<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=OWASP+Germany+Local+Chapter</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=OWASP+Germany+Local+Chapter"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/OWASP_Germany_Local_Chapter"/>
		<updated>2026-04-26T04:52:48Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=71947</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=71947"/>
				<updated>2009-10-21T18:29:32Z</updated>
		
		<summary type="html">&lt;p&gt;OWASP Germany Local Chapter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
&lt;br /&gt;
== PREVIOUS NOTE  ==&lt;br /&gt;
&lt;br /&gt;
This project, while still useful, is pretty much dormant and orphaned by the project lead.  The OWASP Global Projects Committee (GPC)suggests looking at [[:Category:OWASP EnDe|EnDE]] which is an amazing bit of JavaScript encoding/decoding goodness that came out of the OWAP SoC 2008.&lt;br /&gt;
&lt;br /&gt;
[[Image:HttpRequests.jpg|thumb|right|300px]] &lt;br /&gt;
&lt;br /&gt;
== Overview  ==&lt;br /&gt;
&lt;br /&gt;
CAL9000 is a collection of web application security testing tools that complement the feature set of current web proxies and automated scanners. CAL9000 gives you the flexibility and functionality you need for more effective manual testing efforts. Works best when used with Firefox or Internet Explorer. &lt;br /&gt;
&lt;br /&gt;
CAL9000 is written in Javascript, so you have full access to the source code. Feel free to modify it to best suit your particular needs. CAL9000 has some powerful features (like executing cross-domain xmlHttpRequests and writing to disk). It is purposefully designed to do some horribly insecure things. Therefore, I would strongly encourage that you only run it locally and NOT off of a server. &lt;br /&gt;
&lt;br /&gt;
Take a few moments to check out the CAL9000 built-in Help file for information about all of the new features and some potential gotchas (browser quirks, xmlHttpRequest limitations, etc.) &lt;br /&gt;
&lt;br /&gt;
Please only use this tool for testing your own applications or those that you have been authorized to test. &lt;br /&gt;
&lt;br /&gt;
== Features  ==&lt;br /&gt;
&lt;br /&gt;
*XSS Attacks - This is a listing of the XSS Attack Info from [http://ha.ckers.org/xss.html RSnake]. You can filter the listing based on which browsers the attacks work in, test them, apply RegEx filters and create/edit/save/delete your own attacks. &lt;br /&gt;
*Character Encoder/Decoder - Encodes and decodes the following types: URL, Standard Hex, Unicode, Html(Named), Html(Decimal), Html(Hex), Html(Hex Long), Javascript Escaped, XML Escaped, Straight Decimal, Straight Hex, IE Hex, IE Unicode, Base64 and MD5. Encode only with MD4 and SHA1. Specify Upper/Lowercase, Delimiters and Trailing Characters. You can add/remove wrappers around your results and encode/decode selected text instead of the entire contents of the window. &lt;br /&gt;
*Http Requests - Manually craft and send HTTP requests to servers. GET, POST, HEAD, TRACE, TRACK, OPTIONS, CONNECT, PUT, DELETE, COPY, LOCK, MKCOL, MOVE, PROPFIND, PROPPATCH, SEARCH and UNLOCK methods supported. Send single requests or launch automated attacks with more than one request at a time. All results are saved in a history file. &lt;br /&gt;
*Http Responses - View the status codes, response headers and body. Isolate the script, form and cookie information in the response. &lt;br /&gt;
*Scratchpad - A place to save code snippets, notes, results, etc. &lt;br /&gt;
*Cheatsheets - Collection of references for various web-related platforms and languages. &lt;br /&gt;
*IP Encode/Decode - Go to/from IP, Dword, Hex and Octal addresses. &lt;br /&gt;
*String Generator - Create character strings of almost any length. &lt;br /&gt;
*Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators. &lt;br /&gt;
*Testing Tips - Collection of testing ideas for assessments. &lt;br /&gt;
*Testing Checklist - Track the progress of your testing efforts and record your findings. The checklist categories roughly correlate with the Manual Testing Techniques from the OWASP Testing Guide. Create/edit/save/delete your own checklist items. &lt;br /&gt;
*AutoAttack Editor - Create/edit/save/delete the AutoAttack Lists that are used to drive the automated multiple-request capabilities on the HTTP Requests page. &lt;br /&gt;
*Store/Restore - Temporarily hold and retrieve textarea and text field contents. &lt;br /&gt;
*Save/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing. &lt;br /&gt;
*Selected Text Processing - Allows you to process selected text inside of a textarea instead of the entire contents.&lt;br /&gt;
&lt;br /&gt;
== Downloads  ==&lt;br /&gt;
&lt;br /&gt;
LATEST RELEASE - Version 2.0 released November 16, 2006. See the [[OWASP CAL9000 Project Roadmap]] for release notes. &lt;br /&gt;
&lt;br /&gt;
*Click [http://www.digilantesecurity.com/CAL9000/files/CAL9000.zip here] to download the CAL9000 tool. &lt;br /&gt;
*Click [http://owasp-code-central.googlecode.com/svn/trunk/labs/cal9000/ here] to view the CAL9000 source code.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
Chris Loomis wrote the CAL9000 tool and currently leads the project. Any and all questions, comments or suggestions are welcome and may be directed [mailto:cal9000tool@mac.com here] or submitted via the [http://lists.owasp.org/mailman/listinfo/owasp-cal9000 mailing list]. &lt;br /&gt;
&lt;br /&gt;
Thanks to everyone who has emailed me their comments and great suggestions for enhancing CAL9000. Keep the ideas coming! Special thanks to Achim Hoffmann for his significant contributions of code and time to the project. &lt;br /&gt;
&lt;br /&gt;
'''Geeze, Really helpful stuff.''' &lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation:  ==&lt;br /&gt;
&lt;br /&gt;
We hope that you find the OWASP CAL9000 Project useful. Please contribute to the Project by volunteering for one of the Tasks and/or sending your comments, questions and suggestions to owasp@owasp.org. To join the OWASP CAL9000 Project mailing list or to view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-cal9000 subscription page]. &lt;br /&gt;
&lt;br /&gt;
== Roadmap  ==&lt;br /&gt;
&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks. &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|CAL9000 Project]] [[Category:OWASP_Download]] [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>OWASP Germany Local Chapter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Projects_Dashboard&amp;diff=71935</id>
		<title>OWASP Projects Dashboard</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Projects_Dashboard&amp;diff=71935"/>
				<updated>2009-10-21T17:23:48Z</updated>
		
		<summary type="html">&lt;p&gt;OWASP Germany Local Chapter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* For more details on how this works see [[GPC Info On Editing Templates]].&lt;br /&gt;
&lt;br /&gt;
== PROJECTS THAT HAVE ANSWERED BACK TO THE &amp;quot;[https://spreadsheets.google.com/viewform?hl=en&amp;amp;formkey=cEp6TlUxeU5KZDdWQkgxYlM2clkwRVE6MA OWASP Project Owner Spring 2009 Self Update]&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
=== CONNECTED DATA ===&lt;br /&gt;
* In a nutshell, this set of projects have the following features:&lt;br /&gt;
**The [[:GPC Project Details/OWASP Vicnum Project|new project details tab]] has been set up and filled in with the [[:Template:OWASP Project Identification Tab|new template]], &lt;br /&gt;
**The [[:Template:OWASP Project Identification Tab|new template]] has the project's actualized content,&lt;br /&gt;
**The link to the new project details tab has been placed in the projects page.  &lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP_Project_Details/Columns}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_EnDe | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Orizon_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Vicnum_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC Project Details/OWASP Top10 | OWASP Project Details Row}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== UNCONNECTED DATA ===&lt;br /&gt;
* In a nutshell, this set of projects have the following features:&lt;br /&gt;
**The  [[:GPC Project Details/OWASP Vicnum Project|new project details tab]] has been set up and filled in with the [[:Template:OWASP Project Identification Tab|new template]],&lt;br /&gt;
**The [[:Template:OWASP Project Identification Tab|new template]] DOESN'T HAVE the project's actualized content,&lt;br /&gt;
**The link to the new project details tab HASN'T YET BEEN placed in the projects page.  &lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP_Project_Details/Columns}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_.NET_Project | OWASP Project Details/Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Details/Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API Java EE Version | OWASP Project Details/Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API .NET Version | OWASP Project Details/Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Classic ASP Version | OWASP Project Details/Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - PHP Version  | OWASP Project Details/Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - ColdFusion/CFML | OWASP Project Details/Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Python Version | OWASP Project Details/Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Haskell Version | OWASP Project Details/Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Access_Control_Rules_Tester_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AIR_Security_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Anti-Malware_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project_.NET | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Requirements_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Tool_Benchmarking_Environment_and_Site_Generator_Refresh_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AppSensor_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_ASDR_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Verification_Standard_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Backend_Security_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Certification_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Classic_ASP_Security_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Crawler | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Review_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFGuard_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFTester_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_DirBuster_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Education_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_OpenPGP_Extensions_for_HTTP_-_Enigform_and_mod_openpgp | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP OpenSign Server Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Google_Hacking_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Internationalization | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JSP_Testing_Tool_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Learn_About_Encoding_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Legal_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Live_CD | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_ModSecurity_Core_Rule_Set_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_NetBouncer_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Open_Review_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP PHP Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Proxy_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Positive_Security_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Python_Static_Analysis_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Ruby on Rails Security Guide V2 | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Scrubbr | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Securing WebGoat using ModSecurity Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Speakers Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Security Spending Benchmarks Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Skavenger Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/Software_Assurance_Maturity_Model | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Source Code Flaws Top 10 Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Spanish | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sprajax Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sqlibench Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Stinger Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Teachable Static Analysis Workbench Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Testing Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Wapiti Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Webekci Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebGoat Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebScarab Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP WSFuzzer Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Yasca Project | OWASP Project Details Row}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== PROJECTS RECENTLY SET UP (after the &amp;quot;[https://spreadsheets.google.com/viewform?hl=en&amp;amp;formkey=cEp6TlUxeU5KZDdWQkgxYlM2clkwRVE6MA OWASP Project Owner Spring 2009 Self Update]&amp;quot;)==&lt;br /&gt;
&lt;br /&gt;
=== CONNECTED DATA ===&lt;br /&gt;
* In a nutshell, this set of projects have the following features:&lt;br /&gt;
**The [[:GPC Project Details/OWASP Vicnum Project|new project details tab]] has been set up and filled in with the [[:Template:OWASP Project Identification Tab|new template]], &lt;br /&gt;
**The [[:Template:OWASP Project Identification Tab|new template]] has the project's actualized content,&lt;br /&gt;
**The link to the new project details tab has been placed in the projects page.  &lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP_Project_Details/Columns}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP JSReg Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Cloud ‐ 10 Project | OWASP Project Details Row}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== UNCONNECTED DATA ===&lt;br /&gt;
* In a nutshell, this set of projects have the following features:&lt;br /&gt;
**The  [[:GPC Project Details/OWASP Vicnum Project|new project details tab]] has been set up and filled in with the [[:Template:OWASP Project Identification Tab|new template]],&lt;br /&gt;
**The [[:Template:OWASP Project Identification Tab|new template]] DOESN'T HAVE the project's actualized content,&lt;br /&gt;
**The link to the new project details tab HASN'T YET BEEN placed in the projects page.&lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP_Project_Details/Columns}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Content Validation using Java Annotations Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_CRM_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Cryttr_-_Encrypted_Twitter_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP CTF Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Encrypted Syndication Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Favicon Database Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Joomla Vulnerability Scanner Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC Project Details/OWASP Mutillidae Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP O2 Platform | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Security Analysis of Core J2EE Design Patterns Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Web Application Scanner Specification Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Web Application Security Metric using Attack Patterns Project | OWASP Project Details Row}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ADOPTED PROJECTS (after the &amp;quot;[https://spreadsheets.google.com/viewform?hl=en&amp;amp;formkey=cEp6TlUxeU5KZDdWQkgxYlM2clkwRVE6MA OWASP Project Owner Spring 2009 Self Update]&amp;quot;)==&lt;br /&gt;
&lt;br /&gt;
=== UNCONNECTED DATA ===&lt;br /&gt;
* In a nutshell, this set of projects have the following features:&lt;br /&gt;
**The  [[:GPC Project Details/OWASP Vicnum Project|new project details tab]] has been set up and filled in with the [[:Template:OWASP Project Identification Tab|new template]],&lt;br /&gt;
**The [[:Template:OWASP Project Identification Tab|new template]] DOESN'T HAVE the project's actualized content,&lt;br /&gt;
**The link to the new project details tab HASN'T YET BEEN placed in the projects page.&lt;br /&gt;
{{:Template:OWASP_Project_Details/Columns}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Flash Security Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP Fuzzing Code Database | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/ORG (OWASP Report Generator) | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP AJAX Security Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Logging Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Web Services Security Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Tools Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Application Security Metrics Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Web 2.0 Project | OWASP Project Details Row}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ORPHANED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
=== CONNECTED DATA ===&lt;br /&gt;
&lt;br /&gt;
See [[OWASP Projects Dashboard - Orphaned Projects]] for the current list of Orphaned projects (projects that need new project leaders).&lt;/div&gt;</summary>
		<author><name>OWASP Germany Local Chapter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=71934</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=71934"/>
				<updated>2009-10-21T17:20:52Z</updated>
		
