || colspan=&amp;quot;4&amp;quot; style=&amp;quot;width:80%; background:#FFBFEF&amp;quot; align=&amp;quot;center&amp;quot; | Registration&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00 || colspan=&amp;quot;4&amp;quot; style=&amp;quot;width:80%; background:#FFFF00&amp;quot; align=&amp;quot;center&amp;quot; | Summit Keynote  &lt;br /&gt;
Dinis Cruz and Summit Organization Team&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; |  Documents &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; |  Tools  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 09:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Testing Guide&lt;br /&gt;
Matteo Meucci&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | OWASP JSP Testing Tool&lt;br /&gt;
Jason Li&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/index.php/Image:Code_Review_Eoin.pptx OWASP Code Review Guide]&lt;br /&gt;
Eoin Keary&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80 &amp;quot; align=&amp;quot;center&amp;quot; |  [https://www.owasp.org/index.php/Image:OWASP_EU_Summit_2008_The_Owasp_Orizon_Project.ppt OWASP Orizon Project] &lt;br /&gt;
Paolo Perego (a.k.a. thesp0nge)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 10:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Application Security Desk Reference (ADSR)&lt;br /&gt;
Leonardo Cavallari Militelli&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80 &amp;quot; align=&amp;quot;center&amp;quot; | OWASP Live CD&lt;br /&gt;
Matt Tesauro&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Spanish Project&lt;br /&gt;
Juan Carlos Calderon&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80 &amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/index.php/Image:OWASP_EU_Summit_2008_WebScarab_treasures.ppt WebScarab-NG]&lt;br /&gt;
Rogan Dawes&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 10:30 || colspan=&amp;quot;5&amp;quot; style=&amp;quot;background:#B36B00&amp;quot; align=&amp;quot;center&amp;quot; | Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 10:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | .NET ESAPI&lt;br /&gt;
Alex Smolen&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | JBroFuzz&lt;br /&gt;
Yiannis&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 11:00 || colspan=&amp;quot;6&amp;quot; style=&amp;quot;background:#FFFF00&amp;quot; align=&amp;quot;center&amp;quot; | Working Sessions Briefing&lt;br /&gt;
Dinis Cruz&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | Working Sessions &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 11:15 || style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | Documentation Projects/Guides Integration and Unified 4.0 Version&lt;br /&gt;
Chair:  Eduardo Neves&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | Browser Security&lt;br /&gt;
Chair:  Arshan Dabirsiaghi&lt;br /&gt;
Secretary:  Kuai Hinojosa&lt;br /&gt;
| style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | Tools Projects&lt;br /&gt;
Chair:  Matt Tesauro&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 13:00 || colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#B36B00&amp;quot; align=&amp;quot;center&amp;quot; | Lunch &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 14:00 || colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; | Training Sessions&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#7B8ABD&amp;quot; | || style=&amp;quot;background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; | The Art and Science of Threat Modeling Web Applications&lt;br /&gt;
Mano Paul&lt;br /&gt;
| style=&amp;quot;background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/index.php/Image:SELinux-course-OWASP.pdf Web Server Hardening SELinux]&lt;br /&gt;
Pavol Luptak&lt;br /&gt;
| style=&amp;quot;background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; | Offensive WebApp Hacking&lt;br /&gt;
Marco Slaviero&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 16:00 || colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#B36B00&amp;quot; align=&amp;quot;center&amp;quot; | Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | Working Sessions&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 16:30 || colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#7B8ABD &amp;quot; align=&amp;quot;center&amp;quot; |  ESAPI&lt;br /&gt;
Chair:  Jeff Williams&lt;br /&gt;
Secretary:  Arshan Dabirsiaghi&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 18:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | ASDR&lt;br /&gt;
Chair:  Leonardo Cavallari&lt;br /&gt;
| style=&amp;quot;background:#7B8ABD &amp;quot; align=&amp;quot;center&amp;quot; | .NET Project&lt;br /&gt;
Chair:  Dinis Cruz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 | colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Agenda for Wednesday, November 5th, 2008&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:15 || colspan=&amp;quot;4&amp;quot; style=&amp;quot;width:80%; background:#FFFF00&amp;quot; align=&amp;quot;center&amp;quot; | Daily Briefing:  &lt;br /&gt;
Dinis Cruz&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; |  Standards and Education &lt;br /&gt;
(Room 1) &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; |  Tools &lt;br /&gt;
(Room 2)  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 10:00|| colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Positive_Security_Project '''OWASP Positive Security (SoC 08)''']&lt;br /&gt;
Eduardo Vianna de Camargo Neves&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/index.php/Image:OWASP_EU_Summit_2008_AcCoRuTe.pptx OWASP Access Control Rules Tester Project]&lt;br /&gt;
Andrew Petukhov&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Education_Project '''OWASP Education'''] &lt;br /&gt;
Sebastien Deleersnyder, Martin Knobloch&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80 &amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/index.php/Image:Teachable_static_analysis_workbench.pptx OWASP Teachable Static Analysis Workbench] &lt;br /&gt;
Dmitry Kozlov&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Internationalization Guidelines&lt;br /&gt;
Juan Carlos Calderon&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80 &amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_AppSensor_Project OWASP AppSensor]&lt;br /&gt;
Michael Coates&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 10:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/index.php/Image:PASSWD.ppt PASSWD:Metrics and Vulnerabilities]&lt;br /&gt;
Lucilla Mancini &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80 &amp;quot; align=&amp;quot;center&amp;quot; | OWASP Backend Security Project&lt;br /&gt;
Carlo Pelliccioni&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 11:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Open Review Project&lt;br /&gt;
Dan Cornell&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80 &amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/index.php/Image:Site_generator.pptx OWASP Application Security Tool Benchmarking Environment and Site Generator Refresh Project]&lt;br /&gt;
Dmitry Kozlov&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 11:15 || colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Global Committee Elections&lt;br /&gt;
(Room 1)&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 11:30 || colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#B36B00&amp;quot; align=&amp;quot;center&amp;quot; | Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | || colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | Working Sessions&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 12:45 || style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP Working Session Education Project|OWASP Working Session Education Project]]&amp;lt;br&amp;gt;Chair: Sebastien Deleersnyder&amp;lt;br&amp;gt;(Room 1)&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | ''Testing Guide''&lt;br /&gt;
Chair:  Matteo Meucci&lt;br /&gt;
(Room 2)&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | ''Web Application Framework Security''&lt;br /&gt;
Chair:  Arshan Dabirsiaghi&lt;br /&gt;
Secretary:  Kuai Hinojosa&lt;br /&gt;
(Room 3)&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 14:45 || colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#B36B00&amp;quot; align=&amp;quot;center&amp;quot; | Lunch During Working Sessions&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 15:00 || colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; | Training Sessions&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#7B8ABD&amp;quot; | 15:00|| style=&amp;quot;background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; | Flash Player Security&lt;br /&gt;
Peleus Uhley&lt;br /&gt;
(Room 1)&lt;br /&gt;
| style=&amp;quot;background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Top 10&lt;br /&gt;
Sebastien Deleersnyder and Martin Knobloch&lt;br /&gt;
(Room 2)&lt;br /&gt;
| style=&amp;quot;background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/index.php/Image:OWASP_EU_Summit_2008_WebScarab_treasures.ppt Uncovering WebScarab's Secret Treasures]&lt;br /&gt;
Rogan Dawes&lt;br /&gt;
(Sala Bella Vista)&lt;br /&gt;
| style=&amp;quot;background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/Image:Hacking_the_Owasp_Orizon.ppt Hacking the Orizon]&lt;br /&gt;
Paolo Perego&lt;br /&gt;
(Room 3)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 17:00 || colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#B36B00&amp;quot; align=&amp;quot;center&amp;quot; | Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | Working Sessions&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 17:30 || style=&amp;quot;background:#7B8ABD &amp;quot; align=&amp;quot;center&amp;quot; |  Code Review Guide&lt;br /&gt;
Chair:  Eoin Keary&lt;br /&gt;
(Room 2)&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD &amp;quot; align=&amp;quot;center&amp;quot; |  EU Funding for OWASP Projects&lt;br /&gt;
Chair:  Carlos Serrao&lt;br /&gt;
(Sala Bella Vista)&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD &amp;quot; align=&amp;quot;center&amp;quot; | OWASP Certification&lt;br /&gt;
Chair:  Tom Brennan&lt;br /&gt;
(Room 1)&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD &amp;quot; align=&amp;quot;center&amp;quot; | Software Assurance Maturity Model&lt;br /&gt;
Chair:  Pravir Chandra&lt;br /&gt;
(Room 3)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 19:00 || style=&amp;quot;background:#7B8ABD &amp;quot; align=&amp;quot;center&amp;quot; | OWASP Website&lt;br /&gt;
Chair:  Favio Cerull&lt;br /&gt;
(Room 1)&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD &amp;quot; align=&amp;quot;center&amp;quot; | Metrics &amp;amp; Vulnerabilities&lt;br /&gt;
Chair:  Lucilla Mancini&lt;br /&gt;
(Room 2)&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#7B8ABD &amp;quot; align=&amp;quot;center&amp;quot; | OWASP Orizon&lt;br /&gt;
Paolo Perego&lt;br /&gt;
(Room 3)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Agenda for Thursday, November 6th, 2008&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:15 || colspan=&amp;quot;5&amp;quot; style=&amp;quot;width:80%; background:#FFFF00&amp;quot; align=&amp;quot;center&amp;quot; | Daily Briefing:  &lt;br /&gt;
Dinis Cruz&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; |  Technology &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:30%; background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; |  Tools  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 10:00|| colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Classic ASP Security Project&lt;br /&gt;
Juan Carlos Calderon&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Source Code Review&lt;br /&gt;
James Walden&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80 &amp;quot; align=&amp;quot;center&amp;quot; | OWASP Ruby on Rails Security Project&lt;br /&gt;
Heiko Webers&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;background:#80FF80 &amp;quot; align=&amp;quot;center&amp;quot; | OWASP Enigmaform and mod_Openpgp&lt;br /&gt;
Arturo Alberto Busleiman (a.k.a. Buanzo)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Webslayer Project&lt;br /&gt;
Christian Martorella&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;background:#80FF80 &amp;quot; align=&amp;quot;center&amp;quot; | OWASP Securing WebGoat using ModSecurity&lt;br /&gt;
Stephen Evans and Christian Folini&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 11:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#80FF80&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Skavenger Project&lt;br /&gt;
Matthias Rohr&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;background:#80FF80 &amp;quot; align=&amp;quot;center&amp;quot; | OWASP AntiSamy.NET&lt;br /&gt;
Marcin Wielgoszewski&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 11:15 || colspan=&amp;quot;5&amp;quot; style=&amp;quot;background:#B36B00&amp;quot; align=&amp;quot;center&amp;quot; | Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | || colspan=&amp;quot;5&amp;quot; style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | Working Sessions&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 11:30 || style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | Top 10&lt;br /&gt;
2009&lt;br /&gt;
Chair:  Dave Wichers&lt;br /&gt;
Secretary:  Jeff Williams&lt;br /&gt;
(Room 1)&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | Intra Governmental Affairs&lt;br /&gt;
Chair:  David Campbell&lt;br /&gt;
(Room 2)&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | SAMM v2&lt;br /&gt;
(Room 3)&lt;br /&gt;
| style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | Web Site&lt;br /&gt;
12:15&lt;br /&gt;
Executive Room&lt;br /&gt;
| style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | Handling Web MalWare&lt;br /&gt;
12:15&lt;br /&gt;
Sala Bella Vista&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 13:00 || colspan=&amp;quot;5&amp;quot; style=&amp;quot;background:#B36B00&amp;quot; align=&amp;quot;center&amp;quot; | Lunch During Working Sessions&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 14:00 || colspan=&amp;quot;5&amp;quot; style=&amp;quot;background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; | Training Sessions&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#7B8ABD&amp;quot; | || style=&amp;quot;background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; | Ajax Security&lt;br /&gt;
(Room 1)&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; | Auditing Flash Applications&lt;br /&gt;
Peleus Uhley&lt;br /&gt;
(Room 2)&lt;br /&gt;
| style=&amp;quot;background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; | WebApp Assessment&lt;br /&gt;
Vicente Aguilera Diaz&lt;br /&gt;
(Room 3)&lt;br /&gt;
| style=&amp;quot;background:#c0e0e0&amp;quot; align=&amp;quot;center&amp;quot; | Mod Security&lt;br /&gt;
Lucas C. Ferreira&lt;br /&gt;
(Executive Room)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 13:00 || colspan=&amp;quot;5&amp;quot; style=&amp;quot;background:#B36B00&amp;quot; align=&amp;quot;center&amp;quot; | Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;5&amp;quot; style=&amp;quot;background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | Working Sessions&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;background:#7B8ABD&amp;quot; | 16:30 || colspan=&amp;quot;5&amp;quot; style=&amp;quot;background:#7B8ABD &amp;quot; align=&amp;quot;center&amp;quot; |  Strategic Planning and Business Models compatible with OWASP values&lt;br /&gt;
Chair:  Jeff Williams, Dinis Cruz, Dave Wichers, Sebastien Deleersnyder, and Tom Brennan&lt;br /&gt;
Secretary:  Kate Hartmann and Paulo Combra&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 18:30 || style=&amp;quot;background:#7B8ABD &amp;quot; align=&amp;quot;center&amp;quot; |  2-Way Internationalization&lt;br /&gt;
Chair:  Juan Carlos Calderon and Sebastien Deleersnyder&lt;br /&gt;
(Room 1)&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD &amp;quot; align=&amp;quot;center&amp;quot; |  Best Practices for Chapter Leaders&lt;br /&gt;
Chair:  Georg Hess&lt;br /&gt;
(Room 2)&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD &amp;quot; align=&amp;quot;center&amp;quot; | Portuguese Public &amp;amp; Private Organizations&lt;br /&gt;
Chair:  Carlos Serrao&lt;br /&gt;
(Room 3)&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD &amp;quot; align=&amp;quot;center&amp;quot; | Live CD &amp;amp; DVD&lt;br /&gt;
Chair:  Matt Tesauro&lt;br /&gt;
(Sala Bella Vista)&lt;br /&gt;
| style=&amp;quot;background:#7B8ABD &amp;quot; align=&amp;quot;center&amp;quot; | OWASP Awards&lt;br /&gt;
Chair:  Colin Watson&lt;br /&gt;
(Executive Room)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD&amp;quot; | 20:00 || colspan=&amp;quot;5&amp;quot; style=&amp;quot;background:#B36B00 &amp;quot; align=&amp;quot;center&amp;quot; | Gala Dinner - Restaurante de Real&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#7B8ABD &amp;quot; | 22:00 || colspan=&amp;quot;5&amp;quot; style=&amp;quot;background:#B36B00 &amp;quot; align=&amp;quot;center&amp;quot; | OWASP Band - LE CLUB&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Agenda for Friday, November 7th, 2008&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00 || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#FFFF00&amp;quot; align=&amp;quot;center&amp;quot; | OWASP AppSec Agenda 2009:  Working Session Outcomes  &lt;br /&gt;
Dinis Cruz&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15 || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#FFFF00&amp;quot; align=&amp;quot;center&amp;quot; | Results Presentations &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Documentation Projects/Guides Integration and Unified 4.0 Version&lt;br /&gt;
Chair:  Eduardo Neves&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Browser Security&lt;br /&gt;
Chair:  Arshan Dabirsiaghi&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | ESAPI&lt;br /&gt;
Chair:  Jeff Williams&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Tools Projects&lt;br /&gt;
Chair:  Matt Tesauro&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Code Review Guide&lt;br /&gt;
Chair:  Eoin Keary&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Certification&lt;br /&gt;
Chair:  Tom Brennan&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Software Assurance Maturity Model&lt;br /&gt;
Chair:  Pravir Chandra&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Top 10 2009&lt;br /&gt;
Chair:  Dave Wichers&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Intra Governmental Affairs&lt;br /&gt;
Chair:  David Campbell&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Best Practices for Chapter Leaders&lt;br /&gt;
Chair:  Georg Hess&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15 || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#B36B00&amp;quot; align=&amp;quot;center&amp;quot; | Coffee Break and vote break (put your dots on the wall)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30 || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Live CD &amp;amp; DVD&lt;br /&gt;
Chair:  Matt Tesauro&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | ADSR&lt;br /&gt;
Chair:  Leonardo Cavallari&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Education Project&lt;br /&gt;
Chair:  Sebastien Deleersnyder&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Web Application Framework Security&lt;br /&gt;
Chair:  Arshan Dabirsiaghi&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Testing Guide&lt;br /&gt;
Chair:  Matteo Meucci&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Censorship&lt;br /&gt;
Chair:  Tom Brennan&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | EU Funding for OWASP Projects&lt;br /&gt;
Chair:  Carlos Serrao&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Website&lt;br /&gt;
Chair:  Fabio Cerull&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Orizon&lt;br /&gt;
Chair:  Paolo Perego&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Handling Web MalWare&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | 2-Way Internationalization&lt;br /&gt;
Chair:  Juan Carlos Calderon&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; |  || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Portuguese Public &amp;amp; Private Organizations&lt;br /&gt;
Chair:  Carlos Serrao&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:45 || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Winter of Code 2009&lt;br /&gt;
Chair:  Dinis Cruz and Sebastien Deleersnyder&lt;br /&gt;
Secretary:  Paulo Combra&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00 || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#B36B00&amp;quot; align=&amp;quot;center&amp;quot; | Lunch - During Winter of Code&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00 || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#FFFF00&amp;quot; align=&amp;quot;center&amp;quot; | Board Meeting&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00 || colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; background:#FFFF00&amp;quot; align=&amp;quot;center&amp;quot; | Announcement of Summit Procedings&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==VENUE &amp;amp; TRAVEL ARRANGEMENTS==&lt;br /&gt;
&lt;br /&gt;
The OWASP European Summit 2008 will be hosted at the 5 start Resort in Algarve Portugal ([http://www.granderealsantaeulaliahotel.com/index.html '''Grande Real Santa Eulália Resort &amp;amp; Hotel''']). We suggest the hotel booking and the travel arrangements be handled via [http://www.diplomatatours.pt/owasp.php '''Diplomata Tours'''], the assigned travel agency.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The venue address:&lt;br /&gt;
&lt;br /&gt;
Praia de Santa Eulália&lt;br /&gt;
&lt;br /&gt;
PO Box 2445&lt;br /&gt;
&lt;br /&gt;
Albufeira, Portugal&lt;br /&gt;
&lt;br /&gt;
8200-916 &lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=Grande+Real+Santa+Eul%C3%A1lia+Resort+%26+Hotel+algarve&amp;amp;sll=37.015438,-7.919769&amp;amp;sspn=0.084982,0.176468&amp;amp;ie=UTF8&amp;amp;ll=37.124054,-8.182583&amp;amp;spn=0.08486,0.176468&amp;amp;z=13&amp;amp;iwloc=B Google Maps Link] &lt;br /&gt;
&lt;br /&gt;
Nearest Airport: [http://maps.google.co.uk/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=Aeroporto+de+Faro,+Montenegro,+Faro,+8005,+Portugal&amp;amp;ie=UTF8&amp;amp;ll=37.096812,-7.967834&amp;amp;spn=0.502766,1.235962&amp;amp;z=10&amp;amp;output=html Faro]&lt;br /&gt;
&lt;br /&gt;
== U.S. Absentee Voting Information ==&lt;br /&gt;
&lt;br /&gt;
U.S. citizens attending the Summit on 4 November (Election Day) may vote absentee. You may find the information you need [http://www.fvap.gov/ here], [http://www.eac.gov/ here] or [http://travel.state.gov/law/info/info_2964.html here], or on your home [http://www.usa.gov/Agencies/State_and_Territories.shtml state/territory] or foreign [http://www.usembassy.gov/ embassy/consulate] web site. These links are provided for your information only; OWASP does not endorse any political party, candidate, etc. and is not able to provide you with instructions or assistance in voting or registering.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=I%27ve_Been_Hacked-What_Now&amp;diff=46522</id>
		<title>I've Been Hacked-What Now</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=I%27ve_Been_Hacked-What_Now&amp;diff=46522"/>
				<updated>2008-11-19T14:26:34Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====My Server Has Been Hacked--What Do I Do Now??====&lt;br /&gt;
&lt;br /&gt;
This page will offer suggestions and resources for identifying and eliminating threats to your web servers/applications after a suspected attack. &lt;br /&gt;
&lt;br /&gt;
Anyone interested in contributing is welcome.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;small&amp;gt;comment added by [[User:Marcin|Marcin]] • 14:24, 19 November 2008 (UTC):&amp;lt;/small&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
Below are some basic bullet points that should be expanded on/revised, etc.&lt;br /&gt;
&lt;br /&gt;
*Identification&lt;br /&gt;
*Assessment&lt;br /&gt;
*Containment&lt;br /&gt;
*Evidence Collection&lt;br /&gt;
*Forensic Analysis&lt;br /&gt;
*Investigation&lt;br /&gt;
*Incident Follow-up&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_AntiSamy_Project&amp;diff=45080</id>
		<title>Project Information:template AntiSamy Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_AntiSamy_Project&amp;diff=45080"/>
				<updated>2008-10-29T15:46:57Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP AntiSamy .NET Project''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|This project is API for validating rich HTML/CSS input from users without exposure to cross-site scripting and phishing attacks.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:arshan.dabirsiaghi(at)gmail.com '''Arshan Dabirsiaghi''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;[mailto:li.jason.c(at)gmail.com '''Jason Li''']&amp;lt;br&amp;gt;[mailto:j(at)lollyshouse.net '''J Irving''']&amp;lt;br&amp;gt;[mailto:jerryhoff(at)gmail.com '''Jerry Hoff''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;br&amp;gt;&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-antisamy '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:owasp-antisamy@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:kisero(at)gmail.com Esteban Ribičić]&amp;lt;br&amp;gt;[http://docs.google.com/Doc?id=df9vbj96_120fzfj4kfk Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:marcin(at)tssci-security.com Marcin Wielgoszewski]&amp;lt;br&amp;gt;[[:Image:Mwielgoszewski-CV.pdf|Curriculum]]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;[mailto:jeff.williams@owasp.org '''Jeff Williams''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/owaspantisamy/downloads/list Owasp Anti-Samy Tool]&lt;br /&gt;
* [http://www.antisamy.net/  A test site set up to bang on it]  &lt;br /&gt;
* (If appropriate, more links to be added)&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#OWASP_AntiSamy_.NET|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''N/A'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - Final Review - OWASP Board Member - G|See/Edit: Final Review/Board Member (G)]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_AntiSamy_Project&amp;diff=45079</id>
		<title>Project Information:template AntiSamy Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_AntiSamy_Project&amp;diff=45079"/>
				<updated>2008-10-29T15:42:19Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP AntiSamy .NET Project''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|This project is API for validating rich HTML/CSS input from users without exposure to cross-site scripting and phishing attacks.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:arshan.dabirsiaghi(at)gmail.com '''Arshan Dabirsiaghi''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;[mailto:li.jason.c(at)gmail.com '''Jason Li''']&amp;lt;br&amp;gt;[mailto:j(at)lollyshouse.net '''J Irving''']&amp;lt;br&amp;gt;[mailto:jerryhoff(at)gmail.com '''Jerry Hoff''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;br&amp;gt;&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-antisamy '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:owasp-antisamy@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:kisero(at)gmail.com Esteban Ribičić]&amp;lt;br&amp;gt;[http://docs.google.com/Doc?id=df9vbj96_120fzfj4kfk Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:marcin(at)tssci-security.com Marcin Wielgoszewski]&amp;lt;br&amp;gt;[[:Image:Mwielgoszewski-CV.pdf|Curriculum]]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;[mailto:jeff.williams@owasp.org '''Jeff Williams''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/owaspantisamy/downloads/list Owasp Anti-Samy Tool]&lt;br /&gt;
* [http://www.antisamy.net/  A test site set up to bang on it]  &lt;br /&gt;
* (If appropriate, more links to be added)&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#OWASP_AntiSamy_.NET|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - Final Review - OWASP Board Member - G|See/Edit: Final Review/Board Member (G)]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_AntiSamy_Project_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=41757</id>
		<title>Project Information:template AntiSamy Project - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_AntiSamy_Project_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=41757"/>
				<updated>2008-10-01T17:28:08Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template AntiSamy Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#OWASP AntiSamy .NET| OWASP AntiSamy .NET Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP AntiSamy .NET|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The OWASP AntiSamy.NET project is aimed to provide an API for .NET applications  for validating rich HTML/CSS input from users without exposing the web application to cross site scripting and phishing attacks.  The project is a direct port of the AntiSamy Java API. Currently, the project has one outstanding feature left to be implemented – Cascading Style Sheet (CSS) support.  Support for CSS would allow users to wrap input within inline style and div elements.  Arshan Dabirsiaghi stated that at the beginning of the project, it would not include support for CSS by the conclusion of Summer of Code 2008.  This is noted here for reference as it is not stated on the project site.&lt;br /&gt;
&lt;br /&gt;
There are also 8 outstanding issues (defects) of Low and Medium priority listed in  http://code.google.com/p/owaspantisamy/issues/list none of which affect the .NET version of AntiSamy.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP AntiSamy .NET|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Overall, AntiSamy.NET is about 90% complete with missing CSS support.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The offsiteURL regular expression in the policy files could be more restrictive.  Looking up until the TLD, there are several characters, such as Unicode characters allowed within the FQDN where it should only be allowed in the path and the colon (:) character allowed outside of the FQDN.  More time should be allotted to look at the regular expression pattern -- http://www.w3.org/Addressing/URL/uri-spec.html should be consulted.  There are no performance measurements that show how much impact AntiSamy.NET puts on processing of input.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
All project criteria to meet Alpha Quality status have been fulfilled.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
AntiSamy.NET is an API for .NET projects.  There is no “installer” associated with such a project.  Basic usage instructions are included on the wiki, but there could be more effort put here.  See below for more.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
AntiSamy.NET has not been analyzed by a source code analysis tool.  All 50+ AntiSamy.NET unit tests run have passed.  Having been subject to third-party review, all attacks attempted failed to bypass AntiSamy.NET restrictions.  More testing should be done using double-encoded attacks and perhaps a second (side) project could be started that contains various attacks to be used for fuzzing applications.&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
It would be nice to see all functions documented and a data flow graph that shows how input flows through the API and is acted on.  I (Marcin Wielgoszewski) would be willing to create this documentation for the project.  See http://osteele.com/tools/reanimator and http://osteele.com/archives/2006/02/reanimator.  Also, with regards to unit testing, see the chapter on &amp;quot;Code Coverage&amp;quot; written by Charlie Miller in &amp;quot;Open Source Fuzzing Tools.&amp;quot;  It discusses how to increase code coverage with fuzzing.  This directly relates to the unit tests as we cannot guarantee they test all functionality implemented within AntiSamy.NET.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_AntiSamy_Project_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=41750</id>
		<title>Project Information:template AntiSamy Project - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_AntiSamy_Project_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=41750"/>
				<updated>2008-10-01T16:26:16Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template AntiSamy Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#OWASP AntiSamy .NET| OWASP AntiSamy .NET Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP AntiSamy .NET|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The OWASP AntiSamy.NET project is aimed to provide an API for .NET applications  for validating rich HTML/CSS input from users without exposing the web application to cross site scripting and phishing attacks.  The project is a direct port of the AntiSamy Java API. Currently, the project has one outstanding feature left to be implemented – Cascading Style Sheet (CSS) support.  Support for CSS would allow users to wrap input within inline style and div elements.  Arshan Dabirsiaghi stated that at the beginning of the project, it would not include support for CSS by the conclusion of Summer of Code 2008.  This is noted here for reference as it is not stated on the project site.&lt;br /&gt;
&lt;br /&gt;
There are also 8 outstanding issues (defects) of Low and Medium priority listed in  http://code.google.com/p/owaspantisamy/issues/list none of which affect the .NET version of AntiSamy.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP AntiSamy .NET|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Overall, AntiSamy.NET is about 70% complete with missing CSS support.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The offsiteURL regular expression in the policy files could be more restrictive.  Looking up until the TLD, there are several characters, such as Unicode characters allowed within the FQDN where it should only be allowed in the path and the colon (:) character allowed outside of the FQDN.  More time should be allotted to look at the regular expression pattern -- http://www.w3.org/Addressing/URL/uri-spec.html should be consulted.  There are no performance measurements that show how much impact AntiSamy.NET puts on processing of input.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
All project criteria to meet Alpha Quality status have been fulfilled.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
AntiSamy.NET is an API for .NET projects.  There is no “installer” associated with such a project.  Basic usage instructions are included on the wiki, but there could be more effort put here.  See below for more.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
AntiSamy.NET has not been analyzed by a source code analysis tool.  All 50+ AntiSamy.NET unit tests run have passed.  Having been subject to third-party review, all attacks attempted failed to bypass AntiSamy.NET restrictions.  More testing should be done using double-encoded attacks and perhaps a second (side) project could be started that contains various attacks to be used for fuzzing applications.&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
It would be nice to see all functions documented and a data flow graph that shows how input flows through the API and is acted on.  I (Marcin Wielgoszewski) would be willing to create this documentation for the project.  See http://osteele.com/tools/reanimator and http://osteele.com/archives/2006/02/reanimator.  Also, with regards to unit testing, see the chapter on &amp;quot;Code Coverage&amp;quot; written by Charlie Miller in &amp;quot;Open Source Fuzzing Tools.&amp;quot;  It discusses how to increase code coverage with fuzzing.  This directly relates to the unit tests as we cannot guarantee they test all functionality implemented within AntiSamy.NET.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_AntiSamy_Project_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=41749</id>
		<title>Project Information:template AntiSamy Project - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_AntiSamy_Project_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=41749"/>
				<updated>2008-10-01T16:15:03Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template AntiSamy Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#OWASP AntiSamy .NET| OWASP AntiSamy .NET Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP AntiSamy .NET|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The OWASP AntiSamy.NET project is aimed to provide an API for .NET applications  for validating rich HTML/CSS input from users without exposing the web application to cross site scripting and phishing attacks.  The project is a direct port of the AntiSamy Java API. Currently, the project has one outstanding feature left to be implemented – Cascading Style Sheet (CSS) support.  Support for CSS would allow users to wrap input within inline style and div elements.  Arshan Dabirsiaghi stated that at the beginning of the project, it would not include support for CSS by the conclusion of Summer of Code 2008.  This is noted here for reference as it is not stated on the project site.&lt;br /&gt;
&lt;br /&gt;
There are also 8 outstanding issues (defects) of Low and Medium priority listed in  http://code.google.com/p/owaspantisamy/issues/list none of which affect the .NET version of AntiSamy.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#OWASP AntiSamy .NET|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Overall, AntiSamy.NET is about 70% complete with missing CSS support.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
A)	The offsiteURL regular expression in the policy files could be more restrictive.  Looking up until the TLD, there are several characters, such as Unicode characters allowed within the FQDN where it should only be allowed in the path and the colon (:) character allowed outside of the FQDN.  More time should be allotted to look at the regular expression pattern -- http://www.w3.org/Addressing/URL/uri-spec.html should be consulted.  There are no performance measurements that show how much impact AntiSamy.NET puts on processing of input.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
All project criteria to meet Alpha Quality status have been fulfilled.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
AntiSamy.NET is an API for .NET projects.  There is no “installer” associated with such a project.  Basic usage instructions are included on the wiki, but there could be more effort put here.  See below for more.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
