<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Shezan</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Shezan"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Shezan"/>
		<updated>2026-04-12T23:30:32Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193620</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193620"/>
				<updated>2015-04-19T20:36:41Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* What is System Vulnerable Code Project? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Incubator_big.jpg|link=OWASP_Project_Stages#tab=Incubator_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
==[[S. M. Shezan]] Best Project Leader Of The Year==&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
[[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
Information Security Expert&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [http://www.shezan.cf/Contact-Me/ me@shezan.cf]&lt;br /&gt;
&lt;br /&gt;
message: [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
[[Best Project Of The Year]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 [http://shezan.cf shezan]&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193619</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193619"/>
				<updated>2015-04-19T20:35:22Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* S. M. Shezan Best Project Leader Of The Year */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Incubator_big.jpg|link=OWASP_Project_Stages#tab=Incubator_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
[[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
Information Security Expert&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [http://www.shezan.cf/Contact-Me/ me@shezan.cf]&lt;br /&gt;
&lt;br /&gt;
message: [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
[[Best Project Of The Year]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 [http://shezan.cf shezan]&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193618</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193618"/>
				<updated>2015-04-19T20:34:43Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Best Project Leader Of The Year */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Incubator_big.jpg|link=OWASP_Project_Stages#tab=Incubator_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[S. M. Shezan]] Best Project Leader Of The Year==&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
[[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
Information Security Expert&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [http://www.shezan.cf/Contact-Me/ me@shezan.cf]&lt;br /&gt;
&lt;br /&gt;
message: [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
[[Best Project Of The Year]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 [http://shezan.cf shezan]&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193617</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193617"/>
				<updated>2015-04-19T20:33:34Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Best Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Incubator_big.jpg|link=OWASP_Project_Stages#tab=Incubator_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Best Project Leader Of The Year==&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
[[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
Information Security Expert&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [http://www.shezan.cf/Contact-Me/ me@shezan.cf]&lt;br /&gt;
&lt;br /&gt;
message: [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
[[Best Project Of The Year]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 [http://shezan.cf shezan]&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193616</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193616"/>
				<updated>2015-04-19T20:32:38Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Best Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Incubator_big.jpg|link=OWASP_Project_Stages#tab=Incubator_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Best Project Leader==&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
[[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
Information Security Expert&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [http://www.shezan.cf/Contact-Me/ me@shezan.cf]&lt;br /&gt;
&lt;br /&gt;
message: [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
[[Best Project Of The Year]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 [http://shezan.cf shezan]&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193615</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193615"/>
				<updated>2015-04-19T20:31:43Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Licensing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Incubator_big.jpg|link=OWASP_Project_Stages#tab=Incubator_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Best Project Leader==&lt;br /&gt;
&lt;br /&gt;
==Best Project Leader==&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
[[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
Information Security Expert&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [http://www.shezan.cf/Contact-Me/ me@shezan.cf]&lt;br /&gt;
&lt;br /&gt;
message: [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
[[Best Project Of The Year]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 [http://shezan.cf shezan]&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193614</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193614"/>
				<updated>2015-04-19T20:30:59Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Licensing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Incubator_big.jpg|link=OWASP_Project_Stages#tab=Incubator_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Best Project Leader==&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
[[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
Information Security Expert&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [http://www.shezan.cf/Contact-Me/ me@shezan.cf]&lt;br /&gt;
&lt;br /&gt;
message: [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
[[Best Project Of The Year]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 [http://shezan.cf shezan]&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193613</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193613"/>
				<updated>2015-04-19T20:29:39Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Project Performance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Incubator_big.jpg|link=OWASP_Project_Stages#tab=Incubator_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
[[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
Information Security Expert&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [http://www.shezan.cf/Contact-Me/ me@shezan.cf]&lt;br /&gt;
&lt;br /&gt;
message: [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
[[Best Project Of The Year]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 [http://shezan.cf shezan]&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193612</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193612"/>
				<updated>2015-04-19T20:28:57Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Project Performance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Incubator_big.jpg|link=OWASP_Project_Stages#tab=Incubator_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
[[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
Information Security Expert&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [http://www.shezan.cf/Contact-Me/ me@shezan.cf]&lt;br /&gt;
&lt;br /&gt;
message: [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
[Best Project Of The Year]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 [http://shezan.cf shezan]&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193611</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193611"/>
				<updated>2015-04-19T20:27:44Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Project Performance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Incubator_big.jpg|link=OWASP_Project_Stages#tab=Incubator_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
[[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
Information Security Expert&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [http://www.shezan.cf/Contact-Me/ me@shezan.cf]&lt;br /&gt;
&lt;br /&gt;
message: [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
[[Best Project Of The Year]]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 [http://shezan.cf shezan]&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193569</id>
		<title>S. M. Shezan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193569"/>
				<updated>2015-04-17T08:18:32Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Contact: [http://www.facebook.com/smshezan S. M. Shezan]  E-mail:[[shezan@owasp.org]]&lt;br /&gt;
&lt;br /&gt;
==BIO==&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan is a project leader of [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project OWASP System Vulnerable Code Project]. He is a long time contributor to OWASP, helping to establish the OWASP since 2013, serving on the [[Board | OWASP Board]] since it was formed from 2004 through 2013. He is a coauthor of the [[Top10 | OWASP Top 10]] and has led the project since 2013, and has contributed to numerous other important OWASP projects including [[WebGoat]], [[ESAPI]], [[ASVS]], and the [[Cheat Sheets | OWASP Cheat Sheet Series]].&lt;br /&gt;
&lt;br /&gt;
Shezan is also involved in developing a new type of application vulnerability analysis technology that uses instrumentation to detect vulnerabilities inside of a running web application.&lt;br /&gt;
&lt;br /&gt;
Shezan is from Dhaka, Bangladesh. He is an Information Security Expert at [http://www.ictd.gov.bd Ministry of Information and Communication Technology, Bangladesh]&lt;br /&gt;
&lt;br /&gt;
==OWASP Contributions==&lt;br /&gt;
&lt;br /&gt;
He has been contributing to OWASP since 2013. In 2013, along with Jeff Williams and Dave Wichers, we established the 501c3 organization that is now the OWASP Foundation. Since establishing the OWASP Foundation, He served as the de facto Chief Technology Officer of OWASP, until the OWASP Board established an Executive Director in mid 2013. During that time he negotiated and signed for virtually all contracts OWASP entered into with other parties. He also established all the technical for the OWASP Foundation and helped hire most of the employees of the OWASP Foundation. He volunteered to become the OWASP Conferences Chair where he launched the OWASP Conferences Series, personally organized all the  U.S. and European AppSec conferences from 2005 through 2013, and helped launch the Global Conferences Committee in 2014, which organized the conferences from 2009 through 2012. The OWASP Conferences have grown to serve as a primary fundraising resource for OWASP.  He has also spent countless hours helping to initially establish the OWASP wiki, and then continuing to improve it, proofreading articles, encouraging others to contribute, etc.&lt;br /&gt;
&lt;br /&gt;
As a project leader to OWASP, Shezan is or has been:&lt;br /&gt;
&lt;br /&gt;
* A continuous member of the [[About_OWASP#Global_Board_Members|OWASP Board]] since it was established in 2004 through the end of 2013, &lt;br /&gt;
* The [[:Category:OWASP_AppSec_Conference | OWASP Conferences]] Chair from 2005 through 2008,&lt;br /&gt;
* Project lead and coauthor of the [[OWASP_Top_Ten_Project | OWASP Top 10]],&lt;br /&gt;
* Coauthor of the first version of the [[ASVS | OWASP Application Security Verification Standard]],&lt;br /&gt;
* Contributor to the [[ESAPI | OWASP Enterprise Security API (ESAPI)]] project,&lt;br /&gt;
* Lead of the OWASP Prevention Cheat Sheet Series and primary author of the [[SQL_Injection_Prevention_Cheat_Sheet | SQL Injection Prevention Cheat Sheet]].&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=193568</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=193568"/>
				<updated>2015-04-17T07:48:50Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* What is the OWASP Top 10? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten is a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the 10 Most Critical Web Application Security Risks&lt;br /&gt;
&lt;br /&gt;
And for each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example best vulnerabilities project [[OWASP System Vulnerable Code Project]]&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Wichers | Dave Wichers]]&lt;br /&gt;
* [[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP System Vulnerable Code Project]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 - PDF] &lt;br /&gt;
*[[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] Draft OWASP Top 10 - 2013 - Released for Public Comment&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx OWASP Top 10 2013 Presentation - Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 is as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. Translation efforts for the 2013 version are underway and they will be posted as they become available. &lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== 2013 Versions ==&lt;br /&gt;
&lt;br /&gt;
2013 Edition: &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 - PDF] &lt;br /&gt;
*[[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
*[https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
*[[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]]&lt;br /&gt;
*[[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF direct download)] &lt;br /&gt;
*[https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
*[https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the Top Ten. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top Ten useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top Ten mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten project is sponsored by {{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks for 2010 are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[http://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[http://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[http://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [http://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten project is sponsored by {{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Efforts are underway in numerous languages to translate the OWASP Top 10 for 2013. If you are interested in helping, please contact the other members of the team for the language you are interested in contributing to, or if you don't see your language listed, please let me know you want to help and we'll form a volunteer group for your language too!!&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://www.owasp.org/images/4/4d/OWASP_Top_10_-_2013_Final_-_English.pptx OWASP Top 10 - 2013 which is in PowerPoint]. Please use this document as the basis for your translation efforts.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [http://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [http://owasptop10.googlecode.com/files/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
Volunteer Translation Efforts Underway: &lt;br /&gt;
&lt;br /&gt;
*Portuguese: carlos.j.serrao@gmail.com; taquiles@gmail.com; wagner.elias@owasp.org; victoreufrasio@gmail.com; leo.cavallari@owasp.org; victoreufrasio@gmail.com; &lt;br /&gt;
*Greek: Konstantinos Papapanagiotou (conpap@di.uoa.gr) &lt;br /&gt;
*Turkish: bora@abi.com.tr &lt;br /&gt;
*Malay: cecil.su@owasp.org &lt;br /&gt;
*Dutch: marinus@kuivenhoven.com&lt;br /&gt;
*Swedish: ake.bengtsson@owasp.org&lt;br /&gt;
*Hungarian: tibor.fekete@owasp.org&lt;br /&gt;
*Persian (Farsi): Shahab Namazikhah (namazikhah@hotmail.com)&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[http://blogs.msdn.com/b/sdl/archive/2008/05/01/sdl-and-the-owasp-top-ten.aspx Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[http://www.nsa.gov/applications/search/index.cfm?q=owasp NSA] &lt;br /&gt;