		<summary type="html">&lt;p&gt;OWASP Germany Local Chapter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. Tools and documents are organized into the following categories: &lt;br /&gt;
&lt;br /&gt;
*'''PROTECT''' - These are tools and documents that can be used to guard against security-related design and implementation flaws. &lt;br /&gt;
*'''DETECT''' - These are tools and documents that can be used to find security-related design and implementation flaws. &lt;br /&gt;
*'''LIFE CYCLE''' - These are tools and documents that can be used to add security-related activities into the Software Development Life Cycle (SDLC).&lt;br /&gt;
&lt;br /&gt;
If you would like to start a new project please review the '''[[How to Start an OWASP Project]]''' guide. Please contact the [https://www.owasp.org/index.php/Global_Projects_and_Tools_Committee Global Project Committee] members to discuss project ideas and how they might fit into OWASP. All OWASP projects must be free and open and have their homepage on the OWASP portal. You can read all the guidelines in the [[:Category:OWASP Project Assessment|Project Assessment Criteria]]. &lt;br /&gt;
&lt;br /&gt;
Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any of them on the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. &lt;br /&gt;
&lt;br /&gt;
A list of '''Projects''' that have been identified as '''orphaned''' ones has been set up. Please [[:Category:OWASP Orphaned Projects|glance at it]] and see you find interest in leading any of them. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Projects&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Release Quality Projects  ====&lt;br /&gt;
&lt;br /&gt;
*Release quality projects are generally the level of quality of professional tools or documents. &lt;br /&gt;
*Projects are listed below.&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;50%&amp;quot; | Tools&lt;br /&gt;
! Documentation&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
'''PROTECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AntiSamy Project|OWASP AntiSamy Java Project]] &lt;br /&gt;
:an API for validating rich HTML/CSS input from users without exposure to cross-site scripting and phishing attacks (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AntiSamy Project .NET|OWASP AntiSamy .NET Project]] &lt;br /&gt;
:an API for validating rich HTML/CSS input from users without exposure to cross-site scripting and phishing attacks. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Enterprise Security API|OWASP Enterprise Security API (ESAPI) Project]] &lt;br /&gt;
:a free and open collection of all the security methods that a developer needs to build a secure web application. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''DETECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Live CD Project|OWASP Live CD Project]] &lt;br /&gt;
:this CD collects some of the best open source security projects in a single environment. Web developers, testers and security professionals can boot from this Live CD and have access to a full security testing suite. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WebScarab Project|OWASP WebScarab Project]] &lt;br /&gt;
:a tool for performing all types of security testing on web applications and web services (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''LIFE CYCLE:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
:an online training environment for hands-on learning about application security (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
'''PROTECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Guide Project|OWASP Development Guide]] &lt;br /&gt;
:a massive document covering all aspects of web application and web service security (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP .NET Project|OWASP .NET Project]] &lt;br /&gt;
:the purpose of the this project is to provide a central repository of information and tools for software professionals that use the Microsoft .NET Framework for web applications and services. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Ruby on Rails Security Guide V2|OWASP Ruby on Rails Security Guide V2]] &lt;br /&gt;
:this Project is the one and only source of information about Rails security topics. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''DETECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard Project]] &lt;br /&gt;
:The ASVS defines the first internationally-recognized standard for conducting application security assessments. It covers both automated and manual approaches for assessing (verifying) applications using both security testing and code review techniques. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Code Review Project|OWASP Code Review Guide]] &lt;br /&gt;
:a project to capture best practices for reviewing code. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Testing Project|OWASP Testing Guide]] &lt;br /&gt;
:a project focused on application security testing procedures and checklists (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] &lt;br /&gt;
:an awareness document that describes the top ten web application security vulnerabilities (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''LIFE CYCLE:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AppSec FAQ Project|OWASP AppSec FAQ Project]] &lt;br /&gt;
:FAQ covering many application security topics (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Legal Project|OWASP Legal Project]] &lt;br /&gt;
:a project focused on providing contract language for acquiring secure software (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Source Code Review OWASP Projects Project|OWASP Source Code Review for OWASP-Projects]] &lt;br /&gt;
:a workflow for OWASP projects to incorporate static analysis into the Software Development Life Cycle (SDLC). (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Beta Status Projects  ====&lt;br /&gt;
&lt;br /&gt;
*Beta quality projects are complete and ready to use with documentation. &lt;br /&gt;
*Projects are listed below.&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;50%&amp;quot; | Tools&lt;br /&gt;
! Documentation&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
'''PROTECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP CSRFGuard Project|OWASP CSRFGuard Project]] &lt;br /&gt;
:a J2EE filter that implements a unique request token to mitigate CSRF attacks (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Encoding Project|OWASP Encoding Project]] &lt;br /&gt;
:a project focused on the development of encoding best practices for web applications. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP OpenSign Server Project|OWASP OpenSign Server Project]] &lt;br /&gt;
:the purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP OpenPGP Extensions for HTTP - Enigform and mod openpgp|OWASP OpenPGP Extensions for HTTP - Enigform and mod openpgp]] &lt;br /&gt;
:focus on mod_openpgp and Secure Session Management, presenting a working web-site using this new authentication methodology in such a way that it will attract security professionals and web-developers to this new mix of two good'ol protocols: HTTP and OpenPGP. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''DETECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Access Control Rules Tester Project|OWASP Access Control Rules Tester Project]] &lt;br /&gt;
:this project is intended to have two deliverables: research technical report (publication ready article) and an Access Control Rules Tester tool. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Code Crawler|OWASP Code Crawler]] &lt;br /&gt;
:this tool is aimed at assisting code review practitioners. It is a static code review tool which searches for key topics within .NET and J2EE/JAVA code. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP DirBuster Project|OWASP DirBuster Project]] &lt;br /&gt;
:DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP LAPSE Project|OWASP LAPSE Project]] &lt;br /&gt;
:an Eclipse-based source-code static analysis tool for Java (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Orizon Project|OWASP Orizon Project]] &lt;br /&gt;
:the goal of this project is to develop an extensible code review engine to be used from source code assessment tools. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Pantera Web Assessment Studio Project|OWASP Pantera Web Assessment Studio Project]] &lt;br /&gt;
:a project focused on combining automated capabilities with complete manual testing to get the best results (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[ORG (Owasp Report Generator)|OWASP Report Generator]] &lt;br /&gt;
:a project giving security professionals a way to report and keep track of their projects (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[Owasp SiteGenerator|OWASP Site Generator]] &lt;br /&gt;
:a project allowing users to create dynamic sites for use in training, web application scanner testing, etc... (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Skavenger Project|OWASP Skavenger Project]] &lt;br /&gt;
:is a web application security assessment tool kit that passively analyses traffic logged by various MITM proxies as well as other sources and helps to identify various kinds of possible vulnerabilities. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP SQLiX Project|OWASP SQLiX Project]] &lt;br /&gt;
:a project focused on the development of SQLiX, a full perl-based SQL scanner (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Sqlibench Project|OWASP Sqlibench Project]] &lt;br /&gt;
:this is a benchmarking project of automatic sql injectors related to dumping databases. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Tiger|OWASP Tiger]] &lt;br /&gt;
:OWASP Tiger is a Windows application originally intended to be used for automating the process of testing various known ASP.NET security issues in hosted environments. However, it is much more versatile than that: it can help you construct and send a HTTP requests, receive and analyze the responses, match them against a set of conditions to produce alerts, notifications that something is wrong with the application(s) or service(s) being tested. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WeBekci Project|OWASP WeBekci Project]] &lt;br /&gt;
:OWASP WeBekci is a web based ModSecurity 2.x management tool. WeBekci is written in PHP, Its backend is powered by MySQL and the frontend by XAJAX framework. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WSFuzzer Project|OWASP WSFuzzer Project]] &lt;br /&gt;
:a project focused on the development of WSFuzzer, a full python-based Web Services SOAP fuzzer (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''LIFE CYCLE:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP LiveCD Education Project|OWASP Live CD Education Project]] &lt;br /&gt;
:an educational supplement project containing tutorials, challenges and videos detailing the use of tools contained within the OWASP LiveCD - LabRat. This project was sponsored by [[OWASP Spring Of Code 2007|OWASP Spring Of Code 2007]] and [http://www.securitydistro.com/ Security Distro] (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Teachable Static Analysis Workbench Project|OWASP Teachable Static Analysis Workbench Project]] &lt;br /&gt;
:this project is intended to have two deliverables: research technical report (publication ready article) and a workbench prototype. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
'''PROTECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AppSensor Project|OWASP AppSensor Project]] &lt;br /&gt;
:a framework for detecting and responding to attacks from within the application. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Backend Security Project|OWASP Backend Security Project]] &lt;br /&gt;
:this is a new project created to improve and to collect the existant information about the backend security. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Securing WebGoat using ModSecurity Project|OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
:the purpose of this project is to create custom Modsecurity rulesets that will protect WebGoat 5.2 from as many of its vulnerabilities as possible (the goal is 90%) without changing one line of source code. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''DETECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Tools Project|OWASP Tools Project]] &lt;br /&gt;
:The OWASP Tools Project has been created to provide unbiased, practical information and guidance about application security tools that are used to detect vulnerabilities or to protect against vulnerabilities. The goal of this project is to identify any available tools, categorise them and rate them according to a predefind criteria to assess their effectiveness. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''LIFE CYCLE:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP CLASP Project|OWASP CLASP Project]] &lt;br /&gt;
:a project focused on defining process elements that reinforce application security (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Education Project|OWASP Education Project]] &lt;br /&gt;
:a project to build educational tracks and modules for different audiences. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Internationalization|OWASP Internationalization Project]] &lt;br /&gt;
:general guidelines to start a new translation project for OWASP site and projects. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Spanish|OWASP Spanish Project]] &lt;br /&gt;
:first translation effort to make OWASP site and project completely available in Spanish language. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Alpha Status Projects  ====&lt;br /&gt;
&lt;br /&gt;
*Alpha quality projects are generally usable but may lack documentation or quality review. &lt;br /&gt;
*Projects are listed below.&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;50%&amp;quot; | Tools&lt;br /&gt;
! Documentation&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
;[[:Category:OWASP Application Security Tool Benchmarking Environment and Site Generator Refresh Project|OWASP Application Security Tool Benchmarking Environment and Site Generator Refresh Project]] &lt;br /&gt;
:The idea is to split destination web application technology from the three reusable libraries: library of navigational elements, library of vulnerabilities and library of language constructs. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[Classic ASP Security Project|OWASP Classic ASP Security Project]] &lt;br /&gt;
:it aims in creating a secure framework for Classic ASP application by complementing existing OWASP projects with documentation for this particular technology and the creation of security libraries. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Content Validation using Java Annotations Project|OWASP Content Validation using Java Annotations Project]] &lt;br /&gt;
:We wish to explore the use of Java annotations for object validation, specifically for content validation. the result will be a framework which should be easy to use with an existing application. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP CRM Project|OWASP CRM Project]] &lt;br /&gt;
:provides a management system for membership, projects, industry and chapters and users of OWASP projects (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Cryttr - Encrypted Twitter Project|OWASP Cryttr - Encrypted Twitter Project]] &lt;br /&gt;
:a way to do some encrypted messaging to a group of distributed people with as little overhead as possible. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP CSRFTester Project|OWASP CSRFTester Project]] &lt;br /&gt;
:gives developers the ability to test their applications for CSRF flaws (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Encrypted Syndication Project|OWASP Encrypted Syndication Project]] &lt;br /&gt;
:complements the OWASP Cryttr - Encrypted Twitter Project and serves other few other front ends that can use Encrypted Syndication Protocol. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP EnDe|OWASP EnDe Project]] &lt;br /&gt;
:This tool is an encoder, decoder, converter, transformer, calculator, for various codings used in the wild wide web. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Favicon Database Project|OWASP Favicon Database Project]]&lt;br /&gt;
:software enumeration via favicon.ico (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Google Hacking Project|OWASP Google Hacking Project]] &lt;br /&gt;
:Google SOAP Search API with Perl (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Insecure Web App Project|OWASP Insecure Web App Project]] &lt;br /&gt;
:a web application that includes common web application vulnerabilities (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP JBroFuzz|OWASP JBroFuzz Project]] &lt;br /&gt;
:A web application fuzzer for requests being made over HTTP and/or HTTPS. Its purpose is to provide a single, portable application that offers stable web protocol fuzzing capabilities. This project was sponsored by [[OWASP Spring Of Code 2007|OWASP Spring Of Code 2007]] (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Joomla Vulnerability Scanner Project|OWASP Joomla Vulnerability Scanner Project]] &lt;br /&gt;
:a regularly-updated signature-based scanner that can detect file inclusion, sql injection, command execution,XSS, DOS,directory traversal vulnerabilities of a target Joomla! web site&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP JSP Testing Tool Project|OWASP JSP Testing Tool Project]] &lt;br /&gt;
:the goal of this project is to create an easy to use, freely available tool that can be used to quickly ascertain the level of protection that each component of a JSP tag library offers. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP JSReg Project|OWASP JSReg Project]] &lt;br /&gt;
:the goal of this project is to produce a simplified version of Javascript by using regular expressions to remove dangerous functionality and then use Javascript itself to evaluate the results. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Learn About Encoding Project|OWASP Learn About Encoding Project]] &lt;br /&gt;
:this project has as its ultimate goal of demystifying the problems related to the study of character encoding (charset encoding). (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Mutillidae|OWASP Mutillidae Project]] &lt;br /&gt;
:a deliberately vulnerable set of PHP scripts that implement the OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP NetBouncer Project|OWASP NetBouncer Project]] &lt;br /&gt;
:is secure by default centralised input/output validation library which combines security rules and business rules as well as escaping in the output level. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP O2 Platform|OWASP O2 Platform]]&lt;br /&gt;
:this project is a collection of Open Source modules that help Web Application Security Professionals to maximize their efforts and quickly obtain high visibility into an application's security profile (Assessment Criteria v2.0) &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Open Review Project|OWASP Open Review Project (ORPRO)]] &lt;br /&gt;
:a project to openly check open source libraries and software that are vital to most commercial and non-commercial apps around. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP PHP AntiXSS Library Project|OWASP PHP AntiXSS Library Project]] &lt;br /&gt;
:reduce cross-site scripting vulnerabilities by encoding your output (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Python Static Analysis Project|OWASP Python Static Analysis Project]] &lt;br /&gt;
:the aim of this project is to provide full language support,other Python frameworks support, analysis improvement, reporting capability, documentation, promotion materials: publication-ready article and presentation (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Proxy|OWASP Proxy Project]] &lt;br /&gt;
:aims to provide a high quality intercepting proxy library which can be used by developers who require this functionality in their own programs, rather than having to develop it all from scratch. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Sprajax Project|OWASP Sprajax Project]] &lt;br /&gt;
:an open source black box security scanner used to assess the security of AJAX-enabled applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Stinger Project|OWASP Stinger Project]] &lt;br /&gt;
:a project focus on the development of a centralized input validation mechanism which can be easily applied to existing or developmental applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Vicnum Project|OWASP Vicnum Project]] &lt;br /&gt;
: a flexible web application showing common vulnerabilities such as cross site scripting and session management issues. Helpful to IT auditors honing web security skills and to those setting up 'capture the flag' exercises (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Wapiti Project|OWASP Wapiti Project]] &lt;br /&gt;
:the project allows to audit the security by performing &amp;quot;black-box&amp;quot; scans acting like a fuzzer, injecting payloads to see if an application is vulnerable (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Web Application Security Metric using Attack Patterns Project|OWASP Web Application Security Metric using Attack Patterns Project]] &lt;br /&gt;
:the project provides attack pattern database along with prototype model (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Web 2.0 Project|OWASP Web 2.0 Project]] &lt;br /&gt;
:a place for advanced research of security in the Web 2.0 world (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WeBekci Project|OWASP WeBekci Project]] &lt;br /&gt;
:this is web based ModSecurity 2.x management tool. WeBekci is written in PHP, Its backend is powered by MySQL and the frontend by XAJAX framework. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Webslayer Project|OWASP Webslayer Project]] &lt;br /&gt;
:a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Yasca Project|OWASP Yasca Project]] &lt;br /&gt;
:Yasca is a new static analysis tool designed to scan Java, C/C++, JavaScript, .NET, and other source code for security and code-quality issues. Yasca is easily extensible via a plugin-based architecture, so scanning PHP, Ruby, or other languages is as simple as coming up with rules or integrating external tools. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
;[[:Category:OWASP ASDR Project|OWASP ASDR Project]] &lt;br /&gt;
:is a reference volume that contains basic information about all the foundational topics in application security (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Application Security Metrics Project|OWASP Application Security Metrics Project]] &lt;br /&gt;
:identify and provide a set of application security metrics that have been found by contributors to be effective in measuring application security (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AIR Security Project|OWASP AIR Security Project]] &lt;br /&gt;
:investigating the security of AIR applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AJAX Security Project|OWASP AJAX Security Guide]] &lt;br /&gt;
:investigating the security of AJAX enabled applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Anti-Malware Project|OWASP Anti-Malware Project]] &lt;br /&gt;
:describing common flaws in security designs (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Application Security Requirements Project|OWASP Application Security Requirements]] (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Best Practices: Use of Web Application Firewalls|OWASP Best Practices: Use of Web Application Firewalls]] &lt;br /&gt;
:the document is aimed primarily at technical decision-makers, especially those responsible for operations and security (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Book Cover &amp;amp; Sleeve Design|OWASP Book Cover &amp;amp;amp; Sleeve Design]] &lt;br /&gt;
:this is a project of corporate design to develop a scalable book cover series strategy and a Book Sleeve.&lt;br /&gt;
&lt;br /&gt;
(Assessment Criteria v1.0) &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Boot Camp Project|OWASP Boot Camp Project]] &lt;br /&gt;
:this project was started to supply a brief information about the OWASP projects. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Career Development Project|OWASP Career Development Project]] &lt;br /&gt;
:The OWASP Career Development project is focused on helping application security professionals understand the job market, roles, career paths, and skills to work in the field. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Certification Criteria Project|OWASP Certification Criteria Project]]&lt;br /&gt;
&lt;br /&gt;
(Assessment Criteria v1.0) &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Certification Project|OWASP Certification Project]] &lt;br /&gt;
:our challenge is to create a plan for certification: a set of OWASP Certification for Developers and Testers. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Communications Project|OWASP Communications Project]]&lt;br /&gt;
&lt;br /&gt;
(Assessment Criteria v1.0) &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Cloud ‐ 10 Project|OWASP Cloud ‐ 10 Project]] &lt;br /&gt;
:The goal of the project is to maintain a list of top 10 security risks faced with the Cloud Computing and SaaS Models. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Flash Security Project|OWASP Flash Security Project]] &lt;br /&gt;
:investigating the security of Flash applications (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Individual and Corporate Member Packs plus Conference Attendee Packs Brief|OWASP Member Packs/Conference Attendee Packs]] &lt;br /&gt;
:this is a project of corporate design to develop an Individual/Member Pack. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Java Project|OWASP Java Project]] &lt;br /&gt;
:a project focused on helping Java and J2EE developers build secure applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Logging Project|OWASP Logging Guide]] &lt;br /&gt;
:a project to define best practices for logging and log management (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP ModSecurity Core Rule Set Project|OWASP ModSecurity Core Rule Set Project]] &lt;br /&gt;
:a project to document and develop the ModSecurity Core Rule Set (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP PCI Project|OWASP PCI Project]] &lt;br /&gt;
:a project to build and maintain community concensus for managing regulatory risk of web applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP PHP Project|OWASP PHP Project]] &lt;br /&gt;
:a project focused on helping PHP developers build secure applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Positive Security Project|OWASP Positive Security Project]] &lt;br /&gt;
:a project to learn how companies are working to create a positive security approach on their own resources and use this knowledge to create a set of control, marketing and awareness tools that will be available to promote and construct a positive approach to security worldwide (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP SASAP Project|OWASP Scholastic Application Security Assessment Project]] &lt;br /&gt;
:a project that is intended to be the first step towards integrating security requirements in academic course curriculum (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Security Analysis of Core J2EE Design Patterns Project|OWASP Security Analysis of Core J2EE Design Patterns Project]] &lt;br /&gt;
:a to be a design-time security reference for developers implementing common patterns independent of specific platforms and frameworks (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Security Spending Benchmarks|OWASP Security Spending Benchmarks]] &lt;br /&gt;
:provides insight to reduce operational appsec costs (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:Software Assurance Maturity Model|Software Assurance Maturity Model (SAMM)]] &lt;br /&gt;
:this project is committed to building a usable framework to help organizations formulate and implement a strategy for application security that's tailored to the specific business risks facing the organization.&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Source Code Flaws Top 10 Project|OWASP Source Code Flaws Top 10 Project]] &lt;br /&gt;
:a project that is a sort of Top 10 of flaw categories that can be used to match vulnerabilities found during a code review (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Validation Project|OWASP Validation Project]] &lt;br /&gt;
:a project that provides guidance and tools related to validation (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WASS Project|OWASP WASS Guide]] &lt;br /&gt;
:a standards project to develop more concrete criteria for secure applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Web Application Scanner Specification Project|OWASP Web Application Scanner Specification Project]] &lt;br /&gt;
:there will always be a &amp;quot;gap&amp;quot; between the types of attacks that can be performed and those which can be found by an automated scanner. This project will attempt to outline some of those shortcomings and offer a plan for comparing and/or building web application vulnerability scanners. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Web Application Security Put Into Practice|OWASP Web Application Security Put Into Practice]] &lt;br /&gt;
:real-world web application security for Ruby on Rails, Apache and MySQL (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP XML Security Gateway Evaluation Criteria Project|OWASP XML Security Gateway Evaluation Criteria]] &lt;br /&gt;
:a project to define evaluation criteria for XML Security Gateways (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP on the Move Project|OWASP on The Move Project]] &lt;br /&gt;
:a project offering OWASP sponsorship for OWASP (related) speakers on web application security events or chapter meetings. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Speakers Project|OWASP Speakers Project]] &lt;br /&gt;
:a project to match offer and demand regarding OWASP (related) presentations by speakers on web application security events or chapter meetings. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Fuzzing Code Database|OWASP Fuzzing Code Database]] &lt;br /&gt;
:a project to collect, share and compose statements used as code injections like SQL, SSI, XSS, Formatstring and as well directory traversal statements. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Inactive Projects  ====&lt;br /&gt;
&lt;br /&gt;
*Inactive projects are unrated projects (projects that have not reached any one of Alpha, Beta, or Release status) which may have been abandoned. Efforts are being made to contact project leads to determine status and plans for future work. &lt;br /&gt;
*Projects are listed below.&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;50%&amp;quot; | Tools&lt;br /&gt;
! Documentation&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
;[[:Category:OWASP CAL9000 Project|OWASP CAL9000 Project]] &lt;br /&gt;
:a JavaScript based web application security testing suite&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Interceptor Project|OWASP Interceptor Project]] &lt;br /&gt;
:A testing tool for XML web service and Ajax interfaces.&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
;[[:Category:OWASP Application Security Assessment Standards Project|OWASP Application Security Assessment Standards Project]] &lt;br /&gt;
:establish a set of standards defining baseline approaches to conducting differing types/levels of application security assessment (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Corporate Application Security Rating Guide|OWASP Corporate Application Security Rating Guide]] &lt;br /&gt;
:This project will organize and structure publicly available data that large companies will share of the lessons learned about how to organize an application security initiative, best practices for training and testing, and more.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{PutInCategory}}&lt;/div&gt;</summary>
		<author><name>OWASP Germany Local Chapter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=71933</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=71933"/>
				<updated>2009-10-21T17:18:26Z</updated>
		