AntiSamy.NET has not been analyzed by a source code analysis tool.  All 50+ AntiSamy.NET unit tests run have passed.  Having been subject to third-party review, all attacks attempted failed to bypass AntiSamy.NET restrictions.  More testing should be done using double-encoded attacks and perhaps a second (side) project could be started that contains various attacks to be used for fuzzing applications.&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
It would be nice to see all functions documented and a data flow graph that shows how input flows through the API and is acted on.  I (Marcin Wielgoszewski) would be willing to create this documentation for the project.  See http://osteele.com/tools/reanimator and http://osteele.com/archives/2006/02/reanimator.  Also, with regards to unit testing, see the chapter on &amp;quot;Code Coverage&amp;quot; written by Charlie Miller in &amp;quot;Open Source Fuzzing Tools.&amp;quot;  It discusses how to increase code coverage with fuzzing.  This directly relates to the unit tests as we cannot guarantee they test all functionality implemented within AntiSamy.NET.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008_Paid_Participants&amp;diff=38802</id>
		<title>OWASP EU Summit 2008 Paid Participants</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008_Paid_Participants&amp;diff=38802"/>
				<updated>2008-09-07T17:31:19Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: /* Provisory list of 'expenses paid' participants */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Provisory list of 'expenses paid' participants    ==&lt;br /&gt;
&lt;br /&gt;
 {| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECTED CONFERENCE PAID ATTENDEES AND/OR SPEAKERS - NEEDS OWASP BOARD CONFIRMATION''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''NAME'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''POSITION/REASON OF ATTENDANCE'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''COUNTRY'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''DEPARTURE (AIRPORT/CITY)'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;left&amp;quot; style=&amp;quot;background:white; color:black&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP BOARD MEMBERS &amp;amp; EMPLOYEES''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Jeff Williams&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Board, Chair, Wiki, Management&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Washington, D.C. &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Dave Wichers &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Board, Conferences, Financials&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Washington, D.C.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Dinis Cruz &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Board, Firehose of Ideas and Money spender&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|UK&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|London&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Tom Brennan &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Board, OWASP Governance&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|New York, NY&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Sebastien Deleersnyder &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Board, OWASP Chapters and Projects&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Belgium&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Paulo Coimbra&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Employee, Project Manager&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|UK&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|London&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Kate Hartmann&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Employee, Operations Director&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Washington, D.C.&lt;br /&gt;
 |-&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;left&amp;quot; style=&amp;quot;background:white; color:black&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP SUMMER OF CODE 2008 PROJECT LEADERS &amp;amp; REVIEWERS''' &lt;br /&gt;
|- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Achim Hoffmann&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Reviewer, OWASP Skavenger Project, OWASP w3af Project  &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Germany&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Frankfurt or Munich&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Alexander Fry&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Reviewer, OWASP Source Code Review OWASP Projects&amp;lt;br&amp;gt;OWASP Teachable Static Analysis Workbench&amp;lt;br&amp;gt;OWASP WeBekci Project  &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Arshan Dabirsiaghi&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, OWASP AntiSamy Project&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Baltimore, MD&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Andrew Petukhov &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, OWASP Access Control Rules Tester Project&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Russia&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Moscow&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Arturo Alberto Busleiman &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, OWASP Enigform and mod_Openpgp &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Argentina&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Carlo Pelliccioni &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, OWASP Backend Security Project&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Italy &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Rome&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Deb, LX Studios&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, OWASP Book Cover &amp;amp; Sleeve Design, OWASP Individual &amp;amp; Corporate Member Packs, Conference Attendee Packs&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Eduardo Vianna de Camargo Neves  &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, OWASP Positive Security  &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Brazil &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Curitiba (CWB)&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Wagner Elias  &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Reviwer, OWASP Positive Security  &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Brazil &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|São Paulo(GRU)&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Eoin Keary&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, OWASP Code Review Guide, Chapter Leader &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Ireland&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Dublin (DUB)&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Esteban Ribicic&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Reviewer, OWASP Backend Security Project&amp;lt;br&amp;gt;OWASP Classic ASP Security Project&amp;lt;br&amp;gt;OWASP AntiSamy .NET&amp;lt;br&amp;gt;OWASP Interceptor Project - 2008 Update&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Croatia&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Wien&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Fabio Cerullo&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Reviewer, OWASP Internationalization Guidelines Project&amp;lt;br&amp;gt;OWASP Spanish Project&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Ireland&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Dublin (DUB)&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Frederick Donovan&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Reviewer, OWASP Application Security Desk Reference (ASDR) &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|United States&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Heiko Webers&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, OWASP Ruby on Rails Security Project&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Germany&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Frankfurt&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Anthony Shireman&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project reviewer, OWASP Ruby on Rails Security Project&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Portland, OR (PDX)&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Juan Carlos Calderon&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, OWASP Internationalization Guidelines&amp;lt;br&amp;gt;OWASP Spanish Project&amp;lt;br&amp;gt;OWASP Classic ASP Security Project &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Mexico &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|MMAS - Aguascalientes, Mexico&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Justin Derry&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Chapter leader &amp;amp; Project Leader, OWASP Interceptor Project &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Sydney Australia&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Sydney Australia &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Kevin Fuller&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Reviewer, OWASP Testing Guide v3&amp;lt;br&amp;gt;OWASP SQL Injector Benchmarking Project (SQLiBENCH)&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Sacramento Ca &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Leonardo Cavallari Militelli&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, OWASP Application Security Desk Reference (ASDR)&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Brazil &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Sao Paulo (GRU)&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Mark Roxberry&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Leader, OWASP .NET Project&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Matt Tesauro&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader, OWASP Live CD 2008&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Austin, TX or Dallas, TX&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Matteo Meucci&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader, OWASP Testing Guide&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Italy&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Rome&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Matthias Rohr&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, OWASP Skavenger Project &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Germany &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Michael Coates&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, OWASP AppSensor &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Chicago&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Nam Nguyen&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Reviewer, OWASP Testing Guide v3, Python Static Analysis, OWASP Education&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Vietnam&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Ho Chi Minh City&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|P.Satish Kumar&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Reviewer, OWASP Code Review Guide &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|India&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Hyderabad/Mumbai/Chennai&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Paolo Perego&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader, OWASP Orizon Project  &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Italy&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Parvathy Iyer &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Corporate Application Security Guide &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Newark (New Jersey)or Newyork (Newyork city)&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Pierre Parrend&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Reviewer, OWASP OpenSign Server Project&amp;lt;br&amp;gt;OWASP Application Security Verification Standard &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|France&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Stephen Craig Evans&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, OWASP Securing WebGoat using ModSecurity &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Singapore&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Singapore&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Jason Li&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, OWASP JSP Testing Tool&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Baltimore&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Gandhi Aryavalli Sriranga Narasimha&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Reviewer, OWASP Application Security Desk Reference (ASDR)&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|India &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Bangalore&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Rodrigo Marcos&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Reviewer, OWASP Internationalization Guidelines Project&amp;lt;br&amp;gt;OWASP Spanish Project&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|UK&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|London&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Marcin Wielgoszewski&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Reviewer, OWASP AntiSamy.NET&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|New York, NY&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;left&amp;quot; style=&amp;quot;background:white; color:black&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP SUMMER OF CODE 2008 SPECIAL PROJECT CONTRIBUTORS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;left&amp;quot; style=&amp;quot;background:white; color:black&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP SUMMER OF CODE 2008/LOGISTICS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Sarah Cruz&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, Graphic Design &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|UK&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|London&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;left&amp;quot; style=&amp;quot;background:white; color:black&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP SPRING OF CODE 2007 PROJECT LEADERS &amp;amp; REVIEWERS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Przemyslaw Skowron &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader, Refresh Attacks List  &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Poland&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Joshua Perrymon&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader, OWASP LiveCD, OWASP Phishing Framework, Alabama Chapter Lead&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Birmingham,AL&lt;br /&gt;
 |- &lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;left&amp;quot; style=&amp;quot;background:white; color:black&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP AUTUMN OF CODE 2006 PROJECT LEADERS &amp;amp; REVIEWERS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Rogan Dawes &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, WebScarab-NG &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|South Africa&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Simon Roses Femerling&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project leader, OWASP Pantera&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Spain&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;left&amp;quot; style=&amp;quot;background:white; color:black&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''ACTIVE PROJECT LEADERS (NOT CURRENTLY PARTICIPATING ON SOC 08)''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Alex Smolen&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Project leader, .NET ESAPI &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
  |- &lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;left&amp;quot; style=&amp;quot;background:white; color:black&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''ACTIVE CHAPTER LEADERS (NOT CURRENTLY PARTICIPATING ON SOC 08)''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Antti Laulajainen&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Chapter leader, Helsinki     &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Finland&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Steve Antoniewicz&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Chapter Board Member, NY/NJ Metro  &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Kuai Hinojosa&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Chapter leader, Twin-Cities &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Jim Manico&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Chapter leader/founder, Hawaii&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Hawaii, USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Anahola, Island of Kauai&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Rex Booth&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Chapter leader, Washington DC  &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|USA&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|?&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Andrzej Targosz&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Chapter leader, Poland  &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Poland&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Cracow&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;left&amp;quot; style=&amp;quot;background:white; color:black&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''SIGNIFICANT PAST OWASP CONTRIBUTOR (THAT IS NOT ALREADY COVERED BY ONE OF THE ABOVE CATEGORIES)''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|David Rook&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Code Review Guide Contributor, Irish Chapter Contributor&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Ireland&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Dublin (DUB)&lt;br /&gt;
 |- &lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;left&amp;quot; style=&amp;quot;background:white; color:black&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP NON-INDIVIDUAL MEMBERS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_AntiSamy_Project&amp;diff=38525</id>
		<title>Project Information:template AntiSamy Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_AntiSamy_Project&amp;diff=38525"/>
				<updated>2008-09-05T20:29:48Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP AntiSamy .NET Project''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|This project is API for validating rich HTML/CSS input from users without exposure to cross-site scripting and phishing attacks.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:arshan.dabirsiaghi(at)gmail.com '''Arshan Dabirsiaghi''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;[mailto:li.jason.c(at)gmail.com '''Jason Li''']&amp;lt;br&amp;gt;[mailto:j(at)lollyshouse.net '''J Irving''']&amp;lt;br&amp;gt;[mailto:jerryhoff(at)gmail.com '''Jerry Hoff''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;br&amp;gt;&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-antisamy '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:owasp-antisamy@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:kisero(at)gmail.com Esteban Ribičić]&amp;lt;br&amp;gt;[http://docs.google.com/Doc?id=df9vbj96_120fzfj4kfk Curriculum]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:marcin(at)tssci-security.com Marcin Wielgoszewski]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;[mailto:jeff.williams@owasp.org '''Jeff Williams''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [http://code.google.com/p/owaspantisamy/downloads/list Owasp Anti-Samy Tool]&lt;br /&gt;
* [http://www.antisamy.net/  A test site set up to bang on it]  &lt;br /&gt;
* (If appropriate, more links to be added)&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#OWASP_AntiSamy_.NET|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template AntiSamy Project - Final Review - OWASP Board Member - G|See/Edit: Final Review/Board Member (G)]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Newsletter_17&amp;diff=36236</id>
		<title>OWASP Newsletter 17</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Newsletter_17&amp;diff=36236"/>
				<updated>2008-08-15T20:27:51Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: /* OWASP references in the Media */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  OWASP Newsletter #17 (12-August-2008) ==&lt;br /&gt;
Welcome to the 17th edition of the OWASP Newsletter, featuring [[OWASP_NYC_AppSec_2008_Conference|The New York City AppSec Conference]] .&lt;br /&gt;
&lt;br /&gt;
As always, if you have any content to add to the next edition, please feel free to add it directly to its WIKI page [[OWASP Newsletter 18]].&lt;br /&gt;
&lt;br /&gt;
Kate Hartmann - OWASP Operations Director - Tel: 301-575-0197 - eMail: Kate.Hartmann@owasp.org&lt;br /&gt;
&lt;br /&gt;
== Featured Item: OWASP NYC 2008 ==&lt;br /&gt;
OWASP NYC AppSec 2008 Conference Schedule – Sept 24th - Sept 25th [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference Full details] In association with: WASC, NYM InfraGard, AITGlobal, NYC PHP, NYCBUG, ISACA, ISSA and Pace University your invited to (2) days of Seminars and Technology Pavilion from the world's best application security technology minds, (2) days of hardcore hands-on training, all held at Pace University, located in downtown New York City at One Pace Plaza New York, NY 10038. Event Fees: $350 for 2 days of seminars, $675 for 1-day training classes and $1,350 for 2-day courses. With capacity of 1000 folks from around the world, don't miss this event!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference http://www.owasp.org/images/a/ad/NYC08_468x60_72_newdates.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Featured Item: India Conference ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_AppSec_India_Conference_2008 OWASP AppSec India Conference 2008]&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_India-mhnew.gif]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Featured Item: Israel Conference ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Israel_2008_Conference OWASP AppSec Israel Conference 2008]&lt;br /&gt;
&lt;br /&gt;
= OWASP AppSec India Conference 2008 - August 20th-21st 2008 =&lt;br /&gt;
&lt;br /&gt;
== Featured Projects ==&lt;br /&gt;
&lt;br /&gt;
* Four new projects have been set up, namely:&lt;br /&gt;
** [[:Category:OWASP EnDe|'''OWASP EnDe Project''']] - This tool is an encoder, decoder, converter, transformer, calculator, for various codings used in the wild wide web. Achim Hoffmann is the project leader.&lt;br /&gt;
** [[:Category:OWASP Google Hacking Project|'''OWASP Google Hacking Project''']] - This is a Google SOAP Search API with Perl. Christian Heinrich is the project leader.&lt;br /&gt;
** [[:Category:OWASP NetBouncer Project|'''OWASP NetBouncer Project''']] - This is secure by default centralised input/output validation library which combines security rules and business rules as well as escaping in the output level. Ferruh Mavituna is the project leader.&lt;br /&gt;
** [[:Category:OWASP Open Review Project|'''OWASP Open Review Project''']] - A project to openly check open source libraries and software that are vital to most commercial and non-commercial apps around. Mario de Boer is the project leader.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* The [[OWASP Summer of Code 2008|'''OWASP Summer of Code 2008''']] is doing its way up the ladder.&lt;br /&gt;
** 34 SoC’s projects pages, the [[:Category:OWASP_Project#Current_Season_of_Code_Projects |Current Season of Code Projects]], have been set up. &lt;br /&gt;
** [[:OWASP_Summer_of_Code_2008_Projects_Authors_Status_Target_and_Reviewers|70 reviewers were matched with 34 SoC’s projects]].&lt;br /&gt;
** Having reached the stage of 50% completion, 7 project have already been reviewed, namely:&lt;br /&gt;
*** [[:OWASP Internationalization|OWASP Internationalization Guidelines Project]]'''&lt;br /&gt;
*** [[:OWASP Spanish|OWASP Spanish Project]]&lt;br /&gt;
*** [[:Category:OWASP Ruby on Rails Security Guide V2|OWASP Ruby on Rails Security Guide v2]]&lt;br /&gt;
*** [[:Category:OWASP Source Code Review OWASP Projects Project|OWASP Source Code Review OWASP Projects]]&lt;br /&gt;
*** [[:Category:GTK plus GUI for w3af Project|GTK+ GUI for w3af project]]&lt;br /&gt;
*** [[:Category:OWASP Live CD 2008 Project|OWASP Live CD 2008 Project]]&lt;br /&gt;
*** [[:Category:OWASP Python Static Analysis Project|OWASP Python Static Analysis]]&lt;br /&gt;
&lt;br /&gt;
== Latest additions to the WIKI ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== New Pages====&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php?title=Front_Range_OWASP_Conference&amp;amp;rcid=31984 Front Range OWASP Conference in Denver]&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/How_to_Host_a_Conference How to Host a Conference]&lt;br /&gt;
&lt;br /&gt;
== Chapter News ==&lt;br /&gt;
&lt;br /&gt;
===Paypal now Accepted===&lt;br /&gt;
&lt;br /&gt;
Chapter pages are being updated with the new link to paypal.  This will allow your chapter sponsors to make donations to your chapter or project directly.  Because the funds will be managed through the OWASP Foundation, your local chapter or project may take advantage of the non-profit status!  Reimbursement of expenses will be processed through submission of an expense report.  Please contact [mailto:alison.mcnamee@owasp.org Alison McNamee] with any questions.&lt;br /&gt;
&lt;br /&gt;
===New Chapter Pages===&lt;br /&gt;
&lt;br /&gt;
[[Iran|Iran]]&lt;br /&gt;
&lt;br /&gt;
[[Vietnam|Vietnam]]&lt;br /&gt;
&lt;br /&gt;
[[Nigeria|Nigeria]]&lt;br /&gt;
&lt;br /&gt;
[[Saudi Arabia|Saudi Arabia]]&lt;br /&gt;
&lt;br /&gt;
[[Alabama|Alabama]]&lt;br /&gt;
&lt;br /&gt;
[[Croatia|Croatia]]&lt;br /&gt;
&lt;br /&gt;
[[Hawaii|Hawaii]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP references in the Media==&lt;br /&gt;
&lt;br /&gt;
[http://www.net-security.org/dl/insecure/INSECURE-Mag-16.pdf OWASP Featured Article: Producing Producing Secure Software With Software Security Enhanced Processes, In-secure Magazine, Page 57-67]&lt;br /&gt;
&lt;br /&gt;
NSA: http://www.nsa.gov/notices/notic00004.cfm?Address=/snac/support/I733-034R-2007.pdf&lt;br /&gt;
&lt;br /&gt;
FFIEC: http://www.occ.treas.gov/ftp/bulletin/2008-16.html &lt;br /&gt;
&lt;br /&gt;
FTC: http://www.ftc.gov/bcp/conline/pubs/buspubs/security.shtm &lt;br /&gt;
&lt;br /&gt;
NIST: http://csrc.nist.gov/publications/PubsSPs.html &lt;br /&gt;
&lt;br /&gt;
DHS: https://buildsecurityin.us-cert.gov/swa/downloads/SwA_in_Acquisition.pdf&lt;br /&gt;
&lt;br /&gt;
== Application Security News==&lt;br /&gt;
&lt;br /&gt;
=='''[https://www.owasp.org/index.php/Template:Application_Security_News Application Security News Feed]'''==&lt;br /&gt;
&lt;br /&gt;
{{Application Security News}}&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Don%27t_trust_user_input&amp;diff=34676</id>
		<title>Don't trust user input</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Don%27t_trust_user_input&amp;diff=34676"/>
				<updated>2008-07-24T19:40:14Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Principle}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
A principle is a simple rule that helps to guide security decisions in complex situations.&lt;br /&gt;
# Start with a one-sentence description of the principle&lt;br /&gt;
# Describe the principle and how it should be applied to security decisions&lt;br /&gt;
&lt;br /&gt;
A user or client will not always submit data your application will expect.  By building robust applications that do not trust user input by default, you ensure the application will be able to handle unexpected data gracefully.  Examples of user input include: form data, client information such as user-agent strings, cookies, referer, etc.  Anything that is submitted in an HTTP request should be considered user input.&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===Phone number===&lt;br /&gt;
: A short example description, small picture, or sample code with [http://www.site.com links]&lt;br /&gt;
&lt;br /&gt;
===Short example name===&lt;br /&gt;
: A short example description, small picture, or sample code with [http://www.site.com links]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[Vulnerability 1]]&lt;br /&gt;
* [[Vulnerabiltiy 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* [[Input Validation]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
* http://www.link1.com&lt;br /&gt;
* [http://www.link2.com Title for the link2]&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=33424</id>
		<title>Phoenix/Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=33424"/>
				<updated>2008-07-04T13:56:31Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: /* Java static analysis, security frameworks, and web application security tools */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;p&amp;gt;Please send comments or questions to the [https://lists.owasp.org/mailman/listinfo/owasp-phoenix Phoenix-OWASP mailing-list].&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==LiveCDs==&lt;br /&gt;
Monday, January 29, 2007  4:02 PM    828569600 AOC_Labrat-ALPHA-0010.iso - http://www.packetfocus.com/hackos/&amp;lt;br /&amp;gt;&lt;br /&gt;
DVL (Damn Vulnerable Linux) - http://www.damnvulnerablelinux.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Test sites / testing grounds==&lt;br /&gt;
SPI Dynamics (live) - http://zero.webappsecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cenzic (live) - http://crackme.cenzic.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watchfire (live) - http://demo.testfire.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Acunetix (live) - http://testphp.acunetix.com/ http://testasp.acunetix.com http://testaspnet.acunetix.com&amp;lt;br /&amp;gt;&lt;br /&gt;
WebMaven / Buggy Bank (includes live testsite) - http://www.mavensecurity.com/webmaven&amp;lt;br /&amp;gt;&lt;br /&gt;
Foundstone SASS tools - http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&amp;amp;subcontent=/resources/s3i_tools.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP WebGoat - http://www.owasp.org/index.php/OWASP_WebGoat_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP SiteGenerator - http://www.owasp.org/index.php/Owasp_SiteGenerator&amp;lt;br /&amp;gt;&lt;br /&gt;
Stanford SecuriBench - http://suif.stanford.edu/~livshits/securibench/&amp;lt;br /&amp;gt;&lt;br /&gt;
SecuriBench Micro - http://suif.stanford.edu/~livshits/work/securibench-micro/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP proxying / editing==&lt;br /&gt;
WebScarab - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp - http://www.portswigger.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros - http://www.parosproxy.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fiddler - http://www.fiddlertool.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Proxy Editor - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
Pantera - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Suru - http://www.sensepost.com/research/suru/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpedit (curses-based) - http://www.neutralbit.com/en/rd/httpedit/&amp;lt;br /&amp;gt;&lt;br /&gt;
Charles - http://www.xk72.com/charles/&amp;lt;br /&amp;gt;&lt;br /&gt;
Odysseus - http://www.bindshell.net/tools/odysseus&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp, Paros, and WebScarab for Mac OS X - http://www.corsaire.com/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web-application scanning tool from `Network Security Tools'/O'Reilly - http://examples.oreilly.com/networkst/&amp;lt;br /&amp;gt;&lt;br /&gt;
JS Commander - http://jscmd.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools==&lt;br /&gt;
Wfuzz - http://www.edge-security.com/wfuzz.php&amp;lt;br /&amp;gt;&lt;br /&gt;
ProxMon - http://www.isecpartners.com/proxmon.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Wapiti - http://wapiti.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Grabber - http://rgaucher.info/beta/grabber/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSScan - http://darkcode.ath.cx/scanners/XSSscan.py&amp;lt;br /&amp;gt;&lt;br /&gt;
CAL9000 - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
HTMangLe - http://www.fishnetsecurity.com/Tools/HTMangLe/publish.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
JBroFuzz - http://sourceforge.net/projects/jbrofuzz&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSFuzz - http://ha.ckers.org/blog/20060921/xssfuzz-released/&amp;lt;br /&amp;gt;&lt;br /&gt;
WhiteAcid's XSS Assistant - http://www.whiteacid.org/greasemonkey/&amp;lt;br /&amp;gt;&lt;br /&gt;
Overlong UTF - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] MielieTool (SensePost Research) - http://packetstormsecurity.org/UNIX/utilities/mielietools-v1.0.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
RegFuzzer: test your regular expression filter - http://rgaucher.info/b/index.php/post/2007/05/26/RegFuzzer%3A-Test-your-regular-expression-filter&amp;lt;br /&amp;gt;&lt;br /&gt;
screamingCobra - http://www.dachb0den.com/projects/screamingcobra.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SPIKE and SPIKE Proxy - http://immunitysec.com/resources-freesoftware.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
RFuzz - http://rfuzz.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
WebFuzz - http://www.codebreakers-journal.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=112&amp;amp;Itemid=99999999&amp;lt;br /&amp;gt;&lt;br /&gt;
TestMaker - http://www.pushtotest.com/Docs/downloads/features.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ASP Auditor - http://michaeldaw.org/projects/asp-auditor-v2/&amp;lt;br /&amp;gt;&lt;br /&gt;
WSTool - http://wstool.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Hack Control Center (WHCC) - http://ussysadmin.com/whcc/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Text Converter - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
HackBar (Firefox Add-on) - https://addons.mozilla.org/firefox/3899/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Force Tools (NF-Tools, Firefox Add-on) - http://www.net-force.nl/library/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
PostIntercepter (Greasemonkey script) - http://userscripts.org/scripts/show/743&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP general testing / fingerprinting==&lt;br /&gt;
Wbox: HTTP testing tool - http://hping.org/wbox/&amp;lt;br /&amp;gt;&lt;br /&gt;
ht://Check - http://htcheck.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mumsie - http://www.lurhq.com/tools/mumsie.html&amp;lt;br /&amp;gt;&lt;br /&gt;
WebInject - http://www.webinject.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Torture.pl Home Page - http://stein.cshl.org/~lstein/torture/&amp;lt;br /&amp;gt;&lt;br /&gt;
JoeDog's Seige - http://www.joedog.org/JoeDog/Siege/&amp;lt;br /&amp;gt;&lt;br /&gt;
OPEN-LABS: metoscan (http method testing) - http://www.open-labs.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-balancing detector - http://ge.mine.nu/lbd.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HMAP - http://ujeni.murkyroc.com/hmap/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Square: httprint - http://net-square.com/httprint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Wpoison: http stress testing - http://wpoison.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: MSNPawn - http://net-square.com/msnpawn/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
hcraft: HTTP Vuln Request Crafter - http://druid.caughq.org/projects/hcraft/&amp;lt;br /&amp;gt;&lt;br /&gt;
rfp.labs: LibWhisker - http://www.wiretrip.net/rfp/lw.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Nikto - http://www.cirt.net/code/nikto.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
twill - http://twill.idyll.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
DirBuster - http://www.sittinglittleduck.com/DirBuster/&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] DFF Scanner - http://security-net.biz/files/dff/DFF.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] The Elza project - http://packetstormsecurity.org/web/elza-1.4.7-beta.zip http://www.stoev.org/elza.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HackerFox(http://yehg.co.nr) : Portable Firefox with web hacking addons bundled - http://sf.net/projects/hackfox&lt;br /&gt;
&lt;br /&gt;
==Browser-based HTTP tampering / editing / replaying==&lt;br /&gt;
TamperIE - http://www.bayden.com/Other/&amp;lt;br /&amp;gt;&lt;br /&gt;
isr-form - http://www.infobyte.com.ar/developments.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Modify Headers (Firefox Add-on) - http://modifyheaders.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Tamper Data (Firefox Add-on) - http://tamperdata.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
UrlParams (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1290/&amp;lt;br /&amp;gt;&lt;br /&gt;
TestGen4Web (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1385/&amp;lt;br /&amp;gt;&lt;br /&gt;
DOM Inspector / Inspect This (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1806/ https://addons.mozilla.org/en-US/firefox/addon/1913/&amp;lt;br /&amp;gt;&lt;br /&gt;
LiveHTTPHeaders / Header Monitor (Firefox Add-on) - http://livehttpheaders.mozdev.org/ https://addons.mozilla.org/en-US/firefox/addon/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cookie editing / poisoning==&lt;br /&gt;
[TGZ] stompy: session id tool - http://lcamtuf.coredump.cx/stompy.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
Add'N Edit Cookies (AnEC, Firefox Add-on) - http://addneditcookies.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieCuller (Firefox Add-on) - http://cookieculler.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookiePie (Firefox Add-on) - http://www.nektra.com/oss/firefox/extensions/cookiepie/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSpy - http://www.codeproject.com/shell/cookiespy.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookies Explorer - http://www.dutchduck.com/Features/Cookies.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Ajax and XHR scanning==&lt;br /&gt;
Sahi - http://sahi.co.in/&amp;lt;br /&amp;gt;&lt;br /&gt;
scRUBYt - http://scrubyt.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