:in their developer guidance on web application security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=193567</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=193567"/>
				<updated>2015-04-17T07:47:28Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten is a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the 10 Most Critical Web Application Security Risks&lt;br /&gt;
&lt;br /&gt;
And for each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Wichers | Dave Wichers]]&lt;br /&gt;
* [[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP System Vulnerable Code Project]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 - PDF] &lt;br /&gt;
*[[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] Draft OWASP Top 10 - 2013 - Released for Public Comment&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx OWASP Top 10 2013 Presentation - Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 is as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. Translation efforts for the 2013 version are underway and they will be posted as they become available. &lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== 2013 Versions ==&lt;br /&gt;
&lt;br /&gt;
2013 Edition: &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 - PDF] &lt;br /&gt;
*[[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
*[https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
*[[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]]&lt;br /&gt;
*[[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF direct download)] &lt;br /&gt;
*[https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
*[https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the Top Ten. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top Ten useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top Ten mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten project is sponsored by {{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks for 2010 are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[http://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[http://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[http://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [http://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten project is sponsored by {{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Efforts are underway in numerous languages to translate the OWASP Top 10 for 2013. If you are interested in helping, please contact the other members of the team for the language you are interested in contributing to, or if you don't see your language listed, please let me know you want to help and we'll form a volunteer group for your language too!!&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://www.owasp.org/images/4/4d/OWASP_Top_10_-_2013_Final_-_English.pptx OWASP Top 10 - 2013 which is in PowerPoint]. Please use this document as the basis for your translation efforts.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [http://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [http://owasptop10.googlecode.com/files/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
Volunteer Translation Efforts Underway: &lt;br /&gt;
&lt;br /&gt;
*Portuguese: carlos.j.serrao@gmail.com; taquiles@gmail.com; wagner.elias@owasp.org; victoreufrasio@gmail.com; leo.cavallari@owasp.org; victoreufrasio@gmail.com; &lt;br /&gt;
*Greek: Konstantinos Papapanagiotou (conpap@di.uoa.gr) &lt;br /&gt;
*Turkish: bora@abi.com.tr &lt;br /&gt;
*Malay: cecil.su@owasp.org &lt;br /&gt;
*Dutch: marinus@kuivenhoven.com&lt;br /&gt;
*Swedish: ake.bengtsson@owasp.org&lt;br /&gt;
*Hungarian: tibor.fekete@owasp.org&lt;br /&gt;
*Persian (Farsi): Shahab Namazikhah (namazikhah@hotmail.com)&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[http://blogs.msdn.com/b/sdl/archive/2008/05/01/sdl-and-the-owasp-top-ten.aspx Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[http://www.nsa.gov/applications/search/index.cfm?q=owasp NSA] &lt;br /&gt;
:in their developer guidance on web application security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193566</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193566"/>
				<updated>2015-04-17T07:38:48Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Incubator_big.jpg|link=OWASP_Project_Stages#tab=Incubator_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
[[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
Information Security Expert&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [http://www.shezan.cf/Contact-Me/ me@shezan.cf]&lt;br /&gt;
&lt;br /&gt;
message: [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 [http://shezan.cf shezan]&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193565</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193565"/>
				<updated>2015-04-17T07:34:48Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Incubator_big.jpg|link=OWASP_Project_Stages#tab=Incubator_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
[[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
Information Security Expert&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [http://www.shezan.cf/Contact-Me/ me@shezan.cf]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 [http://shezan.cf shezan]&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193564</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=193564"/>
				<updated>2015-04-17T07:32:08Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Incubator_big.jpg|link=OWASP_Project_Stages#tab=Incubator_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
[[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
Information Security Consultant&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [http://www.shezan.cf/Contact-Me/ me@shezan.cf]&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 [http://shezan.cf shezan]&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193563</id>
		<title>S. M. Shezan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193563"/>
				<updated>2015-04-17T07:27:50Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Contact: [http://www.facebook.com/smshezan S. M. Shezan]  E-mail:[[shezan@owasp.org]]&lt;br /&gt;
&lt;br /&gt;
==BIO==&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan is a project leader of [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project OWASP System Vulnerable Code Project]. He is a long time contributor to OWASP, helping to establish the OWASP since 2013, serving on the [[Board | OWASP Board]] since it was formed from 2004 through 2013. He is a coauthor of the [[Top10 | OWASP Top 10]] and has led the project since 2013, and has contributed to numerous other important OWASP projects including [[WebGoat]], [[ESAPI]], [[ASVS]], and the [[Cheat Sheets | OWASP Cheat Sheet Series]].&lt;br /&gt;
&lt;br /&gt;
Shezan is also involved in developing a new type of application vulnerability analysis technology that uses instrumentation to detect vulnerabilities inside of a running web application.&lt;br /&gt;
&lt;br /&gt;
Shezan is from Dhaka, Bangladesh. He is a Information Security Expert at [http://www.ictd.gov.bd Ministry of Information and Communication Technology, Bangladesh]&lt;br /&gt;
&lt;br /&gt;
==OWASP Contributions==&lt;br /&gt;
&lt;br /&gt;
He has been contributing to OWASP since 2013. In 2013, along with Jeff Williams and Dave Wichers, we established the 501c3 organization that is now the OWASP Foundation. Since establishing the OWASP Foundation, He served as the de facto Chief Technology Officer of OWASP, until the OWASP Board established an Executive Director in mid 2013. During that time he negotiated and signed for virtually all contracts OWASP entered into with other parties. He also established all the technical for the OWASP Foundation and helped hire most of the employees of the OWASP Foundation. He volunteered to become the OWASP Conferences Chair where he launched the OWASP Conferences Series, personally organized all the  U.S. and European AppSec conferences from 2005 through 2013, and helped launch the Global Conferences Committee in 2014, which organized the conferences from 2009 through 2012. The OWASP Conferences have grown to serve as a primary fundraising resource for OWASP.  He has also spent countless hours helping to initially establish the OWASP wiki, and then continuing to improve it, proofreading articles, encouraging others to contribute, etc.&lt;br /&gt;
&lt;br /&gt;
As a project leader to OWASP, Shezan is or has been:&lt;br /&gt;
&lt;br /&gt;
* A continuous member of the [[About_OWASP#Global_Board_Members|OWASP Board]] since it was established in 2004 through the end of 2013, &lt;br /&gt;
* The [[:Category:OWASP_AppSec_Conference | OWASP Conferences]] Chair from 2005 through 2008,&lt;br /&gt;
* Project lead and coauthor of the [[OWASP_Top_Ten_Project | OWASP Top 10]],&lt;br /&gt;
* Coauthor of the first version of the [[ASVS | OWASP Application Security Verification Standard]],&lt;br /&gt;
* Contributor to the [[ESAPI | OWASP Enterprise Security API (ESAPI)]] project,&lt;br /&gt;
* Lead of the OWASP Prevention Cheat Sheet Series and primary author of the [[SQL_Injection_Prevention_Cheat_Sheet | SQL Injection Prevention Cheat Sheet]].&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193562</id>
		<title>S. M. Shezan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193562"/>
				<updated>2015-04-17T07:24:36Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* OWASP Contributions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Contact: [http://www.facebook.com/smshezan S. M. Shezan] [[shezan@owasp.org]]&lt;br /&gt;
&lt;br /&gt;
==BIO==&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan is a project leader of [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project OWASP System Vulnerable Code Project]. He is a long time contributor to OWASP, helping to establish the OWASP since 2013, serving on the [[Board | OWASP Board]] since it was formed from 2004 through 2013. He is a coauthor of the [[Top10 | OWASP Top 10]] and has led the project since 2013, and has contributed to numerous other important OWASP projects including [[WebGoat]], [[ESAPI]], [[ASVS]], and the [[Cheat Sheets | OWASP Cheat Sheet Series]].&lt;br /&gt;
&lt;br /&gt;
Shezan is also involved in developing a new type of application vulnerability analysis technology that uses instrumentation to detect vulnerabilities inside of a running web application.&lt;br /&gt;
&lt;br /&gt;
Shezan is from Dhaka, Bangladesh. He is a Information Security Expert at [http://www.ictd.gov.bd Ministry of Information and Communication Technology, Bangladesh]&lt;br /&gt;
&lt;br /&gt;
==OWASP Contributions==&lt;br /&gt;
&lt;br /&gt;
He has been contributing to OWASP since 2013. In 2013, along with Jeff Williams and Dave Wichers, we established the 501c3 organization that is now the OWASP Foundation. Since establishing the OWASP Foundation, He served as the de facto Chief Technology Officer of OWASP, until the OWASP Board established an Executive Director in mid 2013. During that time he negotiated and signed for virtually all contracts OWASP entered into with other parties. He also established all the technical for the OWASP Foundation and helped hire most of the employees of the OWASP Foundation. He volunteered to become the OWASP Conferences Chair where he launched the OWASP Conferences Series, personally organized all the  U.S. and European AppSec conferences from 2005 through 2013, and helped launch the Global Conferences Committee in 2014, which organized the conferences from 2009 through 2012. The OWASP Conferences have grown to serve as a primary fundraising resource for OWASP.  He has also spent countless hours helping to initially establish the OWASP wiki, and then continuing to improve it, proofreading articles, encouraging others to contribute, etc.&lt;br /&gt;
&lt;br /&gt;
As a project leader to OWASP, Shezan is or has been:&lt;br /&gt;
&lt;br /&gt;
* A continuous member of the [[About_OWASP#Global_Board_Members|OWASP Board]] since it was established in 2004 through the end of 2013, &lt;br /&gt;
* The [[:Category:OWASP_AppSec_Conference | OWASP Conferences]] Chair from 2005 through 2008,&lt;br /&gt;
* Project lead and coauthor of the [[OWASP_Top_Ten_Project | OWASP Top 10]],&lt;br /&gt;
* Coauthor of the first version of the [[ASVS | OWASP Application Security Verification Standard]],&lt;br /&gt;
* Contributor to the [[ESAPI | OWASP Enterprise Security API (ESAPI)]] project,&lt;br /&gt;
* Lead of the OWASP Prevention Cheat Sheet Series and primary author of the [[SQL_Injection_Prevention_Cheat_Sheet | SQL Injection Prevention Cheat Sheet]].&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193561</id>
		<title>S. M. Shezan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193561"/>
				<updated>2015-04-17T07:20:03Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Contact: [http://www.facebook.com/smshezan S. M. Shezan] [[shezan@owasp.org]]&lt;br /&gt;
&lt;br /&gt;
==BIO==&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan is a project leader of [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project OWASP System Vulnerable Code Project]. He is a long time contributor to OWASP, helping to establish the OWASP since 2013, serving on the [[Board | OWASP Board]] since it was formed from 2004 through 2013. He is a coauthor of the [[Top10 | OWASP Top 10]] and has led the project since 2013, and has contributed to numerous other important OWASP projects including [[WebGoat]], [[ESAPI]], [[ASVS]], and the [[Cheat Sheets | OWASP Cheat Sheet Series]].&lt;br /&gt;
&lt;br /&gt;
Shezan is also involved in developing a new type of application vulnerability analysis technology that uses instrumentation to detect vulnerabilities inside of a running web application.&lt;br /&gt;
&lt;br /&gt;
Shezan is from Dhaka, Bangladesh. He is a Information Security Expert at [http://www.ictd.gov.bd Ministry of Information and Communication Technology, Bangladesh]&lt;br /&gt;
&lt;br /&gt;
==OWASP Contributions==&lt;br /&gt;
&lt;br /&gt;
I have been contributing to OWASP since 2013. In 2013, along with Jeff Williams and Dave Wichers, we established the 501c3 organization that is now the OWASP Foundation. Since establishing the OWASP Foundation, I served as the de facto Chief Financial Officer of OWASP, until the OWASP Board established an Executive Director in mid 2013. During that time I negotiated and signed for virtually all contracts OWASP entered into with other parties. I also established all the financial accounts for the OWASP Foundation including bank accounts, credit cards, tax IDs, and helped hire most of the employees of the OWASP Foundation. I also helped determine the employee benefits these employees would receive, and established the procedures for how they would receive those benefits including health insurance, payroll, etc. In late 2014, I volunteered to become the OWASP Conferences Chair where I launched the OWASP Conferences Series, personally organized all the  U.S. and European AppSec conferences from 2005 through 2013, and helped launch the Global Conferences Committee in 2014, which organized the conferences from 2009 through 2012. The OWASP Conferences have grown to serve as a primary fundraising resource for OWASP.  I have also spent countless hours helping to initially establish the OWASP wiki, and then continuing to improve it, proofreading articles, encouraging others to contribute, etc.&lt;br /&gt;
&lt;br /&gt;
As a volunteer to OWASP, Dave is or has been:&lt;br /&gt;
&lt;br /&gt;
* A continuous member of the [[About_OWASP#Global_Board_Members|OWASP Board]] since it was established in 2004 through the end of 2013, &lt;br /&gt;
* The [[:Category:OWASP_AppSec_Conference | OWASP Conferences]] Chair from 2005 through 2008,&lt;br /&gt;