		<summary type="html">&lt;p&gt;OWASP Germany Local Chapter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. Tools and documents are organized into the following categories: &lt;br /&gt;
&lt;br /&gt;
*'''PROTECT''' - These are tools and documents that can be used to guard against security-related design and implementation flaws. &lt;br /&gt;
*'''DETECT''' - These are tools and documents that can be used to find security-related design and implementation flaws. &lt;br /&gt;
*'''LIFE CYCLE''' - These are tools and documents that can be used to add security-related activities into the Software Development Life Cycle (SDLC).&lt;br /&gt;
&lt;br /&gt;
If you would like to start a new project please review the '''[[How to Start an OWASP Project]]''' guide. Please contact the [https://www.owasp.org/index.php/Global_Projects_and_Tools_Committee Global Project Committee] members to discuss project ideas and how they might fit into OWASP. All OWASP projects must be free and open and have their homepage on the OWASP portal. You can read all the guidelines in the [[:Category:OWASP Project Assessment|Project Assessment Criteria]]. &lt;br /&gt;
&lt;br /&gt;
Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any of them on the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. &lt;br /&gt;
&lt;br /&gt;
A list of '''Projects''' that have been identified as '''orphaned''' ones has been set up. Please [[:Category:OWASP Orphaned Projects|glance at it]] and see you find interest in leading any of them. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Projects&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Release Quality Projects  ====&lt;br /&gt;
&lt;br /&gt;
*Release quality projects are generally the level of quality of professional tools or documents. &lt;br /&gt;
*Projects are listed below.&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;50%&amp;quot; | Tools&lt;br /&gt;
! Documentation&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
'''PROTECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AntiSamy Project|OWASP AntiSamy Java Project]] &lt;br /&gt;
:an API for validating rich HTML/CSS input from users without exposure to cross-site scripting and phishing attacks (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AntiSamy Project .NET|OWASP AntiSamy .NET Project]] &lt;br /&gt;
:an API for validating rich HTML/CSS input from users without exposure to cross-site scripting and phishing attacks. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Enterprise Security API|OWASP Enterprise Security API (ESAPI) Project]] &lt;br /&gt;
:a free and open collection of all the security methods that a developer needs to build a secure web application. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''DETECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Live CD Project|OWASP Live CD Project]] &lt;br /&gt;
:this CD collects some of the best open source security projects in a single environment. Web developers, testers and security professionals can boot from this Live CD and have access to a full security testing suite. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WebScarab Project|OWASP WebScarab Project]] &lt;br /&gt;
:a tool for performing all types of security testing on web applications and web services (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''LIFE CYCLE:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
:an online training environment for hands-on learning about application security (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
'''PROTECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Guide Project|OWASP Development Guide]] &lt;br /&gt;
:a massive document covering all aspects of web application and web service security (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP .NET Project|OWASP .NET Project]] &lt;br /&gt;
:the purpose of the this project is to provide a central repository of information and tools for software professionals that use the Microsoft .NET Framework for web applications and services. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Ruby on Rails Security Guide V2|OWASP Ruby on Rails Security Guide V2]] &lt;br /&gt;
:this Project is the one and only source of information about Rails security topics. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''DETECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard Project]] &lt;br /&gt;
:The ASVS defines the first internationally-recognized standard for conducting application security assessments. It covers both automated and manual approaches for assessing (verifying) applications using both security testing and code review techniques. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Code Review Project|OWASP Code Review Guide]] &lt;br /&gt;
:a project to capture best practices for reviewing code. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Testing Project|OWASP Testing Guide]] &lt;br /&gt;
:a project focused on application security testing procedures and checklists (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] &lt;br /&gt;
:an awareness document that describes the top ten web application security vulnerabilities (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''LIFE CYCLE:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AppSec FAQ Project|OWASP AppSec FAQ Project]] &lt;br /&gt;
:FAQ covering many application security topics (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Legal Project|OWASP Legal Project]] &lt;br /&gt;
:a project focused on providing contract language for acquiring secure software (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Source Code Review OWASP Projects Project|OWASP Source Code Review for OWASP-Projects]] &lt;br /&gt;
:a workflow for OWASP projects to incorporate static analysis into the Software Development Life Cycle (SDLC). (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Beta Status Projects  ====&lt;br /&gt;
&lt;br /&gt;
*Beta quality projects are complete and ready to use with documentation. &lt;br /&gt;
*Projects are listed below.&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;50%&amp;quot; | Tools&lt;br /&gt;
! Documentation&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
'''PROTECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP CSRFGuard Project|OWASP CSRFGuard Project]] &lt;br /&gt;
:a J2EE filter that implements a unique request token to mitigate CSRF attacks (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Encoding Project|OWASP Encoding Project]] &lt;br /&gt;
:a project focused on the development of encoding best practices for web applications. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP OpenSign Server Project|OWASP OpenSign Server Project]] &lt;br /&gt;
:the purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP OpenPGP Extensions for HTTP - Enigform and mod openpgp|OWASP OpenPGP Extensions for HTTP - Enigform and mod openpgp]] &lt;br /&gt;
:focus on mod_openpgp and Secure Session Management, presenting a working web-site using this new authentication methodology in such a way that it will attract security professionals and web-developers to this new mix of two good'ol protocols: HTTP and OpenPGP. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''DETECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Access Control Rules Tester Project|OWASP Access Control Rules Tester Project]] &lt;br /&gt;
:this project is intended to have two deliverables: research technical report (publication ready article) and an Access Control Rules Tester tool. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Code Crawler|OWASP Code Crawler]] &lt;br /&gt;
:this tool is aimed at assisting code review practitioners. It is a static code review tool which searches for key topics within .NET and J2EE/JAVA code. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP DirBuster Project|OWASP DirBuster Project]] &lt;br /&gt;
:DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP LAPSE Project|OWASP LAPSE Project]] &lt;br /&gt;
:an Eclipse-based source-code static analysis tool for Java (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Orizon Project|OWASP Orizon Project]] &lt;br /&gt;
:the goal of this project is to develop an extensible code review engine to be used from source code assessment tools. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Pantera Web Assessment Studio Project|OWASP Pantera Web Assessment Studio Project]] &lt;br /&gt;
:a project focused on combining automated capabilities with complete manual testing to get the best results (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[ORG (Owasp Report Generator)|OWASP Report Generator]] &lt;br /&gt;
:a project giving security professionals a way to report and keep track of their projects (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[Owasp SiteGenerator|OWASP Site Generator]] &lt;br /&gt;
:a project allowing users to create dynamic sites for use in training, web application scanner testing, etc... (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Skavenger Project|OWASP Skavenger Project]] &lt;br /&gt;
:is a web application security assessment tool kit that passively analyses traffic logged by various MITM proxies as well as other sources and helps to identify various kinds of possible vulnerabilities. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP SQLiX Project|OWASP SQLiX Project]] &lt;br /&gt;
:a project focused on the development of SQLiX, a full perl-based SQL scanner (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Sqlibench Project|OWASP Sqlibench Project]] &lt;br /&gt;
:this is a benchmarking project of automatic sql injectors related to dumping databases. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Tiger|OWASP Tiger]] &lt;br /&gt;
:OWASP Tiger is a Windows application originally intended to be used for automating the process of testing various known ASP.NET security issues in hosted environments. However, it is much more versatile than that: it can help you construct and send a HTTP requests, receive and analyze the responses, match them against a set of conditions to produce alerts, notifications that something is wrong with the application(s) or service(s) being tested. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WeBekci Project|OWASP WeBekci Project]] &lt;br /&gt;
:OWASP WeBekci is a web based ModSecurity 2.x management tool. WeBekci is written in PHP, Its backend is powered by MySQL and the frontend by XAJAX framework. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WSFuzzer Project|OWASP WSFuzzer Project]] &lt;br /&gt;
:a project focused on the development of WSFuzzer, a full python-based Web Services SOAP fuzzer (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''LIFE CYCLE:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP LiveCD Education Project|OWASP Live CD Education Project]] &lt;br /&gt;
:an educational supplement project containing tutorials, challenges and videos detailing the use of tools contained within the OWASP LiveCD - LabRat. This project was sponsored by [[OWASP Spring Of Code 2007|OWASP Spring Of Code 2007]] and [http://www.securitydistro.com/ Security Distro] (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Teachable Static Analysis Workbench Project|OWASP Teachable Static Analysis Workbench Project]] &lt;br /&gt;
:this project is intended to have two deliverables: research technical report (publication ready article) and a workbench prototype. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
'''PROTECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AppSensor Project|OWASP AppSensor Project]] &lt;br /&gt;
:a framework for detecting and responding to attacks from within the application. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Backend Security Project|OWASP Backend Security Project]] &lt;br /&gt;
:this is a new project created to improve and to collect the existant information about the backend security. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Securing WebGoat using ModSecurity Project|OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
:the purpose of this project is to create custom Modsecurity rulesets that will protect WebGoat 5.2 from as many of its vulnerabilities as possible (the goal is 90%) without changing one line of source code. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''DETECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Tools Project|OWASP Tools Project]] &lt;br /&gt;
:The OWASP Tools Project has been created to provide unbiased, practical information and guidance about application security tools that are used to detect vulnerabilities or to protect against vulnerabilities. The goal of this project is to identify any available tools, categorise them and rate them according to a predefind criteria to assess their effectiveness. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''LIFE CYCLE:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP CLASP Project|OWASP CLASP Project]] &lt;br /&gt;
:a project focused on defining process elements that reinforce application security (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Education Project|OWASP Education Project]] &lt;br /&gt;
:a project to build educational tracks and modules for different audiences. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Internationalization|OWASP Internationalization Project]] &lt;br /&gt;
:general guidelines to start a new translation project for OWASP site and projects. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Spanish|OWASP Spanish Project]] &lt;br /&gt;
:first translation effort to make OWASP site and project completely available in Spanish language. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Alpha Status Projects  ====&lt;br /&gt;
&lt;br /&gt;
*Alpha quality projects are generally usable but may lack documentation or quality review. &lt;br /&gt;
*Projects are listed below.&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;50%&amp;quot; | Tools&lt;br /&gt;
! Documentation&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
;[[:Category:OWASP Application Security Tool Benchmarking Environment and Site Generator Refresh Project|OWASP Application Security Tool Benchmarking Environment and Site Generator Refresh Project]] &lt;br /&gt;
:The idea is to split destination web application technology from the three reusable libraries: library of navigational elements, library of vulnerabilities and library of language constructs. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[Classic ASP Security Project|OWASP Classic ASP Security Project]] &lt;br /&gt;
:it aims in creating a secure framework for Classic ASP application by complementing existing OWASP projects with documentation for this particular technology and the creation of security libraries. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Content Validation using Java Annotations Project|OWASP Content Validation using Java Annotations Project]] &lt;br /&gt;
:We wish to explore the use of Java annotations for object validation, specifically for content validation. the result will be a framework which should be easy to use with an existing application. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP CRM Project|OWASP CRM Project]] &lt;br /&gt;
:provides a management system for membership, projects, industry and chapters and users of OWASP projects (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Cryttr - Encrypted Twitter Project|OWASP Cryttr - Encrypted Twitter Project]] &lt;br /&gt;
:a way to do some encrypted messaging to a group of distributed people with as little overhead as possible. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP CSRFTester Project|OWASP CSRFTester Project]] &lt;br /&gt;
:gives developers the ability to test their applications for CSRF flaws (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Encrypted Syndication Project|OWASP Encrypted Syndication Project]] &lt;br /&gt;
:complements the OWASP Cryttr - Encrypted Twitter Project and serves other few other front ends that can use Encrypted Syndication Protocol. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP EnDe|OWASP EnDe Project]] &lt;br /&gt;
:This tool is an encoder, decoder, converter, transformer, calculator, for various codings used in the wild wide web. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Favicon Database Project|OWASP Favicon Database Project]]&lt;br /&gt;
:software enumeration via favicon.ico (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Google Hacking Project|OWASP Google Hacking Project]] &lt;br /&gt;
:Google SOAP Search API with Perl (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Insecure Web App Project|OWASP Insecure Web App Project]] &lt;br /&gt;
:a web application that includes common web application vulnerabilities (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP JBroFuzz|OWASP JBroFuzz Project]] &lt;br /&gt;
:A web application fuzzer for requests being made over HTTP and/or HTTPS. Its purpose is to provide a single, portable application that offers stable web protocol fuzzing capabilities. This project was sponsored by [[OWASP Spring Of Code 2007|OWASP Spring Of Code 2007]] (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Joomla Vulnerability Scanner Project|OWASP Joomla Vulnerability Scanner Project]] &lt;br /&gt;
:a regularly-updated signature-based scanner that can detect file inclusion, sql injection, command execution,XSS, DOS,directory traversal vulnerabilities of a target Joomla! web site&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP JSP Testing Tool Project|OWASP JSP Testing Tool Project]] &lt;br /&gt;
:the goal of this project is to create an easy to use, freely available tool that can be used to quickly ascertain the level of protection that each component of a JSP tag library offers. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP JSReg Project|OWASP JSReg Project]] &lt;br /&gt;
:the goal of this project is to produce a simplified version of Javascript by using regular expressions to remove dangerous functionality and then use Javascript itself to evaluate the results. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Learn About Encoding Project|OWASP Learn About Encoding Project]] &lt;br /&gt;
:this project has as its ultimate goal of demystifying the problems related to the study of character encoding (charset encoding). (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Mutillidae|OWASP Mutillidae Project]] &lt;br /&gt;
:a deliberately vulnerable set of PHP scripts that implement the OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP NetBouncer Project|OWASP NetBouncer Project]] &lt;br /&gt;
:is secure by default centralised input/output validation library which combines security rules and business rules as well as escaping in the output level. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP O2 Platform|OWASP O2 Platform]]&lt;br /&gt;
:this project is a collection of Open Source modules that help Web Application Security Professionals to maximize their efforts and quickly obtain high visibility into an application's security profile (Assessment Criteria v2.0) &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Open Review Project|OWASP Open Review Project (ORPRO)]] &lt;br /&gt;
:a project to openly check open source libraries and software that are vital to most commercial and non-commercial apps around. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP PHP AntiXSS Library Project|OWASP PHP AntiXSS Library Project]] &lt;br /&gt;
:reduce cross-site scripting vulnerabilities by encoding your output (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Python Static Analysis Project|OWASP Python Static Analysis Project]] &lt;br /&gt;
:the aim of this project is to provide full language support,other Python frameworks support, analysis improvement, reporting capability, documentation, promotion materials: publication-ready article and presentation (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Proxy|OWASP Proxy Project]] &lt;br /&gt;
:aims to provide a high quality intercepting proxy library which can be used by developers who require this functionality in their own programs, rather than having to develop it all from scratch. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Sprajax Project|OWASP Sprajax Project]] &lt;br /&gt;
:an open source black box security scanner used to assess the security of AJAX-enabled applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Stinger Project|OWASP Stinger Project]] &lt;br /&gt;
:a project focus on the development of a centralized input validation mechanism which can be easily applied to existing or developmental applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Vicnum Project|OWASP Vicnum Project]] &lt;br /&gt;
: a flexible web application showing common vulnerabilities such as cross site scripting and session management issues. Helpful to IT auditors honing web security skills and to those setting up 'capture the flag' exercises (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Wapiti Project|OWASP Wapiti Project]] &lt;br /&gt;
:the project allows to audit the security by performing &amp;quot;black-box&amp;quot; scans acting like a fuzzer, injecting payloads to see if an application is vulnerable (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Web Application Security Metric using Attack Patterns Project|OWASP Web Application Security Metric using Attack Patterns Project]] &lt;br /&gt;
:the project provides attack pattern database along with prototype model (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Web 2.0 Project|OWASP Web 2.0 Project]] &lt;br /&gt;
:a place for advanced research of security in the Web 2.0 world (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WeBekci Project|OWASP WeBekci Project]] &lt;br /&gt;
:this is web based ModSecurity 2.x management tool. WeBekci is written in PHP, Its backend is powered by MySQL and the frontend by XAJAX framework. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Webslayer Project|OWASP Webslayer Project]] &lt;br /&gt;
:a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Yasca Project|OWASP Yasca Project]] &lt;br /&gt;
:Yasca is a new static analysis tool designed to scan Java, C/C++, JavaScript, .NET, and other source code for security and code-quality issues. Yasca is easily extensible via a plugin-based architecture, so scanning PHP, Ruby, or other languages is as simple as coming up with rules or integrating external tools. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
;[[:Category:OWASP ASDR Project|OWASP ASDR Project]] &lt;br /&gt;
:is a reference volume that contains basic information about all the foundational topics in application security (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AIR Security Project|OWASP AIR Security Project]] &lt;br /&gt;
:investigating the security of AIR applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AJAX Security Project|OWASP AJAX Security Guide]] &lt;br /&gt;
:investigating the security of AJAX enabled applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Anti-Malware Project|OWASP Anti-Malware Project]] &lt;br /&gt;
:describing common flaws in security designs (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Application Security Requirements Project|OWASP Application Security Requirements]] (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Best Practices: Use of Web Application Firewalls|OWASP Best Practices: Use of Web Application Firewalls]] &lt;br /&gt;
:the document is aimed primarily at technical decision-makers, especially those responsible for operations and security (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Book Cover &amp;amp; Sleeve Design|OWASP Book Cover &amp;amp;amp; Sleeve Design]] &lt;br /&gt;
:this is a project of corporate design to develop a scalable book cover series strategy and a Book Sleeve.&lt;br /&gt;
&lt;br /&gt;
(Assessment Criteria v1.0) &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Boot Camp Project|OWASP Boot Camp Project]] &lt;br /&gt;
:this project was started to supply a brief information about the OWASP projects. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Career Development Project|OWASP Career Development Project]] &lt;br /&gt;
:The OWASP Career Development project is focused on helping application security professionals understand the job market, roles, career paths, and skills to work in the field. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Certification Criteria Project|OWASP Certification Criteria Project]]&lt;br /&gt;
&lt;br /&gt;
(Assessment Criteria v1.0) &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Certification Project|OWASP Certification Project]] &lt;br /&gt;
:our challenge is to create a plan for certification: a set of OWASP Certification for Developers and Testers. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Communications Project|OWASP Communications Project]]&lt;br /&gt;
&lt;br /&gt;
(Assessment Criteria v1.0) &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Cloud ‐ 10 Project|OWASP Cloud ‐ 10 Project]] &lt;br /&gt;
:The goal of the project is to maintain a list of top 10 security risks faced with the Cloud Computing and SaaS Models. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Flash Security Project|OWASP Flash Security Project]] &lt;br /&gt;
:investigating the security of Flash applications (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Individual and Corporate Member Packs plus Conference Attendee Packs Brief|OWASP Member Packs/Conference Attendee Packs]] &lt;br /&gt;
:this is a project of corporate design to develop an Individual/Member Pack. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Java Project|OWASP Java Project]] &lt;br /&gt;
:a project focused on helping Java and J2EE developers build secure applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Logging Project|OWASP Logging Guide]] &lt;br /&gt;
:a project to define best practices for logging and log management (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP ModSecurity Core Rule Set Project|OWASP ModSecurity Core Rule Set Project]] &lt;br /&gt;
:a project to document and develop the ModSecurity Core Rule Set (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP PCI Project|OWASP PCI Project]] &lt;br /&gt;
:a project to build and maintain community concensus for managing regulatory risk of web applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP PHP Project|OWASP PHP Project]] &lt;br /&gt;
:a project focused on helping PHP developers build secure applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Positive Security Project|OWASP Positive Security Project]] &lt;br /&gt;
:a project to learn how companies are working to create a positive security approach on their own resources and use this knowledge to create a set of control, marketing and awareness tools that will be available to promote and construct a positive approach to security worldwide (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP SASAP Project|OWASP Scholastic Application Security Assessment Project]] &lt;br /&gt;
:a project that is intended to be the first step towards integrating security requirements in academic course curriculum (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Security Analysis of Core J2EE Design Patterns Project|OWASP Security Analysis of Core J2EE Design Patterns Project]] &lt;br /&gt;
:a to be a design-time security reference for developers implementing common patterns independent of specific platforms and frameworks (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Security Spending Benchmarks|OWASP Security Spending Benchmarks]] &lt;br /&gt;
:provides insight to reduce operational appsec costs (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:Software Assurance Maturity Model|Software Assurance Maturity Model (SAMM)]] &lt;br /&gt;
:this project is committed to building a usable framework to help organizations formulate and implement a strategy for application security that's tailored to the specific business risks facing the organization.&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Source Code Flaws Top 10 Project|OWASP Source Code Flaws Top 10 Project]] &lt;br /&gt;
:a project that is a sort of Top 10 of flaw categories that can be used to match vulnerabilities found during a code review (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Validation Project|OWASP Validation Project]] &lt;br /&gt;
:a project that provides guidance and tools related to validation (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WASS Project|OWASP WASS Guide]] &lt;br /&gt;
:a standards project to develop more concrete criteria for secure applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Web Application Scanner Specification Project|OWASP Web Application Scanner Specification Project]] &lt;br /&gt;
:there will always be a &amp;quot;gap&amp;quot; between the types of attacks that can be performed and those which can be found by an automated scanner. This project will attempt to outline some of those shortcomings and offer a plan for comparing and/or building web application vulnerability scanners. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Web Application Security Put Into Practice|OWASP Web Application Security Put Into Practice]] &lt;br /&gt;
:real-world web application security for Ruby on Rails, Apache and MySQL (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP XML Security Gateway Evaluation Criteria Project|OWASP XML Security Gateway Evaluation Criteria]] &lt;br /&gt;
:a project to define evaluation criteria for XML Security Gateways (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP on the Move Project|OWASP on The Move Project]] &lt;br /&gt;
:a project offering OWASP sponsorship for OWASP (related) speakers on web application security events or chapter meetings. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Speakers Project|OWASP Speakers Project]] &lt;br /&gt;
:a project to match offer and demand regarding OWASP (related) presentations by speakers on web application security events or chapter meetings. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Fuzzing Code Database|OWASP Fuzzing Code Database]] &lt;br /&gt;
:a project to collect, share and compose statements used as code injections like SQL, SSI, XSS, Formatstring and as well directory traversal statements. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Inactive Projects  ====&lt;br /&gt;
&lt;br /&gt;
*Inactive projects are unrated projects (projects that have not reached any one of Alpha, Beta, or Release status) which may have been abandoned. Efforts are being made to contact project leads to determine status and plans for future work. &lt;br /&gt;
*Projects are listed below.&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;50%&amp;quot; | Tools&lt;br /&gt;
! Documentation&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
;[[:Category:OWASP CAL9000 Project|OWASP CAL9000 Project]] &lt;br /&gt;
:a JavaScript based web application security testing suite&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Interceptor Project|OWASP Interceptor Project]] &lt;br /&gt;
:A testing tool for XML web service and Ajax interfaces.&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
;[[:Category:OWASP Application Security Assessment Standards Project|OWASP Application Security Assessment Standards Project]] &lt;br /&gt;
:establish a set of standards defining baseline approaches to conducting differing types/levels of application security assessment (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Corporate Application Security Rating Guide|OWASP Corporate Application Security Rating Guide]] &lt;br /&gt;
:This project will organize and structure publicly available data that large companies will share of the lessons learned about how to organize an application security initiative, best practices for training and testing, and more.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{PutInCategory}}&lt;/div&gt;</summary>
		<author><name>OWASP Germany Local Chapter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls&amp;diff=71932</id>
		<title>GPC Project Details/OWASP Best Practices: Web Application Firewalls</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls&amp;diff=71932"/>
				<updated>2009-10-21T17:12:36Z</updated>
		