jQuery - http://jquery.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
jquery-include - http://www.gnucitizen.org/projects/jquery-include&amp;lt;br /&amp;gt;&lt;br /&gt;
Sprajax - http://www.denimgroup.com/sprajax.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Watir - http://wtr.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watij - http://watij.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watin - http://watin.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
RBNarcissus - http://idontsmoke.co.uk/2005/rbnarcissus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderTest (Spider Fuzz plugin) - http://blog.caboo.se/articles/2007/2/21/the-fabulous-spider-fuzz-plugin&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Inline Debugger (jasildbg) - http://jasildbg.googlepages.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug Lite - http://www.getfirebug.com/lite.html&amp;lt;br /&amp;gt;&lt;br /&gt;
firewaitr - http://code.google.com/p/firewatir/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSS extensions and caching==&lt;br /&gt;
LiveLines (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/324/&amp;lt;br /&amp;gt;&lt;br /&gt;
rss-cache - http://www.dubfire.net/chris/projects/rss-cache/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SQL injection scanning==&lt;br /&gt;
0x90.org: home of Absinthe, Mezcal, etc - http://0x90.org/releases.php&amp;lt;br /&amp;gt;&lt;br /&gt;
SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlninja: a SQL Server injection and takover tool - http://sqlninja.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JustinClarke's SQL Brute - http://www.justinclarke.com/archives/2006/03/sqlbrute.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BobCat - http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlmap - http://sqlmap.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Scully: SQL Server DB Front-End and Brute-Forcer - http://www.sensepost.com/research/scully/&amp;lt;br /&amp;gt;&lt;br /&gt;
FG-Injector - http://www.flowgate.net/?lang=en&amp;amp;seccion=herramientas&amp;lt;br /&amp;gt;&lt;br /&gt;
PRIAMOS - http://www.priamos-project.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application security malware, backdoors, and evil code==&lt;br /&gt;
W3AF: Web Application Attack and Audit Framework - http://w3af.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Jikto - http://busin3ss.name/jikto-in-the-wild/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS Shell - http://ferruh.mavituna.com/article/?1338&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS-Proxy - http://xss-proxy.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AttackAPI - http://www.gnucitizen.org/projects/attackapi/&amp;lt;br /&amp;gt;&lt;br /&gt;
FFsniFF - http://azurit.elbiahosting.sk/ffsniff/&amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyBlog's web-based junkyard - http://honeyblog.org/junkyard/web-based/&amp;lt;br /&amp;gt;&lt;br /&gt;
BeEF - http://www.bindshell.net/tools/beef/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firefox Extension Scanner (FEX) - http://www.gnucitizen.org/projects/fex/&amp;lt;br /&amp;gt;&lt;br /&gt;
What is my IP address? - http://reglos.de/myaddress/&amp;lt;br /&amp;gt;&lt;br /&gt;
xRumer: blogspam automation tool - http://www.botmaster.net/movies/XFull.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyJax - http://www.merchantos.com/makebeta/tools/spyjax/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasecarnaval - http://www.gnucitizen.org/projects/greasecarnaval&amp;lt;br /&amp;gt;&lt;br /&gt;
Technika - http://www.gnucitizen.org/projects/technika/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-AttackAPI bookmarklet - http://www.gnucitizen.org/projects/load-attackapi-bookmarklet&amp;lt;br /&amp;gt;&lt;br /&gt;
MD's Projects: JS port scanner, pinger, backdoors, etc - http://michaeldaw.org/my-projects/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application services that aid in web application security assessment==&lt;br /&gt;
Netcraft - http://www.netcraft.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AboutURL - http://www.abouturl.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
The Scrutinizer - http://www.scrutinizethis.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
net.toolkit - http://clez.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSniff - http://www.serversniff.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Online Microsoft script decoder - http://www.greymagic.com/security/tools/decoder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Webmaster-Toolkit - http://www.webmaster-toolkit.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
myIPNeighbbors, et al - http://digg.com/security/MyIPNeighbors_Find_Out_Who_Else_is_Hosted_on_Your_Site_s_IP_Address&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP charset encoding - http://h4k.in/encoding&amp;lt;br /&amp;gt;&lt;br /&gt;
data: URL testcases - http://h4k.in/dataurl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser-based security fuzzing / checking==&lt;br /&gt;
Zalewski's MangleMe - http://lcamtuf.coredump.cx/mangleme/mangle.cgi&amp;lt;br /&amp;gt;&lt;br /&gt;
hdm's tools: Hamachi, CSSDIE, DOM-Hanoi, AxMan - http://metasploit.com/users/hdm/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
Peach Fuzzer Framework - http://peachfuzz.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
TagBruteForcer - http://research.eeye.com/html/tools/RT20060801-3.html&amp;lt;br /&amp;gt;&lt;br /&gt;
PROTOS Test-Suite: c05-http-reply - http://www.ee.oulu.fi/research/ouspg/protos/testing/c05/http-reply/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
COMRaider - http://labs.idefense.com&amp;lt;br /&amp;gt;&lt;br /&gt;
bcheck - http://bcheck.scanit.be/bcheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Stop-Phishing: Projects page - http://www.indiana.edu/~phishing/?projects&amp;lt;br /&amp;gt;&lt;br /&gt;
LinkScanner - http://linkscanner.explabs.com/linkscanner/default.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
BrowserCheck - http://www.heise-security.co.uk/services/browsercheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cross-browser Exploit Tests - http://www.jungsonnstudios.com/cool.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Stealing information using DNS pinning demo - http://www.jumperz.net/index.php?i=2&amp;amp;a=1&amp;amp;b=7&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Website Login Checker - http://ha.ckers.org/weird/javascript-website-login-checker.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Mozilla Activex - http://www.iol.ie/~locka/mozilla/mozilla.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
Jungsonn's Black Dragon Project - http://blackdragon.jungsonnstudios.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mr. T (Master Recon Tool, includes Read Firefox Settings PoC) - http://ha.ckers.org/mr-t/&amp;lt;br /&amp;gt;&lt;br /&gt;
Vulnerable Adobe Plugin Detection For UXSS PoC - http://www.0x000000.com/?i=324&amp;lt;br /&amp;gt;&lt;br /&gt;
About Flash: is your flash up-to-date? - http://www.macromedia.com/software/flash/about/&amp;lt;br /&amp;gt;&lt;br /&gt;
Test your installation of Java software - http://java.com/en/download/installed.jsp?detect=jre&amp;amp;try=1&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==PHP static analysis and file inclusion scanning==&lt;br /&gt;
PHP-SAT.org: Static analysis for PHP - http://www.program-transformation.org/PHP/&amp;lt;br /&amp;gt;&lt;br /&gt;
Unl0ck Research Team: tool for searching in google for include bugs - http://unl0ck.net/tools.php&amp;lt;br /&amp;gt;&lt;br /&gt;
FIS: File Inclusion Scanner - http://www.segfault.gr/index.php?cat_id=3&amp;amp;cont_id=25&amp;lt;br/&amp;gt;&lt;br /&gt;
PHPSecAudit - http://developer.spikesource.com/projects/phpsecaudit&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web Application Firewall (WAF) and Intrusion Detection (APIDS) rules and resources==&lt;br /&gt;
APIDS on Wikipedia - http://en.wikipedia.org/wiki/APIDS&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP Intrusion Detection System (PHP-IDS) - http://php-ids.org/ http://code.google.com/p/phpids/&amp;lt;br /&amp;gt;&lt;br /&gt;
dotnetids - http://code.google.com/p/dotnetids/&amp;lt;br /&amp;gt;&lt;br /&gt;
Secure Science InterScout - http://www.securescience.com/home/newsandevents/news/interscout1.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Remo: whitelist rule editor for mod_security - http://remo.netnea.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
GotRoot: ModSecuirty rules - http://www.gotroot.com/tiki-index.php?page=mod_security+rules&amp;lt;br /&amp;gt;&lt;br /&gt;
The Web Security Gateway (WSGW) - http://wsgw.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
mod_security rules generator - http://noeljackson.com/tools/modsecurity/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mod_Anti_Tamper - http://www.wisec.it/projects.php?id=3&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] Automatic Rules Generation for Mod_Security - http://www.wisec.it/rdr.php?fn=/Projects/Rule-o-matic.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
AQTRONIX WebKnight - http://www.aqtronix.com/?PageID=99&amp;lt;br /&amp;gt;&lt;br /&gt;
Akismet: blog spam defense - http://akismet.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samoa: Formal tools for securing web services - http://research.microsoft.com/projects/samoa/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web services enumeration / scanning / fuzzing==&lt;br /&gt;
WebServiceStudio2.0 - http://www.gotdotnet.com/Community/UserSamples/Details.aspx?SampleGuid=65a1d4ea-0f7a-41bd-8494-e916ebc4159c&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: wsChess - http://net-square.com/wschess/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
SIFT: web method search tool - http://www.sift.com.au/73/171/sift-web-method-search-tool.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
iSecPartners: WSMap, WSBang, etc - http://www.isecpartners.com/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application non-specific static source-code analysis==&lt;br /&gt;
Pixy: a static analysis tool for detecting XSS vulnerabilities - http://www.seclab.tuwien.ac.at/projects/pixy/&amp;lt;br /&amp;gt;&lt;br /&gt;
Brixoft.Net: Source Edit - http://www.brixoft.net/prodinfo.asp?id=1&amp;lt;br /&amp;gt;&lt;br /&gt;
Security compass web application auditing tools (SWAAT) - http://www.owasp.org/index.php/Category:OWASP_SWAAT_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
An even more complete list here - http://www.cs.cmu.edu/~aldrich/courses/654/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
A nice list that claims some demos available - http://www.cs.cmu.edu/~aldrich/courses/413/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
A smaller, but also good list - http://spinroot.com/static/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Static analysis for C/C++ (CGI, ISAPI, etc) in web applications==&lt;br /&gt;
RATS - http://www.securesoftware.com/resources/download_rats.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ITS4 - http://www.cigital.com/its4/&amp;lt;br /&amp;gt;&lt;br /&gt;
FlawFinder - http://www.dwheeler.com/flawfinder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Splint - http://www.splint.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Uno - http://spinroot.com/uno/&amp;lt;br /&amp;gt;&lt;br /&gt;
BOON (Buffer Overrun detectiON) - http://www.cs.berkeley.edu/~daw/boon/ http://boon.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
Valgrind - http://www.valgrind.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Java static analysis, security frameworks, and web application security tools==&lt;br /&gt;
HDIV Struts - http://hdiv.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Orizon - http://sourceforge.net/projects/orizon/&amp;lt;br /&amp;gt;&lt;br /&gt;
FindBugs: Find bugs in Java programs - http://findbugs.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PMD - http://pmd.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
CUTE: A Concolic Unit Testing Engine for C and Java - http://osl.cs.uiuc.edu/~ksen/cute/&amp;lt;br /&amp;gt;&lt;br /&gt;
EMMA - http://emma.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JLint - http://jlint.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java PathFinder - http://javapathfinder.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fujaba: Move between UML and Java source code - http://wwwcs.uni-paderborn.de/cs/fujaba/&amp;lt;br /&amp;gt;&lt;br /&gt;
Checkstyle - http://checkstyle.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookie Revolver Security Framework - http://sourceforge.net/projects/cookie-revolver&amp;lt;br /&amp;gt;&lt;br /&gt;
tinapoc - http://sourceforge.net/projects/tinapoc&amp;lt;br /&amp;gt;&lt;br /&gt;
jarsigner - http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Solex - http://solex.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java Explorer - http://metal.hurlant.com/jexplore/&amp;lt;br /&amp;gt;&lt;br /&gt;
HTTPClient - http://www.innovation.ch/java/HTTPClient/&amp;lt;br /&amp;gt;&lt;br /&gt;
another HttpClient - http://jakarta.apache.org/commons/httpclient/&amp;lt;br /&amp;gt;&lt;br /&gt;
a list of code coverage and analysis tools for Java - http://mythinkpond.blogspot.com/2007/06/java-foss-freeopen-source-software.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Microsoft .NET static analysis and security framework tools, mostly for ASP.NET and ASP.NET AJAX, but also C# and VB.NET==&lt;br /&gt;
Orcas - http://msdn.microsoft.com/vstudio/express/future/downloads/default.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Development Helper - http://www.nikhilk.net/Project.WebDevHelper.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
FxCop - http://blogs.msdn.com/fxcop/ http://www.gotdotnet.com/team/fxcop/&amp;lt;br /&amp;gt;&lt;br /&gt;
Microsoft Application Verifier - http://www.microsoft.com/technet/prodtechnol/windows/appcompatibility/appverifier.mspx&amp;lt;br /&amp;gt;&lt;br /&gt;
Microsoft internal tools you can't have yet - http://www.microsoft.com/windows/cse/pa_projects.mspx http://research.microsoft.com/Pex/ http://www.owasp.org/images/5/5b/OWASP_IL_7_FuzzGuru.pdf&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Threat modeling==&lt;br /&gt;
Microsoft Threat Analysis and Modeling Tool v2.1 (TAM) - http://www.microsoft.com/downloads/details.aspx?FamilyID=59888078-9daf-4e96-b7d1-944703479451&amp;amp;displaylang=en&amp;lt;br /&amp;gt;&lt;br /&gt;
Amenaza: Attack Tree Modeling (SecurITree) - http://www.amenaza.com/software.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Octotrike - http://www.octotrike.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with general web application security==&lt;br /&gt;
Web Developer Toolbar - https://addons.mozilla.org/firefox/60/&amp;lt;br /&amp;gt;&lt;br /&gt;
Plain Old Webserver (POW) - https://addons.mozilla.org/firefox/3002/&amp;lt;br /&amp;gt;&lt;br /&gt;
XML Developer Toolbar - https://addons.mozilla.org/firefox/2897/&amp;lt;br /&amp;gt;&lt;br /&gt;
Public Fox - https://addons.mozilla.org/firefox/3911/&amp;lt;br /&amp;gt;&lt;br /&gt;
XForms Buddy - http://beaufour.dk/index.php?sec=misc&amp;amp;pagename=xforms&amp;lt;br /&amp;gt;&lt;br /&gt;
MR Tech Local Install - http://www.mrtech.com/extensions/local_install/&amp;lt;br /&amp;gt;&lt;br /&gt;
Nightly Tester Tools - http://users.blueprintit.co.uk/~dave/web/firefox/buildid/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
IE Tab - https://addons.mozilla.org/firefox/1419/&amp;lt;br /&amp;gt;&lt;br /&gt;
User-Agent Switcher - https://addons.mozilla.org/firefox/59/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSwitcher - https://addons.mozilla.org/firefox/2409/&amp;lt;br /&amp;gt;&lt;br /&gt;
HeaderMonitor - https://addons.mozilla.org/firefox/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
RefControl - https://addons.mozilla.org/firefox/953/&amp;lt;br /&amp;gt;&lt;br /&gt;
refspoof - https://addons.mozilla.org/firefox/667/&amp;lt;br /&amp;gt;&lt;br /&gt;
No-Referrer - https://addons.mozilla.org/firefox/1999/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocationBar^2 - https://addons.mozilla.org/firefox/4014/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderZilla - http://spiderzilla.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Slogger - https://addons.mozilla.org/en-US/firefox/addon/143&amp;lt;br /&amp;gt;&lt;br /&gt;
Fire Encrypter - https://addons.mozilla.org/firefox/3208/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with Javascript and Ajax web application security==&lt;br /&gt;
Selenium IDE - http://www.openqa.org/selenium-ide/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug - http://www.joehewitt.com/software/firebug/&amp;lt;br /&amp;gt;&lt;br /&gt;
Venkman - http://www.mozilla.org/projects/venkman/&amp;lt;br /&amp;gt;&lt;br /&gt;
Chickenfoot - http://groups.csail.mit.edu/uid/chickenfoot/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey - http://www.greasespot.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey compiler - http://www.letitblog.com/greasemonkey-compiler/&amp;lt;br /&amp;gt;&lt;br /&gt;
User script compiler - http://arantius.com/misc/greasemonkey/script-compiler&amp;lt;br /&amp;gt;&lt;br /&gt;
Extension Developer's Extension (Firefox Add-on) - http://ted.mielczarek.org/code/mozilla/extensiondev/&amp;lt;br /&amp;gt;&lt;br /&gt;
Smart Middle Click (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/3885/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Bookmarklets that aid in web application security==&lt;br /&gt;
RSnake's security bookmarklets - http://ha.ckers.org/bookmarklets.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BMlets - http://optools.awardspace.com/bmlet.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Huge list of bookmarklets - http://www.squarefree.com/bookmarklets/&amp;lt;br /&amp;gt;&lt;br /&gt;
Blummy: consists of small widgets, called blummlets, which make use of Javascript to provide&lt;br /&gt;
rich functionality - http://www.blummy.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Bookmarklets every blogger should have - http://www.micropersuasion.com/2005/10/bookmarklets_ev.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Flat Bookmark Editing (Firefox Add-on) - http://n01se.net/chouser/proj/mozhack/&amp;lt;br /&amp;gt;&lt;br /&gt;
OpenBook and Update Bookmark (Firefox Add-ons) - http://www.chuonthis.com/extensions/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SSL certificate checking / scanning==&lt;br /&gt;
[ZIP] THCSSLCheck - http://thc.org/root/tools/THCSSLCheck.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] Foundstone SSLDigger - http://www.foundstone.com/us/resources/termsofuse.asp?file=ssldigger.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
Cert Viewer Plus (Firefox Add-on) - https://addons.mozilla.org/firefox/1964/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Honeyclients, Web Application, and Web Proxy honeypots==&lt;br /&gt;
Honeyclient Project: an open-source honeyclient - http://www.honeyclient.org/trac/ &amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyC: the low-interaction honeyclient - http://honeyc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Capture: a high-interaction honeyclient - http://capture-hpc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google Hack Honeypot - http://ghh.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP.Hop - PHP Honeynet Project - http://www.rstack.org/phphop/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyBye - http://www.monkey.org/~provos/spybye/&amp;lt;br /&amp;gt;&lt;br /&gt;
Honeytokens - http://www.securityfocus.com/infocus/1713&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Blackhat SEO and maybe some whitehat SEO==&lt;br /&gt;
SearchStatus (Firefox Add-on) - http://www.quirk.biz/searchstatus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SEO for Firefox (Firefox Add-on) - http://tools.seobook.com/firefox/seo-for-firefox.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SEOQuake (Firefox Add-on) - http://www.seoquake.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Footprinting for web application security==&lt;br /&gt;
Evolution - http://www.paterva.com/evolution-e.html&amp;lt;br /&amp;gt;&lt;br /&gt;
GooSweep - http://www.mcgrewsecurity.com/projects/goosweep/&amp;lt;br /&amp;gt;&lt;br /&gt;
Aura: Google API Utility Tools - http://www.sensepost.com/research/aura/&amp;lt;br /&amp;gt;&lt;br /&gt;
Edge-Security tools - http://www.edge-security.com/soft.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Fierce Domain Scanner - http://ha.ckers.org/fierce/&amp;lt;br /&amp;gt;&lt;br /&gt;
Googlegath - http://www.nothink.org/perl/googlegath/&amp;lt;br /&amp;gt;&lt;br /&gt;
Advanced Dork (Firefox Add-on) - https://addons.mozilla.org/firefox/2144/&amp;lt;br /&amp;gt;&lt;br /&gt;
Passive Cache (Firefox Add-on) - https://addons.mozilla.org/firefox/977/&amp;lt;br /&amp;gt;&lt;br /&gt;
CacheOut! (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1453/&amp;lt;br /&amp;gt;&lt;br /&gt;
BugMeNot Extension (Firefox Add-on) - http://roachfiend.com/archives/2005/02/07/bugmenot/&amp;lt;br /&amp;gt;&lt;br /&gt;
TrashMail.net Extension (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1813/&amp;lt;br /&amp;gt;&lt;br /&gt;
DiggiDig (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2819/&amp;lt;br /&amp;gt;&lt;br /&gt;
Digger (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1467/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Database security assessment==&lt;br /&gt;
Scuba by Imperva Database Vulnerability Scanner - http://www.imperva.com/scuba/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Defenses==&lt;br /&gt;
DieHard - http://www.diehard-software.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocalRodeo (Firefox Add-on) - http://databasement.net/labs/localrodeo/&amp;lt;br /&amp;gt;&lt;br /&gt;
NoMoXSS - http://www.seclab.tuwien.ac.at/projects/jstaint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Request Rodeo - http://savannah.nongnu.org/projects/requestrodeo&amp;lt;br /&amp;gt;&lt;br /&gt;
FlashBlock (Firefox Add-on) - http://flashblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSafe (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2497&amp;lt;br /&amp;gt;&lt;br /&gt;
NoScript (Firefox Add-on) - http://www.noscript.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
FormFox (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1579/&amp;lt;br /&amp;gt;&lt;br /&gt;
Adblock (Firefox Add-on) - http://adblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpOnly in Firefox (Firefox Add-on) - http://blog.php-security.org/archives/40-httpOnly-Cookies-in-Firefox-2.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeCache (Firefox Add-on) - http://www.safecache.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeHistory (Firefox Add-on) - http://www.safehistory.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
PrefBar (Firefox Add-on) - http://prefbar.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
All-in-One Sidebar (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1027/&amp;lt;br /&amp;gt;&lt;br /&gt;
QArchive.org web file checker (Firefox Add-on) - https://addons.mozilla.org/firefox/4115/&amp;lt;br /&amp;gt;&lt;br /&gt;
Update Notified (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2098/&amp;lt;br /&amp;gt;&lt;br /&gt;
FireKeeper - http://firekeeper.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey: XSS Malware Script Detector (http://yehg.co.nr) -  http://userscripts.org/scripts/show/22955&lt;br /&gt;
&lt;br /&gt;
==Browser Privacy==&lt;br /&gt;
TrackMeNot (Firefox Add-on) - https://addons.mozilla.org/firefox/3173/&amp;lt;br /&amp;gt;&lt;br /&gt;
Privacy Bird - http://www.privacybird.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Application and protocol fuzzing (random instead of targeted)==&lt;br /&gt;
Sulley - http://fuzzing.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
taof: The Art of Fuzzing - http://sourceforge.net/projects/taof/&amp;lt;br /&amp;gt;&lt;br /&gt;
zzuf: multipurpose fuzzer - http://sam.zoy.org/zzuf/&amp;lt;br /&amp;gt;&lt;br /&gt;
autodafé: an act of software torture - http://autodafe.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
EFS and GPF: Evolutionary Fuzzing System - http://www.appliedsec.com/resources.html&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Browser_SSL_Compatibility&amp;diff=29411</id>
		<title>Browser SSL Compatibility</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Browser_SSL_Compatibility&amp;diff=29411"/>
				<updated>2008-05-15T14:28:28Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: New page: // reserved page describing SSL compatibility by browser history&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;// reserved page describing SSL compatibility by browser history&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=29263</id>
		<title>Phoenix/Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=29263"/>
				<updated>2008-05-12T01:02:01Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: Removed links submitted by &amp;quot;Rave.&amp;quot; Links were to ebook warez sites.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;p&amp;gt;Please send comments or questions to the [https://lists.owasp.org/mailman/listinfo/owasp-phoenix Phoenix-OWASP mailing-list].&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==LiveCDs==&lt;br /&gt;
Monday, January 29, 2007  4:02 PM    828569600 AOC_Labrat-ALPHA-0010.iso - http://www.packetfocus.com/hackos/&amp;lt;br /&amp;gt;&lt;br /&gt;
DVL (Damn Vulnerable Linux) - http://www.damnvulnerablelinux.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Test sites / testing grounds==&lt;br /&gt;
SPI Dynamics (live) - http://zero.webappsecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cenzic (live) - http://crackme.cenzic.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watchfire (live) - http://demo.testfire.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Acunetix (live) - http://testphp.acunetix.com/ http://testasp.acunetix.com http://testaspnet.acunetix.com&amp;lt;br /&amp;gt;&lt;br /&gt;
WebMaven / Buggy Bank (includes live testsite) - http://www.mavensecurity.com/webmaven&amp;lt;br /&amp;gt;&lt;br /&gt;
Foundstone SASS tools - http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&amp;amp;subcontent=/resources/s3i_tools.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP WebGoat - http://www.owasp.org/index.php/OWASP_WebGoat_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP SiteGenerator - http://www.owasp.org/index.php/Owasp_SiteGenerator&amp;lt;br /&amp;gt;&lt;br /&gt;
Stanford SecuriBench - http://suif.stanford.edu/~livshits/securibench/&amp;lt;br /&amp;gt;&lt;br /&gt;
SecuriBench Micro - http://suif.stanford.edu/~livshits/work/securibench-micro/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP proxying / editing==&lt;br /&gt;
WebScarab - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp - http://www.portswigger.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros - http://www.parosproxy.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fiddler - http://www.fiddlertool.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Proxy Editor - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
Pantera - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Suru - http://www.sensepost.com/research/suru/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpedit (curses-based) - http://www.neutralbit.com/en/rd/httpedit/&amp;lt;br /&amp;gt;&lt;br /&gt;
Charles - http://www.xk72.com/charles/&amp;lt;br /&amp;gt;&lt;br /&gt;
Odysseus - http://www.bindshell.net/tools/odysseus&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp, Paros, and WebScarab for Mac OS X - http://www.corsaire.com/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web-application scanning tool from `Network Security Tools'/O'Reilly - http://examples.oreilly.com/networkst/&amp;lt;br /&amp;gt;&lt;br /&gt;
JS Commander - http://jscmd.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools==&lt;br /&gt;
Wfuzz - http://www.edge-security.com/wfuzz.php&amp;lt;br /&amp;gt;&lt;br /&gt;
ProxMon - http://www.isecpartners.com/proxmon.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Wapiti - http://wapiti.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Grabber - http://rgaucher.info/beta/grabber/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSScan - http://darkcode.ath.cx/scanners/XSSscan.py&amp;lt;br /&amp;gt;&lt;br /&gt;
CAL9000 - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
HTMangLe - http://www.fishnetsecurity.com/Tools/HTMangLe/publish.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
JBroFuzz - http://sourceforge.net/projects/jbrofuzz&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSFuzz - http://ha.ckers.org/blog/20060921/xssfuzz-released/&amp;lt;br /&amp;gt;&lt;br /&gt;
WhiteAcid's XSS Assistant - http://www.whiteacid.org/greasemonkey/&amp;lt;br /&amp;gt;&lt;br /&gt;
Overlong UTF - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] MielieTool (SensePost Research) - http://packetstormsecurity.org/UNIX/utilities/mielietools-v1.0.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
RegFuzzer: test your regular expression filter - http://rgaucher.info/b/index.php/post/2007/05/26/RegFuzzer%3A-Test-your-regular-expression-filter&amp;lt;br /&amp;gt;&lt;br /&gt;
screamingCobra - http://www.dachb0den.com/projects/screamingcobra.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SPIKE and SPIKE Proxy - http://immunitysec.com/resources-freesoftware.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
RFuzz - http://rfuzz.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
WebFuzz - http://www.codebreakers-journal.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=112&amp;amp;Itemid=99999999&amp;lt;br /&amp;gt;&lt;br /&gt;
TestMaker - http://www.pushtotest.com/Docs/downloads/features.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ASP Auditor - http://michaeldaw.org/projects/asp-auditor-v2/&amp;lt;br /&amp;gt;&lt;br /&gt;
WSTool - http://wstool.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Hack Control Center (WHCC) - http://ussysadmin.com/whcc/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Text Converter - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
HackBar (Firefox Add-on) - https://addons.mozilla.org/firefox/3899/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Force Tools (NF-Tools, Firefox Add-on) - http://www.net-force.nl/library/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
PostIntercepter (Greasemonkey script) - http://userscripts.org/scripts/show/743&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP general testing / fingerprinting==&lt;br /&gt;
Wbox: HTTP testing tool - http://hping.org/wbox/&amp;lt;br /&amp;gt;&lt;br /&gt;
ht://Check - http://htcheck.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mumsie - http://www.lurhq.com/tools/mumsie.html&amp;lt;br /&amp;gt;&lt;br /&gt;
WebInject - http://www.webinject.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Torture.pl Home Page - http://stein.cshl.org/~lstein/torture/&amp;lt;br /&amp;gt;&lt;br /&gt;
JoeDog's Seige - http://www.joedog.org/JoeDog/Siege/&amp;lt;br /&amp;gt;&lt;br /&gt;
OPEN-LABS: metoscan (http method testing) - http://www.open-labs.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-balancing detector - http://ge.mine.nu/lbd.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HMAP - http://ujeni.murkyroc.com/hmap/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Square: httprint - http://net-square.com/httprint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Wpoison: http stress testing - http://wpoison.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: MSNPawn - http://net-square.com/msnpawn/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
hcraft: HTTP Vuln Request Crafter - http://druid.caughq.org/projects/hcraft/&amp;lt;br /&amp;gt;&lt;br /&gt;
rfp.labs: LibWhisker - http://www.wiretrip.net/rfp/lw.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Nikto - http://www.cirt.net/code/nikto.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
twill - http://twill.idyll.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
DirBuster - http://www.sittinglittleduck.com/DirBuster/&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] DFF Scanner - http://security-net.biz/files/dff/DFF.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] The Elza project - http://packetstormsecurity.org/web/elza-1.4.7-beta.zip http://www.stoev.org/elza.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HackerFox(http://yehg.co.nr) : Portable Firefox with web hacking addons bundled - http://sf.net/projects/hackfox&lt;br /&gt;
&lt;br /&gt;
==Browser-based HTTP tampering / editing / replaying==&lt;br /&gt;
TamperIE - http://www.bayden.com/Other/&amp;lt;br /&amp;gt;&lt;br /&gt;
isr-form - http://www.infobyte.com.ar/developments.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Modify Headers (Firefox Add-on) - http://modifyheaders.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Tamper Data (Firefox Add-on) - http://tamperdata.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
UrlParams (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1290/&amp;lt;br /&amp;gt;&lt;br /&gt;
TestGen4Web (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1385/&amp;lt;br /&amp;gt;&lt;br /&gt;
DOM Inspector / Inspect This (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1806/ https://addons.mozilla.org/en-US/firefox/addon/1913/&amp;lt;br /&amp;gt;&lt;br /&gt;
LiveHTTPHeaders / Header Monitor (Firefox Add-on) - http://livehttpheaders.mozdev.org/ https://addons.mozilla.org/en-US/firefox/addon/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cookie editing / poisoning==&lt;br /&gt;
[TGZ] stompy: session id tool - http://lcamtuf.coredump.cx/stompy.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
Add'N Edit Cookies (AnEC, Firefox Add-on) - http://addneditcookies.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieCuller (Firefox Add-on) - http://cookieculler.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookiePie (Firefox Add-on) - http://www.nektra.com/oss/firefox/extensions/cookiepie/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSpy - http://www.codeproject.com/shell/cookiespy.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookies Explorer - http://www.dutchduck.com/Features/Cookies.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Ajax and XHR scanning==&lt;br /&gt;
Sahi - http://sahi.co.in/&amp;lt;br /&amp;gt;&lt;br /&gt;
scRUBYt - http://scrubyt.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
jQuery - http://jquery.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
jquery-include - http://www.gnucitizen.org/projects/jquery-include&amp;lt;br /&amp;gt;&lt;br /&gt;
Sprajax - http://www.denimgroup.com/sprajax.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Watir - http://wtr.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watij - http://watij.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watin - http://watin.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
RBNarcissus - http://idontsmoke.co.uk/2005/rbnarcissus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderTest (Spider Fuzz plugin) - http://blog.caboo.se/articles/2007/2/21/the-fabulous-spider-fuzz-plugin&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Inline Debugger (jasildbg) - http://jasildbg.googlepages.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug Lite - http://www.getfirebug.com/lite.html&amp;lt;br /&amp;gt;&lt;br /&gt;
firewaitr - http://code.google.com/p/firewatir/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSS extensions and caching==&lt;br /&gt;
LiveLines (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/324/&amp;lt;br /&amp;gt;&lt;br /&gt;
rss-cache - http://www.dubfire.net/chris/projects/rss-cache/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SQL injection scanning==&lt;br /&gt;
0x90.org: home of Absinthe, Mezcal, etc - http://0x90.org/releases.php&amp;lt;br /&amp;gt;&lt;br /&gt;
SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlninja: a SQL Server injection and takover tool - http://sqlninja.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JustinClarke's SQL Brute - http://www.justinclarke.com/archives/2006/03/sqlbrute.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BobCat - http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlmap - http://sqlmap.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Scully: SQL Server DB Front-End and Brute-Forcer - http://www.sensepost.com/research/scully/&amp;lt;br /&amp;gt;&lt;br /&gt;
FG-Injector - http://www.flowgate.net/?lang=en&amp;amp;seccion=herramientas&amp;lt;br /&amp;gt;&lt;br /&gt;
PRIAMOS - http://www.priamos-project.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application security malware, backdoors, and evil code==&lt;br /&gt;
W3AF: Web Application Attack and Audit Framework - http://w3af.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Jikto - http://busin3ss.name/jikto-in-the-wild/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS Shell - http://ferruh.mavituna.com/article/?1338&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS-Proxy - http://xss-proxy.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AttackAPI - http://www.gnucitizen.org/projects/attackapi/&amp;lt;br /&amp;gt;&lt;br /&gt;
FFsniFF - http://azurit.elbiahosting.sk/ffsniff/&amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyBlog's web-based junkyard - http://honeyblog.org/junkyard/web-based/&amp;lt;br /&amp;gt;&lt;br /&gt;
BeEF - http://www.bindshell.net/tools/beef/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firefox Extension Scanner (FEX) - http://www.gnucitizen.org/projects/fex/&amp;lt;br /&amp;gt;&lt;br /&gt;
What is my IP address? - http://reglos.de/myaddress/&amp;lt;br /&amp;gt;&lt;br /&gt;
xRumer: blogspam automation tool - http://www.botmaster.net/movies/XFull.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyJax - http://www.merchantos.com/makebeta/tools/spyjax/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasecarnaval - http://www.gnucitizen.org/projects/greasecarnaval&amp;lt;br /&amp;gt;&lt;br /&gt;
Technika - http://www.gnucitizen.org/projects/technika/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-AttackAPI bookmarklet - http://www.gnucitizen.org/projects/load-attackapi-bookmarklet&amp;lt;br /&amp;gt;&lt;br /&gt;