* Project lead and coauthor of the [[OWASP_Top_Ten_Project | OWASP Top 10]],&lt;br /&gt;
* Coauthor of the first version of the [[ASVS | OWASP Application Security Verification Standard]],&lt;br /&gt;
* Contributor to the [[ESAPI | OWASP Enterprise Security API (ESAPI)]] project,&lt;br /&gt;
* Lead of the OWASP Prevention Cheat Sheet Series and primary author of the [[SQL_Injection_Prevention_Cheat_Sheet | SQL Injection Prevention Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
For more details than this short bio on what I've done at OWASP, listen to my [https://www.owasp.org/download/jmanico/owasp_podcast_82.mp3 OWASP podcast].&lt;br /&gt;
&lt;br /&gt;
[[:Special:Contributions/Wichers|Wiki Contributions]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193559</id>
		<title>S. M. Shezan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193559"/>
				<updated>2015-04-17T07:14:38Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Contact: [http://www.facebook.com/smshezan S. M. Shezan] [[shezan@owasp.org]]&lt;br /&gt;
&lt;br /&gt;
==BIO==&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan is a project leader of [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project OWASP System Vulnerable Code Project]. He is a long time contributor to OWASP, helping to establish the OWASP since 2013, serving on the [[Board | OWASP Board]] since it was formed from 2004 through 2013. He is a coauthor of the [[Top10 | OWASP Top 10]] and has led the project since 2013, and has contributed to numerous other important OWASP projects including [[WebGoat]], [[ESAPI]], [[ASVS]], and the [[Cheat Sheets | OWASP Cheat Sheet Series]].&lt;br /&gt;
&lt;br /&gt;
Shezan is also involved in developing a new type of application vulnerability analysis technology that uses instrumentation to detect vulnerabilities inside of a running web application.&lt;br /&gt;
&lt;br /&gt;
Shezan is from Dhaka, Bangladesh. He is a Information Security Expert at [http://www.ictd.gov.bd Ministry of Information and Communication Technology, Bangladesh]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193558</id>
		<title>S. M. Shezan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193558"/>
				<updated>2015-04-17T07:13:29Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Contact: [http://www.facebook.com/smshezan S. M. Shezan] &lt;br /&gt;
Mailing Address: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
==BIO==&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan is a project leader of [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project OWASP System Vulnerable Code Project]. He is a long time contributor to OWASP, helping to establish the OWASP since 2013, serving on the [[Board | OWASP Board]] since it was formed from 2004 through 2013. He is a coauthor of the [[Top10 | OWASP Top 10]] and has led the project since 2013, and has contributed to numerous other important OWASP projects including [[WebGoat]], [[ESAPI]], [[ASVS]], and the [[Cheat Sheets | OWASP Cheat Sheet Series]].&lt;br /&gt;
&lt;br /&gt;
Shezan is also involved in developing a new type of application vulnerability analysis technology that uses instrumentation to detect vulnerabilities inside of a running web application.&lt;br /&gt;
&lt;br /&gt;
Shezan is from Dhaka, Bangladesh. He is a Information Security Expert at [http://www.ictd.gov.bd Ministry of Information and Communication Technology, Bangladesh]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193557</id>
		<title>S. M. Shezan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193557"/>
				<updated>2015-04-17T07:11:28Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
==BIO==&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan is a project leader of [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project OWASP System Vulnerable Code Project]. He is a long time contributor to OWASP, helping to establish the OWASP since 2013, serving on the [[Board | OWASP Board]] since it was formed from 2004 through 2013. He is a coauthor of the [[Top10 | OWASP Top 10]] and has led the project since 2013, and has contributed to numerous other important OWASP projects including [[WebGoat]], [[ESAPI]], [[ASVS]], and the [[Cheat Sheets | OWASP Cheat Sheet Series]].&lt;br /&gt;
&lt;br /&gt;
Shezan is also involved in developing a new type of application vulnerability analysis technology that uses instrumentation to detect vulnerabilities inside of a running web application.&lt;br /&gt;
&lt;br /&gt;
Shezan is from Dhaka, Bangladesh. He is a Information Security Expert at [http://www.ictd.gov.bd Ministry of Information and Communication Technology, Bangladesh]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=193556</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=193556"/>
				<updated>2015-04-17T07:10:55Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten is a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the 10 Most Critical Web Application Security Risks&lt;br /&gt;
&lt;br /&gt;
And for each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Wichers | Dave Wichers]]&lt;br /&gt;
* [[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 - PDF] &lt;br /&gt;
*[[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] Draft OWASP Top 10 - 2013 - Released for Public Comment&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx OWASP Top 10 2013 Presentation - Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 is as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. Translation efforts for the 2013 version are underway and they will be posted as they become available. &lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== 2013 Versions ==&lt;br /&gt;
&lt;br /&gt;
2013 Edition: &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 - PDF] &lt;br /&gt;
*[[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
*[https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
*[[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]]&lt;br /&gt;
*[[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF direct download)] &lt;br /&gt;
*[https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
*[https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the Top Ten. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top Ten useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top Ten mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten project is sponsored by {{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks for 2010 are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[http://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[http://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[http://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [http://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten project is sponsored by {{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Efforts are underway in numerous languages to translate the OWASP Top 10 for 2013. If you are interested in helping, please contact the other members of the team for the language you are interested in contributing to, or if you don't see your language listed, please let me know you want to help and we'll form a volunteer group for your language too!!&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://www.owasp.org/images/4/4d/OWASP_Top_10_-_2013_Final_-_English.pptx OWASP Top 10 - 2013 which is in PowerPoint]. Please use this document as the basis for your translation efforts.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [http://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [http://owasptop10.googlecode.com/files/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
Volunteer Translation Efforts Underway: &lt;br /&gt;
&lt;br /&gt;
*Portuguese: carlos.j.serrao@gmail.com; taquiles@gmail.com; wagner.elias@owasp.org; victoreufrasio@gmail.com; leo.cavallari@owasp.org; victoreufrasio@gmail.com; &lt;br /&gt;
*Greek: Konstantinos Papapanagiotou (conpap@di.uoa.gr) &lt;br /&gt;
*Turkish: bora@abi.com.tr &lt;br /&gt;
*Malay: cecil.su@owasp.org &lt;br /&gt;
*Dutch: marinus@kuivenhoven.com&lt;br /&gt;
*Swedish: ake.bengtsson@owasp.org&lt;br /&gt;
*Hungarian: tibor.fekete@owasp.org&lt;br /&gt;
*Persian (Farsi): Shahab Namazikhah (namazikhah@hotmail.com)&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[http://blogs.msdn.com/b/sdl/archive/2008/05/01/sdl-and-the-owasp-top-ten.aspx Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[http://www.nsa.gov/applications/search/index.cfm?q=owasp NSA] &lt;br /&gt;
:in their developer guidance on web application security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Shezan&amp;diff=193555</id>
		<title>User:Shezan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Shezan&amp;diff=193555"/>
				<updated>2015-04-17T07:08:40Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==BIO==&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan is a project leader of [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project OWASP System Vulnerable Code Project]. He is a long time contributor to OWASP, helping to establish the OWASP since 2013, serving on the [[Board | OWASP Board]] since it was formed from 2004 through 2013. He is a coauthor of the [[Top10 | OWASP Top 10]] and has led the project since 2007, and has contributed to numerous other important OWASP projects including [[WebGoat]], [[ESAPI]], [[ASVS]], and the [[Cheat Sheets | OWASP Cheat Sheet Series]].&lt;br /&gt;
&lt;br /&gt;
Shezan is also involved in developing a new type of application vulnerability analysis technology that uses instrumentation to detect vulnerabilities inside of a running web application.&lt;br /&gt;
&lt;br /&gt;
Shezan is from Dhaka, Bangladesh. He is a Information Security Expert at [http://www.ictd.gov.bd Ministry of Information and Communication Technology, Bangladesh]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=193553</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=193553"/>
				<updated>2015-04-17T07:01:08Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten is a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the 10 Most Critical Web Application Security Risks&lt;br /&gt;
&lt;br /&gt;
And for each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Wichers | Dave Wichers]]&lt;br /&gt;
* [[User:Shezan | S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 - PDF] &lt;br /&gt;
*[[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] Draft OWASP Top 10 - 2013 - Released for Public Comment&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx OWASP Top 10 2013 Presentation - Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 is as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. Translation efforts for the 2013 version are underway and they will be posted as they become available. &lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== 2013 Versions ==&lt;br /&gt;
&lt;br /&gt;
2013 Edition: &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 - PDF] &lt;br /&gt;
*[[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
*[https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
*[[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]]&lt;br /&gt;
*[[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF direct download)] &lt;br /&gt;
*[https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
*[https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the Top Ten. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top Ten useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top Ten mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten project is sponsored by {{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks for 2010 are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[http://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[http://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[http://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [http://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten project is sponsored by {{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Efforts are underway in numerous languages to translate the OWASP Top 10 for 2013. If you are interested in helping, please contact the other members of the team for the language you are interested in contributing to, or if you don't see your language listed, please let me know you want to help and we'll form a volunteer group for your language too!!&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://www.owasp.org/images/4/4d/OWASP_Top_10_-_2013_Final_-_English.pptx OWASP Top 10 - 2013 which is in PowerPoint]. Please use this document as the basis for your translation efforts.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [http://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [http://owasptop10.googlecode.com/files/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
Volunteer Translation Efforts Underway: &lt;br /&gt;
&lt;br /&gt;
*Portuguese: carlos.j.serrao@gmail.com; taquiles@gmail.com; wagner.elias@owasp.org; victoreufrasio@gmail.com; leo.cavallari@owasp.org; victoreufrasio@gmail.com; &lt;br /&gt;
*Greek: Konstantinos Papapanagiotou (conpap@di.uoa.gr) &lt;br /&gt;
*Turkish: bora@abi.com.tr &lt;br /&gt;
*Malay: cecil.su@owasp.org &lt;br /&gt;
*Dutch: marinus@kuivenhoven.com&lt;br /&gt;
*Swedish: ake.bengtsson@owasp.org&lt;br /&gt;
*Hungarian: tibor.fekete@owasp.org&lt;br /&gt;
*Persian (Farsi): Shahab Namazikhah (namazikhah@hotmail.com)&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[http://blogs.msdn.com/b/sdl/archive/2008/05/01/sdl-and-the-owasp-top-ten.aspx Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[http://www.nsa.gov/applications/search/index.cfm?q=owasp NSA] &lt;br /&gt;
:in their developer guidance on web application security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=193552</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=193552"/>
				<updated>2015-04-17T06:55:54Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten is a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* A list of the 10 Most Critical Web Application Security Risks&lt;br /&gt;
&lt;br /&gt;
And for each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Wichers | Dave Wichers]]&lt;br /&gt;
* [[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 - PDF] &lt;br /&gt;
*[[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] Draft OWASP Top 10 - 2013 - Released for Public Comment&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx OWASP Top 10 2013 Presentation - Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 is as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. Translation efforts for the 2013 version are underway and they will be posted as they become available. &lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== 2013 Versions ==&lt;br /&gt;
&lt;br /&gt;
2013 Edition: &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 - PDF] &lt;br /&gt;
*[[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
*[https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
*[[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]]&lt;br /&gt;
*[[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF direct download)] &lt;br /&gt;
*[https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
*[https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)].&lt;br /&gt;