		<summary type="html">&lt;p&gt;OWASP Germany Local Chapter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Project Identification Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP Best Practices: Web Application Firewalls &lt;br /&gt;
| project_description = Web applications of all kinds, whether online shops or partner portals, have in recent years increasingly become the target of hacker attacks. The attackers are using methods which are specifically aimed at exploiting potential weak spots in the web application software itself - and this is why they are not detected, or are not detected with sufficient accuracy, by traditional IT security systems such as network firewalls or IDS/IPS systems.&lt;br /&gt;
| project_license = [http://creativecommons.org/licenses/bysa/2.0/de/ Creative Commons/International/Germany]&lt;br /&gt;
| leader_name = OWASP Germany Local Chapter&lt;br /&gt;
| leader_email = owasp-firewalls-project(at)lists.owasp.org&lt;br /&gt;
| leader_username = OWASP Germany Local Chapter&lt;br /&gt;
| past_leaders_special_contributions = None&lt;br /&gt;
| maintainer_name = Achim Hoffmann&lt;br /&gt;
| maintainer_email = achim@owasp.org&lt;br /&gt;
| maintainer_username = Achim  &lt;br /&gt;
| contributor_name1 = Maximilian Dermann&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 =  &lt;br /&gt;
| contributor_name2 = Mirko Dziadzka&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = &lt;br /&gt;
| contributor_name3 = Boris Hemkemeier&lt;br /&gt;
| contributor_email3 = &lt;br /&gt;
| contributor_username3 = &lt;br /&gt;
| contributor_name4 = Alexander Meisel&lt;br /&gt;
| contributor_email4 = &lt;br /&gt;
| contributor_username4 = &lt;br /&gt;
| contributor_name5 = Matthias Rohr&lt;br /&gt;
| contributor_email5 = &lt;br /&gt;
| contributor_username5 = &lt;br /&gt;
| contributor_name6 = Thomas Schreiber&lt;br /&gt;
| contributor_email6 = &lt;br /&gt;
| contributor_username6 = &lt;br /&gt;
| contributor_name7 = &lt;br /&gt;
| contributor_email7 = &lt;br /&gt;
| contributor_username7 = &lt;br /&gt;
| contributor_name8 = &lt;br /&gt;
| contributor_email8 = &lt;br /&gt;
| contributor_username8 = &lt;br /&gt;
| contributor_name9 = &lt;br /&gt;
| contributor_email9 = &lt;br /&gt;
| contributor_username9 = &lt;br /&gt;
| contributor_name10 = &lt;br /&gt;
| contributor_email10 = &lt;br /&gt;
| contributor_username10 =  &lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link =&lt;br /&gt;
| mailing_list_name = owasp-firewalls-project&lt;br /&gt;
| links_url1 = http://www.owasp.org/index.php/Best_Practices:_Einsatz_von_Web_Application_Firewalls&lt;br /&gt;
| links_name1 = Document (wiki) - Deutsch &lt;br /&gt;
| links_url2 = http://www.owasp.org/index.php/Category:OWASP_Best_Practices:_Use_of_Web_Application_Firewalls&lt;br /&gt;
| links_name2 = Document (wiki) - English &lt;br /&gt;
| links_url3 = http://www.owasp.org/index.php/Best_Practices:_Utalisation_des_Web_Application_Firewall&lt;br /&gt;
| links_name3 = Document (wiki) - Français &lt;br /&gt;
| links_url4 = https://www.owasp.org/images/1/1b/Best_Practices_Guide_WAF.pdf&lt;br /&gt;
| links_name4 = Document (PDF) - Deutsch &lt;br /&gt;
| links_url5 = https://www.owasp.org/images/a/a6/Best_Practices_Guide_WAF_v104.en.pdf&lt;br /&gt;
| links_name5 = Document (PDF) - English&lt;br /&gt;
| links_url6 = &lt;br /&gt;
| links_name6 = &lt;br /&gt;
| links_url7 = &lt;br /&gt;
| links_name7 = &lt;br /&gt;
| links_url8 = &lt;br /&gt;
| links_name8 = &lt;br /&gt;
| links_url9 = &lt;br /&gt;
| links_name9 = &lt;br /&gt;
| links_url10 = &lt;br /&gt;
| links_name10 = &lt;br /&gt;
| project_road_map = Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
| project_health_status = &lt;br /&gt;
| current_release_name = Use of Web Application Firewalls - Release 1.0.4&lt;br /&gt;
| current_release_date = 3/2008&lt;br /&gt;
| current_release_download_link = https://www.owasp.org/images/a/a6/Best_Practices_Guide_WAF_v104.en.pdf English Version&lt;br /&gt;
| current_release_rating = -1&lt;br /&gt;
| current_release_leader_name = Achim Hoffmann&lt;br /&gt;
| current_release_leader_email = achim@owasp.org&lt;br /&gt;
| current_release_leader_username = Achim&lt;br /&gt;
| current_release_details = :Category:OWASP Best Practices: Web Application Firewalls - Release 1.0.4 &lt;br /&gt;
| last_reviewed_release_name = &lt;br /&gt;
| last_reviewed_release_date = &lt;br /&gt;
| last_reviewed_release_download_link = &lt;br /&gt;
| last_reviewed_release_rating = &lt;br /&gt;
| last_reviewed_release_leader_name = &lt;br /&gt;
| last_reviewed_release_leader_email = &lt;br /&gt;
| last_reviewed_release_leader_username = &lt;br /&gt;
| old_release_name1 = First Release&lt;br /&gt;
| old_release_date1 = 3/2008&lt;br /&gt;
| old_release_download_link1 = https://www.owasp.org/images/1/1b/Best_Practices_Guide_WAF.pdf Deutsch Version&lt;br /&gt;
| old_release_name2 = &lt;br /&gt;
| old_release_date2 = &lt;br /&gt;
| old_release_download_link2 = &lt;br /&gt;
| old_release_name3 = &lt;br /&gt;
| old_release_date3 = &lt;br /&gt;
| old_release_download_link3 = &lt;br /&gt;
| old_release_name4 = &lt;br /&gt;
| old_release_date4 = &lt;br /&gt;
| old_release_download_link4 = &lt;br /&gt;
| old_release_name5 = &lt;br /&gt;
| old_release_date5 = &lt;br /&gt;
| old_release_download_link5 = &lt;br /&gt;
| last_GPC_update = 21/10/2009&lt;br /&gt;
| GPC_Notes = To be reviewed?&lt;br /&gt;
| project_home_page = Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
| project_details_wiki_page = GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>OWASP Germany Local Chapter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls&amp;diff=71931</id>
		<title>GPC Project Details/OWASP Best Practices: Web Application Firewalls</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls&amp;diff=71931"/>
				<updated>2009-10-21T17:11:50Z</updated>
		