MD's Projects: JS port scanner, pinger, backdoors, etc - http://michaeldaw.org/my-projects/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application services that aid in web application security assessment==&lt;br /&gt;
Netcraft - http://www.netcraft.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AboutURL - http://www.abouturl.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
The Scrutinizer - http://www.scrutinizethis.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
net.toolkit - http://clez.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSniff - http://www.serversniff.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Online Microsoft script decoder - http://www.greymagic.com/security/tools/decoder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Webmaster-Toolkit - http://www.webmaster-toolkit.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
myIPNeighbbors, et al - http://digg.com/security/MyIPNeighbors_Find_Out_Who_Else_is_Hosted_on_Your_Site_s_IP_Address&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP charset encoding - http://h4k.in/encoding&amp;lt;br /&amp;gt;&lt;br /&gt;
data: URL testcases - http://h4k.in/dataurl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser-based security fuzzing / checking==&lt;br /&gt;
Zalewski's MangleMe - http://lcamtuf.coredump.cx/mangleme/mangle.cgi&amp;lt;br /&amp;gt;&lt;br /&gt;
hdm's tools: Hamachi, CSSDIE, DOM-Hanoi, AxMan - http://metasploit.com/users/hdm/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
Peach Fuzzer Framework - http://peachfuzz.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
TagBruteForcer - http://research.eeye.com/html/tools/RT20060801-3.html&amp;lt;br /&amp;gt;&lt;br /&gt;
PROTOS Test-Suite: c05-http-reply - http://www.ee.oulu.fi/research/ouspg/protos/testing/c05/http-reply/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
COMRaider - http://labs.idefense.com&amp;lt;br /&amp;gt;&lt;br /&gt;
bcheck - http://bcheck.scanit.be/bcheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Stop-Phishing: Projects page - http://www.indiana.edu/~phishing/?projects&amp;lt;br /&amp;gt;&lt;br /&gt;
LinkScanner - http://linkscanner.explabs.com/linkscanner/default.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
BrowserCheck - http://www.heise-security.co.uk/services/browsercheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cross-browser Exploit Tests - http://www.jungsonnstudios.com/cool.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Stealing information using DNS pinning demo - http://www.jumperz.net/index.php?i=2&amp;amp;a=1&amp;amp;b=7&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Website Login Checker - http://ha.ckers.org/weird/javascript-website-login-checker.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Mozilla Activex - http://www.iol.ie/~locka/mozilla/mozilla.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
Jungsonn's Black Dragon Project - http://blackdragon.jungsonnstudios.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mr. T (Master Recon Tool, includes Read Firefox Settings PoC) - http://ha.ckers.org/mr-t/&amp;lt;br /&amp;gt;&lt;br /&gt;
Vulnerable Adobe Plugin Detection For UXSS PoC - http://www.0x000000.com/?i=324&amp;lt;br /&amp;gt;&lt;br /&gt;
About Flash: is your flash up-to-date? - http://www.macromedia.com/software/flash/about/&amp;lt;br /&amp;gt;&lt;br /&gt;
Test your installation of Java software - http://java.com/en/download/installed.jsp?detect=jre&amp;amp;try=1&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==PHP static analysis and file inclusion scanning==&lt;br /&gt;
PHP-SAT.org: Static analysis for PHP - http://www.program-transformation.org/PHP/&amp;lt;br /&amp;gt;&lt;br /&gt;
Unl0ck Research Team: tool for searching in google for include bugs - http://unl0ck.net/tools.php&amp;lt;br /&amp;gt;&lt;br /&gt;
FIS: File Inclusion Scanner - http://www.segfault.gr/index.php?cat_id=3&amp;amp;cont_id=25&amp;lt;br/&amp;gt;&lt;br /&gt;
PHPSecAudit - http://developer.spikesource.com/projects/phpsecaudit&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web Application Firewall (WAF) and Intrusion Detection (APIDS) rules and resources==&lt;br /&gt;
APIDS on Wikipedia - http://en.wikipedia.org/wiki/APIDS&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP Intrusion Detection System (PHP-IDS) - http://php-ids.org/ http://code.google.com/p/phpids/&amp;lt;br /&amp;gt;&lt;br /&gt;
dotnetids - http://code.google.com/p/dotnetids/&amp;lt;br /&amp;gt;&lt;br /&gt;
Secure Science InterScout - http://www.securescience.com/home/newsandevents/news/interscout1.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Remo: whitelist rule editor for mod_security - http://remo.netnea.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
GotRoot: ModSecuirty rules - http://www.gotroot.com/tiki-index.php?page=mod_security+rules&amp;lt;br /&amp;gt;&lt;br /&gt;
The Web Security Gateway (WSGW) - http://wsgw.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
mod_security rules generator - http://noeljackson.com/tools/modsecurity/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mod_Anti_Tamper - http://www.wisec.it/projects.php?id=3&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] Automatic Rules Generation for Mod_Security - http://www.wisec.it/rdr.php?fn=/Projects/Rule-o-matic.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
AQTRONIX WebKnight - http://www.aqtronix.com/?PageID=99&amp;lt;br /&amp;gt;&lt;br /&gt;
Akismet: blog spam defense - http://akismet.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samoa: Formal tools for securing web services - http://research.microsoft.com/projects/samoa/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web services enumeration / scanning / fuzzing==&lt;br /&gt;
WebServiceStudio2.0 - http://www.gotdotnet.com/Community/UserSamples/Details.aspx?SampleGuid=65a1d4ea-0f7a-41bd-8494-e916ebc4159c&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: wsChess - http://net-square.com/wschess/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
SIFT: web method search tool - http://www.sift.com.au/73/171/sift-web-method-search-tool.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
iSecPartners: WSMap, WSBang, etc - http://www.isecpartners.com/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application non-specific static source-code analysis==&lt;br /&gt;
Pixy: a static analysis tool for detecting XSS vulnerabilities - http://www.seclab.tuwien.ac.at/projects/pixy/&amp;lt;br /&amp;gt;&lt;br /&gt;
Brixoft.Net: Source Edit - http://www.brixoft.net/prodinfo.asp?id=1&amp;lt;br /&amp;gt;&lt;br /&gt;
Security compass web application auditing tools (SWAAT) - http://www.owasp.org/index.php/Category:OWASP_SWAAT_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
An even more complete list here - http://www.cs.cmu.edu/~aldrich/courses/654/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
A nice list that claims some demos available - http://www.cs.cmu.edu/~aldrich/courses/413/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
A smaller, but also good list - http://spinroot.com/static/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Static analysis for C/C++ (CGI, ISAPI, etc) in web applications==&lt;br /&gt;
RATS - http://www.securesoftware.com/resources/download_rats.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ITS4 - http://www.cigital.com/its4/&amp;lt;br /&amp;gt;&lt;br /&gt;
FlawFinder - http://www.dwheeler.com/flawfinder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Splint - http://www.splint.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Uno - http://spinroot.com/uno/&amp;lt;br /&amp;gt;&lt;br /&gt;
BOON (Buffer Overrun detectiON) - http://www.cs.berkeley.edu/~daw/boon/ http://boon.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
Valgrind - http://www.valgrind.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Java static analysis, security frameworks, and web application security tools==&lt;br /&gt;
HDIV Struts - http://hdiv.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Orizon - http://sourceforge.net/projects/orizon/&amp;lt;br /&amp;gt;&lt;br /&gt;
FindBugs: Find bugs in Java programs - http://findbugs.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PMD - http://pmd.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java - http://www.ebooknetworking.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
CUTE: A Concolic Unit Testing Engine for C and Java - http://osl.cs.uiuc.edu/~ksen/cute/&amp;lt;br /&amp;gt;&lt;br /&gt;
EMMA - http://emma.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JLint - http://jlint.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java PathFinder - http://javapathfinder.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fujaba: Move between UML and Java source code - http://wwwcs.uni-paderborn.de/cs/fujaba/&amp;lt;br /&amp;gt;&lt;br /&gt;
Checkstyle - http://checkstyle.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookie Revolver Security Framework - http://sourceforge.net/projects/cookie-revolver&amp;lt;br /&amp;gt;&lt;br /&gt;
tinapoc - http://sourceforge.net/projects/tinapoc&amp;lt;br /&amp;gt;&lt;br /&gt;
jarsigner - http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Solex - http://solex.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java Explorer - http://metal.hurlant.com/jexplore/&amp;lt;br /&amp;gt;&lt;br /&gt;
HTTPClient - http://www.innovation.ch/java/HTTPClient/&amp;lt;br /&amp;gt;&lt;br /&gt;
another HttpClient - http://jakarta.apache.org/commons/httpclient/&amp;lt;br /&amp;gt;&lt;br /&gt;
a list of code coverage and analysis tools for Java - http://mythinkpond.blogspot.com/2007/06/java-foss-freeopen-source-software.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Microsoft .NET static analysis and security framework tools, mostly for ASP.NET and ASP.NET AJAX, but also C# and VB.NET==&lt;br /&gt;
Orcas - http://msdn.microsoft.com/vstudio/express/future/downloads/default.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Development Helper - http://www.nikhilk.net/Project.WebDevHelper.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
FxCop - http://blogs.msdn.com/fxcop/ http://www.gotdotnet.com/team/fxcop/&amp;lt;br /&amp;gt;&lt;br /&gt;
Microsoft Application Verifier - http://www.microsoft.com/technet/prodtechnol/windows/appcompatibility/appverifier.mspx&amp;lt;br /&amp;gt;&lt;br /&gt;
Microsoft internal tools you can't have yet - http://www.microsoft.com/windows/cse/pa_projects.mspx http://research.microsoft.com/Pex/ http://www.owasp.org/images/5/5b/OWASP_IL_7_FuzzGuru.pdf&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Threat modeling==&lt;br /&gt;
Microsoft Threat Analysis and Modeling Tool v2.1 (TAM) - http://www.microsoft.com/downloads/details.aspx?FamilyID=59888078-9daf-4e96-b7d1-944703479451&amp;amp;displaylang=en&amp;lt;br /&amp;gt;&lt;br /&gt;
Amenaza: Attack Tree Modeling (SecurITree) - http://www.amenaza.com/software.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Octotrike - http://www.octotrike.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with general web application security==&lt;br /&gt;
Web Developer Toolbar - https://addons.mozilla.org/firefox/60/&amp;lt;br /&amp;gt;&lt;br /&gt;
Plain Old Webserver (POW) - https://addons.mozilla.org/firefox/3002/&amp;lt;br /&amp;gt;&lt;br /&gt;
XML Developer Toolbar - https://addons.mozilla.org/firefox/2897/&amp;lt;br /&amp;gt;&lt;br /&gt;
Public Fox - https://addons.mozilla.org/firefox/3911/&amp;lt;br /&amp;gt;&lt;br /&gt;
XForms Buddy - http://beaufour.dk/index.php?sec=misc&amp;amp;pagename=xforms&amp;lt;br /&amp;gt;&lt;br /&gt;
MR Tech Local Install - http://www.mrtech.com/extensions/local_install/&amp;lt;br /&amp;gt;&lt;br /&gt;
Nightly Tester Tools - http://users.blueprintit.co.uk/~dave/web/firefox/buildid/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
IE Tab - https://addons.mozilla.org/firefox/1419/&amp;lt;br /&amp;gt;&lt;br /&gt;
User-Agent Switcher - https://addons.mozilla.org/firefox/59/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSwitcher - https://addons.mozilla.org/firefox/2409/&amp;lt;br /&amp;gt;&lt;br /&gt;
HeaderMonitor - https://addons.mozilla.org/firefox/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
RefControl - https://addons.mozilla.org/firefox/953/&amp;lt;br /&amp;gt;&lt;br /&gt;
refspoof - https://addons.mozilla.org/firefox/667/&amp;lt;br /&amp;gt;&lt;br /&gt;
No-Referrer - https://addons.mozilla.org/firefox/1999/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocationBar^2 - https://addons.mozilla.org/firefox/4014/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderZilla - http://spiderzilla.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Slogger - https://addons.mozilla.org/en-US/firefox/addon/143&amp;lt;br /&amp;gt;&lt;br /&gt;
Fire Encrypter - https://addons.mozilla.org/firefox/3208/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with Javascript and Ajax web application security==&lt;br /&gt;
Selenium IDE - http://www.openqa.org/selenium-ide/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug - http://www.joehewitt.com/software/firebug/&amp;lt;br /&amp;gt;&lt;br /&gt;
Venkman - http://www.mozilla.org/projects/venkman/&amp;lt;br /&amp;gt;&lt;br /&gt;
Chickenfoot - http://groups.csail.mit.edu/uid/chickenfoot/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey - http://www.greasespot.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey compiler - http://www.letitblog.com/greasemonkey-compiler/&amp;lt;br /&amp;gt;&lt;br /&gt;
User script compiler - http://arantius.com/misc/greasemonkey/script-compiler&amp;lt;br /&amp;gt;&lt;br /&gt;
Extension Developer's Extension (Firefox Add-on) - http://ted.mielczarek.org/code/mozilla/extensiondev/&amp;lt;br /&amp;gt;&lt;br /&gt;
Smart Middle Click (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/3885/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Bookmarklets that aid in web application security==&lt;br /&gt;
RSnake's security bookmarklets - http://ha.ckers.org/bookmarklets.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BMlets - http://optools.awardspace.com/bmlet.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Huge list of bookmarklets - http://www.squarefree.com/bookmarklets/&amp;lt;br /&amp;gt;&lt;br /&gt;
Blummy: consists of small widgets, called blummlets, which make use of Javascript to provide&lt;br /&gt;
rich functionality - http://www.blummy.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Bookmarklets every blogger should have - http://www.micropersuasion.com/2005/10/bookmarklets_ev.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Flat Bookmark Editing (Firefox Add-on) - http://n01se.net/chouser/proj/mozhack/&amp;lt;br /&amp;gt;&lt;br /&gt;
OpenBook and Update Bookmark (Firefox Add-ons) - http://www.chuonthis.com/extensions/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SSL certificate checking / scanning==&lt;br /&gt;
[ZIP] THCSSLCheck - http://thc.org/root/tools/THCSSLCheck.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] Foundstone SSLDigger - http://www.foundstone.com/us/resources/termsofuse.asp?file=ssldigger.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
Cert Viewer Plus (Firefox Add-on) - https://addons.mozilla.org/firefox/1964/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Honeyclients, Web Application, and Web Proxy honeypots==&lt;br /&gt;
Honeyclient Project: an open-source honeyclient - http://www.honeyclient.org/trac/ &amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyC: the low-interaction honeyclient - http://honeyc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Capture: a high-interaction honeyclient - http://capture-hpc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google Hack Honeypot - http://ghh.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP.Hop - PHP Honeynet Project - http://www.rstack.org/phphop/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyBye - http://www.monkey.org/~provos/spybye/&amp;lt;br /&amp;gt;&lt;br /&gt;
Honeytokens - http://www.securityfocus.com/infocus/1713&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Blackhat SEO and maybe some whitehat SEO==&lt;br /&gt;
SearchStatus (Firefox Add-on) - http://www.quirk.biz/searchstatus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SEO for Firefox (Firefox Add-on) - http://tools.seobook.com/firefox/seo-for-firefox.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SEOQuake (Firefox Add-on) - http://www.seoquake.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Footprinting for web application security==&lt;br /&gt;
Evolution - http://www.paterva.com/evolution-e.html&amp;lt;br /&amp;gt;&lt;br /&gt;
GooSweep - http://www.mcgrewsecurity.com/projects/goosweep/&amp;lt;br /&amp;gt;&lt;br /&gt;
Aura: Google API Utility Tools - http://www.sensepost.com/research/aura/&amp;lt;br /&amp;gt;&lt;br /&gt;
Edge-Security tools - http://www.edge-security.com/soft.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Fierce Domain Scanner - http://ha.ckers.org/fierce/&amp;lt;br /&amp;gt;&lt;br /&gt;
Googlegath - http://www.nothink.org/perl/googlegath/&amp;lt;br /&amp;gt;&lt;br /&gt;
Advanced Dork (Firefox Add-on) - https://addons.mozilla.org/firefox/2144/&amp;lt;br /&amp;gt;&lt;br /&gt;
Passive Cache (Firefox Add-on) - https://addons.mozilla.org/firefox/977/&amp;lt;br /&amp;gt;&lt;br /&gt;
CacheOut! (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1453/&amp;lt;br /&amp;gt;&lt;br /&gt;
BugMeNot Extension (Firefox Add-on) - http://roachfiend.com/archives/2005/02/07/bugmenot/&amp;lt;br /&amp;gt;&lt;br /&gt;
TrashMail.net Extension (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1813/&amp;lt;br /&amp;gt;&lt;br /&gt;
DiggiDig (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2819/&amp;lt;br /&amp;gt;&lt;br /&gt;
Digger (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1467/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Database security assessment==&lt;br /&gt;
Scuba by Imperva Database Vulnerability Scanner - http://www.imperva.com/scuba/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Defenses==&lt;br /&gt;
DieHard - http://www.diehard-software.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocalRodeo (Firefox Add-on) - http://databasement.net/labs/localrodeo/&amp;lt;br /&amp;gt;&lt;br /&gt;
NoMoXSS - http://www.seclab.tuwien.ac.at/projects/jstaint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Request Rodeo - http://savannah.nongnu.org/projects/requestrodeo&amp;lt;br /&amp;gt;&lt;br /&gt;
FlashBlock (Firefox Add-on) - http://flashblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSafe (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2497&amp;lt;br /&amp;gt;&lt;br /&gt;
NoScript (Firefox Add-on) - http://www.noscript.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
FormFox (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1579/&amp;lt;br /&amp;gt;&lt;br /&gt;
Adblock (Firefox Add-on) - http://adblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpOnly in Firefox (Firefox Add-on) - http://blog.php-security.org/archives/40-httpOnly-Cookies-in-Firefox-2.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeCache (Firefox Add-on) - http://www.safecache.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeHistory (Firefox Add-on) - http://www.safehistory.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
PrefBar (Firefox Add-on) - http://prefbar.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
All-in-One Sidebar (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1027/&amp;lt;br /&amp;gt;&lt;br /&gt;
QArchive.org web file checker (Firefox Add-on) - https://addons.mozilla.org/firefox/4115/&amp;lt;br /&amp;gt;&lt;br /&gt;
Update Notified (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2098/&amp;lt;br /&amp;gt;&lt;br /&gt;
FireKeeper - http://firekeeper.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey: XSS Malware Script Detector (http://yehg.co.nr) -  http://userscripts.org/scripts/show/22955&lt;br /&gt;
&lt;br /&gt;
==Browser Privacy==&lt;br /&gt;
TrackMeNot (Firefox Add-on) - https://addons.mozilla.org/firefox/3173/&amp;lt;br /&amp;gt;&lt;br /&gt;
Privacy Bird - http://www.privacybird.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Application and protocol fuzzing (random instead of targeted)==&lt;br /&gt;
Sulley - http://fuzzing.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
taof: The Art of Fuzzing - http://sourceforge.net/projects/taof/&amp;lt;br /&amp;gt;&lt;br /&gt;
zzuf: multipurpose fuzzer - http://sam.zoy.org/zzuf/&amp;lt;br /&amp;gt;&lt;br /&gt;
autodafé: an act of software torture - http://autodafe.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
EFS and GPF: Evolutionary Fuzzing System - http://www.appliedsec.com/resources.html&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=20216</id>
		<title>Phoenix/Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=20216"/>
				<updated>2007-07-26T17:31:01Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;p&amp;gt;Please send comments or questions to the [https://lists.owasp.org/mailman/listinfo/owasp-phoenix Phoenix-OWASP mailing-list].&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==LiveCDs==&lt;br /&gt;
Monday, January 29, 2007  4:02 PM    828569600 AOC_Labrat-ALPHA-0010.iso - http://www.packetfocus.com/hackos/&amp;lt;br /&amp;gt;&lt;br /&gt;
DVL (Damn Vulnerable Linux) - http://www.damnvulnerablelinux.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Test sites / testing grounds==&lt;br /&gt;
SPI Dynamics (live) - http://zero.webappsecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cenzic (live) - http://crackme.cenzic.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watchfire (live) - http://demo.testfire.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Acunetix (live) - http://testphp.acunetix.com/ http://testasp.acunetix.com http://testaspnet.acunetix.com&amp;lt;br /&amp;gt;&lt;br /&gt;
WebMaven / Buggy Bank (includes live testsite) - http://www.mavensecurity.com/webmaven&amp;lt;br /&amp;gt;&lt;br /&gt;
Foundstone SASS tools - http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&amp;amp;subcontent=/resources/s3i_tools.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP WebGoat - http://www.owasp.org/index.php/OWASP_WebGoat_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP SiteGenerator - http://www.owasp.org/index.php/Owasp_SiteGenerator&amp;lt;br /&amp;gt;&lt;br /&gt;
Stanford SecuriBench - http://suif.stanford.edu/~livshits/securibench/&amp;lt;br /&amp;gt;&lt;br /&gt;
SecuriBench Micro - http://suif.stanford.edu/~livshits/work/securibench-micro/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP proxying / editing==&lt;br /&gt;
WebScarab - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp - http://www.portswigger.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros - http://www.parosproxy.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fiddler - http://www.fiddlertool.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Proxy Editor - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
Pantera - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Suru - http://www.sensepost.com/research/suru/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpedit (curses-based) - http://www.neutralbit.com/en/rd/httpedit/&amp;lt;br /&amp;gt;&lt;br /&gt;
Charles - http://www.xk72.com/charles/&amp;lt;br /&amp;gt;&lt;br /&gt;
Odysseus - http://www.bindshell.net/tools/odysseus&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp, Paros, and WebScarab for Mac OS X - http://www.corsaire.com/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web-application scanning tool from `Network Security Tools'/O'Reilly - http://examples.oreilly.com/networkst/&amp;lt;br /&amp;gt;&lt;br /&gt;
JS Commander - http://jscmd.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools==&lt;br /&gt;
Wfuzz - http://www.edge-security.com/wfuzz.php&amp;lt;br /&amp;gt;&lt;br /&gt;
ProxMon - http://www.isecpartners.com/proxmon.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Wapiti - http://wapiti.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Grabber - http://rgaucher.info/beta/grabber/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSScan - http://darkcode.ath.cx/scanners/XSSscan.py&amp;lt;br /&amp;gt;&lt;br /&gt;
CAL9000 - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
HTMangLe - http://www.fishnetsecurity.com/Tools/HTMangLe/publish.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
JBroFuzz - http://sourceforge.net/projects/jbrofuzz&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSFuzz - http://ha.ckers.org/blog/20060921/xssfuzz-released/&amp;lt;br /&amp;gt;&lt;br /&gt;
WhiteAcid's XSS Assistant - http://www.whiteacid.org/greasemonkey/&amp;lt;br /&amp;gt;&lt;br /&gt;
Overlong UTF - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] MielieTool (SensePost Research) - http://packetstormsecurity.org/UNIX/utilities/mielietools-v1.0.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
RegFuzzer: test your regular expression filter - http://rgaucher.info/b/index.php/post/2007/05/26/RegFuzzer%3A-Test-your-regular-expression-filter&amp;lt;br /&amp;gt;&lt;br /&gt;
screamingCobra - http://www.dachb0den.com/projects/screamingcobra.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SPIKE and SPIKE Proxy - http://immunitysec.com/resources-freesoftware.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
RFuzz - http://rfuzz.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
WebFuzz - http://www.codebreakers-journal.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=112&amp;amp;Itemid=99999999&amp;lt;br /&amp;gt;&lt;br /&gt;
TestMaker - http://www.pushtotest.com/Docs/downloads/features.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ASP Auditor - http://michaeldaw.org/projects/asp-auditor-v2/&amp;lt;br /&amp;gt;&lt;br /&gt;
WSTool - http://wstool.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Hack Control Center (WHCC) - http://ussysadmin.com/whcc/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Text Converter - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
HackBar (Firefox Add-on) - https://addons.mozilla.org/firefox/3899/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Force Tools (NF-Tools, Firefox Add-on) - http://www.net-force.nl/library/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
PostIntercepter (Greasemonkey script) - http://userscripts.org/scripts/show/743&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP general testing / fingerprinting==&lt;br /&gt;
Wbox: HTTP testing tool - http://hping.org/wbox/&amp;lt;br /&amp;gt;&lt;br /&gt;
ht://Check - http://htcheck.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mumsie - http://www.lurhq.com/tools/mumsie.html&amp;lt;br /&amp;gt;&lt;br /&gt;
WebInject - http://www.webinject.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Torture.pl Home Page - http://stein.cshl.org/~lstein/torture/&amp;lt;br /&amp;gt;&lt;br /&gt;
JoeDog's Seige - http://www.joedog.org/JoeDog/Siege/&amp;lt;br /&amp;gt;&lt;br /&gt;
OPEN-LABS: metoscan (http method testing) - http://www.open-labs.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-balancing detector - http://ge.mine.nu/lbd.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HMAP - http://ujeni.murkyroc.com/hmap/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Square: httprint - http://net-square.com/httprint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Wpoison: http stress testing - http://wpoison.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: MSNPawn - http://net-square.com/msnpawn/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
hcraft: HTTP Vuln Request Crafter - http://druid.caughq.org/projects/hcraft/&amp;lt;br /&amp;gt;&lt;br /&gt;
rfp.labs: LibWhisker - http://www.wiretrip.net/rfp/lw.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Nikto - http://www.cirt.net/code/nikto.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
twill - http://twill.idyll.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
DirBuster - http://www.sittinglittleduck.com/DirBuster/&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] DFF Scanner - http://security-net.biz/files/dff/DFF.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] The Elza project - http://packetstormsecurity.org/web/elza-1.4.7-beta.zip http://www.stoev.org/elza.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser-based HTTP tampering / editing / replaying==&lt;br /&gt;
TamperIE - http://www.bayden.com/Other/&amp;lt;br /&amp;gt;&lt;br /&gt;
isr-form - http://www.infobyte.com.ar/developments.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Modify Headers (Firefox Add-on) - http://modifyheaders.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Tamper Data (Firefox Add-on) - http://tamperdata.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
UrlParams (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1290/&amp;lt;br /&amp;gt;&lt;br /&gt;
TestGen4Web (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1385/&amp;lt;br /&amp;gt;&lt;br /&gt;
DOM Inspector / Inspect This (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1806/ https://addons.mozilla.org/en-US/firefox/addon/1913/&amp;lt;br /&amp;gt;&lt;br /&gt;
LiveHTTPHeaders / Header Monitor (Firefox Add-on) - http://livehttpheaders.mozdev.org/ https://addons.mozilla.org/en-US/firefox/addon/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cookie editing / poisoning==&lt;br /&gt;
[TGZ] stompy: session id tool - http://lcamtuf.coredump.cx/stompy.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
Add'N Edit Cookies (AnEC, Firefox Add-on) - http://addneditcookies.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieCuller (Firefox Add-on) - http://cookieculler.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookiePie (Firefox Add-on) - http://www.nektra.com/oss/firefox/extensions/cookiepie/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSpy - http://www.codeproject.com/shell/cookiespy.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookies Explorer - http://www.dutchduck.com/Features/Cookies.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Ajax and XHR scanning==&lt;br /&gt;
Sahi - http://sahi.co.in/&amp;lt;br /&amp;gt;&lt;br /&gt;
scRUBYt - http://scrubyt.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
jQuery - http://jquery.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
jquery-include - http://www.gnucitizen.org/projects/jquery-include&amp;lt;br /&amp;gt;&lt;br /&gt;
Sprajax - http://www.denimgroup.com/sprajax.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Watir - http://wtr.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watij - http://watij.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watin - http://watin.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
RBNarcissus - http://idontsmoke.co.uk/2005/rbnarcissus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderTest (Spider Fuzz plugin) - http://blog.caboo.se/articles/2007/2/21/the-fabulous-spider-fuzz-plugin&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Inline Debugger (jasildbg) - http://jasildbg.googlepages.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug Lite - http://www.getfirebug.com/lite.html&amp;lt;br /&amp;gt;&lt;br /&gt;
firewaitr - http://code.google.com/p/firewatir/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSS extensions and caching==&lt;br /&gt;
LiveLines (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/324/&amp;lt;br /&amp;gt;&lt;br /&gt;
rss-cache - http://www.dubfire.net/chris/projects/rss-cache/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SQL injection scanning==&lt;br /&gt;
0x90.org: home of Absinthe, Mezcal, etc - http://0x90.org/releases.php&amp;lt;br /&amp;gt;&lt;br /&gt;
SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlninja: a SQL Server injection and takover tool - http://sqlninja.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JustinClarke's SQL Brute - http://www.justinclarke.com/archives/2006/03/sqlbrute.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BobCat - http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlmap - http://sqlmap.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Scully: SQL Server DB Front-End and Brute-Forcer - http://www.sensepost.com/research/scully/&amp;lt;br /&amp;gt;&lt;br /&gt;
FG-Injector - http://www.flowgate.net/?lang=en&amp;amp;seccion=herramientas&amp;lt;br /&amp;gt;&lt;br /&gt;
PRIAMOS - http://www.priamos-project.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application security malware, backdoors, and evil code==&lt;br /&gt;
W3AF: Web Application Attack and Audit Framework - http://w3af.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Jikto - http://busin3ss.name/jikto-in-the-wild/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS Shell - http://ferruh.mavituna.com/article/?1338&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS-Proxy - http://xss-proxy.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AttackAPI - http://www.gnucitizen.org/projects/attackapi/&amp;lt;br /&amp;gt;&lt;br /&gt;
FFsniFF - http://azurit.elbiahosting.sk/ffsniff/&amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyBlog's web-based junkyard - http://honeyblog.org/junkyard/web-based/&amp;lt;br /&amp;gt;&lt;br /&gt;
BeEF - http://www.bindshell.net/tools/beef/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firefox Extension Scanner (FEX) - http://www.gnucitizen.org/projects/fex/&amp;lt;br /&amp;gt;&lt;br /&gt;
What is my IP address? - http://reglos.de/myaddress/&amp;lt;br /&amp;gt;&lt;br /&gt;
xRumer: blogspam automation tool - http://www.botmaster.net/movies/XFull.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyJax - http://www.merchantos.com/makebeta/tools/spyjax/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasecarnaval - http://www.gnucitizen.org/projects/greasecarnaval&amp;lt;br /&amp;gt;&lt;br /&gt;
Technika - http://www.gnucitizen.org/projects/technika/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-AttackAPI bookmarklet - http://www.gnucitizen.org/projects/load-attackapi-bookmarklet&amp;lt;br /&amp;gt;&lt;br /&gt;
MD's Projects: JS port scanner, pinger, backdoors, etc - http://michaeldaw.org/my-projects/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application services that aid in web application security assessment==&lt;br /&gt;
Netcraft - http://www.netcraft.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AboutURL - http://www.abouturl.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
The Scrutinizer - http://www.scrutinizethis.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
net.toolkit - http://clez.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSniff - http://www.serversniff.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Online Microsoft script decoder - http://www.greymagic.com/security/tools/decoder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Webmaster-Toolkit - http://www.webmaster-toolkit.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
myIPNeighbbors, et al - http://digg.com/security/MyIPNeighbors_Find_Out_Who_Else_is_Hosted_on_Your_Site_s_IP_Address&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP charset encoding - http://h4k.in/encoding&amp;lt;br /&amp;gt;&lt;br /&gt;
data: URL testcases - http://h4k.in/dataurl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser-based security fuzzing / checking==&lt;br /&gt;
Zalewski's MangleMe - http://lcamtuf.coredump.cx/mangleme/mangle.cgi&amp;lt;br /&amp;gt;&lt;br /&gt;
hdm's tools: Hamachi, CSSDIE, DOM-Hanoi, AxMan - http://metasploit.com/users/hdm/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
Peach Fuzzer Framework - http://peachfuzz.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
TagBruteForcer - http://research.eeye.com/html/tools/RT20060801-3.html&amp;lt;br /&amp;gt;&lt;br /&gt;
PROTOS Test-Suite: c05-http-reply - http://www.ee.oulu.fi/research/ouspg/protos/testing/c05/http-reply/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
COMRaider - http://labs.idefense.com&amp;lt;br /&amp;gt;&lt;br /&gt;
bcheck - http://bcheck.scanit.be/bcheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Stop-Phishing: Projects page - http://www.indiana.edu/~phishing/?projects&amp;lt;br /&amp;gt;&lt;br /&gt;
LinkScanner - http://linkscanner.explabs.com/linkscanner/default.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
BrowserCheck - http://www.heise-security.co.uk/services/browsercheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cross-browser Exploit Tests - http://www.jungsonnstudios.com/cool.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Stealing information using DNS pinning demo - http://www.jumperz.net/index.php?i=2&amp;amp;a=1&amp;amp;b=7&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Website Login Checker - http://ha.ckers.org/weird/javascript-website-login-checker.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Mozilla Activex - http://www.iol.ie/~locka/mozilla/mozilla.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
Jungsonn's Black Dragon Project - http://blackdragon.jungsonnstudios.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mr. T (Master Recon Tool, includes Read Firefox Settings PoC) - http://ha.ckers.org/mr-t/&amp;lt;br /&amp;gt;&lt;br /&gt;
Vulnerable Adobe Plugin Detection For UXSS PoC - http://www.0x000000.com/?i=324&amp;lt;br /&amp;gt;&lt;br /&gt;
About Flash: is your flash up-to-date? - http://www.macromedia.com/software/flash/about/&amp;lt;br /&amp;gt;&lt;br /&gt;
Test your installation of Java software - http://java.com/en/download/installed.jsp?detect=jre&amp;amp;try=1&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==PHP static analysis and file inclusion scanning==&lt;br /&gt;
PHP-SAT.org: Static analysis for PHP - http://www.program-transformation.org/PHP/&amp;lt;br /&amp;gt;&lt;br /&gt;
Unl0ck Research Team: tool for searching in google for include bugs - http://unl0ck.net/tools.php&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
FIS: File Inclusion Scanner - http://www.segfault.gr/index.php?cat_id=3&amp;amp;cont_id=25&amp;lt;br/&amp;gt;&lt;br /&gt;
PHPSecAudit - http://developer.spikesource.com/projects/phpsecaudit&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web Application Firewall (WAF) and Intrusion Detection (APIDS) rules and resources==&lt;br /&gt;
APIDS on Wikipedia - http://en.wikipedia.org/wiki/APIDS&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP Intrusion Detection System (PHP-IDS) - http://php-ids.org/ http://code.google.com/p/phpids/&amp;lt;br /&amp;gt;&lt;br /&gt;
dotnetids - http://code.google.com/p/dotnetids/&amp;lt;br /&amp;gt;&lt;br /&gt;