*[https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the Top Ten. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top Ten useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top Ten mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten project is sponsored by {{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks for 2010 are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[http://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[http://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[http://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [http://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten project is sponsored by {{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Efforts are underway in numerous languages to translate the OWASP Top 10 for 2013. If you are interested in helping, please contact the other members of the team for the language you are interested in contributing to, or if you don't see your language listed, please let me know you want to help and we'll form a volunteer group for your language too!!&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://www.owasp.org/images/4/4d/OWASP_Top_10_-_2013_Final_-_English.pptx OWASP Top 10 - 2013 which is in PowerPoint]. Please use this document as the basis for your translation efforts.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [http://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [http://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [http://owasptop10.googlecode.com/files/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
Volunteer Translation Efforts Underway: &lt;br /&gt;
&lt;br /&gt;
*Portuguese: carlos.j.serrao@gmail.com; taquiles@gmail.com; wagner.elias@owasp.org; victoreufrasio@gmail.com; leo.cavallari@owasp.org; victoreufrasio@gmail.com; &lt;br /&gt;
*Greek: Konstantinos Papapanagiotou (conpap@di.uoa.gr) &lt;br /&gt;
*Turkish: bora@abi.com.tr &lt;br /&gt;
*Malay: cecil.su@owasp.org &lt;br /&gt;
*Dutch: marinus@kuivenhoven.com&lt;br /&gt;
*Swedish: ake.bengtsson@owasp.org&lt;br /&gt;
*Hungarian: tibor.fekete@owasp.org&lt;br /&gt;
*Persian (Farsi): Shahab Namazikhah (namazikhah@hotmail.com)&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[http://blogs.msdn.com/b/sdl/archive/2008/05/01/sdl-and-the-owasp-top-ten.aspx Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[http://www.nsa.gov/applications/search/index.cfm?q=owasp NSA] &lt;br /&gt;
:in their developer guidance on web application security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=193551</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=193551"/>
				<updated>2015-04-17T06:53:38Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* The OWASP Project Lifecycle is broken down into the following stages: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Welcome to the OWASP Global Projects Page ===&lt;br /&gt;
&lt;br /&gt;
An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. OWASP currently has over 142 active projects, and new project applications are submitted every week.  &lt;br /&gt;
&lt;br /&gt;
This is one of the most popular divisions of OWASP as it gives members an opportunity to freely test theories and ideas with the professional advice and support of the OWASP community. Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any project by visiting the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. A summary of recent project announcements is available on the [[OWASP Updates]] page. &lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:PROJECT_LEADER-HANDBOOK_2014.pdf|OWASP Project Handbook 2014]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_2014_Project_Handbook|OWASP Project Handbook Wiki 2014]]'''&lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:OWASP_Projects_Handbook_2013.pdf|OWASP Projects Handbook 2013]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[Project_Online_Resources|Project Online Resources]]'''&lt;br /&gt;
&lt;br /&gt;
=== Who Should Start an OWASP Project? ===&lt;br /&gt;
&lt;br /&gt;
*Application Developers. &lt;br /&gt;
*Software Architects. &lt;br /&gt;
* Information Security Authors.  &lt;br /&gt;
*Those who would like the support of a world wide professional community to develop or test an idea.&lt;br /&gt;
*Anyone wishing to take advantage of the professional body of knowledge OWASP has to offer.&lt;br /&gt;
&lt;br /&gt;
=== Contact Us===&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please do not hesitate to  [http://owasp4.owasp.org/contactus.html Contact Us] by using the form provided here. Please allow five working days for your question or comment to be answered. This is due to the large amount of queries the foundation staff receive every day. We thank you for your patience. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Project Inventory ===&lt;br /&gt;
&lt;br /&gt;
All OWASP tools, document, and code library projects are organized into the following [[OWASP_Project_Stages|categories:]] &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Flagship_Projects|Flagship Projects:]]''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Labs_Projects|Lab Projects:]]''' OWASP Labs projects represent projects that have produced an OWASP reviewed deliverable of value. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Incubator_Projects|Incubator Projects:]]''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.&lt;br /&gt;
&lt;br /&gt;
=== Social Media ===&lt;br /&gt;
&lt;br /&gt;
We recommend using the links below to find our official OWASP social media channels. These are a great way to keep in touch with the different initiatives going on at OWASP throughout the world. They are all updated regularly by chapter leaders, project leaders, the OWASP Board Members, and our OWASP Staff. If you have any questions or concerns about any of these accounts, please drop us a line using our [http://www.tfaforms.com/308703 &amp;quot;Contact Us&amp;quot;] form found above.  &lt;br /&gt;
&lt;br /&gt;
[[Image:Blogger-32x32.png|32px|link=http://owasp.blogspot.co.uk/]] [[Image:Twitter-32x32.png|32px|link=https://twitter.com/OWASP]] [[Image:Facebook-32x32.png|32px|link=https://www.facebook.com/groups/172892372831444/]] [[Image:Linkedin-32x32.png|32px|link=http://www.linkedin.com/groups/Global-OWASP-Foundation-36874]] [[Image:Google-32x32.png|32px|link=https://plus.google.com/u/0/communities/105181517914716500346?cfem=1]] [[Image:Ning-32x32.png|32px|link=http://myowasp.ning.com/]]&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 3px solid rgb(204, 204, 204); vertical-align: top; width: 95%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; |  &lt;br /&gt;
&amp;lt;div style=&amp;quot;padding:2em;padding-bottom:0px;&amp;quot;&amp;gt;&amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL; also 2 empty lines between images --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:New_initiatives.png|center|300px| link=http://owasp.force.com/volunteers/GW_Volunteers__VolunteersJobListing]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_here_banner.png|center|300px| link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project Inventory  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Project Dashboard lists the all project information at a glance, including release links, the current status of the project and project leader contact information. The Project Dashboard can be found here: https://www.owasp.org/index.php/OWASP_Project_Dashboard&lt;br /&gt;
&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
[[File:Flagship_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole.&lt;br /&gt;
After a major review process [[https://www.owasp.org/index.php/LAB_Projects_Code_Analysis_Report More info here]] the following projects are considered to be flagship candidate projects. These project will be evaluated more deeply to confirm their flagship status:&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy]]&lt;br /&gt;
* [[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment Project]]&lt;br /&gt;
* [[OWASP_OWTF|OWASP OWTF]]&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency Check]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed November 2014]====&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
* [[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard Project]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP System Vulnerable Code Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed February 2015] in progress====&lt;br /&gt;
* [[:Category:OWASP_Application_Security_Verification_Standard_Project|OWASP Application Security Verification Standard Project]]&lt;br /&gt;
* [[:Category:Software_Assurance_Maturity_Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[:Category:OWASP_Top_Ten_Project|OWASP Top Ten Project]]&lt;br /&gt;
* [[OWASP_Testing_Project|OWASP Testing Guide Project]]&lt;br /&gt;
&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
[[File:Lab banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to LAB projects showing a steady progress in their development, had very active and continuous releases and commits, regular update of information on their wiki page and have quite complete documentation. These projects are almost ready to become flagship&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed February 2015]====&lt;br /&gt;
* [[OWASP_Hackademic_Challenges_Project|OWASP Hackademic Challenges Project]]&lt;br /&gt;
* [[OWASP_Mantra_-_Security_Framework|OWASP Mantra Security Framework]]&lt;br /&gt;
* [[OWASP_O2_Platform|OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP_Dependency_Track_Project|OWASP Dependency Track Project]]&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
* [[O-Saft|O-Saft]]&lt;br /&gt;
* [[:Category:OWASP_EnDe|OWASP EnDe Project]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] &lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security Project]]&lt;br /&gt;
*[[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]]&lt;br /&gt;
&lt;br /&gt;
====Documentation [In Progress-Results by February/March 2015] ====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Podcast|OWASP Podcast Project]]&lt;br /&gt;
* [[:Category:OWASP_Code_Review_Project|OWASP Code Review Guide Project]]&lt;br /&gt;
* [[:Category:OWASP_Guide_Project|OWASP Development Guide Project]]&lt;br /&gt;
*[[OWASP_CISO_Survey|OWASP CISO Survey]] &lt;br /&gt;
*[[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]]&lt;br /&gt;
*[[OWASP_Cornucopia|OWASP Cornucopia]]&lt;br /&gt;
*[[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Contests====&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]] &lt;br /&gt;
* [[:Category:OWASP_CTF_Project|OWASP CTF Project]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed February 2015]====&lt;br /&gt;
* [[:Category:OWASP_Enterprise_Security_API|OWASP Enterprise Security API]]&lt;br /&gt;
&lt;br /&gt;
======Low Activity (LABS)[Reviewed February 2015] ======&lt;br /&gt;
[[File:low_activity.jpg]]&lt;br /&gt;
&lt;br /&gt;
These projects had no releases in at least a year, however have shown to be valuable tools&lt;br /&gt;
Code [Low Activity]&lt;br /&gt;
* [[Project_Information:template_Vicnum_Project|OWASP Vicnum Project]]&lt;br /&gt;
* [[OWASP_Broken_Web_Applications_Project|OWASP Broken Web Applications Project]]&lt;br /&gt;
&lt;br /&gt;
Documentation [Low Activity]&lt;br /&gt;
* [[OWASP_Appsec_Tutorial_Series|OWASP AppSec Tutorial Series]]&lt;br /&gt;
* [[:Category:OWASP_Legal_Project|OWASP Legal Project]]&lt;br /&gt;
* [[Virtual_Patching_Best_Practices|Virtual Patching Best Practices]]&lt;br /&gt;
* [[OWASP_Codes_of_Conduct|OWASP Codes of Conduct]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
[[File:Incubator_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to incubator projects showing a steady progress in their development, had continuous releases and commits or have delivered a complete product, including open source repository location, basic user guidelines and documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed March 2015]====&lt;br /&gt;
* [[OWASP_Java_Encoder_Project|OWASP Java Encoder Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Java_File_I_O_Security_Project|OWASP Java File I/O Security Project]]&lt;br /&gt;
* [[OWASP_PHPRBAC_Project|OWASP PHPRBAC Project]] &lt;br /&gt;
* [[OWASP_iMAS_iOS_Mobile_Application_Security_Project|OWASP iMAS - iOS Mobile Application Security Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_PHP_Security_Project|OWASP PHP Security Project]] [[File:Thumbsup.png|15px]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Node_js_Goat_Project|OWASP Node.js Goat Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_System_Vulnerable_Code_Project|OWASP System Vulnerable Code Project]]&lt;br /&gt;
* [[OWASP_ISO_IEC_27034_Application_Security_Controls_Project|OWASP ISO/IEC 27034 Application Security Controls Project]]&lt;br /&gt;
* [[OWASP_Hardened_Phalcon_Project|OWASP Hardened Phalcon Project]]&lt;br /&gt;
* [[OWASP_Faux_Bank_Project|OWASP Faux Bank Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Security_Research_and_Development_Framework|OWASP Security Research and Development Framework]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_File_Format_Validation_Project|OWASP File Format Validation Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
*[[OWASP_Security_Logging_Project|OWASP Security Logging Project]]&lt;br /&gt;
*[[OWASP_Droid10_Project|OWASP Droid]]&lt;br /&gt;
&lt;br /&gt;
====Tools [Review in progress-April 2015]====&lt;br /&gt;
*[[Benchmark|OWASP WebGoat Benchmark]]&lt;br /&gt;
*[[OWASP_WAP-Web_Application_Protection|WAP Web Application_Protection]]&lt;br /&gt;
*[[OWASP_Java_HTML_Sanitizer|OWASP Java HTML Sanitizer Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Security_Shepherd|OWASP Security Shepherd]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Mantra_OS|OWASP Mantra OS]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_iGoat_Project|OWASP iGoat Project]]&lt;br /&gt;
*[[OWASP_Bricks|OWASP Bricks]]&lt;br /&gt;
*[[OWASP_Bywaf_Project|OWASP Bywaf Project]]&lt;br /&gt;
*[[OWASP_Mutillidae_2_Project|OWASP Mutillidae 2 Project]] &lt;br /&gt;
*[[OWASP_SeraphimDroid_Project|OWASP SeraphimDroid Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Python_Security_Project|OWASP Python Security Project]]&lt;br /&gt;
*[[OWASP_WebSpa_Project|OWASP WebSpa Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_NINJA_PingU_Project|OWASP NINJA PingU Project]]&lt;br /&gt;
*[[OWASP_Encoder_Comparison_Reference_Project|OWASP Encoder Comparison Reference Project]]&lt;br /&gt;
*[[:Category:OWASP_SQLiX_Project|OWASP sqliX Project]]&lt;br /&gt;
*[[OWASP_Click_Me_Project|OWASP Click Me Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Secure_TDD_Project|OWASP Secure TDD Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_XSecurity_Project|OWASP XSecurity Project]]&lt;br /&gt;
*[[OWASP_Pyttacker_Project|OWASP Pyttacker Project]]&lt;br /&gt;
*[[OWASP_Code_Pulse_Project|OWASP Code Pulse Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_HTTP_Post_Tool|OWASP HTTP POST Tool]]&lt;br /&gt;
*[[OWASP_PHP_Security_Training_Project|OWASP PHP Security Training Project]]&lt;br /&gt;
*[[Projects/OWASP_iOSForensic|OWASP iOSForensic]]&lt;br /&gt;
*[[OWASP_Project_Metrics|OWASP Project Metrics]]&lt;br /&gt;
*[[OWASP_Store_Sheep_Project|OWASP Store Sheep Project]]&lt;br /&gt;
*[[OWASP_SonarQube_Project|OWASP SonarQube Project]]&lt;br /&gt;
*[[OWASP Rainbow Maker Project | OWASP Rainbow Maker Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP JSEC CVE Details | OWASP JSEC CVE Details]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_WebGoat.NET|OWASP WebGoat.NET]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASIDE_Project|OWASP ASIDE Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASVS_Assessment_tool | OWASP Assesment Tool]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Review: March 2015-In progress]====&lt;br /&gt;
*[[OWASP Automated Threats to Web Applications]]&lt;br /&gt;
*[[OWASP_Data_Exchange_Format_Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
*[[OWASP_Proactive_Controls|OWASP Proactive Controls]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Enterprise_Application_Security_Project|OWASP Enterprise Application Security Project]]&lt;br /&gt;
*[[Projects/OWASP_GoatDroid_Project|OWASP GoatDroid Project]]&lt;br /&gt;
*[[OWASP_RFP-Criteria|OWASP Request For Proposal]]&lt;br /&gt;
*[[OWASP_Hacking_Lab|OWASP Hacking-Lab]]&lt;br /&gt;