		<summary type="html">&lt;p&gt;OWASP Germany Local Chapter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Project Identification Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP Best Practices: Web Application Firewalls &lt;br /&gt;
| project_description = Web applications of all kinds, whether online shops or partner portals, have in recent years increasingly become the target of hacker attacks. The attackers are using methods which are specifically aimed at exploiting potential weak spots in the web application software itself - and this is why they are not detected, or are not detected with sufficient accuracy, by traditional IT security systems such as network firewalls or IDS/IPS systems.&lt;br /&gt;
| project_license = [http://creativecommons.org/licenses/bysa/2.0/de/ Creative Commons/International/Germany]&lt;br /&gt;
| leader_name = OWASP Germany Local Chapter&lt;br /&gt;
| leader_email = owasp-firewalls-project(at)lists.owasp.org&lt;br /&gt;
| leader_username = OWASP Germany Local Chapter&lt;br /&gt;
| past_leaders_special_contributions = None&lt;br /&gt;
| maintainer_name = Achim Hoffmann&lt;br /&gt;
| maintainer_email = achim@owasp.org&lt;br /&gt;
| maintainer_username = Achim  &lt;br /&gt;
| contributor_name1 = Maximilian Dermann&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 =  &lt;br /&gt;
| contributor_name2 = Mirko Dziadzka&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = &lt;br /&gt;
| contributor_name3 = Boris Hemkemeier&lt;br /&gt;
| contributor_email3 = &lt;br /&gt;
| contributor_username3 = &lt;br /&gt;
| contributor_name4 = Alexander Meisel&lt;br /&gt;
| contributor_email4 = &lt;br /&gt;
| contributor_username4 = &lt;br /&gt;
| contributor_name5 = Matthias Rohr&lt;br /&gt;
| contributor_email5 = &lt;br /&gt;
| contributor_username5 = &lt;br /&gt;
| contributor_name6 = Thomas Schreiber&lt;br /&gt;
| contributor_email6 = &lt;br /&gt;
| contributor_username6 = &lt;br /&gt;
| contributor_name7 = &lt;br /&gt;
| contributor_email7 = &lt;br /&gt;
| contributor_username7 = &lt;br /&gt;
| contributor_name8 = &lt;br /&gt;
| contributor_email8 = &lt;br /&gt;
| contributor_username8 = &lt;br /&gt;
| contributor_name9 = &lt;br /&gt;
| contributor_email9 = &lt;br /&gt;
| contributor_username9 = &lt;br /&gt;
| contributor_name10 = &lt;br /&gt;
| contributor_email10 = &lt;br /&gt;
| contributor_username10 =  &lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link =&lt;br /&gt;
| mailing_list_name = owasp-firewalls-project&lt;br /&gt;
| links_url1 = http://www.owasp.org/index.php/Best_Practices:_Einsatz_von_Web_Application_Firewalls&lt;br /&gt;
| links_name1 = Document (wiki) - Deutsch &lt;br /&gt;
| links_url2 = http://www.owasp.org/index.php/Category:OWASP_Best_Practices:_Use_of_Web_Application_Firewalls&lt;br /&gt;
| links_name2 = Document (wiki) - English &lt;br /&gt;
| links_url3 = http://www.owasp.org/index.php/Best_Practices:_Utalisation_des_Web_Application_Firewall&lt;br /&gt;
| links_name3 = Document (wiki) - Français &lt;br /&gt;
| links_url4 = https://www.owasp.org/images/1/1b/Best_Practices_Guide_WAF.pdf&lt;br /&gt;
| links_name4 = Document (PDF) - Deutsch &lt;br /&gt;
| links_url5 = https://www.owasp.org/images/a/a6/Best_Practices_Guide_WAF_v104.en.pdf&lt;br /&gt;
| links_name5 = Document (PDF) - English&lt;br /&gt;
| links_url6 = &lt;br /&gt;
| links_name6 = &lt;br /&gt;
| links_url7 = &lt;br /&gt;
| links_name7 = &lt;br /&gt;
| links_url8 = &lt;br /&gt;
| links_name8 = &lt;br /&gt;
| links_url9 = &lt;br /&gt;
| links_name9 = &lt;br /&gt;
| links_url10 = &lt;br /&gt;
| links_name10 = &lt;br /&gt;
| project_road_map = Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
| project_health_status = &lt;br /&gt;
| current_release_name = Use of Web Application Firewalls - Release 1.0.4&lt;br /&gt;
| current_release_date = 3/2008&lt;br /&gt;
| current_release_download_link = https://www.owasp.org/images/a/a6/Best_Practices_Guide_WAF_v104.en.pdf English Version&lt;br /&gt;
| current_release_rating = -1&lt;br /&gt;
| current_release_leader_name = Achim Hoffmann&lt;br /&gt;
| current_release_leader_email = achim@owasp.org&lt;br /&gt;
| current_release_leader_username = Achim&lt;br /&gt;
| current_release_details = :Category:OWASP Best Practices: Web Application Firewalls - Release 1.0.4 &lt;br /&gt;
| last_reviewed_release_name = &lt;br /&gt;
| last_reviewed_release_date = &lt;br /&gt;
| last_reviewed_release_download_link = &lt;br /&gt;
| last_reviewed_release_rating = &lt;br /&gt;
| last_reviewed_release_leader_name = &lt;br /&gt;
| last_reviewed_release_leader_email = &lt;br /&gt;
| last_reviewed_release_leader_username = &lt;br /&gt;
| old_release_name1 = First Release&lt;br /&gt;
| old_release_date1 = 3/2008&lt;br /&gt;
| old_release_download_link1 = https://www.owasp.org/images/1/1b/Best_Practices_Guide_WAF.pdf Deutsch Version&lt;br /&gt;
| old_release_name2 = &lt;br /&gt;
| old_release_date2 = &lt;br /&gt;
| old_release_download_link2 = &lt;br /&gt;
| old_release_name3 = &lt;br /&gt;
| old_release_date3 = &lt;br /&gt;
| old_release_download_link3 = &lt;br /&gt;
| old_release_name4 = &lt;br /&gt;
| old_release_date4 = &lt;br /&gt;
| old_release_download_link4 = &lt;br /&gt;
| old_release_name5 = &lt;br /&gt;
| old_release_date5 = &lt;br /&gt;
| old_release_download_link5 = &lt;br /&gt;
| last_GPC_update = 2/10/2009&lt;br /&gt;
| GPC_Notes = Empty template&lt;br /&gt;
| project_home_page = Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
| project_details_wiki_page = GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>OWASP Germany Local Chapter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Projects_Dashboard&amp;diff=71930</id>
		<title>OWASP Projects Dashboard</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Projects_Dashboard&amp;diff=71930"/>
				<updated>2009-10-21T17:10:40Z</updated>
		
		<summary type="html">&lt;p&gt;OWASP Germany Local Chapter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* For more details on how this works see [[GPC Info On Editing Templates]].&lt;br /&gt;
&lt;br /&gt;
== PROJECTS THAT HAVE ANSWERED BACK TO THE &amp;quot;[https://spreadsheets.google.com/viewform?hl=en&amp;amp;formkey=cEp6TlUxeU5KZDdWQkgxYlM2clkwRVE6MA OWASP Project Owner Spring 2009 Self Update]&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
=== CONNECTED DATA ===&lt;br /&gt;
* In a nutshell, this set of projects have the following features:&lt;br /&gt;
**The [[:GPC Project Details/OWASP Vicnum Project|new project details tab]] has been set up and filled in with the [[:Template:OWASP Project Identification Tab|new template]], &lt;br /&gt;
**The [[:Template:OWASP Project Identification Tab|new template]] has the project's actualized content,&lt;br /&gt;
**The link to the new project details tab has been placed in the projects page.  &lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP_Project_Details/Columns}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_EnDe | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Orizon_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Vicnum_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC Project Details/OWASP Top10 | OWASP Project Details Row}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== UNCONNECTED DATA ===&lt;br /&gt;
* In a nutshell, this set of projects have the following features:&lt;br /&gt;
**The  [[:GPC Project Details/OWASP Vicnum Project|new project details tab]] has been set up and filled in with the [[:Template:OWASP Project Identification Tab|new template]],&lt;br /&gt;
**The [[:Template:OWASP Project Identification Tab|new template]] DOESN'T HAVE the project's actualized content,&lt;br /&gt;
**The link to the new project details tab HASN'T YET BEEN placed in the projects page.  &lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP_Project_Details/Columns}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_.NET_Project | OWASP Project Details/Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Details/Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API Java EE Version | OWASP Project Details/Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API .NET Version | OWASP Project Details/Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Classic ASP Version | OWASP Project Details/Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - PHP Version  | OWASP Project Details/Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - ColdFusion/CFML | OWASP Project Details/Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Python Version | OWASP Project Details/Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Haskell Version | OWASP Project Details/Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Access_Control_Rules_Tester_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AIR_Security_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Anti-Malware_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project_.NET | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Requirements_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Tool_Benchmarking_Environment_and_Site_Generator_Refresh_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AppSensor_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_ASDR_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Verification_Standard_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Backend_Security_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CAL9000_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Certification_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Classic_ASP_Security_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Crawler | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Review_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFGuard_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFTester_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_DirBuster_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Education_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_OpenPGP_Extensions_for_HTTP_-_Enigform_and_mod_openpgp | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP OpenSign Server Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Google_Hacking_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Internationalization | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JSP_Testing_Tool_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Learn_About_Encoding_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Legal_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Live_CD | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_ModSecurity_Core_Rule_Set_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_NetBouncer_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Open_Review_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP PHP Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Proxy_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Positive_Security_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Python_Static_Analysis_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Ruby on Rails Security Guide V2 | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Scrubbr | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Securing WebGoat using ModSecurity Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Speakers Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Security Spending Benchmarks Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Skavenger Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/Software_Assurance_Maturity_Model | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Source Code Flaws Top 10 Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Spanish | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sprajax Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sqlibench Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Stinger Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Teachable Static Analysis Workbench Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Testing Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Wapiti Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Webekci Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebGoat Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebScarab Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP WSFuzzer Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Yasca Project | OWASP Project Details Row}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== PROJECTS RECENTLY SET UP (after the &amp;quot;[https://spreadsheets.google.com/viewform?hl=en&amp;amp;formkey=cEp6TlUxeU5KZDdWQkgxYlM2clkwRVE6MA OWASP Project Owner Spring 2009 Self Update]&amp;quot;)==&lt;br /&gt;
&lt;br /&gt;
=== CONNECTED DATA ===&lt;br /&gt;
* In a nutshell, this set of projects have the following features:&lt;br /&gt;
**The [[:GPC Project Details/OWASP Vicnum Project|new project details tab]] has been set up and filled in with the [[:Template:OWASP Project Identification Tab|new template]], &lt;br /&gt;
**The [[:Template:OWASP Project Identification Tab|new template]] has the project's actualized content,&lt;br /&gt;
**The link to the new project details tab has been placed in the projects page.  &lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP_Project_Details/Columns}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP JSReg Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Cloud ‐ 10 Project | OWASP Project Details Row}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== UNCONNECTED DATA ===&lt;br /&gt;
* In a nutshell, this set of projects have the following features:&lt;br /&gt;
**The  [[:GPC Project Details/OWASP Vicnum Project|new project details tab]] has been set up and filled in with the [[:Template:OWASP Project Identification Tab|new template]],&lt;br /&gt;
**The [[:Template:OWASP Project Identification Tab|new template]] DOESN'T HAVE the project's actualized content,&lt;br /&gt;
**The link to the new project details tab HASN'T YET BEEN placed in the projects page.&lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP_Project_Details/Columns}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Content Validation using Java Annotations Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_CRM_Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Cryttr_-_Encrypted_Twitter_Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP CTF Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Encrypted Syndication Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Favicon Database Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Joomla Vulnerability Scanner Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC Project Details/OWASP Mutillidae Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP O2 Platform | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Security Analysis of Core J2EE Design Patterns Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Web Application Scanner Specification Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC Project Details/OWASP Web Application Security Metric using Attack Patterns Project | OWASP Project Details Row}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ADOPTED PROJECTS (after the &amp;quot;[https://spreadsheets.google.com/viewform?hl=en&amp;amp;formkey=cEp6TlUxeU5KZDdWQkgxYlM2clkwRVE6MA OWASP Project Owner Spring 2009 Self Update]&amp;quot;)==&lt;br /&gt;
&lt;br /&gt;
=== UNCONNECTED DATA ===&lt;br /&gt;
* In a nutshell, this set of projects have the following features:&lt;br /&gt;
**The  [[:GPC Project Details/OWASP Vicnum Project|new project details tab]] has been set up and filled in with the [[:Template:OWASP Project Identification Tab|new template]],&lt;br /&gt;
**The [[:Template:OWASP Project Identification Tab|new template]] DOESN'T HAVE the project's actualized content,&lt;br /&gt;
**The link to the new project details tab HASN'T YET BEEN placed in the projects page.&lt;br /&gt;
{{:Template:OWASP_Project_Details/Columns}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Flash Security Project | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP Fuzzing Code Database | OWASP Project Details Row}} &lt;br /&gt;
{{:GPC_Project_Details/ORG (OWASP Report Generator) | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP AJAX Security Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Logging Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Web Services Security Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Tools Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Application Security Metrics Project | OWASP Project Details Row}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Web 2.0 Project | OWASP Project Details Row}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== ORPHANED PROJECTS ==&lt;br /&gt;
&lt;br /&gt;
=== CONNECTED DATA ===&lt;br /&gt;
&lt;br /&gt;
See [[OWASP Projects Dashboard - Orphaned Projects]] for the current list of Orphaned projects (projects that need new project leaders).&lt;/div&gt;</summary>
		<author><name>OWASP Germany Local Chapter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Best_Practices:_Web_Application_Firewalls_-_Release_1.0.4_-_Assessment&amp;diff=71929</id>
		<title>Category:OWASP Best Practices: Web Application Firewalls - Release 1.0.4 - Assessment</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Best_Practices:_Web_Application_Firewalls_-_Release_1.0.4_-_Assessment&amp;diff=71929"/>
				<updated>2009-10-21T17:09:01Z</updated>
		