Secure Science InterScout - http://www.securescience.com/home/newsandevents/news/interscout1.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Remo: whitelist rule editor for mod_security - http://remo.netnea.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
GotRoot: ModSecuirty rules - http://www.gotroot.com/tiki-index.php?page=mod_security+rules&amp;lt;br /&amp;gt;&lt;br /&gt;
The Web Security Gateway (WSGW) - http://wsgw.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
mod_security rules generator - http://noeljackson.com/tools/modsecurity/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mod_Anti_Tamper - http://www.wisec.it/projects.php?id=3&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] Automatic Rules Generation for Mod_Security - http://www.wisec.it/rdr.php?fn=/Projects/Rule-o-matic.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
AQTRONIX WebKnight - http://www.aqtronix.com/?PageID=99&amp;lt;br /&amp;gt;&lt;br /&gt;
Akismet: blog spam defense - http://akismet.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samoa: Formal tools for securing web services - http://research.microsoft.com/projects/samoa/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web services enumeration / scanning / fuzzing==&lt;br /&gt;
WebServiceStudio2.0 - http://www.gotdotnet.com/Community/UserSamples/Details.aspx?SampleGuid=65a1d4ea-0f7a-41bd-8494-e916ebc4159c&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: wsChess - http://net-square.com/wschess/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
SIFT: web method search tool - http://www.sift.com.au/73/171/sift-web-method-search-tool.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
iSecPartners: WSMap, WSBang, etc - http://www.isecpartners.com/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application non-specific static source-code analysis==&lt;br /&gt;
Pixy: a static analysis tool for detecting XSS vulnerabilities - http://www.seclab.tuwien.ac.at/projects/pixy/&amp;lt;br /&amp;gt;&lt;br /&gt;
Brixoft.Net: Source Edit - http://www.brixoft.net/prodinfo.asp?id=1&amp;lt;br /&amp;gt;&lt;br /&gt;
Security compass web application auditing tools (SWAAT) - http://www.owasp.org/index.php/Category:OWASP_SWAAT_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
An even more complete list here - http://www.cs.cmu.edu/~aldrich/courses/654/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
A nice list that claims some demos available - http://www.cs.cmu.edu/~aldrich/courses/413/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
A smaller, but also good list - http://spinroot.com/static/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Static analysis for C/C++ (CGI, ISAPI, etc) in web applications==&lt;br /&gt;
RATS - http://www.securesoftware.com/resources/download_rats.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ITS4 - http://www.cigital.com/its4/&amp;lt;br /&amp;gt;&lt;br /&gt;
FlawFinder - http://www.dwheeler.com/flawfinder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Splint - http://www.splint.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Uno - http://spinroot.com/uno/&amp;lt;br /&amp;gt;&lt;br /&gt;
BOON (Buffer Overrun detectiON) - http://www.cs.berkeley.edu/~daw/boon/ http://boon.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
Valgrind - http://www.valgrind.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Java static analysis, security frameworks, and web application security tools==&lt;br /&gt;
HDIV Struts - http://hdiv.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Orizon - http://sourceforge.net/projects/orizon/&amp;lt;br /&amp;gt;&lt;br /&gt;
FindBugs: Find bugs in Java programs - http://findbugs.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PMD - http://pmd.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
CUTE: A Concolic Unit Testing Engine for C and Java - http://osl.cs.uiuc.edu/~ksen/cute/&amp;lt;br /&amp;gt;&lt;br /&gt;
EMMA - http://emma.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JLint - http://jlint.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java PathFinder - http://javapathfinder.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fujaba: Move between UML and Java source code - http://wwwcs.uni-paderborn.de/cs/fujaba/&amp;lt;br /&amp;gt;&lt;br /&gt;
Checkstyle - http://checkstyle.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookie Revolver Security Framework - http://sourceforge.net/projects/cookie-revolver&amp;lt;br /&amp;gt;&lt;br /&gt;
tinapoc - http://sourceforge.net/projects/tinapoc&amp;lt;br /&amp;gt;&lt;br /&gt;
jarsigner - http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Solex - http://solex.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java Explorer - http://metal.hurlant.com/jexplore/&amp;lt;br /&amp;gt;&lt;br /&gt;
HTTPClient - http://www.innovation.ch/java/HTTPClient/&amp;lt;br /&amp;gt;&lt;br /&gt;
another HttpClient - http://jakarta.apache.org/commons/httpclient/&amp;lt;br /&amp;gt;&lt;br /&gt;
a list of code coverage and analysis tools for Java - http://mythinkpond.blogspot.com/2007/06/java-foss-freeopen-source-software.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Microsoft .NET static analysis and security framework tools, mostly for ASP.NET and ASP.NET AJAX, but also C# and VB.NET==&lt;br /&gt;
Orcas - http://msdn.microsoft.com/vstudio/express/future/downloads/default.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Development Helper - http://www.nikhilk.net/Project.WebDevHelper.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
FxCop - http://blogs.msdn.com/fxcop/ http://www.gotdotnet.com/team/fxcop/&amp;lt;br /&amp;gt;&lt;br /&gt;
Microsoft Application Verifier - http://www.microsoft.com/technet/prodtechnol/windows/appcompatibility/appverifier.mspx&amp;lt;br /&amp;gt;&lt;br /&gt;
Microsoft internal tools you can't have yet - http://www.microsoft.com/windows/cse/pa_projects.mspx http://research.microsoft.com/Pex/ http://www.owasp.org/images/5/5b/OWASP_IL_7_FuzzGuru.pdf&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Threat modeling==&lt;br /&gt;
Microsoft Threat Analysis and Modeling Tool v2.1 (TAM) - http://www.microsoft.com/downloads/details.aspx?FamilyID=59888078-9daf-4e96-b7d1-944703479451&amp;amp;displaylang=en&amp;lt;br /&amp;gt;&lt;br /&gt;
Amenaza: Attack Tree Modeling (SecurITree) - http://www.amenaza.com/software.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Octotrike - http://www.octotrike.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with general web application security==&lt;br /&gt;
Web Developer Toolbar - https://addons.mozilla.org/firefox/60/&amp;lt;br /&amp;gt;&lt;br /&gt;
Plain Old Webserver (POW) - https://addons.mozilla.org/firefox/3002/&amp;lt;br /&amp;gt;&lt;br /&gt;
XML Developer Toolbar - https://addons.mozilla.org/firefox/2897/&amp;lt;br /&amp;gt;&lt;br /&gt;
Public Fox - https://addons.mozilla.org/firefox/3911/&amp;lt;br /&amp;gt;&lt;br /&gt;
XForms Buddy - http://beaufour.dk/index.php?sec=misc&amp;amp;pagename=xforms&amp;lt;br /&amp;gt;&lt;br /&gt;
MR Tech Local Install - http://www.mrtech.com/extensions/local_install/&amp;lt;br /&amp;gt;&lt;br /&gt;
Nightly Tester Tools - http://users.blueprintit.co.uk/~dave/web/firefox/buildid/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
IE Tab - https://addons.mozilla.org/firefox/1419/&amp;lt;br /&amp;gt;&lt;br /&gt;
User-Agent Switcher - https://addons.mozilla.org/firefox/59/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSwitcher - https://addons.mozilla.org/firefox/2409/&amp;lt;br /&amp;gt;&lt;br /&gt;
HeaderMonitor - https://addons.mozilla.org/firefox/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
RefControl - https://addons.mozilla.org/firefox/953/&amp;lt;br /&amp;gt;&lt;br /&gt;
refspoof - https://addons.mozilla.org/firefox/667/&amp;lt;br /&amp;gt;&lt;br /&gt;
No-Referrer - https://addons.mozilla.org/firefox/1999/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocationBar^2 - https://addons.mozilla.org/firefox/4014/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderZilla - http://spiderzilla.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Slogger - https://addons.mozilla.org/en-US/firefox/addon/143&amp;lt;br /&amp;gt;&lt;br /&gt;
Fire Encrypter - https://addons.mozilla.org/firefox/3208/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with Javascript and Ajax web application security==&lt;br /&gt;
Selenium IDE - http://www.openqa.org/selenium-ide/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug - http://www.joehewitt.com/software/firebug/&amp;lt;br /&amp;gt;&lt;br /&gt;
Venkman - http://www.mozilla.org/projects/venkman/&amp;lt;br /&amp;gt;&lt;br /&gt;
Chickenfoot - http://groups.csail.mit.edu/uid/chickenfoot/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey - http://www.greasespot.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey compiler - http://www.letitblog.com/greasemonkey-compiler/&amp;lt;br /&amp;gt;&lt;br /&gt;
User script compiler - http://arantius.com/misc/greasemonkey/script-compiler&amp;lt;br /&amp;gt;&lt;br /&gt;
Extension Developer's Extension (Firefox Add-on) - http://ted.mielczarek.org/code/mozilla/extensiondev/&amp;lt;br /&amp;gt;&lt;br /&gt;
Smart Middle Click (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/3885/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Bookmarklets that aid in web application security==&lt;br /&gt;
RSnake's security bookmarklets - http://ha.ckers.org/bookmarklets.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BMlets - http://optools.awardspace.com/bmlet.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Huge list of bookmarklets - http://www.squarefree.com/bookmarklets/&amp;lt;br /&amp;gt;&lt;br /&gt;
Blummy: consists of small widgets, called blummlets, which make use of Javascript to provide&lt;br /&gt;
rich functionality - http://www.blummy.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Bookmarklets every blogger should have - http://www.micropersuasion.com/2005/10/bookmarklets_ev.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Flat Bookmark Editing (Firefox Add-on) - http://n01se.net/chouser/proj/mozhack/&amp;lt;br /&amp;gt;&lt;br /&gt;
OpenBook and Update Bookmark (Firefox Add-ons) - http://www.chuonthis.com/extensions/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SSL certificate checking / scanning==&lt;br /&gt;
[ZIP] THCSSLCheck - http://thc.org/root/tools/THCSSLCheck.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] Foundstone SSLDigger - http://www.foundstone.com/us/resources/termsofuse.asp?file=ssldigger.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
Cert Viewer Plus (Firefox Add-on) - https://addons.mozilla.org/firefox/1964/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Honeyclients, Web Application, and Web Proxy honeypots==&lt;br /&gt;
Honeyclient Project: an open-source honeyclient - http://www.honeyclient.org/trac/ &amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyC: the low-interaction honeyclient - http://honeyc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Capture: a high-interaction honeyclient - http://capture-hpc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google Hack Honeypot - http://ghh.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP.Hop - PHP Honeynet Project - http://www.rstack.org/phphop/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyBye - http://www.monkey.org/~provos/spybye/&amp;lt;br /&amp;gt;&lt;br /&gt;
Honeytokens - http://www.securityfocus.com/infocus/1713&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Blackhat SEO and maybe some whitehat SEO==&lt;br /&gt;
SearchStatus (Firefox Add-on) - http://www.quirk.biz/searchstatus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SEO for Firefox (Firefox Add-on) - http://tools.seobook.com/firefox/seo-for-firefox.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SEOQuake (Firefox Add-on) - http://www.seoquake.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Footprinting for web application security==&lt;br /&gt;
Evolution - http://www.paterva.com/evolution-e.html&amp;lt;br /&amp;gt;&lt;br /&gt;
GooSweep - http://www.mcgrewsecurity.com/projects/goosweep/&amp;lt;br /&amp;gt;&lt;br /&gt;
Aura: Google API Utility Tools - http://www.sensepost.com/research/aura/&amp;lt;br /&amp;gt;&lt;br /&gt;
Edge-Security tools - http://www.edge-security.com/soft.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Fierce Domain Scanner - http://ha.ckers.org/fierce/&amp;lt;br /&amp;gt;&lt;br /&gt;
Googlegath - http://www.nothink.org/perl/googlegath/&amp;lt;br /&amp;gt;&lt;br /&gt;
Advanced Dork (Firefox Add-on) - https://addons.mozilla.org/firefox/2144/&amp;lt;br /&amp;gt;&lt;br /&gt;
Passive Cache (Firefox Add-on) - https://addons.mozilla.org/firefox/977/&amp;lt;br /&amp;gt;&lt;br /&gt;
CacheOut! (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1453/&amp;lt;br /&amp;gt;&lt;br /&gt;
BugMeNot Extension (Firefox Add-on) - http://roachfiend.com/archives/2005/02/07/bugmenot/&amp;lt;br /&amp;gt;&lt;br /&gt;
TrashMail.net Extension (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1813/&amp;lt;br /&amp;gt;&lt;br /&gt;
DiggiDig (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2819/&amp;lt;br /&amp;gt;&lt;br /&gt;
Digger (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1467/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Database security assessment==&lt;br /&gt;
Scuba by Imperva Database Vulnerability Scanner - http://www.imperva.com/scuba/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Defenses==&lt;br /&gt;
DieHard - http://www.diehard-software.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocalRodeo (Firefox Add-on) - http://databasement.net/labs/localrodeo/&amp;lt;br /&amp;gt;&lt;br /&gt;
NoMoXSS - http://www.seclab.tuwien.ac.at/projects/jstaint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Request Rodeo - http://savannah.nongnu.org/projects/requestrodeo&amp;lt;br /&amp;gt;&lt;br /&gt;
FlashBlock (Firefox Add-on) - http://flashblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSafe (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2497&amp;lt;br /&amp;gt;&lt;br /&gt;
NoScript (Firefox Add-on) - http://www.noscript.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
FormFox (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1579/&amp;lt;br /&amp;gt;&lt;br /&gt;
Adblock (Firefox Add-on) - http://adblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpOnly in Firefox (Firefox Add-on) - http://blog.php-security.org/archives/40-httpOnly-Cookies-in-Firefox-2.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeCache (Firefox Add-on) - http://www.safecache.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeHistory (Firefox Add-on) - http://www.safehistory.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
PrefBar (Firefox Add-on) - http://prefbar.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
All-in-One Sidebar (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1027/&amp;lt;br /&amp;gt;&lt;br /&gt;
QArchive.org web file checker (Firefox Add-on) - https://addons.mozilla.org/firefox/4115/&amp;lt;br /&amp;gt;&lt;br /&gt;
Update Notified (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2098/&amp;lt;br /&amp;gt;&lt;br /&gt;
FireKeeper - http://firekeeper.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Privacy==&lt;br /&gt;
TrackMeNot (Firefox Add-on) - https://addons.mozilla.org/firefox/3173/&amp;lt;br /&amp;gt;&lt;br /&gt;
Privacy Bird - http://www.privacybird.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Application and protocol fuzzing (random instead of targeted)==&lt;br /&gt;
Sulley - http://fuzzing.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
taof: The Art of Fuzzing - http://sourceforge.net/projects/taof/&amp;lt;br /&amp;gt;&lt;br /&gt;
zzuf: multipurpose fuzzer - http://sam.zoy.org/zzuf/&amp;lt;br /&amp;gt;&lt;br /&gt;
autodafé: an act of software torture - http://autodafe.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
EFS and GPF: Evolutionary Fuzzing System - http://www.appliedsec.com/resources.html&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=19956</id>
		<title>Phoenix/Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=19956"/>
				<updated>2007-07-17T18:13:09Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;p&amp;gt;Please send comments or questions to the Phoenix-OWASP mailing-list.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==LiveCDs==&lt;br /&gt;
Monday, January 29, 2007  4:02 PM    828569600 AOC_Labrat-ALPHA-0010.iso - http://www.packetfocus.com/hackos/&amp;lt;br /&amp;gt;&lt;br /&gt;
DVL (Damn Vulnerable Linux) - http://www.damnvulnerablelinux.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Test sites / testing grounds==&lt;br /&gt;
SPI Dynamics (live) - http://zero.webappsecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cenzic (live) - http://crackme.cenzic.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watchfire (live) - http://demo.testfire.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Acunetix (live) - http://testphp.acunetix.com/ http://testasp.acunetix.com http://testaspnet.acunetix.com&amp;lt;br /&amp;gt;&lt;br /&gt;
WebMaven / Buggy Bank (includes live testsite) - http://www.mavensecurity.com/webmaven&amp;lt;br /&amp;gt;&lt;br /&gt;
Foundstone SASS tools - http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&amp;amp;subcontent=/resources/s3i_tools.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP WebGoat - http://www.owasp.org/index.php/OWASP_WebGoat_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP SiteGenerator - http://www.owasp.org/index.php/Owasp_SiteGenerator&amp;lt;br /&amp;gt;&lt;br /&gt;
Stanford SecuriBench - http://suif.stanford.edu/~livshits/securibench/&amp;lt;br /&amp;gt;&lt;br /&gt;
SecuriBench Micro - http://suif.stanford.edu/~livshits/work/securibench-micro/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP proxying / editing==&lt;br /&gt;
WebScarab - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp - http://www.portswigger.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros - http://www.parosproxy.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fiddler - http://www.fiddlertool.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Proxy Editor - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
Pantera - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Suru - http://www.sensepost.com/research/suru/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpedit (curses-based) - http://www.neutralbit.com/en/rd/httpedit/&amp;lt;br /&amp;gt;&lt;br /&gt;
Charles - http://www.xk72.com/charles/&amp;lt;br /&amp;gt;&lt;br /&gt;
Odysseus - http://www.bindshell.net/tools/odysseus&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp, Paros, and WebScarab for Mac OS X - http://www.corsaire.com/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web-application scanning tool from `Network Security Tools'/O'Reilly - http://examples.oreilly.com/networkst/&amp;lt;br /&amp;gt;&lt;br /&gt;
JS Commander - http://jscmd.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools==&lt;br /&gt;
Wfuzz - http://www.edge-security.com/wfuzz.php&amp;lt;br /&amp;gt;&lt;br /&gt;
ProxMon - http://www.isecpartners.com/proxmon.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Wapiti - http://wapiti.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Grabber - http://rgaucher.info/beta/grabber/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSScan - http://darkcode.ath.cx/scanners/XSSscan.py&amp;lt;br /&amp;gt;&lt;br /&gt;
CAL9000 - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
HTMangLe - http://www.fishnetsecurity.com/Tools/HTMangLe/publish.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
JBroFuzz - http://sourceforge.net/projects/jbrofuzz&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSFuzz - http://ha.ckers.org/blog/20060921/xssfuzz-released/&amp;lt;br /&amp;gt;&lt;br /&gt;
WhiteAcid's XSS Assistant - http://www.whiteacid.org/greasemonkey/&amp;lt;br /&amp;gt;&lt;br /&gt;
Overlong UTF - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] MielieTool (SensePost Research) - http://packetstormsecurity.org/UNIX/utilities/mielietools-v1.0.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
RegFuzzer: test your regular expression filter - http://rgaucher.info/b/index.php/post/2007/05/26/RegFuzzer%3A-Test-your-regular-expression-filter&amp;lt;br /&amp;gt;&lt;br /&gt;
screamingCobra - http://www.dachb0den.com/projects/screamingcobra.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SPIKE and SPIKE Proxy - http://immunitysec.com/resources-freesoftware.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
RFuzz - http://rfuzz.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
WebFuzz - http://www.codebreakers-journal.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=112&amp;amp;Itemid=99999999&amp;lt;br /&amp;gt;&lt;br /&gt;
TestMaker - http://www.pushtotest.com/Docs/downloads/features.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ASP Auditor - http://michaeldaw.org/projects/asp-auditor-v2/&amp;lt;br /&amp;gt;&lt;br /&gt;
WSTool - http://wstool.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Hack Control Center (WHCC) - http://ussysadmin.com/whcc/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Text Converter - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
HackBar (Firefox Add-on) - https://addons.mozilla.org/firefox/3899/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Force Tools (NF-Tools, Firefox Add-on) - http://www.net-force.nl/library/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
PostIntercepter (Greasemonkey script) - http://userscripts.org/scripts/show/743&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP general testing / fingerprinting==&lt;br /&gt;
Wbox: HTTP testing tool - http://hping.org/wbox/&amp;lt;br /&amp;gt;&lt;br /&gt;
ht://Check - http://htcheck.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mumsie - http://www.lurhq.com/tools/mumsie.html&amp;lt;br /&amp;gt;&lt;br /&gt;
WebInject - http://www.webinject.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Torture.pl Home Page - http://stein.cshl.org/~lstein/torture/&amp;lt;br /&amp;gt;&lt;br /&gt;
JoeDog's Seige - http://www.joedog.org/JoeDog/Siege/&amp;lt;br /&amp;gt;&lt;br /&gt;
OPEN-LABS: metoscan (http method testing) - http://www.open-labs.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-balancing detector - http://ge.mine.nu/lbd.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HMAP - http://ujeni.murkyroc.com/hmap/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Square: httprint - http://net-square.com/httprint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Wpoison: http stress testing - http://wpoison.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: MSNPawn - http://net-square.com/msnpawn/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
hcraft: HTTP Vuln Request Crafter - http://druid.caughq.org/projects/hcraft/&amp;lt;br /&amp;gt;&lt;br /&gt;
rfp.labs: LibWhisker - http://www.wiretrip.net/rfp/lw.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Nikto - http://www.cirt.net/code/nikto.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
twill - http://twill.idyll.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
DirBuster - http://www.sittinglittleduck.com/DirBuster/&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] DFF Scanner - http://security-net.biz/files/dff/DFF.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] The Elza project - http://packetstormsecurity.org/web/elza-1.4.7-beta.zip http://www.stoev.org/elza.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser-based HTTP tampering / editing / replaying==&lt;br /&gt;
TamperIE - http://www.bayden.com/Other/&amp;lt;br /&amp;gt;&lt;br /&gt;
isr-form - http://www.infobyte.com.ar/developments.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Modify Headers (Firefox Add-on) - http://modifyheaders.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Tamper Data (Firefox Add-on) - http://tamperdata.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
UrlParams (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1290/&amp;lt;br /&amp;gt;&lt;br /&gt;
TestGen4Web (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1385/&amp;lt;br /&amp;gt;&lt;br /&gt;
DOM Inspector / Inspect This (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1806/ https://addons.mozilla.org/en-US/firefox/addon/1913/&amp;lt;br /&amp;gt;&lt;br /&gt;
LiveHTTPHeaders / Header Monitor (Firefox Add-on) - http://livehttpheaders.mozdev.org/ https://addons.mozilla.org/en-US/firefox/addon/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cookie editing / poisoning==&lt;br /&gt;
[TGZ] stompy: session id tool - http://lcamtuf.coredump.cx/stompy.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
Add'N Edit Cookies (AnEC, Firefox Add-on) - http://addneditcookies.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieCuller (Firefox Add-on) - http://cookieculler.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookiePie (Firefox Add-on) - http://www.nektra.com/oss/firefox/extensions/cookiepie/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSpy - http://www.codeproject.com/shell/cookiespy.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookies Explorer - http://www.dutchduck.com/Features/Cookies.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Ajax and XHR scanning==&lt;br /&gt;
Sahi - http://sahi.co.in/&amp;lt;br /&amp;gt;&lt;br /&gt;
scRUBYt - http://scrubyt.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
jQuery - http://jquery.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
jquery-include - http://www.gnucitizen.org/projects/jquery-include&amp;lt;br /&amp;gt;&lt;br /&gt;
Sprajax - http://www.denimgroup.com/sprajax.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Watir - http://wtr.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watij - http://watij.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watin - http://watin.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
RBNarcissus - http://idontsmoke.co.uk/2005/rbnarcissus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderTest (Spider Fuzz plugin) - http://blog.caboo.se/articles/2007/2/21/the-fabulous-spider-fuzz-plugin&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Inline Debugger (jasildbg) - http://jasildbg.googlepages.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug Lite - http://www.getfirebug.com/lite.html&amp;lt;br /&amp;gt;&lt;br /&gt;
firewaitr - http://code.google.com/p/firewatir/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSS extensions and caching==&lt;br /&gt;
LiveLines (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/324/&amp;lt;br /&amp;gt;&lt;br /&gt;
rss-cache - http://www.dubfire.net/chris/projects/rss-cache/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SQL injection scanning==&lt;br /&gt;
0x90.org: home of Absinthe, Mezcal, etc - http://0x90.org/releases.php&amp;lt;br /&amp;gt;&lt;br /&gt;
SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlninja: a SQL Server injection and takover tool - http://sqlninja.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JustinClarke's SQL Brute - http://www.justinclarke.com/archives/2006/03/sqlbrute.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BobCat - http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlmap - http://sqlmap.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Scully: SQL Server DB Front-End and Brute-Forcer - http://www.sensepost.com/research/scully/&amp;lt;br /&amp;gt;&lt;br /&gt;
FG-Injector - http://www.flowgate.net/?lang=en&amp;amp;seccion=herramientas&amp;lt;br /&amp;gt;&lt;br /&gt;
PRIAMOS - http://www.priamos-project.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application security malware, backdoors, and evil code==&lt;br /&gt;
W3AF: Web Application Attack and Audit Framework - http://w3af.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Jikto - http://busin3ss.name/jikto-in-the-wild/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS Shell - http://ferruh.mavituna.com/article/?1338&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS-Proxy - http://xss-proxy.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AttackAPI - http://www.gnucitizen.org/projects/attackapi/&amp;lt;br /&amp;gt;&lt;br /&gt;
FFsniFF - http://azurit.elbiahosting.sk/ffsniff/&amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyBlog's web-based junkyard - http://honeyblog.org/junkyard/web-based/&amp;lt;br /&amp;gt;&lt;br /&gt;
BeEF - http://www.bindshell.net/tools/beef/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firefox Extension Scanner (FEX) - http://www.gnucitizen.org/projects/fex/&amp;lt;br /&amp;gt;&lt;br /&gt;
What is my IP address? - http://reglos.de/myaddress/&amp;lt;br /&amp;gt;&lt;br /&gt;
xRumer: blogspam automation tool - http://www.botmaster.net/movies/XFull.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyJax - http://www.merchantos.com/makebeta/tools/spyjax/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasecarnaval - http://www.gnucitizen.org/projects/greasecarnaval&amp;lt;br /&amp;gt;&lt;br /&gt;
Technika - http://www.gnucitizen.org/projects/technika/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-AttackAPI bookmarklet - http://www.gnucitizen.org/projects/load-attackapi-bookmarklet&amp;lt;br /&amp;gt;&lt;br /&gt;
MD's Projects: JS port scanner, pinger, backdoors, etc - http://michaeldaw.org/my-projects/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application services that aid in web application security assessment==&lt;br /&gt;
Netcraft - http://www.netcraft.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AboutURL - http://www.abouturl.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
The Scrutinizer - http://www.scrutinizethis.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
net.toolkit - http://clez.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSniff - http://www.serversniff.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Online Microsoft script decoder - http://www.greymagic.com/security/tools/decoder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Webmaster-Toolkit - http://www.webmaster-toolkit.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
myIPNeighbbors, et al - http://digg.com/security/MyIPNeighbors_Find_Out_Who_Else_is_Hosted_on_Your_Site_s_IP_Address&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP charset encoding - http://h4k.in/encoding&amp;lt;br /&amp;gt;&lt;br /&gt;
data: URL testcases - http://h4k.in/dataurl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser-based security fuzzing / checking==&lt;br /&gt;
Zalewski's MangleMe - http://lcamtuf.coredump.cx/mangleme/mangle.cgi&amp;lt;br /&amp;gt;&lt;br /&gt;
hdm's tools: Hamachi, CSSDIE, DOM-Hanoi, AxMan - http://metasploit.com/users/hdm/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
Peach Fuzzer Framework - http://peachfuzz.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
TagBruteForcer - http://research.eeye.com/html/tools/RT20060801-3.html&amp;lt;br /&amp;gt;&lt;br /&gt;
PROTOS Test-Suite: c05-http-reply - http://www.ee.oulu.fi/research/ouspg/protos/testing/c05/http-reply/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
COMRaider - http://labs.idefense.com&amp;lt;br /&amp;gt;&lt;br /&gt;
bcheck - http://bcheck.scanit.be/bcheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Stop-Phishing: Projects page - http://www.indiana.edu/~phishing/?projects&amp;lt;br /&amp;gt;&lt;br /&gt;
LinkScanner - http://linkscanner.explabs.com/linkscanner/default.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
BrowserCheck - http://www.heise-security.co.uk/services/browsercheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cross-browser Exploit Tests - http://www.jungsonnstudios.com/cool.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Stealing information using DNS pinning demo - http://www.jumperz.net/index.php?i=2&amp;amp;a=1&amp;amp;b=7&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Website Login Checker - http://ha.ckers.org/weird/javascript-website-login-checker.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Mozilla Activex - http://www.iol.ie/~locka/mozilla/mozilla.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
Jungsonn's Black Dragon Project - http://blackdragon.jungsonnstudios.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mr. T (Master Recon Tool, includes Read Firefox Settings PoC) - http://ha.ckers.org/mr-t/&amp;lt;br /&amp;gt;&lt;br /&gt;
Vulnerable Adobe Plugin Detection For UXSS PoC - http://www.0x000000.com/?i=324&amp;lt;br /&amp;gt;&lt;br /&gt;
About Flash: is your flash up-to-date? - http://www.macromedia.com/software/flash/about/&amp;lt;br /&amp;gt;&lt;br /&gt;
Test your installation of Java software - http://java.com/en/download/installed.jsp?detect=jre&amp;amp;try=1&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==PHP static analysis and file inclusion scanning==&lt;br /&gt;
PHP-SAT.org: Static analysis for PHP - http://www.program-transformation.org/PHP/&amp;lt;br /&amp;gt;&lt;br /&gt;
Unl0ck Research Team: tool for searching in google for include bugs - http://unl0ck.net/tools.php&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
FIS: File Inclusion Scanner - http://www.segfault.gr/index.php?cat_id=3&amp;amp;cont_id=25&amp;lt;br/&amp;gt;&lt;br /&gt;
PHPSecAudit - http://developer.spikesource.com/projects/phpsecaudit&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web Application Firewall (WAF) and Intrusion Detection (APIDS) rules and resources==&lt;br /&gt;
APIDS on Wikipedia - http://en.wikipedia.org/wiki/APIDS&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP Intrusion Detection System (PHP-IDS) - http://php-ids.org/ http://code.google.com/p/phpids/&amp;lt;br /&amp;gt;&lt;br /&gt;
dotnetids - http://code.google.com/p/dotnetids/&amp;lt;br /&amp;gt;&lt;br /&gt;
Secure Science InterScout - http://www.securescience.com/home/newsandevents/news/interscout1.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Remo: whitelist rule editor for mod_security - http://remo.netnea.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
GotRoot: ModSecuirty rules - http://www.gotroot.com/tiki-index.php?page=mod_security+rules&amp;lt;br /&amp;gt;&lt;br /&gt;
The Web Security Gateway (WSGW) - http://wsgw.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
mod_security rules generator - http://noeljackson.com/tools/modsecurity/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mod_Anti_Tamper - http://www.wisec.it/projects.php?id=3&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] Automatic Rules Generation for Mod_Security - http://www.wisec.it/rdr.php?fn=/Projects/Rule-o-matic.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
AQTRONIX WebKnight - http://www.aqtronix.com/?PageID=99&amp;lt;br /&amp;gt;&lt;br /&gt;
Akismet: blog spam defense - http://akismet.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samoa: Formal tools for securing web services - http://research.microsoft.com/projects/samoa/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web services enumeration / scanning / fuzzing==&lt;br /&gt;
WebServiceStudio2.0 - http://www.gotdotnet.com/Community/UserSamples/Details.aspx?SampleGuid=65a1d4ea-0f7a-41bd-8494-e916ebc4159c&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: wsChess - http://net-square.com/wschess/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
SIFT: web method search tool - http://www.sift.com.au/73/171/sift-web-method-search-tool.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
iSecPartners: WSMap, WSBang, etc - http://www.isecpartners.com/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application non-specific static source-code analysis==&lt;br /&gt;
Pixy: a static analysis tool for detecting XSS vulnerabilities - http://www.seclab.tuwien.ac.at/projects/pixy/&amp;lt;br /&amp;gt;&lt;br /&gt;
Brixoft.Net: Source Edit - http://www.brixoft.net/prodinfo.asp?id=1&amp;lt;br /&amp;gt;&lt;br /&gt;
Security compass web application auditing tools (SWAAT) - http://www.owasp.org/index.php/Category:OWASP_SWAAT_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
An even more complete list here - http://www.cs.cmu.edu/~aldrich/courses/654/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
A nice list that claims some demos available - http://www.cs.cmu.edu/~aldrich/courses/413/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
A smaller, but also good list - http://spinroot.com/static/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Static analysis for C/C++ (CGI, ISAPI, etc) in web applications==&lt;br /&gt;
RATS - http://www.securesoftware.com/resources/download_rats.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ITS4 - http://www.cigital.com/its4/&amp;lt;br /&amp;gt;&lt;br /&gt;
FlawFinder - http://www.dwheeler.com/flawfinder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Splint - http://www.splint.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Uno - http://spinroot.com/uno/&amp;lt;br /&amp;gt;&lt;br /&gt;
BOON (Buffer Overrun detectiON) - http://www.cs.berkeley.edu/~daw/boon/ http://boon.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
Valgrind - http://www.valgrind.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Java static analysis, security frameworks, and web application security tools==&lt;br /&gt;
HDIV Struts - http://hdiv.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Orizon - http://sourceforge.net/projects/orizon/&amp;lt;br /&amp;gt;&lt;br /&gt;
FindBugs: Find bugs in Java programs - http://findbugs.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PMD - http://pmd.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
CUTE: A Concolic Unit Testing Engine for C and Java - http://osl.cs.uiuc.edu/~ksen/cute/&amp;lt;br /&amp;gt;&lt;br /&gt;
EMMA - http://emma.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JLint - http://jlint.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java PathFinder - http://javapathfinder.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fujaba: Move between UML and Java source code - http://wwwcs.uni-paderborn.de/cs/fujaba/&amp;lt;br /&amp;gt;&lt;br /&gt;
Checkstyle - http://checkstyle.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookie Revolver Security Framework - http://sourceforge.net/projects/cookie-revolver&amp;lt;br /&amp;gt;&lt;br /&gt;
tinapoc - http://sourceforge.net/projects/tinapoc&amp;lt;br /&amp;gt;&lt;br /&gt;
jarsigner - http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Solex - http://solex.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java Explorer - http://metal.hurlant.com/jexplore/&amp;lt;br /&amp;gt;&lt;br /&gt;
HTTPClient - http://www.innovation.ch/java/HTTPClient/&amp;lt;br /&amp;gt;&lt;br /&gt;