*[[WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project|WASC/OWASP Web Application Firewall Evaluation Criteria (WAFEC)]]&lt;br /&gt;
*[[OWASP_Secure_Application_Design_Project|OWASP Secure Application Design Project]]&lt;br /&gt;
*[[OWASP_Top_10_Fuer_Entwickler_Project|OWASP Top 10 Fuer Entwickler Project]]&lt;br /&gt;
*[[OWASP_Security_Principles_Project|OWASP Security Principles Project]]&lt;br /&gt;
*[[OWASP_Media_Project|OWASP Media Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Global_Chapter_Meetings_Project|OWASP Global Chapter Meetings Project]]&lt;br /&gt;
*[[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
*[[OWASP_Insecure_Web_Components_Project|OWASP Insecure Web Components Project]]&lt;br /&gt;
*[[OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project|OWASP Reverse Engineering and Code Modification Prevention Project]]&lt;br /&gt;
*[[OWASP_Student_Chapters_Program|OWASP Student Chapters Project]]&lt;br /&gt;
*[[:Category:OWASP_Education_Project|OWASP Education Project]]&lt;br /&gt;
*[[:Category:OWASP_Speakers_Project|OWASP Speakers Project]]&lt;br /&gt;
*[[OWASP_Internet_of_Things_Top_Ten_Project|OWASP Internet of Things Top Ten Project]]&lt;br /&gt;
*[[:Category:OWASP_.NET_Project|OWASP .NET Project]]&lt;br /&gt;
*[[OWASP_Open_Cyber_Security_Framework_Project|OWASP Open Cyber Security Framework Project]]&lt;br /&gt;
*[[OWASP_Top_10_Privacy_Risks_Project|OWASP Top 10 Privacy Risks Project]]&lt;br /&gt;
*[[OWASP_WASC_Web_Hacking_Incidents_Database_Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
*[[OWASP_Security_Frameworks_Project|OWASP Security Frameworks Project]]&lt;br /&gt;
*[[OWASP_Incident_Response_Project|OWASP Incident Response Project]]&lt;br /&gt;
*[[OWASP_Embedded_Application_Security|OWASP Embedded Application Security]]&lt;br /&gt;
*[[OWASP_STING_Game_Project|OWASP STING Game Project]]&lt;br /&gt;
*[[Projects/OWASP_Ruby_on_Rails_and_friends_Security_Guide|OWASP Ruby on Rails and Friends Security Guide]]&lt;br /&gt;
*[[OWASP_Secure_Development_Training|OWASP Secure Development Training]]&lt;br /&gt;
*[[OWASP_Periodic_Table_of_Vulnerabilities|OWASP Periodic Table of Vulnerabilities]]&lt;br /&gt;
*[[OWASP_Top_Trumps_for_Projects|OWASP Top Trumps for Projects]]&lt;br /&gt;
*[[OWASP_Supporting_Legacy_Web_Applications_in_the_Current_Environment_Project|OWASP Supporting Legacy Web Applications in the Current Environment Project]]&lt;br /&gt;
*[[OWASP KALP Mobile Project | OWASP KALP Mobile Project]]&lt;br /&gt;
*[[OWASP Persian Translation Project | OWASP Persian Translation Project]]&lt;br /&gt;
*[[OWASP_Security_Controls_in_Web_Application_Development_Lifecycle |OWASP Security Controls in Web Application Development Lifecycle Project]]&lt;br /&gt;
*[[OWASP_Application_Security_Program_Quick_Start_Guide_Project|OWASP_Application_Security_Program_Quick_Start_Guide_Project]]&lt;br /&gt;
*[[OWASP_Secure_Configuration_Guide|OWASP_Secure_Configuration_Guide]]&lt;br /&gt;
*[[OWASP_Product_Requirement_Recommendations_Library|OWASP_Product_Requirement_Recommendations_Library]]&lt;br /&gt;
*[[OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project|OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project]]&lt;br /&gt;
*[[OWASP_Knowledge_Graph|OWASP_Knowledge_Graph]]&lt;br /&gt;
&lt;br /&gt;
====Educational Project====&lt;br /&gt;
*[[OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project#tab=Main | OWASP Visual Crime Scene and Security Incident Project]]&lt;br /&gt;
&lt;br /&gt;
==Donated Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Donated Projects are inactive projects that have been donated to the OWASP Projects Infrastructure. &lt;br /&gt;
&lt;br /&gt;
====Tools====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Excess_XSS_Project|OWASP Excess XSS Project]]&lt;br /&gt;
* [[OWASP_JOTP_Project|OWASP jOTP Project]]&lt;br /&gt;
&lt;br /&gt;
==OWASP Archived Projects==&lt;br /&gt;
OWASP Archived Projects are projects that have developed outside OWASP umbrella or have become inactive. If you are interested in pursuing any of the inactive projects (click hyperlink for list), please contact us and let us know of your interest.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project_Archived_Projects&lt;br /&gt;
&lt;br /&gt;
= Project Task Force =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OWASP Project Task Force====&lt;br /&gt;
&lt;br /&gt;
{{:Task_Force/OWASP_Projects}}&lt;br /&gt;
&lt;br /&gt;
= Online Resources =&lt;br /&gt;
&lt;br /&gt;
===Project Online Resources===&lt;br /&gt;
&lt;br /&gt;
{{:Project_Online_Resources}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Starting a New Project  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== So you want to start a project... ==&lt;br /&gt;
&lt;br /&gt;
Starting an OWASP project is quite easy, and your desire to contribute and make it happen is essential.&lt;br /&gt;
[[File:HowToStartProjectoWasp.png | 600px | right]]&lt;br /&gt;
&lt;br /&gt;
Here are some of the guidelines for running a successful OWASP project:&lt;br /&gt;
&lt;br /&gt;
-Start exploring the actual OWASP projects Inventory. Many projects handle specific areas of security it is a good idea to start looking how other successful projects do this (LABS/Flagship)&lt;br /&gt;
&lt;br /&gt;
-Place your idea or project on the [https://www.owasp.org/index.php/Project_Ideas_Board#From_Idea_to_Project_Incubator Project Ideas Board].This phase will help you to define the project goals and also explore and exchange with other OWASP leaders and volunteers how to develop the idea into a tangible project&lt;br /&gt;
&lt;br /&gt;
-Explore and research if your idea covers a unique segment in the Security arena.Think of your project as a product, if you really want people using it, think how this project will cover a necessity in the security area you are working on &lt;br /&gt;
&lt;br /&gt;
-Define what kind of project you would like to start. Is it a code, tool or documentation?&lt;br /&gt;
&lt;br /&gt;
-Communicate through the Project leader mailing list about your idea and get feedback and  meet potential contributors&lt;br /&gt;
&lt;br /&gt;
-Develop your project based on the type of project. For example if you are willing to start a documentation project, begin by defining a Table of Content and work it through with potential contributors. First of all begin by creating a Road-map for your project. This is essential to submit your project. We highly recommend to read  documentation such as &amp;quot;[http://www2.econ.iastate.edu/tesfatsi/ProducingOSS.KarlFogel2005.pdf How to start /run a successful Open Source Projects]&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 500px | left]]&lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Road-map===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Start defining a development, documentation and marketing plan for your project. Set short , medium and long term plans. Include promotion of your project, this is very important in order to engage users and consumers of your project. Contact project coordinator and the Project Task Force to help you achieve this goal. You ''can'' run a single person project, but it's usually best to get the community involved.  You should be prepared to support a mailing list, build a team, speak at conferences, and promote your project.&lt;br /&gt;
&lt;br /&gt;
* You can contribute existing documents or tools to OWASP! Assuming you have the intellectual property rights to a work, you can open it to the world as an OWASP Project.  Please coordinate this with OWASP by contacting owasp(at)owasp.org.&lt;br /&gt;
&lt;br /&gt;
* Available Grants to consider if you need funding - [[Grants|Click Here]]&lt;br /&gt;
&lt;br /&gt;
* You should promote your project through the OWASP channels as well as by outside means.  Get people to blog about it!&lt;br /&gt;
&lt;br /&gt;
== Creating a new project ==&lt;br /&gt;
Once you have passed the Project Ideas phase, then you will be ready to start a new project&lt;br /&gt;
To Submit your project please use the following form&lt;br /&gt;
. [http://www.tfaforms.com/263506 Please submit a new project application here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* You will need to gather the following information together for your application:&lt;br /&gt;
A - PROJECT&lt;br /&gt;
# Project Name,&lt;br /&gt;
# Project purpose / overview,&lt;br /&gt;
# Project Roadmap,&lt;br /&gt;
# Project links (if any) to external sites,&lt;br /&gt;
# [[Guidelines_for_OWASP_Projects#Project_Licensing|Project License],]&lt;br /&gt;
# Project Leader name,&lt;br /&gt;
# Project Leader email address,&lt;br /&gt;
# Project Leader wiki account - the username (you'll need this to edit the wiki),&lt;br /&gt;
# Project Contributor(s) (if any) - name email and wiki account (if any),&lt;br /&gt;
# Project Main Links (if any).&lt;br /&gt;
# For Documentation: A table of Contents&lt;br /&gt;
# For Code: A prototype hosted in an open source repository of your choice. Make sure it has read access.&lt;br /&gt;
&lt;br /&gt;
* Check out the '''[[Guidelines for OWASP Projects]]'''.&lt;br /&gt;
* [[Grant_Spending_Policy|Grant Spending Policy]]&lt;br /&gt;
* [[Project_Spending_Policy|Project Spending Policy]]&lt;br /&gt;
* [[Project_Sponsorship_Operational_Guidelines|Project Sponsorship Operational Guidelines]]&lt;br /&gt;
&lt;br /&gt;
==OWASP	Recommended Licenses==&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Funding your Project==&lt;br /&gt;
An OWASP project does not receive any funding for development at project inception; however, a new project does have the opportunity to submit a request to receive funds if they are available for the year. Additionally, project leaders have the option of seeking sponsorship from outside organizations, but project leaders are required to seek funding through their own initiative. Please contact the OWASP Projects Manager for more information. &lt;br /&gt;
&lt;br /&gt;
== Project Release ==&lt;br /&gt;
&lt;br /&gt;
As your project reaches a point that you'd like OWASP to assist in its promotion, the will need the following information to help spread the word about your project:&lt;br /&gt;
&lt;br /&gt;
# Short 5 sentence paragraph outlining what your project is about, what you hope to accomplish with your project, what value your project brings to software security, and contributor and project leader names and contact information.&lt;br /&gt;
# Link to your wiki page.&lt;br /&gt;
# Link to your code repository or a link to where readers can download your project.&lt;br /&gt;
# Latest Release description answering the following questions: What is it?, What does it do?, Where can I get it?, Who should I contact if something goes wrong?.&lt;br /&gt;
&lt;br /&gt;
==Project Process Forms==&lt;br /&gt;
These forms were created to help project leaders, and those interested in a going through a process in the OWASP projects infrastructure. They facilitate the management of each query based on the specific task an applicant will need help with. The forms are described below, and they are linked with their designated online application form. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264422 Project Transition Application]:The OWASP project transition form gives current project leaders an easy way of handing over project administration information to individuals wishing to take over a project.  &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264413 Project Review Application]:This form is for current project leaders to request a review of their project based on OWASP graduation criteria. The aim is to designate an OWASP volunteer to review these projects within 3 months time. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264418 Project Donation Application]:This form is for projects outside of the OWASP project infrastructure. Project Leaders for these open source projects can choose to partner or give their project to OWASP directly through this form.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264428 Project Adoption Request]:This form is used when someone is interested in adopting an archived project. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264426 Project Abandonment Request]:The OWASP project abandonment form gives current project leaders an easy way of letting the OWASP Foundation know that they wish to resign their project leader duties. This form should be used when no replacement project leader exists to take over these duties.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264392 Incubator Project Graduation Application]:This application form is for Incubator Projects to apply for Labs Project status.&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project Project Request (Bangladesh)]:For Information Security Project contact with OWASP Bangladesh Project Leader [[S. M. Shezan]][http://www.facebook.com/smshezan]&lt;br /&gt;
&lt;br /&gt;
= Project Assessments  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==OWASP Project Lifecycle==&lt;br /&gt;
The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state. The greater the maturity of the project, the greater the level of responsibility for the project leader. These responsibilities are not trivial as OWASP provides incentives and benefits (Section 7) for projects who take on these added responsibilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====The OWASP Project Lifecycle is broken down into the following stages:====&lt;br /&gt;
&lt;br /&gt;
'''Incubator Projects''': OWASP Incubator projects represent the experimental playground where projects are still being designed, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity; moreover, the label allows project leaders to leverage the OWASP name while their project is still maturing. OWASP Incubator projects are given a place on the OWASP Projects Portal to leverage the organizations' infrastructure, and establish their presence and project history.&lt;br /&gt;
&lt;br /&gt;
'''Lab Projects''': OWASP Labs projects represent projects that have produced a deliverable of significant value. Leaders of OWASP Labs projects are expected to stand behind the quality of their projects as these projects have matured to the point where they are accepted by a significant portion of the OWASP community. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are ready for mainstream usage. OWASP Labs Projects are meant to be the collection of established projects that have gained community support and acclaim by undergoing the project review process. &lt;br /&gt;
&lt;br /&gt;
'''Flagship Projects''': The OWASP Flagship designation is given to projects that have demonstrated superior maturity, established quality, and strategic value to OWASP and application security as a whole. Eligible projects are selected from the OWASP Labs project pool. This selection process generally ensures that there is only one project of each type covering any particular security space. OWASP Flagship projects represent projects that are not only mature, but are also projects that OWASP as an organization provides direct support to maintaining. The core mission of OWASP is to make application security visible and so as an organization, OWASP has a vested interest in the success of its Flagship projects. Since Flagship projects have such high visibility, these projects are expected to uphold the most stringent requirements of all OWASP Projects.&lt;br /&gt;
&lt;br /&gt;
'''Code Projects''': OWASP code projects are very important for the cyber security solutions. Because these projects are used to find out the application security problems and try to solve those problems. Best code project is [[OWASP System Vulnerable Code Project]] and best project leader is [http://www.facebook.com/smshezan S. M. Shezan]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Stage Benefits==&lt;br /&gt;