		<summary type="html">&lt;p&gt;OWASP Germany Local Chapter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;small&amp;gt;[[:Best Practices: Web Application Firewalls|Click here to return to project's main page]]&amp;lt;/small&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Stable Release Review of the OWASP Best Practices: Web Application Firewalls Project - Release 1.0.4 ==&lt;br /&gt;
&lt;br /&gt;
==== Project Leader for this Release ====&lt;br /&gt;
'''''[[user:OWASP Germany Local Chapter|OWASP Germany Local Chapter]]'s Pre-Assessment Checklist:'''''&lt;br /&gt;
&lt;br /&gt;
{{ Template:Pre-Assessment Questions - Documents&lt;br /&gt;
&lt;br /&gt;
| 1. Is this release associated with a project containing at least the [[Assessing_Project_Health#Project_Wiki_Page_Minimal_Content|Project Wiki Page Minimum Content]]  information?&lt;br /&gt;
= answer 1&lt;br /&gt;
&lt;br /&gt;
| 2. Is your document licensed under a free and open license? (see Project Licensing section of the [http://www.owasp.org/index.php/Guidelines_for_OWASP_Projects Guidelines for OWASP Projects]) Please point out the link(s).&lt;br /&gt;
= answer 2&lt;br /&gt;
&lt;br /&gt;
| 3. Is the document available as a PDF (Portable Document Format) and an editable (.Doc) format on the project site? Please point out the link(s).&lt;br /&gt;
= answer 3&lt;br /&gt;
&lt;br /&gt;
| 4. Are all articles that constitute the project release properly tagged within project category and available from main project Wiki page? Please point out the link(s).&lt;br /&gt;
= answer 4&lt;br /&gt;
&lt;br /&gt;
| 5. Is there a roadmap for this project release which will take it from Alpha to Stable release? Please point out the link(s).&lt;br /&gt;
= answer 5&lt;br /&gt;
&lt;br /&gt;
| 6. Are the Alpha pre-assessment items complete?&lt;br /&gt;
= answer 6&lt;br /&gt;
&lt;br /&gt;
| 7. Are all document contents (articles) present and listed on the OWASP project wiki page? Please point out the link(s).&lt;br /&gt;
= answer 7&lt;br /&gt;
&lt;br /&gt;
| 8. Is there user documentation on the OWASP project wiki page? Please point out the link(s).&lt;br /&gt;
= answer 8&lt;br /&gt;
&lt;br /&gt;
| 9. Is there an “About This Document” section in the document listing:&lt;br /&gt;
= answer 9&lt;br /&gt;
&lt;br /&gt;
| 10. Is there documentation on how to build the tool from source including obtaining the source from the code repository?&lt;br /&gt;
= answer 10&lt;br /&gt;
&lt;br /&gt;
| 11. Are the Alpha and Beta pre-assessment items complete?&lt;br /&gt;
= answer 11&lt;br /&gt;
&lt;br /&gt;
| 12. Have any limitations been documented? Please point out the link(s).&lt;br /&gt;
= answer 12&lt;br /&gt;
&lt;br /&gt;
| 13. Does the document consider [http://www.owasp.org/index.php/OWASP_Writing_Style OWASP Writing Style] and [http://www.owasp.org/index.php/OWASP_Template_Document OWASP Template for Docs]? Please point out the link(s)&lt;br /&gt;
= answer 13&lt;br /&gt;
&lt;br /&gt;
| 14. Is there a one sheet overview document about the project release? Please point out the link(s).&lt;br /&gt;
= answer 14&lt;br /&gt;
&lt;br /&gt;
| 15. Is the document in a format which can be converted to an OWASP book?  (books are currently via Lulu.com) Please point out the link(s).&lt;br /&gt;
= answer 15&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== First Reviewer ====&lt;br /&gt;
'''''[[user:name|TBD]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;Ideally, reviewers should be an existing OWASP project leader or chapter leader.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ :Template:Assessment Questions - Documents&lt;br /&gt;
&lt;br /&gt;
| 1. Does the document consider the [http://www.owasp.org/index.php/OWASP_Writing_Style OWASP Writing Style]?&lt;br /&gt;
= answer 1&lt;br /&gt;
&lt;br /&gt;
| 2. Do contents from wiki articles match download-able documents? (PDF and .doc versions)&lt;br /&gt;
= answer 2&lt;br /&gt;
&lt;br /&gt;
| 3. Does the document have an “About This Document” section which allows the end user to get an overview of the state of the document?&lt;br /&gt;
= answer 3&lt;br /&gt;
&lt;br /&gt;
| 4. How completely does the release address the goal of the project? Is the overall document complete in structure and organization? Are any missing or incomplete sections critical enough to keep the document at an Alpha quality level?&lt;br /&gt;
= answer 4&lt;br /&gt;
&lt;br /&gt;
| 5. Have all the Beta Reviewer Action Items been completed? These will need to be completed if they have not already occurred during a previous assessment.&lt;br /&gt;
= answer 5&lt;br /&gt;
&lt;br /&gt;
| 6. Have any limitations been documented? Please point out the link(s).&lt;br /&gt;
= answer 6&lt;br /&gt;
&lt;br /&gt;
| 7. Does the document substantially address the application security issues it was created to solve?&lt;br /&gt;
= answer 7&lt;br /&gt;
&lt;br /&gt;
| 8. Does the document respect OWASP Writing Style and OWASP Template for Docs?&lt;br /&gt;
= answer 8&lt;br /&gt;
&lt;br /&gt;
| 9. Have you noted any limitations of the document that are not already documented by the project release lead?&lt;br /&gt;
= answer 9&lt;br /&gt;
&lt;br /&gt;
| 10. Would you consider using this document in your day to day work assuming your professional work includes a reason to use this document? Would you recommend this document to others in the profession? Why or why not?&lt;br /&gt;
= answer 10&lt;br /&gt;
&lt;br /&gt;
| 11. What, if anything, is missing which would make this a more useful document? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= answer 11&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== Second Reviewer ====&lt;br /&gt;
'''''[[User:name|TBD]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;It is recommended that an OWASP board member or Global Projects Committee member be the second reviewer on Quality releases. The board has the initial option to review the project, followed by the Global Projects Committee.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ :Template:Assessment Questions - Documents&lt;br /&gt;
&lt;br /&gt;
| 1. Does the document consider the [http://www.owasp.org/index.php/OWASP_Writing_Style OWASP Writing Style]?&lt;br /&gt;
= answer 1&lt;br /&gt;
&lt;br /&gt;
| 2. Do contents from wiki articles match download-able documents? (PDF and .doc versions)&lt;br /&gt;
= answer 2&lt;br /&gt;
&lt;br /&gt;
| 3. Does the document have an “About This Document” section which allows the end user to get an overview of the state of the document?&lt;br /&gt;
= answer 3&lt;br /&gt;
&lt;br /&gt;
| 4. How completely does the release address the goal of the project? Is the overall document complete in structure and organization? Are any missing or incomplete sections critical enough to keep the document at an Alpha quality level?&lt;br /&gt;
= answer 4&lt;br /&gt;
&lt;br /&gt;
| 5. Have all the Beta Reviewer Action Items been completed? These will need to be completed if they have not already occurred during a previous assessment.&lt;br /&gt;
= answer 5&lt;br /&gt;
&lt;br /&gt;
| 6. Have any limitations been documented? Please point out the link(s).&lt;br /&gt;
= answer 6&lt;br /&gt;
&lt;br /&gt;
| 7. Does the document substantially address the application security issues it was created to solve?&lt;br /&gt;
= answer 7&lt;br /&gt;
&lt;br /&gt;
| 8. Does the document respect OWASP Writing Style and OWASP Template for Docs?&lt;br /&gt;
= answer 8&lt;br /&gt;
&lt;br /&gt;
| 9. Have you noted any limitations of the document that are not already documented by the project release lead?&lt;br /&gt;
= answer 9&lt;br /&gt;
&lt;br /&gt;
| 10. Would you consider using this document in your day to day work assuming your professional work includes a reason to use this document? Would you recommend this document to others in the profession? Why or why not?&lt;br /&gt;
= answer 10&lt;br /&gt;
&lt;br /&gt;
| 11. What, if anything, is missing which would make this a more useful document? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= answer 11&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>OWASP Germany Local Chapter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Best_Practices:_Web_Application_Firewalls_-_Release_1.0.4_-_Assessment&amp;diff=71928</id>
		<title>Category:OWASP Best Practices: Web Application Firewalls - Release 1.0.4 - Assessment</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Best_Practices:_Web_Application_Firewalls_-_Release_1.0.4_-_Assessment&amp;diff=71928"/>
				<updated>2009-10-21T17:07:31Z</updated>
		