another HttpClient - http://jakarta.apache.org/commons/httpclient/&amp;lt;br /&amp;gt;&lt;br /&gt;
a list of code coverage and analysis tools for Java - http://mythinkpond.blogspot.com/2007/06/java-foss-freeopen-source-software.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Microsoft .NET static analysis and security framework tools, mostly for ASP.NET and ASP.NET AJAX, but also C# and VB.NET==&lt;br /&gt;
Orcas - http://msdn.microsoft.com/vstudio/express/future/downloads/default.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Development Helper - http://www.nikhilk.net/Project.WebDevHelper.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
FxCop - http://blogs.msdn.com/fxcop/ http://www.gotdotnet.com/team/fxcop/&amp;lt;br /&amp;gt;&lt;br /&gt;
Microsoft Application Verifier - http://www.microsoft.com/technet/prodtechnol/windows/appcompatibility/appverifier.mspx&amp;lt;br /&amp;gt;&lt;br /&gt;
Microsoft internal tools you can't have yet - http://www.microsoft.com/windows/cse/pa_projects.mspx http://research.microsoft.com/Pex/ http://www.owasp.org/images/5/5b/OWASP_IL_7_FuzzGuru.pdf&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Threat modeling==&lt;br /&gt;
Microsoft Threat Analysis and Modeling Tool v2.1 (TAM) - http://www.microsoft.com/downloads/details.aspx?FamilyID=59888078-9daf-4e96-b7d1-944703479451&amp;amp;displaylang=en&amp;lt;br /&amp;gt;&lt;br /&gt;
Amenaza: Attack Tree Modeling (SecurITree) - http://www.amenaza.com/software.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Octotrike - http://www.octotrike.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with general web application security==&lt;br /&gt;
Web Developer Toolbar - https://addons.mozilla.org/firefox/60/&amp;lt;br /&amp;gt;&lt;br /&gt;
Plain Old Webserver (POW) - https://addons.mozilla.org/firefox/3002/&amp;lt;br /&amp;gt;&lt;br /&gt;
XML Developer Toolbar - https://addons.mozilla.org/firefox/2897/&amp;lt;br /&amp;gt;&lt;br /&gt;
Public Fox - https://addons.mozilla.org/firefox/3911/&amp;lt;br /&amp;gt;&lt;br /&gt;
XForms Buddy - http://beaufour.dk/index.php?sec=misc&amp;amp;pagename=xforms&amp;lt;br /&amp;gt;&lt;br /&gt;
MR Tech Local Install - http://www.mrtech.com/extensions/local_install/&amp;lt;br /&amp;gt;&lt;br /&gt;
Nightly Tester Tools - http://users.blueprintit.co.uk/~dave/web/firefox/buildid/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
IE Tab - https://addons.mozilla.org/firefox/1419/&amp;lt;br /&amp;gt;&lt;br /&gt;
User-Agent Switcher - https://addons.mozilla.org/firefox/59/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSwitcher - https://addons.mozilla.org/firefox/2409/&amp;lt;br /&amp;gt;&lt;br /&gt;
HeaderMonitor - https://addons.mozilla.org/firefox/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
RefControl - https://addons.mozilla.org/firefox/953/&amp;lt;br /&amp;gt;&lt;br /&gt;
refspoof - https://addons.mozilla.org/firefox/667/&amp;lt;br /&amp;gt;&lt;br /&gt;
No-Referrer - https://addons.mozilla.org/firefox/1999/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocationBar^2 - https://addons.mozilla.org/firefox/4014/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderZilla - http://spiderzilla.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Slogger - https://addons.mozilla.org/en-US/firefox/addon/143&amp;lt;br /&amp;gt;&lt;br /&gt;
Fire Encrypter - https://addons.mozilla.org/firefox/3208/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with Javascript and Ajax web application security==&lt;br /&gt;
Selenium IDE - http://www.openqa.org/selenium-ide/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug - http://www.joehewitt.com/software/firebug/&amp;lt;br /&amp;gt;&lt;br /&gt;
Venkman - http://www.mozilla.org/projects/venkman/&amp;lt;br /&amp;gt;&lt;br /&gt;
Chickenfoot - http://groups.csail.mit.edu/uid/chickenfoot/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey - http://www.greasespot.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey compiler - http://www.letitblog.com/greasemonkey-compiler/&amp;lt;br /&amp;gt;&lt;br /&gt;
User script compiler - http://arantius.com/misc/greasemonkey/script-compiler&amp;lt;br /&amp;gt;&lt;br /&gt;
Extension Developer's Extension (Firefox Add-on) - http://ted.mielczarek.org/code/mozilla/extensiondev/&amp;lt;br /&amp;gt;&lt;br /&gt;
Smart Middle Click (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/3885/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Bookmarklets that aid in web application security==&lt;br /&gt;
RSnake's security bookmarklets - http://ha.ckers.org/bookmarklets.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BMlets - http://optools.awardspace.com/bmlet.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Huge list of bookmarklets - http://www.squarefree.com/bookmarklets/&amp;lt;br /&amp;gt;&lt;br /&gt;
Blummy: consists of small widgets, called blummlets, which make use of Javascript to provide&lt;br /&gt;
rich functionality - http://www.blummy.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Bookmarklets every blogger should have - http://www.micropersuasion.com/2005/10/bookmarklets_ev.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Flat Bookmark Editing (Firefox Add-on) - http://n01se.net/chouser/proj/mozhack/&amp;lt;br /&amp;gt;&lt;br /&gt;
OpenBook and Update Bookmark (Firefox Add-ons) - http://www.chuonthis.com/extensions/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SSL certificate checking / scanning==&lt;br /&gt;
[ZIP] THCSSLCheck - http://thc.org/root/tools/THCSSLCheck.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] Foundstone SSLDigger - http://www.foundstone.com/us/resources/termsofuse.asp?file=ssldigger.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
Cert Viewer Plus (Firefox Add-on) - https://addons.mozilla.org/firefox/1964/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Honeyclients, Web Application, and Web Proxy honeypots==&lt;br /&gt;
Honeyclient Project: an open-source honeyclient - http://www.honeyclient.org/trac/ &amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyC: the low-interaction honeyclient - http://honeyc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Capture: a high-interaction honeyclient - http://capture-hpc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google Hack Honeypot - http://ghh.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP.Hop - PHP Honeynet Project - http://www.rstack.org/phphop/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyBye - http://www.monkey.org/~provos/spybye/&amp;lt;br /&amp;gt;&lt;br /&gt;
Honeytokens - http://www.securityfocus.com/infocus/1713&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Blackhat SEO and maybe some whitehat SEO==&lt;br /&gt;
SearchStatus (Firefox Add-on) - http://www.quirk.biz/searchstatus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SEO for Firefox (Firefox Add-on) - http://tools.seobook.com/firefox/seo-for-firefox.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SEOQuake (Firefox Add-on) - http://www.seoquake.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Footprinting for web application security==&lt;br /&gt;
Evolution - http://www.paterva.com/evolution-e.html&amp;lt;br /&amp;gt;&lt;br /&gt;
GooSweep - http://www.mcgrewsecurity.com/projects/goosweep/&amp;lt;br /&amp;gt;&lt;br /&gt;
Aura: Google API Utility Tools - http://www.sensepost.com/research/aura/&amp;lt;br /&amp;gt;&lt;br /&gt;
Edge-Security tools - http://www.edge-security.com/soft.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Fierce Domain Scanner - http://ha.ckers.org/fierce/&amp;lt;br /&amp;gt;&lt;br /&gt;
Googlegath - http://www.nothink.org/perl/googlegath/&amp;lt;br /&amp;gt;&lt;br /&gt;
Advanced Dork (Firefox Add-on) - https://addons.mozilla.org/firefox/2144/&amp;lt;br /&amp;gt;&lt;br /&gt;
Passive Cache (Firefox Add-on) - https://addons.mozilla.org/firefox/977/&amp;lt;br /&amp;gt;&lt;br /&gt;
CacheOut! (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1453/&amp;lt;br /&amp;gt;&lt;br /&gt;
BugMeNot Extension (Firefox Add-on) - http://roachfiend.com/archives/2005/02/07/bugmenot/&amp;lt;br /&amp;gt;&lt;br /&gt;
TrashMail.net Extension (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1813/&amp;lt;br /&amp;gt;&lt;br /&gt;
DiggiDig (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2819/&amp;lt;br /&amp;gt;&lt;br /&gt;
Digger (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1467/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Database security assessment==&lt;br /&gt;
Scuba by Imperva Database Vulnerability Scanner - http://www.imperva.com/scuba/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Defenses==&lt;br /&gt;
DieHard - http://www.diehard-software.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocalRodeo (Firefox Add-on) - http://databasement.net/labs/localrodeo/&amp;lt;br /&amp;gt;&lt;br /&gt;
NoMoXSS - http://www.seclab.tuwien.ac.at/projects/jstaint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Request Rodeo - http://savannah.nongnu.org/projects/requestrodeo&amp;lt;br /&amp;gt;&lt;br /&gt;
FlashBlock (Firefox Add-on) - http://flashblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSafe (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2497&amp;lt;br /&amp;gt;&lt;br /&gt;
NoScript (Firefox Add-on) - http://www.noscript.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
FormFox (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1579/&amp;lt;br /&amp;gt;&lt;br /&gt;
Adblock (Firefox Add-on) - http://adblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpOnly in Firefox (Firefox Add-on) - http://blog.php-security.org/archives/40-httpOnly-Cookies-in-Firefox-2.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeCache (Firefox Add-on) - http://www.safecache.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeHistory (Firefox Add-on) - http://www.safehistory.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
PrefBar (Firefox Add-on) - http://prefbar.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
All-in-One Sidebar (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1027/&amp;lt;br /&amp;gt;&lt;br /&gt;
QArchive.org web file checker (Firefox Add-on) - https://addons.mozilla.org/firefox/4115/&amp;lt;br /&amp;gt;&lt;br /&gt;
Update Notified (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2098/&amp;lt;br /&amp;gt;&lt;br /&gt;
FireKeeper - http://firekeeper.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Privacy==&lt;br /&gt;
TrackMeNot (Firefox Add-on) - https://addons.mozilla.org/firefox/3173/&amp;lt;br /&amp;gt;&lt;br /&gt;
Privacy Bird - http://www.privacybird.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Application and protocol fuzzing (random instead of targeted)==&lt;br /&gt;
Sulley - http://fuzzing.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
taof: The Art of Fuzzing - http://sourceforge.net/projects/taof/&amp;lt;br /&amp;gt;&lt;br /&gt;
zzuf: multipurpose fuzzer - http://sam.zoy.org/zzuf/&amp;lt;br /&amp;gt;&lt;br /&gt;
autodafé: an act of software torture - http://autodafe.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
EFS and GPF: Evolutionary Fuzzing System - http://www.appliedsec.com/resources.html&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=19955</id>
		<title>Phoenix/Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=19955"/>
				<updated>2007-07-17T18:07:04Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: /* HTTP proxying / editing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;p&amp;gt;Please send comments or questions to the Phoenix-OWASP mailing-list.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==LiveCDs==&lt;br /&gt;
Monday, January 29, 2007  4:02 PM    828569600 AOC_Labrat-ALPHA-0010.iso - http://www.packetfocus.com/hackos/&amp;lt;br/ &amp;gt;&lt;br /&gt;
DVL (Damn Vulnerable Linux) - http://www.damnvulnerablelinux.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Test sites / testing grounds==&lt;br /&gt;
SPI Dynamics (live) - http://zero.webappsecurity.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Cenzic (live) - http://crackme.cenzic.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Watchfire (live) - http://demo.testfire.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Acunetix (live) - http://testphp.acunetix.com/ http://testasp.acunetix.com http://testaspnet.acunetix.com&amp;lt;br/ &amp;gt;&lt;br /&gt;
WebMaven / Buggy Bank (includes live testsite) - http://www.mavensecurity.com/webmaven&amp;lt;br/ &amp;gt;&lt;br /&gt;
Foundstone SASS tools - http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&amp;amp;subcontent=/resources/s3i_tools.htm&amp;lt;br/ &amp;gt;&lt;br /&gt;
OWASP WebGoat - http://www.owasp.org/index.php/OWASP_WebGoat_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
OWASP SiteGenerator - http://www.owasp.org/index.php/Owasp_SiteGenerator&amp;lt;br/ &amp;gt;&lt;br /&gt;
Stanford SecuriBench - http://suif.stanford.edu/~livshits/securibench/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SecuriBench Micro - http://suif.stanford.edu/~livshits/work/securibench-micro/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP proxying / editing==&lt;br /&gt;
WebScarab - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
Burp - http://www.portswigger.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Paros - http://www.parosproxy.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Fiddler - http://www.fiddlertool.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Web Proxy Editor - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Pantera - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
Suru - http://www.sensepost.com/research/suru/&amp;lt;br/ &amp;gt;&lt;br /&gt;
httpedit (curses-based) - http://www.neutralbit.com/en/rd/httpedit/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Charles - http://www.xk72.com/charles/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Odysseus - http://www.bindshell.net/tools/odysseus&amp;lt;br/ &amp;gt;&lt;br /&gt;
Burp, Paros, and WebScarab for Mac OS X - http://www.corsaire.com/downloads/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Web-application scanning tool from `Network Security Tools'/O'Reilly - http://examples.oreilly.com/networkst/&amp;lt;br/ &amp;gt;&lt;br /&gt;
JS Commander - http://jscmd.rubyforge.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools==&lt;br /&gt;
Wfuzz - http://www.edge-security.com/wfuzz.php&amp;lt;br/ &amp;gt;&lt;br /&gt;
ProxMon - http://www.isecpartners.com/proxmon.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Wapiti - http://wapiti.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Grabber - http://rgaucher.info/beta/grabber/&amp;lt;br/ &amp;gt;&lt;br /&gt;
XSSScan - http://darkcode.ath.cx/scanners/XSSscan.py&amp;lt;br/ &amp;gt;&lt;br /&gt;
CAL9000 - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
HTMangLe - http://www.fishnetsecurity.com/Tools/HTMangLe/publish.htm&amp;lt;br/ &amp;gt;&lt;br /&gt;
JBroFuzz - http://sourceforge.net/projects/jbrofuzz&amp;lt;br/ &amp;gt;&lt;br /&gt;
XSSFuzz - http://ha.ckers.org/blog/20060921/xssfuzz-released/&amp;lt;br/ &amp;gt;&lt;br /&gt;
WhiteAcid's XSS Assistant - http://www.whiteacid.org/greasemonkey/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Overlong UTF - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br/ &amp;gt;&lt;br /&gt;
[TGZ] MielieTool (SensePost Research) - http://packetstormsecurity.org/UNIX/utilities/mielietools-v1.0.tgz&amp;lt;br/ &amp;gt;&lt;br /&gt;
RegFuzzer: test your regular expression filter - http://rgaucher.info/b/index.php/post/2007/05/26/RegFuzzer%3A-Test-your-regular-expression-filter&amp;lt;br/ &amp;gt;&lt;br /&gt;
screamingCobra - http://www.dachb0den.com/projects/screamingcobra.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
SPIKE and SPIKE Proxy - http://immunitysec.com/resources-freesoftware.shtml&amp;lt;br/ &amp;gt;&lt;br /&gt;
RFuzz - http://rfuzz.rubyforge.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
WebFuzz - http://www.codebreakers-journal.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=112&amp;amp;Itemid=99999999&amp;lt;br/ &amp;gt;&lt;br /&gt;
TestMaker - http://www.pushtotest.com/Docs/downloads/features.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
ASP Auditor - http://michaeldaw.org/projects/asp-auditor-v2/&amp;lt;br/ &amp;gt;&lt;br /&gt;
WSTool - http://wstool.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Web Hack Control Center (WHCC) - http://ussysadmin.com/whcc/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Web Text Converter - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br/ &amp;gt;&lt;br /&gt;
HackBar (Firefox Add-on) - https://addons.mozilla.org/firefox/3899/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Net-Force Tools (NF-Tools, Firefox Add-on) - http://www.net-force.nl/library/downloads/&amp;lt;br/ &amp;gt;&lt;br /&gt;
PostIntercepter (Greasemonkey script) - http://userscripts.org/scripts/show/743&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP general testing / fingerprinting==&lt;br /&gt;
Wbox: HTTP testing tool - http://hping.org/wbox/&amp;lt;br/ &amp;gt;&lt;br /&gt;
ht://Check - http://htcheck.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Mumsie - http://www.lurhq.com/tools/mumsie.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
WebInject - http://www.webinject.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Torture.pl Home Page - http://stein.cshl.org/~lstein/torture/&amp;lt;br/ &amp;gt;&lt;br /&gt;
JoeDog's Seige - http://www.joedog.org/JoeDog/Siege/&amp;lt;br/ &amp;gt;&lt;br /&gt;
OPEN-LABS: metoscan (http method testing) - http://www.open-labs.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Load-balancing detector - http://ge.mine.nu/lbd.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
HMAP - http://ujeni.murkyroc.com/hmap/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Net-Square: httprint - http://net-square.com/httprint/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Wpoison: http stress testing - http://wpoison.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Net-square: MSNPawn - http://net-square.com/msnpawn/index.shtml&amp;lt;br/ &amp;gt;&lt;br /&gt;
hcraft: HTTP Vuln Request Crafter - http://druid.caughq.org/projects/hcraft/&amp;lt;br/ &amp;gt;&lt;br /&gt;
rfp.labs: LibWhisker - http://www.wiretrip.net/rfp/lw.asp&amp;lt;br/ &amp;gt;&lt;br /&gt;
Nikto - http://www.cirt.net/code/nikto.shtml&amp;lt;br/ &amp;gt;&lt;br /&gt;
twill - http://twill.idyll.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
DirBuster - http://www.sittinglittleduck.com/DirBuster/&amp;lt;br/ &amp;gt;&lt;br /&gt;
[ZIP] DFF Scanner - http://security-net.biz/files/dff/DFF.zip&amp;lt;br/ &amp;gt;&lt;br /&gt;
[ZIP] The Elza project - http://packetstormsecurity.org/web/elza-1.4.7-beta.zip http://www.stoev.org/elza.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser-based HTTP tampering / editing / replaying==&lt;br /&gt;
TamperIE - http://www.bayden.com/Other/&amp;lt;br/ &amp;gt;&lt;br /&gt;
isr-form - http://www.infobyte.com.ar/developments.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Modify Headers (Firefox Add-on) - http://modifyheaders.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Tamper Data (Firefox Add-on) - http://tamperdata.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
UrlParams (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1290/&amp;lt;br/ &amp;gt;&lt;br /&gt;
TestGen4Web (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1385/&amp;lt;br/ &amp;gt;&lt;br /&gt;
DOM Inspector / Inspect This (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1806/ https://addons.mozilla.org/en-US/firefox/addon/1913/&amp;lt;br/ &amp;gt;&lt;br /&gt;
LiveHTTPHeaders / Header Monitor (Firefox Add-on) - http://livehttpheaders.mozdev.org/ https://addons.mozilla.org/en-US/firefox/addon/575/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cookie editing / poisoning==&lt;br /&gt;
[TGZ] stompy: session id tool - http://lcamtuf.coredump.cx/stompy.tgz&amp;lt;br/ &amp;gt;&lt;br /&gt;
Add'N Edit Cookies (AnEC, Firefox Add-on) - http://addneditcookies.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CookieCuller (Firefox Add-on) - http://cookieculler.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CookiePie (Firefox Add-on) - http://www.nektra.com/oss/firefox/extensions/cookiepie/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CookieSpy - http://www.codeproject.com/shell/cookiespy.asp&amp;lt;br/ &amp;gt;&lt;br /&gt;
Cookies Explorer - http://www.dutchduck.com/Features/Cookies.aspx&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Ajax and XHR scanning==&lt;br /&gt;
Sahi - http://sahi.co.in/&amp;lt;br/ &amp;gt;&lt;br /&gt;
scRUBYt - http://scrubyt.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
jQuery - http://jquery.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
jquery-include - http://www.gnucitizen.org/projects/jquery-include&amp;lt;br/ &amp;gt;&lt;br /&gt;
Sprajax - http://www.denimgroup.com/sprajax.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Watir - http://wtr.rubyforge.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Watij - http://watij.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Watin - http://watin.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
RBNarcissus - http://idontsmoke.co.uk/2005/rbnarcissus/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SpiderTest (Spider Fuzz plugin) - http://blog.caboo.se/articles/2007/2/21/the-fabulous-spider-fuzz-plugin&amp;lt;br/ &amp;gt;&lt;br /&gt;
Javascript Inline Debugger (jasildbg) - http://jasildbg.googlepages.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Firebug Lite - http://www.getfirebug.com/lite.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
firewaitr - http://code.google.com/p/firewatir/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSS extensions and caching==&lt;br /&gt;
LiveLines (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/324/&amp;lt;br/ &amp;gt;&lt;br /&gt;
rss-cache - http://www.dubfire.net/chris/projects/rss-cache/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SQL injection scanning==&lt;br /&gt;
0x90.org: home of Absinthe, Mezcal, etc - http://0x90.org/releases.php&amp;lt;br/ &amp;gt;&lt;br /&gt;
SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
sqlninja: a SQL Server injection and takover tool - http://sqlninja.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
JustinClarke's SQL Brute - http://www.justinclarke.com/archives/2006/03/sqlbrute.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
BobCat - http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
sqlmap - http://sqlmap.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Scully: SQL Server DB Front-End and Brute-Forcer - http://www.sensepost.com/research/scully/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FG-Injector - http://www.flowgate.net/?lang=en&amp;amp;seccion=herramientas&amp;lt;br/ &amp;gt;&lt;br /&gt;
PRIAMOS - http://www.priamos-project.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application security malware, backdoors, and evil code==&lt;br /&gt;
W3AF: Web Application Attack and Audit Framework - http://w3af.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Jikto - http://busin3ss.name/jikto-in-the-wild/&amp;lt;br/ &amp;gt;&lt;br /&gt;
XSS Shell - http://ferruh.mavituna.com/article/?1338&amp;lt;br/ &amp;gt;&lt;br /&gt;
XSS-Proxy - http://xss-proxy.sourceforge.net&amp;lt;br/ &amp;gt;&lt;br /&gt;
AttackAPI - http://www.gnucitizen.org/projects/attackapi/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FFsniFF - http://azurit.elbiahosting.sk/ffsniff/&amp;lt;br/ &amp;gt;&lt;br /&gt;
HoneyBlog's web-based junkyard - http://honeyblog.org/junkyard/web-based/&amp;lt;br/ &amp;gt;&lt;br /&gt;
BeEF - http://www.bindshell.net/tools/beef/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Firefox Extension Scanner (FEX) - http://www.gnucitizen.org/projects/fex/&amp;lt;br/ &amp;gt;&lt;br /&gt;
What is my IP address? - http://reglos.de/myaddress/&amp;lt;br/ &amp;gt;&lt;br /&gt;
xRumer: blogspam automation tool - http://www.botmaster.net/movies/XFull.htm&amp;lt;br/ &amp;gt;&lt;br /&gt;
SpyJax - http://www.merchantos.com/makebeta/tools/spyjax/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Greasecarnaval - http://www.gnucitizen.org/projects/greasecarnaval&amp;lt;br/ &amp;gt;&lt;br /&gt;
Technika - http://www.gnucitizen.org/projects/technika/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Load-AttackAPI bookmarklet - http://www.gnucitizen.org/projects/load-attackapi-bookmarklet&amp;lt;br/ &amp;gt;&lt;br /&gt;
MD's Projects: JS port scanner, pinger, backdoors, etc - http://michaeldaw.org/my-projects/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application services that aid in web application security assessment==&lt;br /&gt;
Netcraft - http://www.netcraft.net&amp;lt;br/ &amp;gt;&lt;br /&gt;
AboutURL - http://www.abouturl.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
The Scrutinizer - http://www.scrutinizethis.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
net.toolkit - http://clez.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
ServerSniff - http://www.serversniff.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Online Microsoft script decoder - http://www.greymagic.com/security/tools/decoder/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Webmaster-Toolkit - http://www.webmaster-toolkit.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
myIPNeighbbors, et al - http://digg.com/security/MyIPNeighbors_Find_Out_Who_Else_is_Hosted_on_Your_Site_s_IP_Address&amp;lt;br/ &amp;gt;&lt;br /&gt;
PHP charset encoding - http://h4k.in/encoding&amp;lt;br/ &amp;gt;&lt;br /&gt;
data: URL testcases - http://h4k.in/dataurl&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser-based security fuzzing / checking==&lt;br /&gt;
Zalewski's MangleMe - http://lcamtuf.coredump.cx/mangleme/mangle.cgi&amp;lt;br/ &amp;gt;&lt;br /&gt;
hdm's tools: Hamachi, CSSDIE, DOM-Hanoi, AxMan - http://metasploit.com/users/hdm/tools/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Peach Fuzzer Framework - http://peachfuzz.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
TagBruteForcer - http://research.eeye.com/html/tools/RT20060801-3.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
PROTOS Test-Suite: c05-http-reply - http://www.ee.oulu.fi/research/ouspg/protos/testing/c05/http-reply/index.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
COMRaider - http://labs.idefense.com&amp;lt;br/ &amp;gt;&lt;br /&gt;
bcheck - http://bcheck.scanit.be/bcheck/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Stop-Phishing: Projects page - http://www.indiana.edu/~phishing/?projects&amp;lt;br/ &amp;gt;&lt;br /&gt;
LinkScanner - http://linkscanner.explabs.com/linkscanner/default.asp&amp;lt;br/ &amp;gt;&lt;br /&gt;
BrowserCheck - http://www.heise-security.co.uk/services/browsercheck/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Cross-browser Exploit Tests - http://www.jungsonnstudios.com/cool.php&amp;lt;br/ &amp;gt;&lt;br /&gt;
Stealing information using DNS pinning demo - http://www.jumperz.net/index.php?i=2&amp;amp;a=1&amp;amp;b=7&amp;lt;br/ &amp;gt;&lt;br /&gt;
Javascript Website Login Checker - http://ha.ckers.org/weird/javascript-website-login-checker.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Mozilla Activex - http://www.iol.ie/~locka/mozilla/mozilla.htm&amp;lt;br/ &amp;gt;&lt;br /&gt;
Jungsonn's Black Dragon Project - http://blackdragon.jungsonnstudios.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Mr. T (Master Recon Tool, includes Read Firefox Settings PoC) - http://ha.ckers.org/mr-t/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Vulnerable Adobe Plugin Detection For UXSS PoC - http://www.0x000000.com/?i=324&amp;lt;br/ &amp;gt;&lt;br /&gt;
About Flash: is your flash up-to-date? - http://www.macromedia.com/software/flash/about/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Test your installation of Java software - http://java.com/en/download/installed.jsp?detect=jre&amp;amp;try=1&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==PHP static analysis and file inclusion scanning==&lt;br /&gt;
PHP-SAT.org: Static analysis for PHP - http://www.program-transformation.org/PHP/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Unl0ck Research Team: tool for searching in google for include bugs - http://unl0ck.net/tools.php&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
FIS: File Inclusion Scanner - http://www.segfault.gr/index.php?cat_id=3&amp;amp;cont_id=25&amp;lt;br/&amp;gt;&lt;br /&gt;
PHPSecAudit - http://developer.spikesource.com/projects/phpsecaudit&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web Application Firewall (WAF) and Intrusion Detection (APIDS) rules and resources==&lt;br /&gt;
APIDS on Wikipedia - http://en.wikipedia.org/wiki/APIDS&amp;lt;br/ &amp;gt;&lt;br /&gt;
PHP Intrusion Detection System (PHP-IDS) - http://php-ids.org/ http://code.google.com/p/phpids/&amp;lt;br/ &amp;gt;&lt;br /&gt;
dotnetids - http://code.google.com/p/dotnetids/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Secure Science InterScout - http://www.securescience.com/home/newsandevents/news/interscout1.0.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Remo: whitelist rule editor for mod_security - http://remo.netnea.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
GotRoot: ModSecuirty rules - http://www.gotroot.com/tiki-index.php?page=mod_security+rules&amp;lt;br/ &amp;gt;&lt;br /&gt;
The Web Security Gateway (WSGW) - http://wsgw.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
mod_security rules generator - http://noeljackson.com/tools/modsecurity/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Mod_Anti_Tamper - http://www.wisec.it/projects.php?id=3&amp;lt;br/ &amp;gt;&lt;br /&gt;
[TGZ] Automatic Rules Generation for Mod_Security - http://www.wisec.it/rdr.php?fn=/Projects/Rule-o-matic.tgz&amp;lt;br/ &amp;gt;&lt;br /&gt;
AQTRONIX WebKnight - http://www.aqtronix.com/?PageID=99&amp;lt;br/ &amp;gt;&lt;br /&gt;
Akismet: blog spam defense - http://akismet.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Samoa: Formal tools for securing web services - http://research.microsoft.com/projects/samoa/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web services enumeration / scanning / fuzzing==&lt;br /&gt;
WebServiceStudio2.0 - http://www.gotdotnet.com/Community/UserSamples/Details.aspx?SampleGuid=65a1d4ea-0f7a-41bd-8494-e916ebc4159c&amp;lt;br/ &amp;gt;&lt;br /&gt;
Net-square: wsChess - http://net-square.com/wschess/index.shtml&amp;lt;br/ &amp;gt;&lt;br /&gt;
WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
SIFT: web method search tool - http://www.sift.com.au/73/171/sift-web-method-search-tool.htm&amp;lt;br/ &amp;gt;&lt;br /&gt;
iSecPartners: WSMap, WSBang, etc - http://www.isecpartners.com/tools.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application non-specific static source-code analysis==&lt;br /&gt;
Pixy: a static analysis tool for detecting XSS vulnerabilities - http://www.seclab.tuwien.ac.at/projects/pixy/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Brixoft.Net: Source Edit - http://www.brixoft.net/prodinfo.asp?id=1&amp;lt;br/ &amp;gt;&lt;br /&gt;
Security compass web application auditing tools (SWAAT) - http://www.owasp.org/index.php/Category:OWASP_SWAAT_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
An even more complete list here - http://www.cs.cmu.edu/~aldrich/courses/654/tools/&amp;lt;br/ &amp;gt;&lt;br /&gt;
A nice list that claims some demos available - http://www.cs.cmu.edu/~aldrich/courses/413/tools.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
A smaller, but also good list - http://spinroot.com/static/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Static analysis for C/C++ (CGI, ISAPI, etc) in web applications==&lt;br /&gt;
RATS - http://www.securesoftware.com/resources/download_rats.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
ITS4 - http://www.cigital.com/its4/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FlawFinder - http://www.dwheeler.com/flawfinder/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Splint - http://www.splint.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Uno - http://spinroot.com/uno/&amp;lt;br/ &amp;gt;&lt;br /&gt;
BOON (Buffer Overrun detectiON) - http://www.cs.berkeley.edu/~daw/boon/ http://boon.sourceforge.net&amp;lt;br/ &amp;gt;&lt;br /&gt;
Valgrind - http://www.valgrind.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Java static analysis, security frameworks, and web application security tools==&lt;br /&gt;
HDIV Struts - http://hdiv.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Orizon - http://sourceforge.net/projects/orizon/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FindBugs: Find bugs in Java programs - http://findbugs.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
PMD - http://pmd.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CUTE: A Concolic Unit Testing Engine for C and Java - http://osl.cs.uiuc.edu/~ksen/cute/&amp;lt;br/ &amp;gt;&lt;br /&gt;
EMMA - http://emma.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
JLint - http://jlint.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Java PathFinder - http://javapathfinder.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Fujaba: Move between UML and Java source code - http://wwwcs.uni-paderborn.de/cs/fujaba/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Checkstyle - http://checkstyle.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Cookie Revolver Security Framework - http://sourceforge.net/projects/cookie-revolver&amp;lt;br/ &amp;gt;&lt;br /&gt;
tinapoc - http://sourceforge.net/projects/tinapoc&amp;lt;br/ &amp;gt;&lt;br /&gt;
jarsigner - http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Solex - http://solex.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Java Explorer - http://metal.hurlant.com/jexplore/&amp;lt;br/ &amp;gt;&lt;br /&gt;
HTTPClient - http://www.innovation.ch/java/HTTPClient/&amp;lt;br/ &amp;gt;&lt;br /&gt;
another HttpClient - http://jakarta.apache.org/commons/httpclient/&amp;lt;br/ &amp;gt;&lt;br /&gt;
a list of code coverage and analysis tools for Java - http://mythinkpond.blogspot.com/2007/06/java-foss-freeopen-source-software.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Microsoft .NET static analysis and security framework tools, mostly for ASP.NET and ASP.NET AJAX, but also C# and VB.NET==&lt;br /&gt;
Orcas - http://msdn.microsoft.com/vstudio/express/future/downloads/default.aspx&amp;lt;br/ &amp;gt;&lt;br /&gt;
Web Development Helper - http://www.nikhilk.net/Project.WebDevHelper.aspx&amp;lt;br/ &amp;gt;&lt;br /&gt;
FxCop - http://blogs.msdn.com/fxcop/ http://www.gotdotnet.com/team/fxcop/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Microsoft Application Verifier - http://www.microsoft.com/technet/prodtechnol/windows/appcompatibility/appverifier.mspx&amp;lt;br/ &amp;gt;&lt;br /&gt;
Microsoft internal tools you can't have yet - http://www.microsoft.com/windows/cse/pa_projects.mspx http://research.microsoft.com/Pex/ http://www.owasp.org/images/5/5b/OWASP_IL_7_FuzzGuru.pdf&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Threat modeling==&lt;br /&gt;
Microsoft Threat Analysis and Modeling Tool v2.1 (TAM) - http://www.microsoft.com/downloads/details.aspx?FamilyID=59888078-9daf-4e96-b7d1-944703479451&amp;amp;displaylang=en&amp;lt;br/ &amp;gt;&lt;br /&gt;
Amenaza: Attack Tree Modeling (SecurITree) - http://www.amenaza.com/software.php&amp;lt;br/ &amp;gt;&lt;br /&gt;
Octotrike - http://www.octotrike.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with general web application security==&lt;br /&gt;
Web Developer Toolbar - https://addons.mozilla.org/firefox/60/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Plain Old Webserver (POW) - https://addons.mozilla.org/firefox/3002/&amp;lt;br/ &amp;gt;&lt;br /&gt;
XML Developer Toolbar - https://addons.mozilla.org/firefox/2897/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Public Fox - https://addons.mozilla.org/firefox/3911/&amp;lt;br/ &amp;gt;&lt;br /&gt;
XForms Buddy - http://beaufour.dk/index.php?sec=misc&amp;amp;pagename=xforms&amp;lt;br/ &amp;gt;&lt;br /&gt;
MR Tech Local Install - http://www.mrtech.com/extensions/local_install/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Nightly Tester Tools - http://users.blueprintit.co.uk/~dave/web/firefox/buildid/index.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
IE Tab - https://addons.mozilla.org/firefox/1419/&amp;lt;br/ &amp;gt;&lt;br /&gt;
User-Agent Switcher - https://addons.mozilla.org/firefox/59/&amp;lt;br/ &amp;gt;&lt;br /&gt;
ServerSwitcher - https://addons.mozilla.org/firefox/2409/&amp;lt;br/ &amp;gt;&lt;br /&gt;
HeaderMonitor - https://addons.mozilla.org/firefox/575/&amp;lt;br/ &amp;gt;&lt;br /&gt;
RefControl - https://addons.mozilla.org/firefox/953/&amp;lt;br/ &amp;gt;&lt;br /&gt;
refspoof - https://addons.mozilla.org/firefox/667/&amp;lt;br/ &amp;gt;&lt;br /&gt;
No-Referrer - https://addons.mozilla.org/firefox/1999/&amp;lt;br/ &amp;gt;&lt;br /&gt;
LocationBar^2 - https://addons.mozilla.org/firefox/4014/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SpiderZilla - http://spiderzilla.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Slogger - https://addons.mozilla.org/en-US/firefox/addon/143&amp;lt;br/ &amp;gt;&lt;br /&gt;
Fire Encrypter - https://addons.mozilla.org/firefox/3208/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with Javascript and Ajax web application security==&lt;br /&gt;
Selenium IDE - http://www.openqa.org/selenium-ide/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Firebug - http://www.joehewitt.com/software/firebug/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Venkman - http://www.mozilla.org/projects/venkman/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Chickenfoot - http://groups.csail.mit.edu/uid/chickenfoot/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Greasemonkey - http://www.greasespot.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Greasemonkey compiler - http://www.letitblog.com/greasemonkey-compiler/&amp;lt;br/ &amp;gt;&lt;br /&gt;
User script compiler - http://arantius.com/misc/greasemonkey/script-compiler&amp;lt;br/ &amp;gt;&lt;br /&gt;
Extension Developer's Extension (Firefox Add-on) - http://ted.mielczarek.org/code/mozilla/extensiondev/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Smart Middle Click (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/3885/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Bookmarklets that aid in web application security==&lt;br /&gt;
RSnake's security bookmarklets - http://ha.ckers.org/bookmarklets.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