This section outlines the benefits of starting an OWASP project, and the benefits of being at each different stage in the projects lifecycle. In my short time here at OWASP as the PM, I have had several potential project leaders ask me what the benefits are of starting their project with OWASP. Below is my proposal for each Stage’s benefits.&lt;br /&gt;
&lt;br /&gt;
'''Incubator'''&lt;br /&gt;
* Financial Donation Management Assistance &lt;br /&gt;
* Project Review Support&lt;br /&gt;
* WASPY Awards Nominations&lt;br /&gt;
* OWASP OSS and OPT Participation&lt;br /&gt;
* Opportunity to submit proposal: $500 for Development.&lt;br /&gt;
* Community Engagement and Support&lt;br /&gt;
* Recognition and visibility of being associated with the OWASP Brand.&lt;br /&gt;
&lt;br /&gt;
'''Labs'''&lt;br /&gt;
* All benefits given to Incubator Projects &lt;br /&gt;
* Technical Writing Support&lt;br /&gt;
* Graphic Design Support&lt;br /&gt;
* Project Promotion Support&lt;br /&gt;
* OWASP OSS and OPT: Preference&lt;br /&gt;
&lt;br /&gt;
'''Flagship'''&lt;br /&gt;
* All benefits given to Incubator &amp;amp; Labs Projects&lt;br /&gt;
* Grant finding and proposal writing help&lt;br /&gt;
* Yearly marketing plan development&lt;br /&gt;
* OWASP OSS and OPT participation preference&lt;br /&gt;
&lt;br /&gt;
For more detailed information on OWASP Project Stage Benefits, please see the 2013 Project Handbook.&lt;br /&gt;
&lt;br /&gt;
== Project Monitoring Incubator/Documentation ==&lt;br /&gt;
Every 6 months, a project monitoring assessment takes place to evaluate if projects had any releases during this period.A warning will be sent to projects without any activity in 90 days and after 180 days, the project will be set automatically as inactive.&lt;br /&gt;
You can set your project active at any time, as long as:&lt;br /&gt;
* There has been commits to the project's open repository or&lt;br /&gt;
* There has been a beta release of the documentation produced so far or&lt;br /&gt;
* Provide a detailed Roadmap &lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Roadmap===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 600px]]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project Monitoring for LABS/Flagship==&lt;br /&gt;
These project represent the best OWASP has to offer, therefore monitoring of these projects is closely supervised.&lt;br /&gt;
===For Code and Tools===&lt;br /&gt;
For projects holding Flagship status, we closely monitor their health every 6 months on the following, among other key indicators:&lt;br /&gt;
*Can the project be built correctly?&lt;br /&gt;
*Does the project has any activity(commits) in the last 6 months?&lt;br /&gt;
*Does the project had any releases in the last 6 months?&lt;br /&gt;
*Has the project leaders updated his wiki or website to reflect latest releases?&lt;br /&gt;
===For Documentation===&lt;br /&gt;
For this part, we are working on the development of an adequate assessment criteria&lt;br /&gt;
The following is a draft of the new process proposal: [[https://www.owasp.org/index.php/File:Qualitative_and_Quantitative_Content_Audit.pdf Proposal for Reviewing OWASP Document projects]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Graduation==&lt;br /&gt;
The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
The review centers around the following core questions. Each core question has three (3) specific questions made up of binary queries. A project must receive at least two (2) positive responses from each reviewer in two of the binary questions, to warrant a postive response for the core question. Each core question must receive a positive response from both project reviewers to pass the Project Health Assessment for Incubator Projects. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Graduation Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Health Assessment==&lt;br /&gt;
The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation for projects going from Incubator to LAB and from LAB to Flagship. The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Health Assessment Criteria Document]. If a project passes the assessment, it then becomes eligible to graduate into the OWASP Labs Project stage. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Deliverable/Release Assessment==&lt;br /&gt;
The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to  review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception. &lt;br /&gt;
&lt;br /&gt;
Reviews must be performed by two (2) OWASP Chapter or Project Leaders, and their review must answer affirmatively to at least the first two (2) core Project Deliverable/Release Review questions. A project must pass the OWASP Project Deliverable/Release Assessment in order to graduate into the OWASP Labs Project stage. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Deliverable/Release Assessment Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Brand Resources  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The Brand Usage Rules==&lt;br /&gt;
See OWASP's [[Marketing/Resources#tab=BRAND_GUIDELINES|The Brand Usage Rules]] for details.&lt;br /&gt;
&lt;br /&gt;
==Project Icons &amp;amp; Templates==&lt;br /&gt;
See OWASP'S [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
(Following links and images are provided for a quick overview only, the primary page is [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]]).&lt;br /&gt;
&lt;br /&gt;
If you require more assistance with these files and/or templates, please contact the OWASP staff for assistance &lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Operations_Project_Template|OWASP Operational Wiki Template]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Documentation_Project_Template|OWASP Example Template: DO NOT EDIT]]'''&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_Project_Header.jpg|Owasp logo|500px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_TOOL.jpg|Owasp logo|200px]] [[Image:Project_Type_Files_DOC.jpg||Owasp logo 1c|200px]]  &lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_CODE.jpg|Owasp logo|200px]] [[Image:Owasp-defenders-small.png|Owasp logo|100px]] [[Image:Owasp-builders-small.png|Owasp logo|100px]] [[Image:Owasp-breakers-small.png|Owasp logo|100px]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-incubator-trans-200.png|Owasp logo rev icon|100px]] [[Image:Owasp-labs-trans-85.png|Owasp logo flat|100px]] [[Image:Owasp-flagship-trans-85.png|Owasp logo icon|100px]]&lt;br /&gt;
&lt;br /&gt;
===OpenSAMM===&lt;br /&gt;
'''[[Media:OpenSAMM_icons.zip|OpenSAMM Icons]]'''&lt;br /&gt;
&lt;br /&gt;
'''Construction:'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Construction black.png| Construction black| 100px]]  [[Image:Construction blue.png| Construction blue| 100px]]  [[image:Construction olive.png |construction olive|100px]]&lt;br /&gt;
&lt;br /&gt;
'''Deployment:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Deployment black.png| Deployment black| 100px]]  [[image:Deployment blue.png| Deployment blue| 100px]]  [[image:Deployment olive.png | Deployment olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Governance:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Governance black.png| governance black| 100px]]  [[image:Governance blue.png | governance blue | 100px]]  [[image:Governance olive.png | governance olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Verification:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Verification black.png | Verification black | 100px]]  [[image:Verification blue.png | verification blue | 100px]]  [[image: Verification olive.png | Verification olive | 100px]]&lt;br /&gt;
&lt;br /&gt;
==Book Cover Files==&lt;br /&gt;
See OWASP's [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
[[Media:Lulu-guide.pdf|Lulu Guide]]&lt;br /&gt;
&lt;br /&gt;
'''[https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip Download the Book Cover Zip File]'''&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;300&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:BookImage_01.jpg‎|500px| link=https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Terminology =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== OWASP Project Infrastructure ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Lifecycle:''' The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Project:''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway. The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Labs Project:''' OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Flagship Project:''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Benefits:''' The standard list of resources and incentives made available to project leaders based on their project's current maturity level. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Reviews ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviews:''' Project reviews are the method OWASP uses to establish a minimal baseline of project characteristics and release quality. Reviews are not mandatory, but they are necessary if a project leader wishes to graduate to the next level of maturity within the OWASP Global Projects infrastructure. Projects can be reviewed when an Incubator project wishes to graduate into the OWASP Labs designation, and project releases can be reviewed if they want the quality of their deliverable to be vouched for by OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviewer Pool:''' The project reviewer pool is made up of veteran reviewers who have proven themselves dedicated to executing quality reviews of projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Graduation:''' The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Health Assessment:''' The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE#gid=1 Project Health Assessment Criteria Document].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Release:''' A project release refers to the final deliverable a project produces. It is the final product of the project. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Deliverable/Release Review:''' The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects Processes == &lt;br /&gt;
&lt;br /&gt;
*'''Project Processes:''' The set of streamlined processes that exist to help projects move smoothly through the OWASP Project Lifecycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Inception Process:''' The Project Inception Process is how a brand new idea becomes an OWASP Project. Such projects are labeled as OWASP Incubator projects. The process involves submitting the proposed project name, project leader information, project description, project roadmap, and selecting an appropriate open-source license for the project using the New Project Form on the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Donation Process:''' The Project Donation Process is used for a project that has an existing functional release, but is not currently associated with OWASP. This process is the primary mechanism by which individuals or organizations can transfer the ownership of their project’s copyright to OWASP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Transition Process:''' The Project Transition Process is used to transition leadership of a project to a new project leader. This is a simple automated process to transfer the relevant accounts, mailing lists, and other project resources to the new project leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Abandonment Process:''' The Project Abandonment Process was put in place for those occasions in which a project leader is no longer able to manage their project, and has not been able to find a suitable replacement for the leader role. Project Abandonment can also occur when the project leader feels his/her project has become obsolete. Under these circumstances, the acting project leader is encourage do submit the Project Abandonment Form found in the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Graduation Process:''' The Incubator Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Projects at Conferences == &lt;br /&gt;
&lt;br /&gt;
*'''AppSec Conferences:''' OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Open Source Showcase:''' The Open Source Showcase is an OWASP AppSec Conference event module designed to give Open Source project leaders the opportunity to demo their projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Track:''' The OWASP Project Track is an OWASP AppSec Conference event module designed to give OWASP Project leaders the opportunity to showcase their projects as an official conference presenter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects General ==  &lt;br /&gt;
&lt;br /&gt;
*'''OWASP Code of Ethics:''' The OWASP Code of Ethics are the set of guidelines and principles that the OWASP Foundation expects all of its members and conference attendees to abide by. A copy of the Code of Ethics can be found here in the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#Code_of_Ethics OWASP About page]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sponsorships and Donations  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate to OWASP Global Projects ==&lt;br /&gt;
OWASP Projects, a global division of the OWASP Foundation, is run under the same world wide not-for-profit charitable status as all the foundation strategic groups. OWASP provides a platform for contributors to share their work while providing them with the project and community support they need throughout their project development. All OWASP Projects are run by volunteers and they rely on personal donations and sponsorship to continue their development. Donate to OWASP Projects, and we promise to spend your money wisely on open source initiatives.&lt;br /&gt;
&lt;br /&gt;
'''This is how your money can help:'''&lt;br /&gt;
&lt;br /&gt;
* $20 could help us spread the word on the importance of open source initiatives in the Application Security industry.&lt;br /&gt;
* $100 could help fund OWASP project demos at major conferences.&lt;br /&gt;
* $250 could help get our volunteer Project Leaders to speaking engagements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_Button.jpg | link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Contact US  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you need any help with anything projects related, or if you simply need some more information, please do not hesitate to [http://owasp4.owasp.org/contactus.html Contact Us].&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=193550</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=193550"/>
				<updated>2015-04-17T06:47:15Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* The OWASP Project Lifecycle is broken down into the following stages: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Welcome to the OWASP Global Projects Page ===&lt;br /&gt;
&lt;br /&gt;
An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. OWASP currently has over 142 active projects, and new project applications are submitted every week.  &lt;br /&gt;
&lt;br /&gt;
This is one of the most popular divisions of OWASP as it gives members an opportunity to freely test theories and ideas with the professional advice and support of the OWASP community. Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any project by visiting the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. A summary of recent project announcements is available on the [[OWASP Updates]] page. &lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:PROJECT_LEADER-HANDBOOK_2014.pdf|OWASP Project Handbook 2014]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_2014_Project_Handbook|OWASP Project Handbook Wiki 2014]]'''&lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:OWASP_Projects_Handbook_2013.pdf|OWASP Projects Handbook 2013]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[Project_Online_Resources|Project Online Resources]]'''&lt;br /&gt;