		<summary type="html">&lt;p&gt;OWASP Germany Local Chapter: Created page with '&amp;lt;small&amp;gt;Click here to return to project's main page&amp;lt;/small&amp;gt;&amp;lt;br&amp;gt;  == Stable Release Review of the OWASP Best Practices: Web Applicati…'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;small&amp;gt;[[:Best Practices: Web Application Firewalls|Click here to return to project's main page]]&amp;lt;/small&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Stable Release Review of the OWASP Best Practices: Web Application Firewalls Project - Release 1.0.4 ==&lt;br /&gt;
&lt;br /&gt;
==== Project Leader for this Release ====&lt;br /&gt;
'''''[[user:OWASP Germany Local Chapter|OWASP Germany Local Chapter]]'s Pre-Assessment Checklist:'''''&lt;br /&gt;
&lt;br /&gt;
{{ Template:Pre-Assessment Questions - Documents&lt;br /&gt;
&lt;br /&gt;
| 1. Is this release associated with a project containing at least the [[Assessing_Project_Health#Project_Wiki_Page_Minimal_Content|Project Wiki Page Minimum Content]]  information?&lt;br /&gt;
= answer 1&lt;br /&gt;
&lt;br /&gt;
| 2. Is your document licensed under a free and open license? (see Project Licensing section of the [http://www.owasp.org/index.php/Guidelines_for_OWASP_Projects Guidelines for OWASP Projects]) Please point out the link(s).&lt;br /&gt;
= answer 2&lt;br /&gt;
&lt;br /&gt;
| 3. Is the document available as a PDF (Portable Document Format) and an editable (.Doc) format on the project site? Please point out the link(s).&lt;br /&gt;
= answer 3&lt;br /&gt;
&lt;br /&gt;
| 4. Are all articles that constitute the project release properly tagged within project category and available from main project Wiki page? Please point out the link(s).&lt;br /&gt;
= answer 4&lt;br /&gt;
&lt;br /&gt;
| 5. Is there a roadmap for this project release which will take it from Alpha to Stable release? Please point out the link(s).&lt;br /&gt;
= answer 5&lt;br /&gt;
&lt;br /&gt;
| 6. Are the Alpha pre-assessment items complete?&lt;br /&gt;
= answer 6&lt;br /&gt;
&lt;br /&gt;
| 7. Are all document contents (articles) present and listed on the OWASP project wiki page? Please point out the link(s).&lt;br /&gt;
= answer 7&lt;br /&gt;
&lt;br /&gt;
| 8. Is there user documentation on the OWASP project wiki page? Please point out the link(s).&lt;br /&gt;
= answer 8&lt;br /&gt;
&lt;br /&gt;
| 9. Is there an “About This Document” section in the document listing:&lt;br /&gt;
= answer 9&lt;br /&gt;
&lt;br /&gt;
| 10. Is there documentation on how to build the tool from source including obtaining the source from the code repository?&lt;br /&gt;
= answer 10&lt;br /&gt;
&lt;br /&gt;
| 11. Are the Alpha and Beta pre-assessment items complete?&lt;br /&gt;
= answer 11&lt;br /&gt;
&lt;br /&gt;
| 12. Have any limitations been documented? Please point out the link(s).&lt;br /&gt;
= answer 12&lt;br /&gt;
&lt;br /&gt;
| 13. Does the document consider [http://www.owasp.org/index.php/OWASP_Writing_Style OWASP Writing Style] and [http://www.owasp.org/index.php/OWASP_Template_Document OWASP Template for Docs]? Please point out the link(s)&lt;br /&gt;
= answer 13&lt;br /&gt;
&lt;br /&gt;
| 14. Is there a one sheet overview document about the project release? Please point out the link(s).&lt;br /&gt;
= answer 14&lt;br /&gt;
&lt;br /&gt;
| 15. Is the document in a format which can be converted to an OWASP book?  (books are currently via Lulu.com) Please point out the link(s).&lt;br /&gt;
= answer 15&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== Second Reviewer ====&lt;br /&gt;
'''''[[user:name|TBD]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;Ideally, reviewers should be an existing OWASP project leader or chapter leader.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ :Template:Assessment Questions - Documents&lt;br /&gt;
&lt;br /&gt;
| 1. Does the document consider the [http://www.owasp.org/index.php/OWASP_Writing_Style OWASP Writing Style]?&lt;br /&gt;
= answer 1&lt;br /&gt;
&lt;br /&gt;
| 2. Do contents from wiki articles match download-able documents? (PDF and .doc versions)&lt;br /&gt;
= answer 2&lt;br /&gt;
&lt;br /&gt;
| 3. Does the document have an “About This Document” section which allows the end user to get an overview of the state of the document?&lt;br /&gt;
= answer 3&lt;br /&gt;
&lt;br /&gt;
| 4. How completely does the release address the goal of the project? Is the overall document complete in structure and organization? Are any missing or incomplete sections critical enough to keep the document at an Alpha quality level?&lt;br /&gt;
= answer 4&lt;br /&gt;
&lt;br /&gt;
| 5. Have all the Beta Reviewer Action Items been completed? These will need to be completed if they have not already occurred during a previous assessment.&lt;br /&gt;
= answer 5&lt;br /&gt;
&lt;br /&gt;
| 6. Have any limitations been documented? Please point out the link(s).&lt;br /&gt;
= answer 6&lt;br /&gt;
&lt;br /&gt;
| 7. Does the document substantially address the application security issues it was created to solve?&lt;br /&gt;
= answer 7&lt;br /&gt;
&lt;br /&gt;
| 8. Does the document respect OWASP Writing Style and OWASP Template for Docs?&lt;br /&gt;
= answer 8&lt;br /&gt;
&lt;br /&gt;
| 9. Have you noted any limitations of the document that are not already documented by the project release lead?&lt;br /&gt;
= answer 9&lt;br /&gt;
&lt;br /&gt;
| 10. Would you consider using this document in your day to day work assuming your professional work includes a reason to use this document? Would you recommend this document to others in the profession? Why or why not?&lt;br /&gt;
= answer 10&lt;br /&gt;
&lt;br /&gt;
| 11. What, if anything, is missing which would make this a more useful document? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= answer 11&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== First Reviewer ====&lt;br /&gt;
'''''[[user:name|TBD]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;Ideally, reviewers should be an existing OWASP project leader or chapter leader.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ :Template:Assessment Questions - Documents&lt;br /&gt;
&lt;br /&gt;
| 1. Does the document consider the [http://www.owasp.org/index.php/OWASP_Writing_Style OWASP Writing Style]?&lt;br /&gt;
= answer 1&lt;br /&gt;
&lt;br /&gt;
| 2. Do contents from wiki articles match download-able documents? (PDF and .doc versions)&lt;br /&gt;
= answer 2&lt;br /&gt;
&lt;br /&gt;
| 3. Does the document have an “About This Document” section which allows the end user to get an overview of the state of the document?&lt;br /&gt;
= answer 3&lt;br /&gt;
&lt;br /&gt;
| 4. How completely does the release address the goal of the project? Is the overall document complete in structure and organization? Are any missing or incomplete sections critical enough to keep the document at an Alpha quality level?&lt;br /&gt;
= answer 4&lt;br /&gt;
&lt;br /&gt;
| 5. Have all the Beta Reviewer Action Items been completed? These will need to be completed if they have not already occurred during a previous assessment.&lt;br /&gt;
= answer 5&lt;br /&gt;
&lt;br /&gt;
| 6. Have any limitations been documented? Please point out the link(s).&lt;br /&gt;
= answer 6&lt;br /&gt;
&lt;br /&gt;
| 7. Does the document substantially address the application security issues it was created to solve?&lt;br /&gt;
= answer 7&lt;br /&gt;
&lt;br /&gt;
| 8. Does the document respect OWASP Writing Style and OWASP Template for Docs?&lt;br /&gt;
= answer 8&lt;br /&gt;
&lt;br /&gt;
| 9. Have you noted any limitations of the document that are not already documented by the project release lead?&lt;br /&gt;
= answer 9&lt;br /&gt;
&lt;br /&gt;
| 10. Would you consider using this document in your day to day work assuming your professional work includes a reason to use this document? Would you recommend this document to others in the profession? Why or why not?&lt;br /&gt;
= answer 10&lt;br /&gt;
&lt;br /&gt;
| 11. What, if anything, is missing which would make this a more useful document? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= answer 11&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>OWASP Germany Local Chapter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Best_Practices:_Web_Application_Firewalls_-_Release_1.0.4_-_Notes&amp;diff=71927</id>
		<title>Category:OWASP Best Practices: Web Application Firewalls - Release 1.0.4 - Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Best_Practices:_Web_Application_Firewalls_-_Release_1.0.4_-_Notes&amp;diff=71927"/>
				<updated>2009-10-21T16:56:25Z</updated>
		
		<summary type="html">&lt;p&gt;OWASP Germany Local Chapter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hello German Chapter.&lt;br /&gt;
&lt;br /&gt;
Please replace all this text by filling in as you find best. Please see below the guidance produced by the OWASP Global Committee. Thanks, Paulo Coimbra.&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;Release Notes – this is to provide both reviewers and users an idea ‘what they are getting’ in the new release.  It could double as (or be sourced from) the change log.  Particularly for reviewers, this helps them focus their efforts on the new parts of the project.  That should help project leads get eyeballs and feedback on their new code.  Especially for large projects that have made previous releases, this is very useful.  Think about the difference in effort between reviewing the Testing Guide as a whole vs looking at the 2 new chapters and 20 minor additions.&lt;br /&gt;
&lt;br /&gt;
How big to either of these have to be?  As big as the project lead feels they need to be to meet the purpose of them.  Maybe 10 bullets, maybe 10 pages – its really the project leads choice.  Also, project leads are in the best position to know how much effort this should take.&amp;quot;&lt;/div&gt;</summary>
		<author><name>OWASP Germany Local Chapter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Best_Practices:_Web_Application_Firewalls_-_Release_1.0.4_-_Notes&amp;diff=71926</id>
		<title>Category:OWASP Best Practices: Web Application Firewalls - Release 1.0.4 - Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Best_Practices:_Web_Application_Firewalls_-_Release_1.0.4_-_Notes&amp;diff=71926"/>
				<updated>2009-10-21T16:55:45Z</updated>
		
		<summary type="html">&lt;p&gt;OWASP Germany Local Chapter: Created page with 'Hello German Chapter.  Please fill in as you find best. Please see below the guidance produced by the OWASP Global Committee. Thanks, Paulo Coimbra.  * &amp;quot;Release Notes – this is…'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hello German Chapter.&lt;br /&gt;
&lt;br /&gt;
Please fill in as you find best. Please see below the guidance produced by the OWASP Global Committee. Thanks, Paulo Coimbra.&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;Release Notes – this is to provide both reviewers and users an idea ‘what they are getting’ in the new release.  It could double as (or be sourced from) the change log.  Particularly for reviewers, this helps them focus their efforts on the new parts of the project.  That should help project leads get eyeballs and feedback on their new code.  Especially for large projects that have made previous releases, this is very useful.  Think about the difference in effort between reviewing the Testing Guide as a whole vs looking at the 2 new chapters and 20 minor additions.&lt;br /&gt;
&lt;br /&gt;
How big to either of these have to be?  As big as the project lead feels they need to be to meet the purpose of them.  Maybe 10 bullets, maybe 10 pages – its really the project leads choice.  Also, project leads are in the best position to know how much effort this should take.&amp;quot;&lt;/div&gt;</summary>
		<author><name>OWASP Germany Local Chapter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Best_Practices:_Web_Application_Firewalls_-_Release_1.0.4&amp;diff=71923</id>
		<title>Category:OWASP Best Practices: Web Application Firewalls - Release 1.0.4</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Best_Practices:_Web_Application_Firewalls_-_Release_1.0.4&amp;diff=71923"/>
				<updated>2009-10-21T16:50:47Z</updated>
		
		<summary type="html">&lt;p&gt;OWASP Germany Local Chapter: Created page with '{{ Template:Detailed Release Information  | Release Name and Version  = Use of Web Application Firewalls - Release 1.0.4  | Release Date  = 3/2008    | Release Download Link  = […'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ Template:Detailed Release Information&lt;br /&gt;
&lt;br /&gt;
| Release Name and Version &lt;br /&gt;
= Use of Web Application Firewalls - Release 1.0.4&lt;br /&gt;
&lt;br /&gt;
| Release Date &lt;br /&gt;
= 3/2008  &lt;br /&gt;
&lt;br /&gt;
| Release Download Link &lt;br /&gt;
= [https://www.owasp.org/images/a/a6/Best_Practices_Guide_WAF_v104.en.pdf English Version/download], [https://www.owasp.org/images/1/1b/Best_Practices_Guide_WAF.pdf Deutsch Version/download]&lt;br /&gt;
&lt;br /&gt;
| Main Features&lt;br /&gt;
= &lt;br /&gt;
&lt;br /&gt;
| Release Leader - Wiki Account&lt;br /&gt;
= [[User:Achim|Achim Hoffmann]] &lt;br /&gt;
&lt;br /&gt;
| Release Contributor(s)&lt;br /&gt;
= &lt;br /&gt;
&lt;br /&gt;
| Release Reviewer(s)&lt;br /&gt;
= [[User:name|TBD]]  &lt;br /&gt;
&lt;br /&gt;
| Release Mentor(s)&lt;br /&gt;
= if any&lt;br /&gt;
&lt;br /&gt;
| Release Sponsor(s)&lt;br /&gt;
= if any&lt;br /&gt;
&lt;br /&gt;
| Release Flyer/Pamphlet&lt;br /&gt;
= &lt;br /&gt;
&lt;br /&gt;
| Release Notes&lt;br /&gt;
= [[:Category:OWASP Best Practices: Web Application Firewalls - Release 1.0.4 - Notes|Click here to view]]&lt;br /&gt;
&lt;br /&gt;
| Release Main Links&lt;br /&gt;
= [https://www.owasp.org/images/a/a6/Best_Practices_Guide_WAF_v104.en.pdf English Version/download]&lt;br /&gt;
&lt;br /&gt;
| Release Assessment&lt;br /&gt;
= [[Image:Yellow button.JPG|25px]] [[::Category:OWASP Best Practices: Web Application Firewalls - Release 1.0.4 - Assessment|Not reviewed/Targeted at Stable Release]] &lt;br /&gt;
&lt;br /&gt;
| Assessment Criteria Version&lt;br /&gt;
= [[:Assessing Project Health|Assessment Criteria v2.0]]&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>OWASP Germany Local Chapter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls&amp;diff=71922</id>
		<title>GPC Project Details/OWASP Best Practices: Web Application Firewalls</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls&amp;diff=71922"/>
				<updated>2009-10-21T16:44:06Z</updated>
		
		<summary type="html">&lt;p&gt;OWASP Germany Local Chapter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Project Identification Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP Best Practices: Web Application Firewalls &lt;br /&gt;
| project_description = Web applications of all kinds, whether online shops or partner portals, have in recent years increasingly become the target of hacker attacks. The attackers are using methods which are specifically aimed at exploiting potential weak spots in the web application software itself - and this is why they are not detected, or are not detected with sufficient accuracy, by traditional IT security systems such as network firewalls or IDS/IPS systems.&lt;br /&gt;
| project_license = [http://creativecommons.org/licenses/bysa/2.0/de/ Creative Commons/International/Germany]&lt;br /&gt;
| leader_name = OWASP Germany Local Chapter&lt;br /&gt;
| leader_email = owasp-firewalls-project(at)lists.owasp.org&lt;br /&gt;
| leader_username = OWASP Germany Local Chapter&lt;br /&gt;
| past_leaders_special_contributions = -&lt;br /&gt;
| maintainer_name = Achim Hoffmann&lt;br /&gt;
| maintainer_email = achim@owasp.org&lt;br /&gt;
| maintainer_username = Achim  &lt;br /&gt;
| contributor_name1 = Maximilian Dermann&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 =  &lt;br /&gt;
| contributor_name2 = Mirko Dziadzka&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = &lt;br /&gt;
| contributor_name3 = Boris Hemkemeier&lt;br /&gt;
| contributor_email3 = &lt;br /&gt;
| contributor_username3 = &lt;br /&gt;
| contributor_name4 = Alexander Meisel&lt;br /&gt;
| contributor_email4 = &lt;br /&gt;
| contributor_username4 = &lt;br /&gt;
| contributor_name5 = Matthias Rohr&lt;br /&gt;
| contributor_email5 = &lt;br /&gt;
| contributor_username5 = &lt;br /&gt;
| contributor_name6 = Thomas Schreiber&lt;br /&gt;
| contributor_email6 = &lt;br /&gt;
| contributor_username6 = &lt;br /&gt;
| contributor_name7 = &lt;br /&gt;
| contributor_email7 = &lt;br /&gt;
| contributor_username7 = &lt;br /&gt;
| contributor_name8 = &lt;br /&gt;
| contributor_email8 = &lt;br /&gt;
| contributor_username8 = &lt;br /&gt;
| contributor_name9 = &lt;br /&gt;
| contributor_email9 = &lt;br /&gt;
| contributor_username9 = &lt;br /&gt;
| contributor_name10 = &lt;br /&gt;
| contributor_email10 = &lt;br /&gt;
| contributor_username10 =  &lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link =&lt;br /&gt;
| mailing_list_name = owasp-firewalls-project&lt;br /&gt;
| links_url1 = http://www.owasp.org/index.php/Best_Practices:_Einsatz_von_Web_Application_Firewalls&lt;br /&gt;
| links_name1 = Document (wiki) - Deutsch &lt;br /&gt;
| links_url2 = http://www.owasp.org/index.php/Category:OWASP_Best_Practices:_Use_of_Web_Application_Firewalls&lt;br /&gt;
| links_name2 = Document (wiki) - English &lt;br /&gt;
| links_url3 = http://www.owasp.org/index.php/Best_Practices:_Utalisation_des_Web_Application_Firewall&lt;br /&gt;
| links_name3 = Document (wiki) - Français &lt;br /&gt;
| links_url4 = https://www.owasp.org/images/1/1b/Best_Practices_Guide_WAF.pdf&lt;br /&gt;
| links_name4 = Document (PDF) - Deutsch &lt;br /&gt;
| links_url5 = https://www.owasp.org/images/a/a6/Best_Practices_Guide_WAF_v104.en.pdf&lt;br /&gt;
| links_name5 = Document (PDF) - English&lt;br /&gt;
| links_url6 = &lt;br /&gt;
| links_name6 = &lt;br /&gt;
| links_url7 = &lt;br /&gt;
| links_name7 = &lt;br /&gt;
| links_url8 = &lt;br /&gt;
| links_name8 = &lt;br /&gt;
| links_url9 = &lt;br /&gt;
| links_name9 = &lt;br /&gt;
| links_url10 = &lt;br /&gt;
| links_name10 = &lt;br /&gt;
| project_road_map = Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
| project_health_status = &lt;br /&gt;
| current_release_name = Use of Web Application Firewalls - Release 1.0.4&lt;br /&gt;
| current_release_date = 3/2008&lt;br /&gt;
| current_release_download_link = https://www.owasp.org/images/a/a6/Best_Practices_Guide_WAF_v104.en.pdf English Version&lt;br /&gt;
| current_release_rating = -1&lt;br /&gt;
| current_release_leader_name = Achim Hoffmann&lt;br /&gt;
| current_release_leader_email = achim@owasp.org&lt;br /&gt;
| current_release_leader_username = Achim&lt;br /&gt;
| current_release_details = :Category:OWASP Best Practices: Web Application Firewalls - Release 1.0.4 &lt;br /&gt;
| last_reviewed_release_name = &lt;br /&gt;
| last_reviewed_release_date = &lt;br /&gt;
| last_reviewed_release_download_link = &lt;br /&gt;
| last_reviewed_release_rating = &lt;br /&gt;
| last_reviewed_release_leader_name = &lt;br /&gt;
| last_reviewed_release_leader_email = &lt;br /&gt;
| last_reviewed_release_leader_username = &lt;br /&gt;
| old_release_name1 = First Release&lt;br /&gt;
| old_release_date1 = 3/2008&lt;br /&gt;
| old_release_download_link1 = https://www.owasp.org/images/1/1b/Best_Practices_Guide_WAF.pdf Deutsch Version&lt;br /&gt;
| old_release_name2 = &lt;br /&gt;
| old_release_date2 = &lt;br /&gt;
| old_release_download_link2 = &lt;br /&gt;
| old_release_name3 = &lt;br /&gt;
| old_release_date3 = &lt;br /&gt;
| old_release_download_link3 = &lt;br /&gt;
| old_release_name4 = &lt;br /&gt;
| old_release_date4 = &lt;br /&gt;
| old_release_download_link4 = &lt;br /&gt;
| old_release_name5 = &lt;br /&gt;
| old_release_date5 = &lt;br /&gt;
| old_release_download_link5 = &lt;br /&gt;
| last_GPC_update = 2/10/2009&lt;br /&gt;
| GPC_Notes = Empty template&lt;br /&gt;
| project_home_page = Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
| project_details_wiki_page = GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>OWASP Germany Local Chapter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls&amp;diff=71919</id>
		<title>GPC Project Details/OWASP Best Practices: Web Application Firewalls</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls&amp;diff=71919"/>
				<updated>2009-10-21T16:15:03Z</updated>
		