BMlets - http://optools.awardspace.com/bmlet.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Huge list of bookmarklets - http://www.squarefree.com/bookmarklets/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Blummy: consists of small widgets, called blummlets, which make use of Javascript to provide&lt;br /&gt;
rich functionality - http://www.blummy.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Bookmarklets every blogger should have - http://www.micropersuasion.com/2005/10/bookmarklets_ev.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Flat Bookmark Editing (Firefox Add-on) - http://n01se.net/chouser/proj/mozhack/&amp;lt;br/ &amp;gt;&lt;br /&gt;
OpenBook and Update Bookmark (Firefox Add-ons) - http://www.chuonthis.com/extensions/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SSL certificate checking / scanning==&lt;br /&gt;
[ZIP] THCSSLCheck - http://thc.org/root/tools/THCSSLCheck.zip&amp;lt;br/ &amp;gt;&lt;br /&gt;
[ZIP] Foundstone SSLDigger - http://www.foundstone.com/us/resources/termsofuse.asp?file=ssldigger.zip&amp;lt;br/ &amp;gt;&lt;br /&gt;
Cert Viewer Plus (Firefox Add-on) - https://addons.mozilla.org/firefox/1964/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Honeyclients, Web Application, and Web Proxy honeypots==&lt;br /&gt;
Honeyclient Project: an open-source honeyclient - http://www.honeyclient.org/trac/ &amp;lt;br/ &amp;gt;&lt;br /&gt;
HoneyC: the low-interaction honeyclient - http://honeyc.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Capture: a high-interaction honeyclient - http://capture-hpc.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Google Hack Honeypot - http://ghh.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
PHP.Hop - PHP Honeynet Project - http://www.rstack.org/phphop/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SpyBye - http://www.monkey.org/~provos/spybye/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Honeytokens - http://www.securityfocus.com/infocus/1713&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Blackhat SEO and maybe some whitehat SEO==&lt;br /&gt;
SearchStatus (Firefox Add-on) - http://www.quirk.biz/searchstatus/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SEO for Firefox (Firefox Add-on) - http://tools.seobook.com/firefox/seo-for-firefox.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
SEOQuake (Firefox Add-on) - http://www.seoquake.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Footprinting for web application security==&lt;br /&gt;
Evolution - http://www.paterva.com/evolution-e.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
GooSweep - http://www.mcgrewsecurity.com/projects/goosweep/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Aura: Google API Utility Tools - http://www.sensepost.com/research/aura/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Edge-Security tools - http://www.edge-security.com/soft.php&amp;lt;br/ &amp;gt;&lt;br /&gt;
Fierce Domain Scanner - http://ha.ckers.org/fierce/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Googlegath - http://www.nothink.org/perl/googlegath/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Advanced Dork (Firefox Add-on) - https://addons.mozilla.org/firefox/2144/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Passive Cache (Firefox Add-on) - https://addons.mozilla.org/firefox/977/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CacheOut! (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1453/&amp;lt;br/ &amp;gt;&lt;br /&gt;
BugMeNot Extension (Firefox Add-on) - http://roachfiend.com/archives/2005/02/07/bugmenot/&amp;lt;br/ &amp;gt;&lt;br /&gt;
TrashMail.net Extension (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1813/&amp;lt;br/ &amp;gt;&lt;br /&gt;
DiggiDig (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2819/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Digger (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1467/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Database security assessment==&lt;br /&gt;
Scuba by Imperva Database Vulnerability Scanner - http://www.imperva.com/scuba/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Defenses==&lt;br /&gt;
DieHard - http://www.diehard-software.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
LocalRodeo (Firefox Add-on) - http://databasement.net/labs/localrodeo/&amp;lt;br/ &amp;gt;&lt;br /&gt;
NoMoXSS - http://www.seclab.tuwien.ac.at/projects/jstaint/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Request Rodeo - http://savannah.nongnu.org/projects/requestrodeo&amp;lt;br/ &amp;gt;&lt;br /&gt;
FlashBlock (Firefox Add-on) - http://flashblock.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CookieSafe (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2497&amp;lt;br/ &amp;gt;&lt;br /&gt;
NoScript (Firefox Add-on) - http://www.noscript.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FormFox (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1579/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Adblock (Firefox Add-on) - http://adblock.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
httpOnly in Firefox (Firefox Add-on) - http://blog.php-security.org/archives/40-httpOnly-Cookies-in-Firefox-2.0.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
SafeCache (Firefox Add-on) - http://www.safecache.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SafeHistory (Firefox Add-on) - http://www.safehistory.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
PrefBar (Firefox Add-on) - http://prefbar.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
All-in-One Sidebar (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1027/&amp;lt;br/ &amp;gt;&lt;br /&gt;
QArchive.org web file checker (Firefox Add-on) - https://addons.mozilla.org/firefox/4115/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Update Notified (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2098/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FireKeeper - http://firekeeper.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Privacy==&lt;br /&gt;
TrackMeNot (Firefox Add-on) - https://addons.mozilla.org/firefox/3173/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Privacy Bird - http://www.privacybird.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Application and protocol fuzzing (random instead of targeted)==&lt;br /&gt;
Sulley - http://fuzzing.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
taof: The Art of Fuzzing - http://sourceforge.net/projects/taof/&amp;lt;br/ &amp;gt;&lt;br /&gt;
zzuf: multipurpose fuzzer - http://sam.zoy.org/zzuf/&amp;lt;br/ &amp;gt;&lt;br /&gt;
autodafé: an act of software torture - http://autodafe.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
EFS and GPF: Evolutionary Fuzzing System - http://www.appliedsec.com/resources.html&amp;lt;br/ &amp;gt;&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=19954</id>
		<title>Phoenix/Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=19954"/>
				<updated>2007-07-17T17:59:02Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;p&amp;gt;Please send comments or questions to the Phoenix-OWASP mailing-list.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==LiveCDs==&lt;br /&gt;
Monday, January 29, 2007  4:02 PM    828569600 AOC_Labrat-ALPHA-0010.iso - http://www.packetfocus.com/hackos/&amp;lt;br/ &amp;gt;&lt;br /&gt;
DVL (Damn Vulnerable Linux) - http://www.damnvulnerablelinux.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Test sites / testing grounds==&lt;br /&gt;
SPI Dynamics (live) - http://zero.webappsecurity.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Cenzic (live) - http://crackme.cenzic.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Watchfire (live) - http://demo.testfire.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Acunetix (live) - http://testphp.acunetix.com/ http://testasp.acunetix.com http://testaspnet.acunetix.com&amp;lt;br/ &amp;gt;&lt;br /&gt;
WebMaven / Buggy Bank (includes live testsite) - http://www.mavensecurity.com/webmaven&amp;lt;br/ &amp;gt;&lt;br /&gt;
Foundstone SASS tools - http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&amp;amp;subcontent=/resources/s3i_tools.htm&amp;lt;br/ &amp;gt;&lt;br /&gt;
OWASP WebGoat - http://www.owasp.org/index.php/OWASP_WebGoat_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
OWASP SiteGenerator - http://www.owasp.org/index.php/Owasp_SiteGenerator&amp;lt;br/ &amp;gt;&lt;br /&gt;
Stanford SecuriBench - http://suif.stanford.edu/~livshits/securibench/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SecuriBench Micro - http://suif.stanford.edu/~livshits/work/securibench-micro/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP proxying / editing==&lt;br /&gt;
WebScarab - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
Burp - http://www.portswigger.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Paros - http://www.parosproxy.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Fiddler - http://www.fiddlertool.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Web Proxy Editor - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Pantera - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
Suru - http://www.sensepost.com/research/suru/&amp;lt;br/ &amp;gt;&lt;br /&gt;
httpedit (curses-based) - http://www.neutralbit.com/en/rd/httpedit/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Charles - http://www.xk72.com/charles/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Odysseus - http://www.bindshell.net/tools/odysseus&amp;lt;br/ &amp;gt;&lt;br /&gt;
Burp, Paros, and WebScarab for Mac OS X - http://www.corsaire.com/downloads/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Web-application scanning tool from `Network Security Tools'/O'Reilly - http://examples.oreilly.com/networkst/&amp;lt;br/ &amp;gt;&lt;br /&gt;
JS Commander http://jscmd.rubyforge.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools==&lt;br /&gt;
Wfuzz - http://www.edge-security.com/wfuzz.php&amp;lt;br/ &amp;gt;&lt;br /&gt;
ProxMon - http://www.isecpartners.com/proxmon.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Wapiti - http://wapiti.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Grabber - http://rgaucher.info/beta/grabber/&amp;lt;br/ &amp;gt;&lt;br /&gt;
XSSScan - http://darkcode.ath.cx/scanners/XSSscan.py&amp;lt;br/ &amp;gt;&lt;br /&gt;
CAL9000 - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
HTMangLe - http://www.fishnetsecurity.com/Tools/HTMangLe/publish.htm&amp;lt;br/ &amp;gt;&lt;br /&gt;
JBroFuzz - http://sourceforge.net/projects/jbrofuzz&amp;lt;br/ &amp;gt;&lt;br /&gt;
XSSFuzz - http://ha.ckers.org/blog/20060921/xssfuzz-released/&amp;lt;br/ &amp;gt;&lt;br /&gt;
WhiteAcid's XSS Assistant - http://www.whiteacid.org/greasemonkey/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Overlong UTF - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br/ &amp;gt;&lt;br /&gt;
[TGZ] MielieTool (SensePost Research) - http://packetstormsecurity.org/UNIX/utilities/mielietools-v1.0.tgz&amp;lt;br/ &amp;gt;&lt;br /&gt;
RegFuzzer: test your regular expression filter - http://rgaucher.info/b/index.php/post/2007/05/26/RegFuzzer%3A-Test-your-regular-expression-filter&amp;lt;br/ &amp;gt;&lt;br /&gt;
screamingCobra - http://www.dachb0den.com/projects/screamingcobra.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
SPIKE and SPIKE Proxy - http://immunitysec.com/resources-freesoftware.shtml&amp;lt;br/ &amp;gt;&lt;br /&gt;
RFuzz - http://rfuzz.rubyforge.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
WebFuzz - http://www.codebreakers-journal.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=112&amp;amp;Itemid=99999999&amp;lt;br/ &amp;gt;&lt;br /&gt;
TestMaker - http://www.pushtotest.com/Docs/downloads/features.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
ASP Auditor - http://michaeldaw.org/projects/asp-auditor-v2/&amp;lt;br/ &amp;gt;&lt;br /&gt;
WSTool - http://wstool.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Web Hack Control Center (WHCC) - http://ussysadmin.com/whcc/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Web Text Converter - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br/ &amp;gt;&lt;br /&gt;
HackBar (Firefox Add-on) - https://addons.mozilla.org/firefox/3899/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Net-Force Tools (NF-Tools, Firefox Add-on) - http://www.net-force.nl/library/downloads/&amp;lt;br/ &amp;gt;&lt;br /&gt;
PostIntercepter (Greasemonkey script) - http://userscripts.org/scripts/show/743&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP general testing / fingerprinting==&lt;br /&gt;
Wbox: HTTP testing tool - http://hping.org/wbox/&amp;lt;br/ &amp;gt;&lt;br /&gt;
ht://Check - http://htcheck.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Mumsie - http://www.lurhq.com/tools/mumsie.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
WebInject - http://www.webinject.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Torture.pl Home Page - http://stein.cshl.org/~lstein/torture/&amp;lt;br/ &amp;gt;&lt;br /&gt;
JoeDog's Seige - http://www.joedog.org/JoeDog/Siege/&amp;lt;br/ &amp;gt;&lt;br /&gt;
OPEN-LABS: metoscan (http method testing) - http://www.open-labs.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Load-balancing detector - http://ge.mine.nu/lbd.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
HMAP - http://ujeni.murkyroc.com/hmap/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Net-Square: httprint - http://net-square.com/httprint/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Wpoison: http stress testing - http://wpoison.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Net-square: MSNPawn - http://net-square.com/msnpawn/index.shtml&amp;lt;br/ &amp;gt;&lt;br /&gt;
hcraft: HTTP Vuln Request Crafter - http://druid.caughq.org/projects/hcraft/&amp;lt;br/ &amp;gt;&lt;br /&gt;
rfp.labs: LibWhisker - http://www.wiretrip.net/rfp/lw.asp&amp;lt;br/ &amp;gt;&lt;br /&gt;
Nikto - http://www.cirt.net/code/nikto.shtml&amp;lt;br/ &amp;gt;&lt;br /&gt;
twill - http://twill.idyll.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
DirBuster - http://www.sittinglittleduck.com/DirBuster/&amp;lt;br/ &amp;gt;&lt;br /&gt;
[ZIP] DFF Scanner - http://security-net.biz/files/dff/DFF.zip&amp;lt;br/ &amp;gt;&lt;br /&gt;
[ZIP] The Elza project - http://packetstormsecurity.org/web/elza-1.4.7-beta.zip http://www.stoev.org/elza.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser-based HTTP tampering / editing / replaying==&lt;br /&gt;
TamperIE - http://www.bayden.com/Other/&amp;lt;br/ &amp;gt;&lt;br /&gt;
isr-form - http://www.infobyte.com.ar/developments.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Modify Headers (Firefox Add-on) - http://modifyheaders.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Tamper Data (Firefox Add-on) - http://tamperdata.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
UrlParams (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1290/&amp;lt;br/ &amp;gt;&lt;br /&gt;
TestGen4Web (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1385/&amp;lt;br/ &amp;gt;&lt;br /&gt;
DOM Inspector / Inspect This (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1806/ https://addons.mozilla.org/en-US/firefox/addon/1913/&amp;lt;br/ &amp;gt;&lt;br /&gt;
LiveHTTPHeaders / Header Monitor (Firefox Add-on) - http://livehttpheaders.mozdev.org/ https://addons.mozilla.org/en-US/firefox/addon/575/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cookie editing / poisoning==&lt;br /&gt;
[TGZ] stompy: session id tool - http://lcamtuf.coredump.cx/stompy.tgz&amp;lt;br/ &amp;gt;&lt;br /&gt;
Add'N Edit Cookies (AnEC, Firefox Add-on) - http://addneditcookies.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CookieCuller (Firefox Add-on) - http://cookieculler.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CookiePie (Firefox Add-on) - http://www.nektra.com/oss/firefox/extensions/cookiepie/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CookieSpy - http://www.codeproject.com/shell/cookiespy.asp&amp;lt;br/ &amp;gt;&lt;br /&gt;
Cookies Explorer - http://www.dutchduck.com/Features/Cookies.aspx&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Ajax and XHR scanning==&lt;br /&gt;
Sahi - http://sahi.co.in/&amp;lt;br/ &amp;gt;&lt;br /&gt;
scRUBYt - http://scrubyt.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
jQuery - http://jquery.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
jquery-include - http://www.gnucitizen.org/projects/jquery-include&amp;lt;br/ &amp;gt;&lt;br /&gt;
Sprajax - http://www.denimgroup.com/sprajax.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Watir - http://wtr.rubyforge.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Watij - http://watij.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Watin - http://watin.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
RBNarcissus - http://idontsmoke.co.uk/2005/rbnarcissus/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SpiderTest (Spider Fuzz plugin) - http://blog.caboo.se/articles/2007/2/21/the-fabulous-spider-fuzz-plugin&amp;lt;br/ &amp;gt;&lt;br /&gt;
Javascript Inline Debugger (jasildbg) - http://jasildbg.googlepages.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Firebug Lite - http://www.getfirebug.com/lite.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
firewaitr - http://code.google.com/p/firewatir/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSS extensions and caching==&lt;br /&gt;
LiveLines (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/324/&amp;lt;br/ &amp;gt;&lt;br /&gt;
rss-cache - http://www.dubfire.net/chris/projects/rss-cache/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SQL injection scanning==&lt;br /&gt;
0x90.org: home of Absinthe, Mezcal, etc - http://0x90.org/releases.php&amp;lt;br/ &amp;gt;&lt;br /&gt;
SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
sqlninja: a SQL Server injection and takover tool - http://sqlninja.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
JustinClarke's SQL Brute - http://www.justinclarke.com/archives/2006/03/sqlbrute.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
BobCat - http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
sqlmap - http://sqlmap.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Scully: SQL Server DB Front-End and Brute-Forcer - http://www.sensepost.com/research/scully/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FG-Injector - http://www.flowgate.net/?lang=en&amp;amp;seccion=herramientas&amp;lt;br/ &amp;gt;&lt;br /&gt;
PRIAMOS - http://www.priamos-project.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application security malware, backdoors, and evil code==&lt;br /&gt;
W3AF: Web Application Attack and Audit Framework - http://w3af.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Jikto - http://busin3ss.name/jikto-in-the-wild/&amp;lt;br/ &amp;gt;&lt;br /&gt;
XSS Shell - http://ferruh.mavituna.com/article/?1338&amp;lt;br/ &amp;gt;&lt;br /&gt;
XSS-Proxy - http://xss-proxy.sourceforge.net&amp;lt;br/ &amp;gt;&lt;br /&gt;
AttackAPI - http://www.gnucitizen.org/projects/attackapi/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FFsniFF - http://azurit.elbiahosting.sk/ffsniff/&amp;lt;br/ &amp;gt;&lt;br /&gt;
HoneyBlog's web-based junkyard - http://honeyblog.org/junkyard/web-based/&amp;lt;br/ &amp;gt;&lt;br /&gt;
BeEF - http://www.bindshell.net/tools/beef/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Firefox Extension Scanner (FEX) - http://www.gnucitizen.org/projects/fex/&amp;lt;br/ &amp;gt;&lt;br /&gt;
What is my IP address? - http://reglos.de/myaddress/&amp;lt;br/ &amp;gt;&lt;br /&gt;
xRumer: blogspam automation tool - http://www.botmaster.net/movies/XFull.htm&amp;lt;br/ &amp;gt;&lt;br /&gt;
SpyJax - http://www.merchantos.com/makebeta/tools/spyjax/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Greasecarnaval - http://www.gnucitizen.org/projects/greasecarnaval&amp;lt;br/ &amp;gt;&lt;br /&gt;
Technika - http://www.gnucitizen.org/projects/technika/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Load-AttackAPI bookmarklet - http://www.gnucitizen.org/projects/load-attackapi-bookmarklet&amp;lt;br/ &amp;gt;&lt;br /&gt;
MD's Projects: JS port scanner, pinger, backdoors, etc - http://michaeldaw.org/my-projects/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application services that aid in web application security assessment==&lt;br /&gt;
Netcraft - http://www.netcraft.net&amp;lt;br/ &amp;gt;&lt;br /&gt;
AboutURL - http://www.abouturl.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
The Scrutinizer - http://www.scrutinizethis.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
net.toolkit - http://clez.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
ServerSniff - http://www.serversniff.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Online Microsoft script decoder - http://www.greymagic.com/security/tools/decoder/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Webmaster-Toolkit - http://www.webmaster-toolkit.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
myIPNeighbbors, et al - http://digg.com/security/MyIPNeighbors_Find_Out_Who_Else_is_Hosted_on_Your_Site_s_IP_Address&amp;lt;br/ &amp;gt;&lt;br /&gt;
PHP charset encoding - http://h4k.in/encoding&amp;lt;br/ &amp;gt;&lt;br /&gt;
data: URL testcases - http://h4k.in/dataurl&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser-based security fuzzing / checking==&lt;br /&gt;
Zalewski's MangleMe - http://lcamtuf.coredump.cx/mangleme/mangle.cgi&amp;lt;br/ &amp;gt;&lt;br /&gt;
hdm's tools: Hamachi, CSSDIE, DOM-Hanoi, AxMan - http://metasploit.com/users/hdm/tools/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Peach Fuzzer Framework - http://peachfuzz.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
TagBruteForcer - http://research.eeye.com/html/tools/RT20060801-3.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
PROTOS Test-Suite: c05-http-reply - http://www.ee.oulu.fi/research/ouspg/protos/testing/c05/http-reply/index.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
COMRaider - http://labs.idefense.com&amp;lt;br/ &amp;gt;&lt;br /&gt;
bcheck - http://bcheck.scanit.be/bcheck/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Stop-Phishing: Projects page - http://www.indiana.edu/~phishing/?projects&amp;lt;br/ &amp;gt;&lt;br /&gt;
LinkScanner - http://linkscanner.explabs.com/linkscanner/default.asp&amp;lt;br/ &amp;gt;&lt;br /&gt;
BrowserCheck - http://www.heise-security.co.uk/services/browsercheck/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Cross-browser Exploit Tests - http://www.jungsonnstudios.com/cool.php&amp;lt;br/ &amp;gt;&lt;br /&gt;
Stealing information using DNS pinning demo - http://www.jumperz.net/index.php?i=2&amp;amp;a=1&amp;amp;b=7&amp;lt;br/ &amp;gt;&lt;br /&gt;
Javascript Website Login Checker - http://ha.ckers.org/weird/javascript-website-login-checker.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Mozilla Activex - http://www.iol.ie/~locka/mozilla/mozilla.htm&amp;lt;br/ &amp;gt;&lt;br /&gt;
Jungsonn's Black Dragon Project - http://blackdragon.jungsonnstudios.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Mr. T (Master Recon Tool, includes Read Firefox Settings PoC) - http://ha.ckers.org/mr-t/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Vulnerable Adobe Plugin Detection For UXSS PoC - http://www.0x000000.com/?i=324&amp;lt;br/ &amp;gt;&lt;br /&gt;
About Flash: is your flash up-to-date? - http://www.macromedia.com/software/flash/about/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Test your installation of Java software - http://java.com/en/download/installed.jsp?detect=jre&amp;amp;try=1&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==PHP static analysis and file inclusion scanning==&lt;br /&gt;
PHP-SAT.org: Static analysis for PHP - http://www.program-transformation.org/PHP/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Unl0ck Research Team: tool for searching in google for include bugs - http://unl0ck.net/tools.php&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
FIS: File Inclusion Scanner - http://www.segfault.gr/index.php?cat_id=3&amp;amp;cont_id=25&amp;lt;br/&amp;gt;&lt;br /&gt;
PHPSecAudit - http://developer.spikesource.com/projects/phpsecaudit&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web Application Firewall (WAF) and Intrusion Detection (APIDS) rules and resources==&lt;br /&gt;
APIDS on Wikipedia - http://en.wikipedia.org/wiki/APIDS&amp;lt;br/ &amp;gt;&lt;br /&gt;
PHP Intrusion Detection System (PHP-IDS) - http://php-ids.org/ http://code.google.com/p/phpids/&amp;lt;br/ &amp;gt;&lt;br /&gt;
dotnetids - http://code.google.com/p/dotnetids/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Secure Science InterScout - http://www.securescience.com/home/newsandevents/news/interscout1.0.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Remo: whitelist rule editor for mod_security - http://remo.netnea.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
GotRoot: ModSecuirty rules - http://www.gotroot.com/tiki-index.php?page=mod_security+rules&amp;lt;br/ &amp;gt;&lt;br /&gt;
The Web Security Gateway (WSGW) - http://wsgw.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
mod_security rules generator - http://noeljackson.com/tools/modsecurity/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Mod_Anti_Tamper - http://www.wisec.it/projects.php?id=3&amp;lt;br/ &amp;gt;&lt;br /&gt;
[TGZ] Automatic Rules Generation for Mod_Security - http://www.wisec.it/rdr.php?fn=/Projects/Rule-o-matic.tgz&amp;lt;br/ &amp;gt;&lt;br /&gt;
AQTRONIX WebKnight - http://www.aqtronix.com/?PageID=99&amp;lt;br/ &amp;gt;&lt;br /&gt;
Akismet: blog spam defense - http://akismet.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Samoa: Formal tools for securing web services - http://research.microsoft.com/projects/samoa/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web services enumeration / scanning / fuzzing==&lt;br /&gt;
WebServiceStudio2.0 - http://www.gotdotnet.com/Community/UserSamples/Details.aspx?SampleGuid=65a1d4ea-0f7a-41bd-8494-e916ebc4159c&amp;lt;br/ &amp;gt;&lt;br /&gt;
Net-square: wsChess - http://net-square.com/wschess/index.shtml&amp;lt;br/ &amp;gt;&lt;br /&gt;
WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
SIFT: web method search tool - http://www.sift.com.au/73/171/sift-web-method-search-tool.htm&amp;lt;br/ &amp;gt;&lt;br /&gt;
iSecPartners: WSMap, WSBang, etc - http://www.isecpartners.com/tools.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application non-specific static source-code analysis==&lt;br /&gt;
Pixy: a static analysis tool for detecting XSS vulnerabilities - http://www.seclab.tuwien.ac.at/projects/pixy/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Brixoft.Net: Source Edit - http://www.brixoft.net/prodinfo.asp?id=1&amp;lt;br/ &amp;gt;&lt;br /&gt;
Security compass web application auditing tools (SWAAT) - http://www.owasp.org/index.php/Category:OWASP_SWAAT_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
An even more complete list here - http://www.cs.cmu.edu/~aldrich/courses/654/tools/&amp;lt;br/ &amp;gt;&lt;br /&gt;
A nice list that claims some demos available - http://www.cs.cmu.edu/~aldrich/courses/413/tools.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
A smaller, but also good list - http://spinroot.com/static/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Static analysis for C/C++ (CGI, ISAPI, etc) in web applications==&lt;br /&gt;
RATS - http://www.securesoftware.com/resources/download_rats.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
ITS4 - http://www.cigital.com/its4/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FlawFinder - http://www.dwheeler.com/flawfinder/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Splint - http://www.splint.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Uno - http://spinroot.com/uno/&amp;lt;br/ &amp;gt;&lt;br /&gt;
BOON (Buffer Overrun detectiON) - http://www.cs.berkeley.edu/~daw/boon/ http://boon.sourceforge.net&amp;lt;br/ &amp;gt;&lt;br /&gt;
Valgrind - http://www.valgrind.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Java static analysis, security frameworks, and web application security tools==&lt;br /&gt;
HDIV Struts - http://hdiv.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Orizon - http://sourceforge.net/projects/orizon/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FindBugs: Find bugs in Java programs - http://findbugs.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
PMD - http://pmd.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CUTE: A Concolic Unit Testing Engine for C and Java - http://osl.cs.uiuc.edu/~ksen/cute/&amp;lt;br/ &amp;gt;&lt;br /&gt;
EMMA - http://emma.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
JLint - http://jlint.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Java PathFinder - http://javapathfinder.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Fujaba: Move between UML and Java source code - http://wwwcs.uni-paderborn.de/cs/fujaba/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Checkstyle - http://checkstyle.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Cookie Revolver Security Framework - http://sourceforge.net/projects/cookie-revolver&amp;lt;br/ &amp;gt;&lt;br /&gt;
tinapoc - http://sourceforge.net/projects/tinapoc&amp;lt;br/ &amp;gt;&lt;br /&gt;
jarsigner - http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Solex - http://solex.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Java Explorer - http://metal.hurlant.com/jexplore/&amp;lt;br/ &amp;gt;&lt;br /&gt;
HTTPClient - http://www.innovation.ch/java/HTTPClient/&amp;lt;br/ &amp;gt;&lt;br /&gt;
another HttpClient - http://jakarta.apache.org/commons/httpclient/&amp;lt;br/ &amp;gt;&lt;br /&gt;
a list of code coverage and analysis tools for Java - http://mythinkpond.blogspot.com/2007/06/java-foss-freeopen-source-software.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Microsoft .NET static analysis and security framework tools, mostly for ASP.NET and ASP.NET AJAX, but also C# and VB.NET==&lt;br /&gt;
Orcas - http://msdn.microsoft.com/vstudio/express/future/downloads/default.aspx&amp;lt;br/ &amp;gt;&lt;br /&gt;
Web Development Helper - http://www.nikhilk.net/Project.WebDevHelper.aspx&amp;lt;br/ &amp;gt;&lt;br /&gt;
FxCop - http://blogs.msdn.com/fxcop/ http://www.gotdotnet.com/team/fxcop/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Microsoft Application Verifier - http://www.microsoft.com/technet/prodtechnol/windows/appcompatibility/appverifier.mspx&amp;lt;br/ &amp;gt;&lt;br /&gt;
Microsoft internal tools you can't have yet - http://www.microsoft.com/windows/cse/pa_projects.mspx http://research.microsoft.com/Pex/ http://www.owasp.org/images/5/5b/OWASP_IL_7_FuzzGuru.pdf&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Threat modeling==&lt;br /&gt;
Microsoft Threat Analysis and Modeling Tool v2.1 (TAM) - http://www.microsoft.com/downloads/details.aspx?FamilyID=59888078-9daf-4e96-b7d1-944703479451&amp;amp;displaylang=en&amp;lt;br/ &amp;gt;&lt;br /&gt;
Amenaza: Attack Tree Modeling (SecurITree) - http://www.amenaza.com/software.php&amp;lt;br/ &amp;gt;&lt;br /&gt;
Octotrike - http://www.octotrike.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with general web application security==&lt;br /&gt;
Web Developer Toolbar - https://addons.mozilla.org/firefox/60/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Plain Old Webserver (POW) - https://addons.mozilla.org/firefox/3002/&amp;lt;br/ &amp;gt;&lt;br /&gt;
XML Developer Toolbar - https://addons.mozilla.org/firefox/2897/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Public Fox - https://addons.mozilla.org/firefox/3911/&amp;lt;br/ &amp;gt;&lt;br /&gt;
XForms Buddy - http://beaufour.dk/index.php?sec=misc&amp;amp;pagename=xforms&amp;lt;br/ &amp;gt;&lt;br /&gt;
MR Tech Local Install - http://www.mrtech.com/extensions/local_install/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Nightly Tester Tools - http://users.blueprintit.co.uk/~dave/web/firefox/buildid/index.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
IE Tab - https://addons.mozilla.org/firefox/1419/&amp;lt;br/ &amp;gt;&lt;br /&gt;
User-Agent Switcher - https://addons.mozilla.org/firefox/59/&amp;lt;br/ &amp;gt;&lt;br /&gt;
ServerSwitcher - https://addons.mozilla.org/firefox/2409/&amp;lt;br/ &amp;gt;&lt;br /&gt;
HeaderMonitor - https://addons.mozilla.org/firefox/575/&amp;lt;br/ &amp;gt;&lt;br /&gt;
RefControl - https://addons.mozilla.org/firefox/953/&amp;lt;br/ &amp;gt;&lt;br /&gt;
refspoof - https://addons.mozilla.org/firefox/667/&amp;lt;br/ &amp;gt;&lt;br /&gt;
No-Referrer - https://addons.mozilla.org/firefox/1999/&amp;lt;br/ &amp;gt;&lt;br /&gt;
LocationBar^2 - https://addons.mozilla.org/firefox/4014/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SpiderZilla - http://spiderzilla.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Slogger - https://addons.mozilla.org/en-US/firefox/addon/143&amp;lt;br/ &amp;gt;&lt;br /&gt;
Fire Encrypter - https://addons.mozilla.org/firefox/3208/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with Javascript and Ajax web application security==&lt;br /&gt;
Selenium IDE - http://www.openqa.org/selenium-ide/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Firebug - http://www.joehewitt.com/software/firebug/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Venkman - http://www.mozilla.org/projects/venkman/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Chickenfoot - http://groups.csail.mit.edu/uid/chickenfoot/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Greasemonkey - http://www.greasespot.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Greasemonkey compiler - http://www.letitblog.com/greasemonkey-compiler/&amp;lt;br/ &amp;gt;&lt;br /&gt;
User script compiler - http://arantius.com/misc/greasemonkey/script-compiler&amp;lt;br/ &amp;gt;&lt;br /&gt;
Extension Developer's Extension (Firefox Add-on) - http://ted.mielczarek.org/code/mozilla/extensiondev/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Smart Middle Click (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/3885/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Bookmarklets that aid in web application security==&lt;br /&gt;
RSnake's security bookmarklets - http://ha.ckers.org/bookmarklets.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
BMlets - http://optools.awardspace.com/bmlet.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Huge list of bookmarklets - http://www.squarefree.com/bookmarklets/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Blummy: consists of small widgets, called blummlets, which make use of Javascript to provide&lt;br /&gt;
rich functionality - http://www.blummy.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Bookmarklets every blogger should have - http://www.micropersuasion.com/2005/10/bookmarklets_ev.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Flat Bookmark Editing (Firefox Add-on) - http://n01se.net/chouser/proj/mozhack/&amp;lt;br/ &amp;gt;&lt;br /&gt;
OpenBook and Update Bookmark (Firefox Add-ons) - http://www.chuonthis.com/extensions/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SSL certificate checking / scanning==&lt;br /&gt;
[ZIP] THCSSLCheck - http://thc.org/root/tools/THCSSLCheck.zip&amp;lt;br/ &amp;gt;&lt;br /&gt;
[ZIP] Foundstone SSLDigger - http://www.foundstone.com/us/resources/termsofuse.asp?file=ssldigger.zip&amp;lt;br/ &amp;gt;&lt;br /&gt;
Cert Viewer Plus (Firefox Add-on) - https://addons.mozilla.org/firefox/1964/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Honeyclients, Web Application, and Web Proxy honeypots==&lt;br /&gt;
Honeyclient Project: an open-source honeyclient - http://www.honeyclient.org/trac/ &amp;lt;br/ &amp;gt;&lt;br /&gt;
HoneyC: the low-interaction honeyclient - http://honeyc.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Capture: a high-interaction honeyclient - http://capture-hpc.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Google Hack Honeypot - http://ghh.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
PHP.Hop - PHP Honeynet Project - http://www.rstack.org/phphop/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SpyBye - http://www.monkey.org/~provos/spybye/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Honeytokens - http://www.securityfocus.com/infocus/1713&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Blackhat SEO and maybe some whitehat SEO==&lt;br /&gt;
SearchStatus (Firefox Add-on) - http://www.quirk.biz/searchstatus/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SEO for Firefox (Firefox Add-on) - http://tools.seobook.com/firefox/seo-for-firefox.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
SEOQuake (Firefox Add-on) - http://www.seoquake.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Footprinting for web application security==&lt;br /&gt;
Evolution - http://www.paterva.com/evolution-e.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
GooSweep - http://www.mcgrewsecurity.com/projects/goosweep/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Aura: Google API Utility Tools - http://www.sensepost.com/research/aura/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Edge-Security tools - http://www.edge-security.com/soft.php&amp;lt;br/ &amp;gt;&lt;br /&gt;
Fierce Domain Scanner - http://ha.ckers.org/fierce/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Googlegath - http://www.nothink.org/perl/googlegath/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Advanced Dork (Firefox Add-on) - https://addons.mozilla.org/firefox/2144/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Passive Cache (Firefox Add-on) - https://addons.mozilla.org/firefox/977/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CacheOut! (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1453/&amp;lt;br/ &amp;gt;&lt;br /&gt;
BugMeNot Extension (Firefox Add-on) - http://roachfiend.com/archives/2005/02/07/bugmenot/&amp;lt;br/ &amp;gt;&lt;br /&gt;
TrashMail.net Extension (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1813/&amp;lt;br/ &amp;gt;&lt;br /&gt;
DiggiDig (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2819/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Digger (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1467/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Database security assessment==&lt;br /&gt;
Scuba by Imperva Database Vulnerability Scanner - http://www.imperva.com/scuba/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Defenses==&lt;br /&gt;
DieHard - http://www.diehard-software.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
LocalRodeo (Firefox Add-on) - http://databasement.net/labs/localrodeo/&amp;lt;br/ &amp;gt;&lt;br /&gt;