&lt;br /&gt;
=== Who Should Start an OWASP Project? ===&lt;br /&gt;
&lt;br /&gt;
*Application Developers. &lt;br /&gt;
*Software Architects. &lt;br /&gt;
* Information Security Authors.  &lt;br /&gt;
*Those who would like the support of a world wide professional community to develop or test an idea.&lt;br /&gt;
*Anyone wishing to take advantage of the professional body of knowledge OWASP has to offer.&lt;br /&gt;
&lt;br /&gt;
=== Contact Us===&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please do not hesitate to  [http://owasp4.owasp.org/contactus.html Contact Us] by using the form provided here. Please allow five working days for your question or comment to be answered. This is due to the large amount of queries the foundation staff receive every day. We thank you for your patience. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Project Inventory ===&lt;br /&gt;
&lt;br /&gt;
All OWASP tools, document, and code library projects are organized into the following [[OWASP_Project_Stages|categories:]] &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Flagship_Projects|Flagship Projects:]]''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Labs_Projects|Lab Projects:]]''' OWASP Labs projects represent projects that have produced an OWASP reviewed deliverable of value. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Incubator_Projects|Incubator Projects:]]''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.&lt;br /&gt;
&lt;br /&gt;
=== Social Media ===&lt;br /&gt;
&lt;br /&gt;
We recommend using the links below to find our official OWASP social media channels. These are a great way to keep in touch with the different initiatives going on at OWASP throughout the world. They are all updated regularly by chapter leaders, project leaders, the OWASP Board Members, and our OWASP Staff. If you have any questions or concerns about any of these accounts, please drop us a line using our [http://www.tfaforms.com/308703 &amp;quot;Contact Us&amp;quot;] form found above.  &lt;br /&gt;
&lt;br /&gt;
[[Image:Blogger-32x32.png|32px|link=http://owasp.blogspot.co.uk/]] [[Image:Twitter-32x32.png|32px|link=https://twitter.com/OWASP]] [[Image:Facebook-32x32.png|32px|link=https://www.facebook.com/groups/172892372831444/]] [[Image:Linkedin-32x32.png|32px|link=http://www.linkedin.com/groups/Global-OWASP-Foundation-36874]] [[Image:Google-32x32.png|32px|link=https://plus.google.com/u/0/communities/105181517914716500346?cfem=1]] [[Image:Ning-32x32.png|32px|link=http://myowasp.ning.com/]]&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 3px solid rgb(204, 204, 204); vertical-align: top; width: 95%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; |  &lt;br /&gt;
&amp;lt;div style=&amp;quot;padding:2em;padding-bottom:0px;&amp;quot;&amp;gt;&amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL; also 2 empty lines between images --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:New_initiatives.png|center|300px| link=http://owasp.force.com/volunteers/GW_Volunteers__VolunteersJobListing]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_here_banner.png|center|300px| link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project Inventory  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Project Dashboard lists the all project information at a glance, including release links, the current status of the project and project leader contact information. The Project Dashboard can be found here: https://www.owasp.org/index.php/OWASP_Project_Dashboard&lt;br /&gt;
&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
[[File:Flagship_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole.&lt;br /&gt;
After a major review process [[https://www.owasp.org/index.php/LAB_Projects_Code_Analysis_Report More info here]] the following projects are considered to be flagship candidate projects. These project will be evaluated more deeply to confirm their flagship status:&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy]]&lt;br /&gt;
* [[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment Project]]&lt;br /&gt;
* [[OWASP_OWTF|OWASP OWTF]]&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency Check]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed November 2014]====&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
* [[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard Project]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP System Vulnerable Code Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed February 2015] in progress====&lt;br /&gt;
* [[:Category:OWASP_Application_Security_Verification_Standard_Project|OWASP Application Security Verification Standard Project]]&lt;br /&gt;
* [[:Category:Software_Assurance_Maturity_Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[:Category:OWASP_Top_Ten_Project|OWASP Top Ten Project]]&lt;br /&gt;
* [[OWASP_Testing_Project|OWASP Testing Guide Project]]&lt;br /&gt;
&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
[[File:Lab banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to LAB projects showing a steady progress in their development, had very active and continuous releases and commits, regular update of information on their wiki page and have quite complete documentation. These projects are almost ready to become flagship&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed February 2015]====&lt;br /&gt;
* [[OWASP_Hackademic_Challenges_Project|OWASP Hackademic Challenges Project]]&lt;br /&gt;
* [[OWASP_Mantra_-_Security_Framework|OWASP Mantra Security Framework]]&lt;br /&gt;
* [[OWASP_O2_Platform|OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP_Dependency_Track_Project|OWASP Dependency Track Project]]&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
* [[O-Saft|O-Saft]]&lt;br /&gt;
* [[:Category:OWASP_EnDe|OWASP EnDe Project]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] &lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security Project]]&lt;br /&gt;
*[[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]]&lt;br /&gt;
&lt;br /&gt;
====Documentation [In Progress-Results by February/March 2015] ====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Podcast|OWASP Podcast Project]]&lt;br /&gt;
* [[:Category:OWASP_Code_Review_Project|OWASP Code Review Guide Project]]&lt;br /&gt;
* [[:Category:OWASP_Guide_Project|OWASP Development Guide Project]]&lt;br /&gt;
*[[OWASP_CISO_Survey|OWASP CISO Survey]] &lt;br /&gt;
*[[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]]&lt;br /&gt;
*[[OWASP_Cornucopia|OWASP Cornucopia]]&lt;br /&gt;
*[[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Contests====&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]] &lt;br /&gt;
* [[:Category:OWASP_CTF_Project|OWASP CTF Project]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed February 2015]====&lt;br /&gt;
* [[:Category:OWASP_Enterprise_Security_API|OWASP Enterprise Security API]]&lt;br /&gt;
&lt;br /&gt;
======Low Activity (LABS)[Reviewed February 2015] ======&lt;br /&gt;
[[File:low_activity.jpg]]&lt;br /&gt;
&lt;br /&gt;
These projects had no releases in at least a year, however have shown to be valuable tools&lt;br /&gt;
Code [Low Activity]&lt;br /&gt;
* [[Project_Information:template_Vicnum_Project|OWASP Vicnum Project]]&lt;br /&gt;
* [[OWASP_Broken_Web_Applications_Project|OWASP Broken Web Applications Project]]&lt;br /&gt;
&lt;br /&gt;
Documentation [Low Activity]&lt;br /&gt;
* [[OWASP_Appsec_Tutorial_Series|OWASP AppSec Tutorial Series]]&lt;br /&gt;
* [[:Category:OWASP_Legal_Project|OWASP Legal Project]]&lt;br /&gt;
* [[Virtual_Patching_Best_Practices|Virtual Patching Best Practices]]&lt;br /&gt;
* [[OWASP_Codes_of_Conduct|OWASP Codes of Conduct]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
[[File:Incubator_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to incubator projects showing a steady progress in their development, had continuous releases and commits or have delivered a complete product, including open source repository location, basic user guidelines and documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed March 2015]====&lt;br /&gt;
* [[OWASP_Java_Encoder_Project|OWASP Java Encoder Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Java_File_I_O_Security_Project|OWASP Java File I/O Security Project]]&lt;br /&gt;
* [[OWASP_PHPRBAC_Project|OWASP PHPRBAC Project]] &lt;br /&gt;
* [[OWASP_iMAS_iOS_Mobile_Application_Security_Project|OWASP iMAS - iOS Mobile Application Security Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_PHP_Security_Project|OWASP PHP Security Project]] [[File:Thumbsup.png|15px]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Node_js_Goat_Project|OWASP Node.js Goat Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_System_Vulnerable_Code_Project|OWASP System Vulnerable Code Project]]&lt;br /&gt;
* [[OWASP_ISO_IEC_27034_Application_Security_Controls_Project|OWASP ISO/IEC 27034 Application Security Controls Project]]&lt;br /&gt;
* [[OWASP_Hardened_Phalcon_Project|OWASP Hardened Phalcon Project]]&lt;br /&gt;
* [[OWASP_Faux_Bank_Project|OWASP Faux Bank Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Security_Research_and_Development_Framework|OWASP Security Research and Development Framework]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_File_Format_Validation_Project|OWASP File Format Validation Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
*[[OWASP_Security_Logging_Project|OWASP Security Logging Project]]&lt;br /&gt;
*[[OWASP_Droid10_Project|OWASP Droid]]&lt;br /&gt;
&lt;br /&gt;
====Tools [Review in progress-April 2015]====&lt;br /&gt;
*[[Benchmark|OWASP WebGoat Benchmark]]&lt;br /&gt;
*[[OWASP_WAP-Web_Application_Protection|WAP Web Application_Protection]]&lt;br /&gt;
*[[OWASP_Java_HTML_Sanitizer|OWASP Java HTML Sanitizer Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Security_Shepherd|OWASP Security Shepherd]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Mantra_OS|OWASP Mantra OS]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_iGoat_Project|OWASP iGoat Project]]&lt;br /&gt;
*[[OWASP_Bricks|OWASP Bricks]]&lt;br /&gt;
*[[OWASP_Bywaf_Project|OWASP Bywaf Project]]&lt;br /&gt;
*[[OWASP_Mutillidae_2_Project|OWASP Mutillidae 2 Project]] &lt;br /&gt;
*[[OWASP_SeraphimDroid_Project|OWASP SeraphimDroid Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Python_Security_Project|OWASP Python Security Project]]&lt;br /&gt;
*[[OWASP_WebSpa_Project|OWASP WebSpa Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_NINJA_PingU_Project|OWASP NINJA PingU Project]]&lt;br /&gt;
*[[OWASP_Encoder_Comparison_Reference_Project|OWASP Encoder Comparison Reference Project]]&lt;br /&gt;
*[[:Category:OWASP_SQLiX_Project|OWASP sqliX Project]]&lt;br /&gt;
*[[OWASP_Click_Me_Project|OWASP Click Me Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Secure_TDD_Project|OWASP Secure TDD Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_XSecurity_Project|OWASP XSecurity Project]]&lt;br /&gt;
*[[OWASP_Pyttacker_Project|OWASP Pyttacker Project]]&lt;br /&gt;
*[[OWASP_Code_Pulse_Project|OWASP Code Pulse Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_HTTP_Post_Tool|OWASP HTTP POST Tool]]&lt;br /&gt;
*[[OWASP_PHP_Security_Training_Project|OWASP PHP Security Training Project]]&lt;br /&gt;
*[[Projects/OWASP_iOSForensic|OWASP iOSForensic]]&lt;br /&gt;
*[[OWASP_Project_Metrics|OWASP Project Metrics]]&lt;br /&gt;
*[[OWASP_Store_Sheep_Project|OWASP Store Sheep Project]]&lt;br /&gt;
*[[OWASP_SonarQube_Project|OWASP SonarQube Project]]&lt;br /&gt;
*[[OWASP Rainbow Maker Project | OWASP Rainbow Maker Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP JSEC CVE Details | OWASP JSEC CVE Details]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_WebGoat.NET|OWASP WebGoat.NET]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASIDE_Project|OWASP ASIDE Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASVS_Assessment_tool | OWASP Assesment Tool]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Review: March 2015-In progress]====&lt;br /&gt;
*[[OWASP Automated Threats to Web Applications]]&lt;br /&gt;
*[[OWASP_Data_Exchange_Format_Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
*[[OWASP_Proactive_Controls|OWASP Proactive Controls]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Enterprise_Application_Security_Project|OWASP Enterprise Application Security Project]]&lt;br /&gt;
*[[Projects/OWASP_GoatDroid_Project|OWASP GoatDroid Project]]&lt;br /&gt;
*[[OWASP_RFP-Criteria|OWASP Request For Proposal]]&lt;br /&gt;
*[[OWASP_Hacking_Lab|OWASP Hacking-Lab]]&lt;br /&gt;
*[[WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project|WASC/OWASP Web Application Firewall Evaluation Criteria (WAFEC)]]&lt;br /&gt;
*[[OWASP_Secure_Application_Design_Project|OWASP Secure Application Design Project]]&lt;br /&gt;
*[[OWASP_Top_10_Fuer_Entwickler_Project|OWASP Top 10 Fuer Entwickler Project]]&lt;br /&gt;
*[[OWASP_Security_Principles_Project|OWASP Security Principles Project]]&lt;br /&gt;
*[[OWASP_Media_Project|OWASP Media Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Global_Chapter_Meetings_Project|OWASP Global Chapter Meetings Project]]&lt;br /&gt;
*[[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
*[[OWASP_Insecure_Web_Components_Project|OWASP Insecure Web Components Project]]&lt;br /&gt;
*[[OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project|OWASP Reverse Engineering and Code Modification Prevention Project]]&lt;br /&gt;
*[[OWASP_Student_Chapters_Program|OWASP Student Chapters Project]]&lt;br /&gt;
*[[:Category:OWASP_Education_Project|OWASP Education Project]]&lt;br /&gt;
*[[:Category:OWASP_Speakers_Project|OWASP Speakers Project]]&lt;br /&gt;
*[[OWASP_Internet_of_Things_Top_Ten_Project|OWASP Internet of Things Top Ten Project]]&lt;br /&gt;
*[[:Category:OWASP_.NET_Project|OWASP .NET Project]]&lt;br /&gt;
*[[OWASP_Open_Cyber_Security_Framework_Project|OWASP Open Cyber Security Framework Project]]&lt;br /&gt;
*[[OWASP_Top_10_Privacy_Risks_Project|OWASP Top 10 Privacy Risks Project]]&lt;br /&gt;
*[[OWASP_WASC_Web_Hacking_Incidents_Database_Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
*[[OWASP_Security_Frameworks_Project|OWASP Security Frameworks Project]]&lt;br /&gt;
*[[OWASP_Incident_Response_Project|OWASP Incident Response Project]]&lt;br /&gt;
*[[OWASP_Embedded_Application_Security|OWASP Embedded Application Security]]&lt;br /&gt;
*[[OWASP_STING_Game_Project|OWASP STING Game Project]]&lt;br /&gt;
*[[Projects/OWASP_Ruby_on_Rails_and_friends_Security_Guide|OWASP Ruby on Rails and Friends Security Guide]]&lt;br /&gt;
*[[OWASP_Secure_Development_Training|OWASP Secure Development Training]]&lt;br /&gt;
*[[OWASP_Periodic_Table_of_Vulnerabilities|OWASP Periodic Table of Vulnerabilities]]&lt;br /&gt;
*[[OWASP_Top_Trumps_for_Projects|OWASP Top Trumps for Projects]]&lt;br /&gt;
*[[OWASP_Supporting_Legacy_Web_Applications_in_the_Current_Environment_Project|OWASP Supporting Legacy Web Applications in the Current Environment Project]]&lt;br /&gt;
*[[OWASP KALP Mobile Project | OWASP KALP Mobile Project]]&lt;br /&gt;
*[[OWASP Persian Translation Project | OWASP Persian Translation Project]]&lt;br /&gt;
*[[OWASP_Security_Controls_in_Web_Application_Development_Lifecycle |OWASP Security Controls in Web Application Development Lifecycle Project]]&lt;br /&gt;
*[[OWASP_Application_Security_Program_Quick_Start_Guide_Project|OWASP_Application_Security_Program_Quick_Start_Guide_Project]]&lt;br /&gt;
*[[OWASP_Secure_Configuration_Guide|OWASP_Secure_Configuration_Guide]]&lt;br /&gt;
*[[OWASP_Product_Requirement_Recommendations_Library|OWASP_Product_Requirement_Recommendations_Library]]&lt;br /&gt;
*[[OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project|OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project]]&lt;br /&gt;