		<summary type="html">&lt;p&gt;OWASP Germany Local Chapter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Project Identification Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP Best Practices: Web Application Firewalls &lt;br /&gt;
| project_description = Web applications of all kinds, whether online shops or partner portals, have in recent years increasingly become the target of hacker attacks. The attackers are using methods which are specifically aimed at exploiting potential weak spots in the web application software itself - and this is why they are not detected, or are not detected with sufficient accuracy, by traditional IT security systems such as network firewalls or IDS/IPS systems.&lt;br /&gt;
| project_license = [http://creativecommons.org/licenses/bysa/2.0/de/ Creative Commons/International/Germany]&lt;br /&gt;
| leader_name = OWASP Germany Local Chapter&lt;br /&gt;
| leader_email = owasp-firewalls-project(at)lists.owasp.org&lt;br /&gt;
| leader_username = OWASP Germany Local Chapter&lt;br /&gt;
| past_leaders_special_contributions = -&lt;br /&gt;
| maintainer_name = Achim Hoffmann&lt;br /&gt;
| maintainer_email = achim@owasp.org&lt;br /&gt;
| maintainer_username = Achim  &lt;br /&gt;
| contributor_name1 = Maximilian Dermann&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 =  &lt;br /&gt;
| contributor_name2 = Mirko Dziadzka&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = &lt;br /&gt;
| contributor_name3 = Boris Hemkemeier&lt;br /&gt;
| contributor_email3 = &lt;br /&gt;
| contributor_username3 = &lt;br /&gt;
| contributor_name4 = Alexander Meisel&lt;br /&gt;
| contributor_email4 = &lt;br /&gt;
| contributor_username4 = &lt;br /&gt;
| contributor_name5 = Matthias Rohr&lt;br /&gt;
| contributor_email5 = &lt;br /&gt;
| contributor_username5 = &lt;br /&gt;
| contributor_name6 = Thomas Schreiber&lt;br /&gt;
| contributor_email6 = &lt;br /&gt;
| contributor_username6 = &lt;br /&gt;
| contributor_name7 = &lt;br /&gt;
| contributor_email7 = &lt;br /&gt;
| contributor_username7 = &lt;br /&gt;
| contributor_name8 = &lt;br /&gt;
| contributor_email8 = &lt;br /&gt;
| contributor_username8 = &lt;br /&gt;
| contributor_name9 = &lt;br /&gt;
| contributor_email9 = &lt;br /&gt;
| contributor_username9 = &lt;br /&gt;
| contributor_name10 = &lt;br /&gt;
| contributor_email10 = &lt;br /&gt;
| contributor_username10 =  &lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link =&lt;br /&gt;
| mailing_list_name = owasp-firewalls-project&lt;br /&gt;
| links_url1 = http://www.owasp.org/index.php/Best_Practices:_Einsatz_von_Web_Application_Firewalls&lt;br /&gt;
| links_name1 = Document (wiki) - Deutsch &lt;br /&gt;
| links_url2 = http://www.owasp.org/index.php/Category:OWASP_Best_Practices:_Use_of_Web_Application_Firewalls&lt;br /&gt;
| links_name2 = Document (wiki) - English &lt;br /&gt;
| links_url3 = http://www.owasp.org/index.php/Best_Practices:_Utalisation_des_Web_Application_Firewall&lt;br /&gt;
| links_name3 = Document (wiki) - Français &lt;br /&gt;
| links_url4 = https://www.owasp.org/images/1/1b/Best_Practices_Guide_WAF.pdf&lt;br /&gt;
| links_name4 = Document (PDF) - Deutsch &lt;br /&gt;
| links_url5 = https://www.owasp.org/images/a/a6/Best_Practices_Guide_WAF_v104.en.pdf&lt;br /&gt;
| links_name5 = Document (PDF) - English&lt;br /&gt;
| links_url6 = &lt;br /&gt;
| links_name6 = &lt;br /&gt;
| links_url7 = &lt;br /&gt;
| links_name7 = &lt;br /&gt;
| links_url8 = &lt;br /&gt;
| links_name8 = &lt;br /&gt;
| links_url9 = &lt;br /&gt;
| links_name9 = &lt;br /&gt;
| links_url10 = &lt;br /&gt;
| links_name10 = &lt;br /&gt;
| project_road_map = Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
| project_health_status = &lt;br /&gt;
| current_release_name = Use of Web Application Firewalls - Version 1.0.4&lt;br /&gt;
| current_release_date = 3/2008&lt;br /&gt;
| current_release_download_link = https://www.owasp.org/images/a/a6/Best_Practices_Guide_WAF_v104.en.pdf English Version&lt;br /&gt;
| current_release_rating = -1&lt;br /&gt;
| current_release_leader_name = Achim Hoffmann&lt;br /&gt;
| current_release_leader_email = achim@owasp.org&lt;br /&gt;
| current_release_leader_username = Achim&lt;br /&gt;
| current_release_details = Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
| last_reviewed_release_name = &lt;br /&gt;
| last_reviewed_release_date = &lt;br /&gt;
| last_reviewed_release_download_link = &lt;br /&gt;
| last_reviewed_release_rating = &lt;br /&gt;
| last_reviewed_release_leader_name = &lt;br /&gt;
| last_reviewed_release_leader_email = &lt;br /&gt;
| last_reviewed_release_leader_username = &lt;br /&gt;
| old_release_name1 = First Release&lt;br /&gt;
| old_release_date1 = 3/2008&lt;br /&gt;
| old_release_download_link1 = https://www.owasp.org/images/1/1b/Best_Practices_Guide_WAF.pdf Deutsch&lt;br /&gt;
| old_release_name2 = &lt;br /&gt;
| old_release_date2 = &lt;br /&gt;
| old_release_download_link2 = &lt;br /&gt;
| old_release_name3 = &lt;br /&gt;
| old_release_date3 = &lt;br /&gt;
| old_release_download_link3 = &lt;br /&gt;
| old_release_name4 = &lt;br /&gt;
| old_release_date4 = &lt;br /&gt;
| old_release_download_link4 = &lt;br /&gt;
| old_release_name5 = &lt;br /&gt;
| old_release_date5 = &lt;br /&gt;
| old_release_download_link5 = &lt;br /&gt;
| last_GPC_update = 2/10/2009&lt;br /&gt;
| GPC_Notes = Empty template&lt;br /&gt;
| project_home_page = Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
| project_details_wiki_page = GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>OWASP Germany Local Chapter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:OWASP_Germany_Local_Chapter&amp;diff=71918</id>
		<title>User:OWASP Germany Local Chapter</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:OWASP_Germany_Local_Chapter&amp;diff=71918"/>
				<updated>2009-10-21T15:59:12Z</updated>
		
		<summary type="html">&lt;p&gt;OWASP Germany Local Chapter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Germany Local Chapter's [mailto:owasp-firewalls-project@lists.owasp.org Email Address]&lt;/div&gt;</summary>
		<author><name>OWASP Germany Local Chapter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls&amp;diff=71917</id>
		<title>GPC Project Details/OWASP Best Practices: Web Application Firewalls</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls&amp;diff=71917"/>
				<updated>2009-10-21T15:56:14Z</updated>
		
		<summary type="html">&lt;p&gt;OWASP Germany Local Chapter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Project Identification Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP Best Practices: Web Application Firewalls &lt;br /&gt;
| project_description = Web applications of all kinds, whether online shops or partner portals, have in recent years increasingly become the target of hacker attacks. The attackers are using methods which are specifically aimed at exploiting potential weak spots in the web application software itself - and this is why they are not detected, or are not detected with sufficient accuracy, by traditional IT security systems such as network firewalls or IDS/IPS systems.&lt;br /&gt;
| project_license = [http://creativecommons.org/licenses/bysa/2.0/de/ Creative Commons/International/Germany]&lt;br /&gt;
| leader_name = OWASP Germany Local Chapter&lt;br /&gt;
| leader_email = owasp-firewalls-project(at)lists.owasp.org&lt;br /&gt;
| leader_username = OWASP Germany Local Chapter&lt;br /&gt;
| past_leaders_special_contributions = -&lt;br /&gt;
| maintainer_name = Achim Hoffmann&lt;br /&gt;
| maintainer_email = achim@owasp.org&lt;br /&gt;
| maintainer_username = Achim  &lt;br /&gt;
| contributor_name1 = Maximilian Dermann&lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 =  &lt;br /&gt;
| contributor_name2 = Mirko Dziadzka&lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = &lt;br /&gt;
| contributor_name3 = Boris Hemkemeier&lt;br /&gt;
| contributor_email3 = &lt;br /&gt;
| contributor_username3 = &lt;br /&gt;
| contributor_name4 = Alexander Meisel&lt;br /&gt;
| contributor_email4 = &lt;br /&gt;
| contributor_username4 = &lt;br /&gt;
| contributor_name5 = Matthias Rohr&lt;br /&gt;
| contributor_email5 = &lt;br /&gt;
| contributor_username5 = &lt;br /&gt;
| contributor_name6 = Thomas Schreiber&lt;br /&gt;
| contributor_email6 = &lt;br /&gt;
| contributor_username6 = &lt;br /&gt;
| contributor_name7 = &lt;br /&gt;
| contributor_email7 = &lt;br /&gt;
| contributor_username7 = &lt;br /&gt;
| contributor_name8 = &lt;br /&gt;
| contributor_email8 = &lt;br /&gt;
| contributor_username8 = &lt;br /&gt;
| contributor_name9 = &lt;br /&gt;
| contributor_email9 = &lt;br /&gt;
| contributor_username9 = &lt;br /&gt;
| contributor_name10 = &lt;br /&gt;
| contributor_email10 = &lt;br /&gt;
| contributor_username10 =  &lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link =&lt;br /&gt;
| mailing_list_name = owasp-firewalls-project&lt;br /&gt;
| links_url1 = http://www.owasp.org/index.php/Best_Practices:_Einsatz_von_Web_Application_Firewalls&lt;br /&gt;
| links_name1 = Document (wiki) - Deutsch &lt;br /&gt;
| links_url2 = http://www.owasp.org/index.php/Category:OWASP_Best_Practices:_Use_of_Web_Application_Firewalls&lt;br /&gt;
| links_name2 = Document (wiki) - English &lt;br /&gt;
| links_url3 = http://www.owasp.org/index.php/Best_Practices:_Utalisation_des_Web_Application_Firewall&lt;br /&gt;
| links_name3 = Document (wiki) - Français &lt;br /&gt;
| links_url4 = https://www.owasp.org/images/1/1b/Best_Practices_Guide_WAF.pdf&lt;br /&gt;
| links_name4 = Document (PDF) - Deutsch &lt;br /&gt;
| links_url5 = https://www.owasp.org/images/a/a6/Best_Practices_Guide_WAF_v104.en.pdf&lt;br /&gt;
| links_name5 = Document (PDF) - English&lt;br /&gt;
| links_url6 = &lt;br /&gt;
| links_name6 = &lt;br /&gt;
| links_url7 = &lt;br /&gt;
| links_name7 = &lt;br /&gt;
| links_url8 = &lt;br /&gt;
| links_name8 = &lt;br /&gt;
| links_url9 = &lt;br /&gt;
| links_name9 = &lt;br /&gt;
| links_url10 = &lt;br /&gt;
| links_name10 = &lt;br /&gt;
| project_road_map = Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
| project_health_status = &lt;br /&gt;
| current_release_name = Last Release&lt;br /&gt;
| current_release_date = 3/2008&lt;br /&gt;
| current_release_download_link = [https://www.owasp.org/images/1/1b/Best_Practices_Guide_WAF.pdf Deutsch], [https://www.owasp.org/images/a/a6/Best_Practices_Guide_WAF_v104.en.pdf English]&lt;br /&gt;
| current_release_rating = &lt;br /&gt;
| current_release_leader_name = Achim Hoffmann&lt;br /&gt;
| current_release_leader_email = &lt;br /&gt;
| current_release_leader_username = &lt;br /&gt;
| current_release_details = Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
| last_reviewed_release_name = &lt;br /&gt;
| last_reviewed_release_date = &lt;br /&gt;
| last_reviewed_release_download_link = &lt;br /&gt;
| last_reviewed_release_rating = &lt;br /&gt;
| last_reviewed_release_leader_name = &lt;br /&gt;
| last_reviewed_release_leader_email = &lt;br /&gt;
| last_reviewed_release_leader_username = &lt;br /&gt;
| old_release_name1 = First Release&lt;br /&gt;
| old_release_date1 = 3/2008&lt;br /&gt;
| old_release_download_link1 = [https://www.owasp.org/images/1/1b/Best_Practices_Guide_WAF.pdf Deutsch]&lt;br /&gt;
| old_release_name2 = &lt;br /&gt;
| old_release_date2 = &lt;br /&gt;
| old_release_download_link2 = &lt;br /&gt;
| old_release_name3 = &lt;br /&gt;
| old_release_date3 = &lt;br /&gt;
| old_release_download_link3 = &lt;br /&gt;
| old_release_name4 = &lt;br /&gt;
| old_release_date4 = &lt;br /&gt;
| old_release_download_link4 = &lt;br /&gt;
| old_release_name5 = &lt;br /&gt;
| old_release_date5 = &lt;br /&gt;
| old_release_download_link5 = &lt;br /&gt;
| last_GPC_update = 2/10/2009&lt;br /&gt;
| GPC_Notes = Empty template&lt;br /&gt;
| project_home_page = Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
| project_details_wiki_page = GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>OWASP Germany Local Chapter</name></author>	</entry>

	</feed>