NoMoXSS - http://www.seclab.tuwien.ac.at/projects/jstaint/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Request Rodeo - http://savannah.nongnu.org/projects/requestrodeo&amp;lt;br/ &amp;gt;&lt;br /&gt;
FlashBlock (Firefox Add-on) - http://flashblock.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CookieSafe (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2497&amp;lt;br/ &amp;gt;&lt;br /&gt;
NoScript (Firefox Add-on) - http://www.noscript.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FormFox (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1579/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Adblock (Firefox Add-on) - http://adblock.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
httpOnly in Firefox (Firefox Add-on) - http://blog.php-security.org/archives/40-httpOnly-Cookies-in-Firefox-2.0.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
SafeCache (Firefox Add-on) - http://www.safecache.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SafeHistory (Firefox Add-on) - http://www.safehistory.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
PrefBar (Firefox Add-on) - http://prefbar.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
All-in-One Sidebar (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1027/&amp;lt;br/ &amp;gt;&lt;br /&gt;
QArchive.org web file checker (Firefox Add-on) - https://addons.mozilla.org/firefox/4115/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Update Notified (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2098/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FireKeeper - http://firekeeper.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Privacy==&lt;br /&gt;
TrackMeNot (Firefox Add-on) - https://addons.mozilla.org/firefox/3173/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Privacy Bird - http://www.privacybird.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Application and protocol fuzzing (random instead of targeted)==&lt;br /&gt;
Sulley - http://fuzzing.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
taof: The Art of Fuzzing - http://sourceforge.net/projects/taof/&amp;lt;br/ &amp;gt;&lt;br /&gt;
zzuf: multipurpose fuzzer - http://sam.zoy.org/zzuf/&amp;lt;br/ &amp;gt;&lt;br /&gt;
autodafé: an act of software torture - http://autodafe.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
EFS and GPF: Evolutionary Fuzzing System - http://www.appliedsec.com/resources.html&amp;lt;br/ &amp;gt;&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Marcin&amp;diff=19743</id>
		<title>User:Marcin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Marcin&amp;diff=19743"/>
				<updated>2007-07-11T14:22:50Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: New page: [http://www.tssci-security.com tssci-security]  pub KeyID = [http://pgp.mit.edu:11371/pks/lookup?op=get&amp;amp;search=0xB0D446C3 B0D446C3]&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.tssci-security.com tssci-security]&lt;br /&gt;
&lt;br /&gt;
pub KeyID = [http://pgp.mit.edu:11371/pks/lookup?op=get&amp;amp;search=0xB0D446C3 B0D446C3]&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=19742</id>
		<title>Phoenix/Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=19742"/>
				<updated>2007-07-11T14:13:36Z</updated>
		
		<summary type="html">&lt;p&gt;Marcin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Please send comments or questions to the Phoenix-OWASP mailing-list.&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;LiveCDs&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
Monday, January 29, 2007  4:02 PM    828569600 AOC_Labrat-ALPHA-0010.iso - http://www.packetfocus.com/hackos/&amp;lt;br/ &amp;gt;&lt;br /&gt;
DVL (Damn Vulnerable Linux) - http://www.damnvulnerablelinux.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Test sites / testing grounds&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
SPI Dynamics (live) - http://zero.webappsecurity.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Cenzic (live) - http://crackme.cenzic.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Watchfire (live) - http://demo.testfire.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Acunetix (live) - http://testphp.acunetix.com/ http://testasp.acunetix.com http://testaspnet.acunetix.com&amp;lt;br/ &amp;gt;&lt;br /&gt;
WebMaven / Buggy Bank (includes live testsite) - http://www.mavensecurity.com/webmaven&amp;lt;br/ &amp;gt;&lt;br /&gt;
Foundstone SASS tools - http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&amp;amp;subcontent=/resources/s3i_tools.htm&amp;lt;br/ &amp;gt;&lt;br /&gt;
OWASP WebGoat - http://www.owasp.org/index.php/OWASP_WebGoat_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
OWASP SiteGenerator - http://www.owasp.org/index.php/Owasp_SiteGenerator&amp;lt;br/ &amp;gt;&lt;br /&gt;
Stanford SecuriBench - http://suif.stanford.edu/~livshits/securibench/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SecuriBench Micro - http://suif.stanford.edu/~livshits/work/securibench-micro/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;HTTP proxying / editing&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
WebScarab - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
Burp - http://www.portswigger.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Paros - http://www.parosproxy.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Fiddler - http://www.fiddlertool.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Web Proxy Editor - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Pantera - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
Suru - http://www.sensepost.com/research/suru/&amp;lt;br/ &amp;gt;&lt;br /&gt;
httpedit (curses-based) - http://www.neutralbit.com/en/rd/httpedit/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Charles - http://www.xk72.com/charles/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Odysseus - http://www.bindshell.net/tools/odysseus&amp;lt;br/ &amp;gt;&lt;br /&gt;
Burp, Paros, and WebScarab for Mac OS X - http://www.corsaire.com/downloads/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Web-application scanning tool from `Network Security Tools'/O'Reilly - http://examples.oreilly.com/networkst/&amp;lt;br/ &amp;gt;&lt;br /&gt;
JS Commander http://jscmd.rubyforge.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
Wfuzz - http://www.edge-security.com/wfuzz.php&amp;lt;br/ &amp;gt;&lt;br /&gt;
ProxMon - http://www.isecpartners.com/proxmon.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Wapiti - http://wapiti.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Grabber - http://rgaucher.info/beta/grabber/&amp;lt;br/ &amp;gt;&lt;br /&gt;
XSSScan - http://darkcode.ath.cx/scanners/XSSscan.py&amp;lt;br/ &amp;gt;&lt;br /&gt;
CAL9000 - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
HTMangLe - http://www.fishnetsecurity.com/Tools/HTMangLe/publish.htm&amp;lt;br/ &amp;gt;&lt;br /&gt;
JBroFuzz - http://sourceforge.net/projects/jbrofuzz&amp;lt;br/ &amp;gt;&lt;br /&gt;
XSSFuzz - http://ha.ckers.org/blog/20060921/xssfuzz-released/&amp;lt;br/ &amp;gt;&lt;br /&gt;
WhiteAcid's XSS Assistant - http://www.whiteacid.org/greasemonkey/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Overlong UTF - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br/ &amp;gt;&lt;br /&gt;
[TGZ] MielieTool (SensePost Research) - http://packetstormsecurity.org/UNIX/utilities/mielietools-v1.0.tgz&amp;lt;br/ &amp;gt;&lt;br /&gt;
RegFuzzer: test your regular expression filter - http://rgaucher.info/b/index.php/post/2007/05/26/RegFuzzer%3A-Test-your-regular-expression-filter&amp;lt;br/ &amp;gt;&lt;br /&gt;
screamingCobra - http://www.dachb0den.com/projects/screamingcobra.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
SPIKE and SPIKE Proxy - http://immunitysec.com/resources-freesoftware.shtml&amp;lt;br/ &amp;gt;&lt;br /&gt;
RFuzz - http://rfuzz.rubyforge.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
WebFuzz - http://www.codebreakers-journal.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=112&amp;amp;Itemid=99999999&amp;lt;br/ &amp;gt;&lt;br /&gt;
TestMaker - http://www.pushtotest.com/Docs/downloads/features.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
ASP Auditor - http://michaeldaw.org/projects/asp-auditor-v2/&amp;lt;br/ &amp;gt;&lt;br /&gt;
WSTool - http://wstool.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Web Hack Control Center (WHCC) - http://ussysadmin.com/whcc/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Web Text Converter - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br/ &amp;gt;&lt;br /&gt;
HackBar (Firefox Add-on) - https://addons.mozilla.org/firefox/3899/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Net-Force Tools (NF-Tools, Firefox Add-on) - http://www.net-force.nl/library/downloads/&amp;lt;br/ &amp;gt;&lt;br /&gt;
PostIntercepter (Greasemonkey script) - http://userscripts.org/scripts/show/743&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;HTTP general testing / fingerprinting&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
Wbox: HTTP testing tool - http://hping.org/wbox/&amp;lt;br/ &amp;gt;&lt;br /&gt;
ht://Check - http://htcheck.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Mumsie - http://www.lurhq.com/tools/mumsie.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
WebInject - http://www.webinject.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Torture.pl Home Page - http://stein.cshl.org/~lstein/torture/&amp;lt;br/ &amp;gt;&lt;br /&gt;
JoeDog's Seige - http://www.joedog.org/JoeDog/Siege/&amp;lt;br/ &amp;gt;&lt;br /&gt;
OPEN-LABS: metoscan (http method testing) - http://www.open-labs.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Load-balancing detector - http://ge.mine.nu/lbd.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
HMAP - http://ujeni.murkyroc.com/hmap/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Net-Square: httprint - http://net-square.com/httprint/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Wpoison: http stress testing - http://wpoison.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Net-square: MSNPawn - http://net-square.com/msnpawn/index.shtml&amp;lt;br/ &amp;gt;&lt;br /&gt;
hcraft: HTTP Vuln Request Crafter - http://druid.caughq.org/projects/hcraft/&amp;lt;br/ &amp;gt;&lt;br /&gt;
rfp.labs: LibWhisker - http://www.wiretrip.net/rfp/lw.asp&amp;lt;br/ &amp;gt;&lt;br /&gt;
Nikto - http://www.cirt.net/code/nikto.shtml&amp;lt;br/ &amp;gt;&lt;br /&gt;
twill - http://twill.idyll.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
DirBuster - http://www.sittinglittleduck.com/DirBuster/&amp;lt;br/ &amp;gt;&lt;br /&gt;
[ZIP] DFF Scanner - http://security-net.biz/files/dff/DFF.zip&amp;lt;br/ &amp;gt;&lt;br /&gt;
[ZIP] The Elza project - http://packetstormsecurity.org/web/elza-1.4.7-beta.zip http://www.stoev.org/elza.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Browser-based HTTP tampering / editing / replaying&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
TamperIE - http://www.bayden.com/Other/&amp;lt;br/ &amp;gt;&lt;br /&gt;
isr-form - http://www.infobyte.com.ar/developments.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Modify Headers (Firefox Add-on) - http://modifyheaders.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Tamper Data (Firefox Add-on) - http://tamperdata.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
UrlParams (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1290/&amp;lt;br/ &amp;gt;&lt;br /&gt;
TestGen4Web (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1385/&amp;lt;br/ &amp;gt;&lt;br /&gt;
DOM Inspector / Inspect This (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1806/ https://addons.mozilla.org/en-US/firefox/addon/1913/&amp;lt;br/ &amp;gt;&lt;br /&gt;
LiveHTTPHeaders / Header Monitor (Firefox Add-on) - http://livehttpheaders.mozdev.org/ https://addons.mozilla.org/en-US/firefox/addon/575/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Cookie editing / poisoning&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
[TGZ] stompy: session id tool - http://lcamtuf.coredump.cx/stompy.tgz&amp;lt;br/ &amp;gt;&lt;br /&gt;
Add'N Edit Cookies (AnEC, Firefox Add-on) - http://addneditcookies.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CookieCuller (Firefox Add-on) - http://cookieculler.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CookiePie (Firefox Add-on) - http://www.nektra.com/oss/firefox/extensions/cookiepie/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CookieSpy - http://www.codeproject.com/shell/cookiespy.asp&amp;lt;br/ &amp;gt;&lt;br /&gt;
Cookies Explorer - http://www.dutchduck.com/Features/Cookies.aspx&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Ajax and XHR scanning&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
Sahi - http://sahi.co.in/&amp;lt;br/ &amp;gt;&lt;br /&gt;
scRUBYt - http://scrubyt.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
jQuery - http://jquery.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
jquery-include - http://www.gnucitizen.org/projects/jquery-include&amp;lt;br/ &amp;gt;&lt;br /&gt;
Sprajax - http://www.denimgroup.com/sprajax.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Watir - http://wtr.rubyforge.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Watij - http://watij.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Watin - http://watin.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
RBNarcissus - http://idontsmoke.co.uk/2005/rbnarcissus/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SpiderTest (Spider Fuzz plugin) - http://blog.caboo.se/articles/2007/2/21/the-fabulous-spider-fuzz-plugin&amp;lt;br/ &amp;gt;&lt;br /&gt;
Javascript Inline Debugger (jasildbg) - http://jasildbg.googlepages.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Firebug Lite - http://www.getfirebug.com/lite.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
firewaitr - http://code.google.com/p/firewatir/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;RSS extensions and caching&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
LiveLines (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/324/&amp;lt;br/ &amp;gt;&lt;br /&gt;
rss-cache - http://www.dubfire.net/chris/projects/rss-cache/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;SQL injection scanning&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
0x90.org: home of Absinthe, Mezcal, etc - http://0x90.org/releases.php&amp;lt;br/ &amp;gt;&lt;br /&gt;
SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
sqlninja: a SQL Server injection and takover tool - http://sqlninja.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
JustinClarke's SQL Brute - http://www.justinclarke.com/archives/2006/03/sqlbrute.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
BobCat - http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
sqlmap - http://sqlmap.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Scully: SQL Server DB Front-End and Brute-Forcer - http://www.sensepost.com/research/scully/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FG-Injector - http://www.flowgate.net/?lang=en&amp;amp;seccion=herramientas&amp;lt;br/ &amp;gt;&lt;br /&gt;
PRIAMOS - http://www.priamos-project.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Web application security malware, backdoors, and evil code&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
W3AF: Web Application Attack and Audit Framework - http://w3af.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Jikto - http://busin3ss.name/jikto-in-the-wild/&amp;lt;br/ &amp;gt;&lt;br /&gt;
XSS Shell - http://ferruh.mavituna.com/article/?1338&amp;lt;br/ &amp;gt;&lt;br /&gt;
XSS-Proxy - http://xss-proxy.sourceforge.net&amp;lt;br/ &amp;gt;&lt;br /&gt;
AttackAPI - http://www.gnucitizen.org/projects/attackapi/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FFsniFF - http://azurit.elbiahosting.sk/ffsniff/&amp;lt;br/ &amp;gt;&lt;br /&gt;
HoneyBlog's web-based junkyard - http://honeyblog.org/junkyard/web-based/&amp;lt;br/ &amp;gt;&lt;br /&gt;
BeEF - http://www.bindshell.net/tools/beef/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Firefox Extension Scanner (FEX) - http://www.gnucitizen.org/projects/fex/&amp;lt;br/ &amp;gt;&lt;br /&gt;
What is my IP address? - http://reglos.de/myaddress/&amp;lt;br/ &amp;gt;&lt;br /&gt;
xRumer: blogspam automation tool - http://www.botmaster.net/movies/XFull.htm&amp;lt;br/ &amp;gt;&lt;br /&gt;
SpyJax - http://www.merchantos.com/makebeta/tools/spyjax/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Greasecarnaval - http://www.gnucitizen.org/projects/greasecarnaval&amp;lt;br/ &amp;gt;&lt;br /&gt;
Technika - http://www.gnucitizen.org/projects/technika/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Load-AttackAPI bookmarklet - http://www.gnucitizen.org/projects/load-attackapi-bookmarklet&amp;lt;br/ &amp;gt;&lt;br /&gt;
MD's Projects: JS port scanner, pinger, backdoors, etc - http://michaeldaw.org/my-projects/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Web application services that aid in web application security assessment&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
Netcraft - http://www.netcraft.net&amp;lt;br/ &amp;gt;&lt;br /&gt;
AboutURL - http://www.abouturl.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
The Scrutinizer - http://www.scrutinizethis.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
net.toolkit - http://clez.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
ServerSniff - http://www.serversniff.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Online Microsoft script decoder - http://www.greymagic.com/security/tools/decoder/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Webmaster-Toolkit - http://www.webmaster-toolkit.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
myIPNeighbbors, et al - http://digg.com/security/MyIPNeighbors_Find_Out_Who_Else_is_Hosted_on_Your_Site_s_IP_Address&amp;lt;br/ &amp;gt;&lt;br /&gt;
PHP charset encoding - http://h4k.in/encoding&amp;lt;br/ &amp;gt;&lt;br /&gt;
data: URL testcases - http://h4k.in/dataurl&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Browser-based security fuzzing / checking&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
Zalewski's MangleMe - http://lcamtuf.coredump.cx/mangleme/mangle.cgi&amp;lt;br/ &amp;gt;&lt;br /&gt;
hdm's tools: Hamachi, CSSDIE, DOM-Hanoi, AxMan - http://metasploit.com/users/hdm/tools/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Peach Fuzzer Framework - http://peachfuzz.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
TagBruteForcer - http://research.eeye.com/html/tools/RT20060801-3.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
PROTOS Test-Suite: c05-http-reply - http://www.ee.oulu.fi/research/ouspg/protos/testing/c05/http-reply/index.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
COMRaider - http://labs.idefense.com&amp;lt;br/ &amp;gt;&lt;br /&gt;
bcheck - http://bcheck.scanit.be/bcheck/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Stop-Phishing: Projects page - http://www.indiana.edu/~phishing/?projects&amp;lt;br/ &amp;gt;&lt;br /&gt;
LinkScanner - http://linkscanner.explabs.com/linkscanner/default.asp&amp;lt;br/ &amp;gt;&lt;br /&gt;
BrowserCheck - http://www.heise-security.co.uk/services/browsercheck/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Cross-browser Exploit Tests - http://www.jungsonnstudios.com/cool.php&amp;lt;br/ &amp;gt;&lt;br /&gt;
Stealing information using DNS pinning demo - http://www.jumperz.net/index.php?i=2&amp;amp;a=1&amp;amp;b=7&amp;lt;br/ &amp;gt;&lt;br /&gt;
Javascript Website Login Checker - http://ha.ckers.org/weird/javascript-website-login-checker.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Mozilla Activex - http://www.iol.ie/~locka/mozilla/mozilla.htm&amp;lt;br/ &amp;gt;&lt;br /&gt;
Jungsonn's Black Dragon Project - http://blackdragon.jungsonnstudios.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Mr. T (Master Recon Tool, includes Read Firefox Settings PoC) - http://ha.ckers.org/mr-t/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Vulnerable Adobe Plugin Detection For UXSS PoC - http://www.0x000000.com/?i=324&amp;lt;br/ &amp;gt;&lt;br /&gt;
About Flash: is your flash up-to-date? - http://www.macromedia.com/software/flash/about/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Test your installation of Java software - http://java.com/en/download/installed.jsp?detect=jre&amp;amp;try=1&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;PHP static analysis and file inclusion scanning&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
PHP-SAT.org: Static analysis for PHP - http://www.program-transformation.org/PHP/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Unl0ck Research Team: tool for searching in google for include bugs - http://unl0ck.net/tools.php&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
FIS: File Inclusion Scanner - http://www.segfault.gr/index.php?cat_id=3&amp;amp;cont_id=25&amp;lt;br/&amp;gt;&lt;br /&gt;
PHPSecAudit - http://developer.spikesource.com/projects/phpsecaudit&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Web Application Firewall (WAF) and Intrusion Detection (APIDS) rules and resources&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
APIDS on Wikipedia - http://en.wikipedia.org/wiki/APIDS&amp;lt;br/ &amp;gt;&lt;br /&gt;
PHP Intrusion Detection System (PHP-IDS) - http://php-ids.org/ http://code.google.com/p/phpids/&amp;lt;br/ &amp;gt;&lt;br /&gt;
dotnetids - http://code.google.com/p/dotnetids/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Secure Science InterScout - http://www.securescience.com/home/newsandevents/news/interscout1.0.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Remo: whitelist rule editor for mod_security - http://remo.netnea.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
GotRoot: ModSecuirty rules - http://www.gotroot.com/tiki-index.php?page=mod_security+rules&amp;lt;br/ &amp;gt;&lt;br /&gt;
The Web Security Gateway (WSGW) - http://wsgw.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
mod_security rules generator - http://noeljackson.com/tools/modsecurity/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Mod_Anti_Tamper - http://www.wisec.it/projects.php?id=3&amp;lt;br/ &amp;gt;&lt;br /&gt;
[TGZ] Automatic Rules Generation for Mod_Security - http://www.wisec.it/rdr.php?fn=/Projects/Rule-o-matic.tgz&amp;lt;br/ &amp;gt;&lt;br /&gt;
AQTRONIX WebKnight - http://www.aqtronix.com/?PageID=99&amp;lt;br/ &amp;gt;&lt;br /&gt;
Akismet: blog spam defense - http://akismet.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Samoa: Formal tools for securing web services - http://research.microsoft.com/projects/samoa/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Web services enumeration / scanning / fuzzing&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
WebServiceStudio2.0 - http://www.gotdotnet.com/Community/UserSamples/Details.aspx?SampleGuid=65a1d4ea-0f7a-41bd-8494-e916ebc4159c&amp;lt;br/ &amp;gt;&lt;br /&gt;
Net-square: wsChess - http://net-square.com/wschess/index.shtml&amp;lt;br/ &amp;gt;&lt;br /&gt;
WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
SIFT: web method search tool - http://www.sift.com.au/73/171/sift-web-method-search-tool.htm&amp;lt;br/ &amp;gt;&lt;br /&gt;
iSecPartners: WSMap, WSBang, etc - http://www.isecpartners.com/tools.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Web application non-specific static source-code analysis&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
Pixy: a static analysis tool for detecting XSS vulnerabilities - http://www.seclab.tuwien.ac.at/projects/pixy/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Brixoft.Net: Source Edit - http://www.brixoft.net/prodinfo.asp?id=1&amp;lt;br/ &amp;gt;&lt;br /&gt;
Security compass web application auditing tools (SWAAT) - http://www.owasp.org/index.php/Category:OWASP_SWAAT_Project&amp;lt;br/ &amp;gt;&lt;br /&gt;
An even more complete list here - http://www.cs.cmu.edu/~aldrich/courses/654/tools/&amp;lt;br/ &amp;gt;&lt;br /&gt;
A nice list that claims some demos available - http://www.cs.cmu.edu/~aldrich/courses/413/tools.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
A smaller, but also good list - http://spinroot.com/static/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Static analysis for C/C++ (CGI, ISAPI, etc) in web applications&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
RATS - http://www.securesoftware.com/resources/download_rats.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
ITS4 - http://www.cigital.com/its4/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FlawFinder - http://www.dwheeler.com/flawfinder/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Splint - http://www.splint.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Uno - http://spinroot.com/uno/&amp;lt;br/ &amp;gt;&lt;br /&gt;
BOON (Buffer Overrun detectiON) - http://www.cs.berkeley.edu/~daw/boon/ http://boon.sourceforge.net&amp;lt;br/ &amp;gt;&lt;br /&gt;
Valgrind - http://www.valgrind.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Java static analysis, security frameworks, and web application security tools&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
HDIV Struts - http://hdiv.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Orizon - http://sourceforge.net/projects/orizon/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FindBugs: Find bugs in Java programs - http://findbugs.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
PMD - http://pmd.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CUTE: A Concolic Unit Testing Engine for C and Java - http://osl.cs.uiuc.edu/~ksen/cute/&amp;lt;br/ &amp;gt;&lt;br /&gt;
EMMA - http://emma.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
JLint - http://jlint.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Java PathFinder - http://javapathfinder.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Fujaba: Move between UML and Java source code - http://wwwcs.uni-paderborn.de/cs/fujaba/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Checkstyle - http://checkstyle.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Cookie Revolver Security Framework - http://sourceforge.net/projects/cookie-revolver&amp;lt;br/ &amp;gt;&lt;br /&gt;
tinapoc - http://sourceforge.net/projects/tinapoc&amp;lt;br/ &amp;gt;&lt;br /&gt;
jarsigner - http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Solex - http://solex.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Java Explorer - http://metal.hurlant.com/jexplore/&amp;lt;br/ &amp;gt;&lt;br /&gt;
HTTPClient - http://www.innovation.ch/java/HTTPClient/&amp;lt;br/ &amp;gt;&lt;br /&gt;
another HttpClient - http://jakarta.apache.org/commons/httpclient/&amp;lt;br/ &amp;gt;&lt;br /&gt;
a list of code coverage and analysis tools for Java - http://mythinkpond.blogspot.com/2007/06/java-foss-freeopen-source-software.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Microsoft .NET static analysis and security framework tools, mostly for ASP.NET and ASP.NET AJAX, but also C# and VB.NET&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
Orcas - http://msdn.microsoft.com/vstudio/express/future/downloads/default.aspx&amp;lt;br/ &amp;gt;&lt;br /&gt;
Web Development Helper - http://www.nikhilk.net/Project.WebDevHelper.aspx&amp;lt;br/ &amp;gt;&lt;br /&gt;
FxCop - http://blogs.msdn.com/fxcop/ http://www.gotdotnet.com/team/fxcop/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Microsoft Application Verifier - http://www.microsoft.com/technet/prodtechnol/windows/appcompatibility/appverifier.mspx&amp;lt;br/ &amp;gt;&lt;br /&gt;
Microsoft internal tools you can't have yet - http://www.microsoft.com/windows/cse/pa_projects.mspx http://research.microsoft.com/Pex/ http://www.owasp.org/images/5/5b/OWASP_IL_7_FuzzGuru.pdf&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Threat modeling&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
Microsoft Threat Analysis and Modeling Tool v2.1 (TAM) - http://www.microsoft.com/downloads/details.aspx?FamilyID=59888078-9daf-4e96-b7d1-944703479451&amp;amp;displaylang=en&amp;lt;br/ &amp;gt;&lt;br /&gt;
Amenaza: Attack Tree Modeling (SecurITree) - http://www.amenaza.com/software.php&amp;lt;br/ &amp;gt;&lt;br /&gt;
Octotrike - http://www.octotrike.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Add-ons for Firefox that help with general web application security&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
Web Developer Toolbar - https://addons.mozilla.org/firefox/60/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Plain Old Webserver (POW) - https://addons.mozilla.org/firefox/3002/&amp;lt;br/ &amp;gt;&lt;br /&gt;
XML Developer Toolbar - https://addons.mozilla.org/firefox/2897/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Public Fox - https://addons.mozilla.org/firefox/3911/&amp;lt;br/ &amp;gt;&lt;br /&gt;
XForms Buddy - http://beaufour.dk/index.php?sec=misc&amp;amp;pagename=xforms&amp;lt;br/ &amp;gt;&lt;br /&gt;
MR Tech Local Install - http://www.mrtech.com/extensions/local_install/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Nightly Tester Tools - http://users.blueprintit.co.uk/~dave/web/firefox/buildid/index.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
IE Tab - https://addons.mozilla.org/firefox/1419/&amp;lt;br/ &amp;gt;&lt;br /&gt;
User-Agent Switcher - https://addons.mozilla.org/firefox/59/&amp;lt;br/ &amp;gt;&lt;br /&gt;
ServerSwitcher - https://addons.mozilla.org/firefox/2409/&amp;lt;br/ &amp;gt;&lt;br /&gt;
HeaderMonitor - https://addons.mozilla.org/firefox/575/&amp;lt;br/ &amp;gt;&lt;br /&gt;
RefControl - https://addons.mozilla.org/firefox/953/&amp;lt;br/ &amp;gt;&lt;br /&gt;
refspoof - https://addons.mozilla.org/firefox/667/&amp;lt;br/ &amp;gt;&lt;br /&gt;
No-Referrer - https://addons.mozilla.org/firefox/1999/&amp;lt;br/ &amp;gt;&lt;br /&gt;
LocationBar^2 - https://addons.mozilla.org/firefox/4014/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SpiderZilla - http://spiderzilla.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Slogger - https://addons.mozilla.org/en-US/firefox/addon/143&amp;lt;br/ &amp;gt;&lt;br /&gt;
Fire Encrypter - https://addons.mozilla.org/firefox/3208/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Add-ons for Firefox that help with Javascript and Ajax web application security&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
Selenium IDE - http://www.openqa.org/selenium-ide/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Firebug - http://www.joehewitt.com/software/firebug/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Venkman - http://www.mozilla.org/projects/venkman/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Chickenfoot - http://groups.csail.mit.edu/uid/chickenfoot/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Greasemonkey - http://www.greasespot.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Greasemonkey compiler - http://www.letitblog.com/greasemonkey-compiler/&amp;lt;br/ &amp;gt;&lt;br /&gt;
User script compiler - http://arantius.com/misc/greasemonkey/script-compiler&amp;lt;br/ &amp;gt;&lt;br /&gt;
Extension Developer's Extension (Firefox Add-on) - http://ted.mielczarek.org/code/mozilla/extensiondev/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Smart Middle Click (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/3885/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Bookmarklets that aid in web application security&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
RSnake's security bookmarklets - http://ha.ckers.org/bookmarklets.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
BMlets - http://optools.awardspace.com/bmlet.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Huge list of bookmarklets - http://www.squarefree.com/bookmarklets/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Blummy: consists of small widgets, called blummlets, which make use of Javascript to provide&lt;br /&gt;
rich functionality - http://www.blummy.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Bookmarklets every blogger should have - http://www.micropersuasion.com/2005/10/bookmarklets_ev.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
Flat Bookmark Editing (Firefox Add-on) - http://n01se.net/chouser/proj/mozhack/&amp;lt;br/ &amp;gt;&lt;br /&gt;
OpenBook and Update Bookmark (Firefox Add-ons) - http://www.chuonthis.com/extensions/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;SSL certificate checking / scanning&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
[ZIP] THCSSLCheck - http://thc.org/root/tools/THCSSLCheck.zip&amp;lt;br/ &amp;gt;&lt;br /&gt;
[ZIP] Foundstone SSLDigger - http://foundstone.com/resources/freetooldownload.htm?file=ssldigger.zip&amp;lt;br/ &amp;gt;&lt;br /&gt;
Cert Viewer Plus (Firefox Add-on) - https://addons.mozilla.org/firefox/1964/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Honeyclients, Web Application, and Web Proxy honeypots&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
Honeyclient Project: an open-source honeyclient - http://www.honeyclient.org/trac/ &amp;lt;br/ &amp;gt;&lt;br /&gt;
HoneyC: the low-interaction honeyclient - http://honeyc.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Capture: a high-interaction honeyclient - http://capture-hpc.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Google Hack Honeypot - http://ghh.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
PHP.Hop - PHP Honeynet Project - http://www.rstack.org/phphop/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SpyBye - http://www.monkey.org/~provos/spybye/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Honeytokens - http://www.securityfocus.com/infocus/1713&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Blackhat SEO and maybe some whitehat SEO&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
SearchStatus (Firefox Add-on) - http://www.quirk.biz/searchstatus/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SEO for Firefox (Firefox Add-on) - http://tools.seobook.com/firefox/seo-for-firefox.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
SEOQuake (Firefox Add-on) - http://www.seoquake.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Footprinting for web application security&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
Evolution - http://www.paterva.com/evolution-e.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
GooSweep - http://www.mcgrewsecurity.com/projects/goosweep/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Aura: Google API Utility Tools - http://www.sensepost.com/research/aura/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Edge-Security tools - http://www.edge-security.com/soft.php&amp;lt;br/ &amp;gt;&lt;br /&gt;
Fierce Domain Scanner - http://ha.ckers.org/fierce/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Googlegath - http://www.nothink.org/perl/googlegath/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Advanced Dork (Firefox Add-on) - https://addons.mozilla.org/firefox/2144/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Passive Cache (Firefox Add-on) - https://addons.mozilla.org/firefox/977/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CacheOut! (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1453/&amp;lt;br/ &amp;gt;&lt;br /&gt;
BugMeNot Extension (Firefox Add-on) - http://roachfiend.com/archives/2005/02/07/bugmenot/&amp;lt;br/ &amp;gt;&lt;br /&gt;
TrashMail.net Extension (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1813/&amp;lt;br/ &amp;gt;&lt;br /&gt;
DiggiDig (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2819/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Digger (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1467/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Database security assessment&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
Scuba by Imperva Database Vulnerability Scanner - http://www.imperva.com/scuba/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Browser Defenses&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
DieHard - http://www.diehard-software.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
LocalRodeo (Firefox Add-on) - http://databasement.net/labs/localrodeo/&amp;lt;br/ &amp;gt;&lt;br /&gt;
NoMoXSS - http://www.seclab.tuwien.ac.at/projects/jstaint/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Request Rodeo - http://savannah.nongnu.org/projects/requestrodeo&amp;lt;br/ &amp;gt;&lt;br /&gt;
FlashBlock (Firefox Add-on) - http://flashblock.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
CookieSafe (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2497&amp;lt;br/ &amp;gt;&lt;br /&gt;
NoScript (Firefox Add-on) - http://www.noscript.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FormFox (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1579/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Adblock (Firefox Add-on) - http://adblock.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
httpOnly in Firefox (Firefox Add-on) - http://blog.php-security.org/archives/40-httpOnly-Cookies-in-Firefox-2.0.html&amp;lt;br/ &amp;gt;&lt;br /&gt;
SafeCache (Firefox Add-on) - http://www.safecache.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
SafeHistory (Firefox Add-on) - http://www.safehistory.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
PrefBar (Firefox Add-on) - http://prefbar.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
All-in-One Sidebar (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1027/&amp;lt;br/ &amp;gt;&lt;br /&gt;
QArchive.org web file checker (Firefox Add-on) - https://addons.mozilla.org/firefox/4115/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Update Notified (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2098/&amp;lt;br/ &amp;gt;&lt;br /&gt;
FireKeeper - http://firekeeper.mozdev.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Browser Privacy&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
TrackMeNot (Firefox Add-on) - https://addons.mozilla.org/firefox/3173/&amp;lt;br/ &amp;gt;&lt;br /&gt;
Privacy Bird - http://www.privacybird.com/&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;br/ &amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Application and protocol fuzzing (random instead of targeted)&amp;lt;/b&amp;gt;&amp;lt;br/ &amp;gt;&lt;br /&gt;
Sulley - http://fuzzing.org/&amp;lt;br/ &amp;gt;&lt;br /&gt;
taof: The Art of Fuzzing - http://sourceforge.net/projects/taof/&amp;lt;br/ &amp;gt;&lt;br /&gt;
zzuf: multipurpose fuzzer - http://sam.zoy.org/zzuf/&amp;lt;br/ &amp;gt;&lt;br /&gt;
autodafé: an act of software torture - http://autodafe.sourceforge.net/&amp;lt;br/ &amp;gt;&lt;br /&gt;
EFS and GPF: Evolutionary Fuzzing System - http://www.appliedsec.com/resources.html&amp;lt;br/ &amp;gt;&lt;/div&gt;</summary>
		<author><name>Marcin</name></author>	</entry>

	</feed>