*[[OWASP_Knowledge_Graph|OWASP_Knowledge_Graph]]&lt;br /&gt;
&lt;br /&gt;
====Educational Project====&lt;br /&gt;
*[[OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project#tab=Main | OWASP Visual Crime Scene and Security Incident Project]]&lt;br /&gt;
&lt;br /&gt;
==Donated Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Donated Projects are inactive projects that have been donated to the OWASP Projects Infrastructure. &lt;br /&gt;
&lt;br /&gt;
====Tools====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Excess_XSS_Project|OWASP Excess XSS Project]]&lt;br /&gt;
* [[OWASP_JOTP_Project|OWASP jOTP Project]]&lt;br /&gt;
&lt;br /&gt;
==OWASP Archived Projects==&lt;br /&gt;
OWASP Archived Projects are projects that have developed outside OWASP umbrella or have become inactive. If you are interested in pursuing any of the inactive projects (click hyperlink for list), please contact us and let us know of your interest.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project_Archived_Projects&lt;br /&gt;
&lt;br /&gt;
= Project Task Force =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OWASP Project Task Force====&lt;br /&gt;
&lt;br /&gt;
{{:Task_Force/OWASP_Projects}}&lt;br /&gt;
&lt;br /&gt;
= Online Resources =&lt;br /&gt;
&lt;br /&gt;
===Project Online Resources===&lt;br /&gt;
&lt;br /&gt;
{{:Project_Online_Resources}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Starting a New Project  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== So you want to start a project... ==&lt;br /&gt;
&lt;br /&gt;
Starting an OWASP project is quite easy, and your desire to contribute and make it happen is essential.&lt;br /&gt;
[[File:HowToStartProjectoWasp.png | 600px | right]]&lt;br /&gt;
&lt;br /&gt;
Here are some of the guidelines for running a successful OWASP project:&lt;br /&gt;
&lt;br /&gt;
-Start exploring the actual OWASP projects Inventory. Many projects handle specific areas of security it is a good idea to start looking how other successful projects do this (LABS/Flagship)&lt;br /&gt;
&lt;br /&gt;
-Place your idea or project on the [https://www.owasp.org/index.php/Project_Ideas_Board#From_Idea_to_Project_Incubator Project Ideas Board].This phase will help you to define the project goals and also explore and exchange with other OWASP leaders and volunteers how to develop the idea into a tangible project&lt;br /&gt;
&lt;br /&gt;
-Explore and research if your idea covers a unique segment in the Security arena.Think of your project as a product, if you really want people using it, think how this project will cover a necessity in the security area you are working on &lt;br /&gt;
&lt;br /&gt;
-Define what kind of project you would like to start. Is it a code, tool or documentation?&lt;br /&gt;
&lt;br /&gt;
-Communicate through the Project leader mailing list about your idea and get feedback and  meet potential contributors&lt;br /&gt;
&lt;br /&gt;
-Develop your project based on the type of project. For example if you are willing to start a documentation project, begin by defining a Table of Content and work it through with potential contributors. First of all begin by creating a Road-map for your project. This is essential to submit your project. We highly recommend to read  documentation such as &amp;quot;[http://www2.econ.iastate.edu/tesfatsi/ProducingOSS.KarlFogel2005.pdf How to start /run a successful Open Source Projects]&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 500px | left]]&lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Road-map===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Start defining a development, documentation and marketing plan for your project. Set short , medium and long term plans. Include promotion of your project, this is very important in order to engage users and consumers of your project. Contact project coordinator and the Project Task Force to help you achieve this goal. You ''can'' run a single person project, but it's usually best to get the community involved.  You should be prepared to support a mailing list, build a team, speak at conferences, and promote your project.&lt;br /&gt;
&lt;br /&gt;
* You can contribute existing documents or tools to OWASP! Assuming you have the intellectual property rights to a work, you can open it to the world as an OWASP Project.  Please coordinate this with OWASP by contacting owasp(at)owasp.org.&lt;br /&gt;
&lt;br /&gt;
* Available Grants to consider if you need funding - [[Grants|Click Here]]&lt;br /&gt;
&lt;br /&gt;
* You should promote your project through the OWASP channels as well as by outside means.  Get people to blog about it!&lt;br /&gt;
&lt;br /&gt;
== Creating a new project ==&lt;br /&gt;
Once you have passed the Project Ideas phase, then you will be ready to start a new project&lt;br /&gt;
To Submit your project please use the following form&lt;br /&gt;
. [http://www.tfaforms.com/263506 Please submit a new project application here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* You will need to gather the following information together for your application:&lt;br /&gt;
A - PROJECT&lt;br /&gt;
# Project Name,&lt;br /&gt;
# Project purpose / overview,&lt;br /&gt;
# Project Roadmap,&lt;br /&gt;
# Project links (if any) to external sites,&lt;br /&gt;
# [[Guidelines_for_OWASP_Projects#Project_Licensing|Project License],]&lt;br /&gt;
# Project Leader name,&lt;br /&gt;
# Project Leader email address,&lt;br /&gt;
# Project Leader wiki account - the username (you'll need this to edit the wiki),&lt;br /&gt;
# Project Contributor(s) (if any) - name email and wiki account (if any),&lt;br /&gt;
# Project Main Links (if any).&lt;br /&gt;
# For Documentation: A table of Contents&lt;br /&gt;
# For Code: A prototype hosted in an open source repository of your choice. Make sure it has read access.&lt;br /&gt;
&lt;br /&gt;
* Check out the '''[[Guidelines for OWASP Projects]]'''.&lt;br /&gt;
* [[Grant_Spending_Policy|Grant Spending Policy]]&lt;br /&gt;
* [[Project_Spending_Policy|Project Spending Policy]]&lt;br /&gt;
* [[Project_Sponsorship_Operational_Guidelines|Project Sponsorship Operational Guidelines]]&lt;br /&gt;
&lt;br /&gt;
==OWASP	Recommended Licenses==&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Funding your Project==&lt;br /&gt;
An OWASP project does not receive any funding for development at project inception; however, a new project does have the opportunity to submit a request to receive funds if they are available for the year. Additionally, project leaders have the option of seeking sponsorship from outside organizations, but project leaders are required to seek funding through their own initiative. Please contact the OWASP Projects Manager for more information. &lt;br /&gt;
&lt;br /&gt;
== Project Release ==&lt;br /&gt;
&lt;br /&gt;
As your project reaches a point that you'd like OWASP to assist in its promotion, the will need the following information to help spread the word about your project:&lt;br /&gt;
&lt;br /&gt;
# Short 5 sentence paragraph outlining what your project is about, what you hope to accomplish with your project, what value your project brings to software security, and contributor and project leader names and contact information.&lt;br /&gt;
# Link to your wiki page.&lt;br /&gt;
# Link to your code repository or a link to where readers can download your project.&lt;br /&gt;
# Latest Release description answering the following questions: What is it?, What does it do?, Where can I get it?, Who should I contact if something goes wrong?.&lt;br /&gt;
&lt;br /&gt;
==Project Process Forms==&lt;br /&gt;
These forms were created to help project leaders, and those interested in a going through a process in the OWASP projects infrastructure. They facilitate the management of each query based on the specific task an applicant will need help with. The forms are described below, and they are linked with their designated online application form. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264422 Project Transition Application]:The OWASP project transition form gives current project leaders an easy way of handing over project administration information to individuals wishing to take over a project.  &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264413 Project Review Application]:This form is for current project leaders to request a review of their project based on OWASP graduation criteria. The aim is to designate an OWASP volunteer to review these projects within 3 months time. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264418 Project Donation Application]:This form is for projects outside of the OWASP project infrastructure. Project Leaders for these open source projects can choose to partner or give their project to OWASP directly through this form.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264428 Project Adoption Request]:This form is used when someone is interested in adopting an archived project. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264426 Project Abandonment Request]:The OWASP project abandonment form gives current project leaders an easy way of letting the OWASP Foundation know that they wish to resign their project leader duties. This form should be used when no replacement project leader exists to take over these duties.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264392 Incubator Project Graduation Application]:This application form is for Incubator Projects to apply for Labs Project status.&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project Project Request (Bangladesh)]:For Information Security Project contact with OWASP Bangladesh Project Leader [[S. M. Shezan]][http://www.facebook.com/smshezan]&lt;br /&gt;
&lt;br /&gt;
= Project Assessments  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==OWASP Project Lifecycle==&lt;br /&gt;
The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state. The greater the maturity of the project, the greater the level of responsibility for the project leader. These responsibilities are not trivial as OWASP provides incentives and benefits (Section 7) for projects who take on these added responsibilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====The OWASP Project Lifecycle is broken down into the following stages:====&lt;br /&gt;
&lt;br /&gt;
'''Incubator Projects''': OWASP Incubator projects represent the experimental playground where projects are still being designed, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity; moreover, the label allows project leaders to leverage the OWASP name while their project is still maturing. OWASP Incubator projects are given a place on the OWASP Projects Portal to leverage the organizations' infrastructure, and establish their presence and project history.&lt;br /&gt;
&lt;br /&gt;
'''Lab Projects''': OWASP Labs projects represent projects that have produced a deliverable of significant value. Leaders of OWASP Labs projects are expected to stand behind the quality of their projects as these projects have matured to the point where they are accepted by a significant portion of the OWASP community. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are ready for mainstream usage. OWASP Labs Projects are meant to be the collection of established projects that have gained community support and acclaim by undergoing the project review process. &lt;br /&gt;
&lt;br /&gt;
'''Flagship Projects''': The OWASP Flagship designation is given to projects that have demonstrated superior maturity, established quality, and strategic value to OWASP and application security as a whole. Eligible projects are selected from the OWASP Labs project pool. This selection process generally ensures that there is only one project of each type covering any particular security space. OWASP Flagship projects represent projects that are not only mature, but are also projects that OWASP as an organization provides direct support to maintaining. The core mission of OWASP is to make application security visible and so as an organization, OWASP has a vested interest in the success of its Flagship projects. Since Flagship projects have such high visibility, these projects are expected to uphold the most stringent requirements of all OWASP Projects.&lt;br /&gt;
&lt;br /&gt;
'''Code Projects''': OWASP code projects are very important for the cyber security solutions. Because application security can be visible here through these projects. Best code project is [[OWASP System Vulnerable Code Project]] and best project leader is [[S. M. Shezan]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Stage Benefits==&lt;br /&gt;
This section outlines the benefits of starting an OWASP project, and the benefits of being at each different stage in the projects lifecycle. In my short time here at OWASP as the PM, I have had several potential project leaders ask me what the benefits are of starting their project with OWASP. Below is my proposal for each Stage’s benefits.&lt;br /&gt;
&lt;br /&gt;
'''Incubator'''&lt;br /&gt;
* Financial Donation Management Assistance &lt;br /&gt;
* Project Review Support&lt;br /&gt;
* WASPY Awards Nominations&lt;br /&gt;
* OWASP OSS and OPT Participation&lt;br /&gt;
* Opportunity to submit proposal: $500 for Development.&lt;br /&gt;
* Community Engagement and Support&lt;br /&gt;
* Recognition and visibility of being associated with the OWASP Brand.&lt;br /&gt;
&lt;br /&gt;
'''Labs'''&lt;br /&gt;
* All benefits given to Incubator Projects &lt;br /&gt;
* Technical Writing Support&lt;br /&gt;
* Graphic Design Support&lt;br /&gt;
* Project Promotion Support&lt;br /&gt;
* OWASP OSS and OPT: Preference&lt;br /&gt;
&lt;br /&gt;
'''Flagship'''&lt;br /&gt;
* All benefits given to Incubator &amp;amp; Labs Projects&lt;br /&gt;
* Grant finding and proposal writing help&lt;br /&gt;
* Yearly marketing plan development&lt;br /&gt;
* OWASP OSS and OPT participation preference&lt;br /&gt;
&lt;br /&gt;
For more detailed information on OWASP Project Stage Benefits, please see the 2013 Project Handbook.&lt;br /&gt;
&lt;br /&gt;
== Project Monitoring Incubator/Documentation ==&lt;br /&gt;
Every 6 months, a project monitoring assessment takes place to evaluate if projects had any releases during this period.A warning will be sent to projects without any activity in 90 days and after 180 days, the project will be set automatically as inactive.&lt;br /&gt;
You can set your project active at any time, as long as:&lt;br /&gt;
* There has been commits to the project's open repository or&lt;br /&gt;
* There has been a beta release of the documentation produced so far or&lt;br /&gt;
* Provide a detailed Roadmap &lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Roadmap===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 600px]]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project Monitoring for LABS/Flagship==&lt;br /&gt;
These project represent the best OWASP has to offer, therefore monitoring of these projects is closely supervised.&lt;br /&gt;
===For Code and Tools===&lt;br /&gt;
For projects holding Flagship status, we closely monitor their health every 6 months on the following, among other key indicators:&lt;br /&gt;
*Can the project be built correctly?&lt;br /&gt;
*Does the project has any activity(commits) in the last 6 months?&lt;br /&gt;
*Does the project had any releases in the last 6 months?&lt;br /&gt;
*Has the project leaders updated his wiki or website to reflect latest releases?&lt;br /&gt;
===For Documentation===&lt;br /&gt;
For this part, we are working on the development of an adequate assessment criteria&lt;br /&gt;
The following is a draft of the new process proposal: [[https://www.owasp.org/index.php/File:Qualitative_and_Quantitative_Content_Audit.pdf Proposal for Reviewing OWASP Document projects]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Graduation==&lt;br /&gt;
The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
The review centers around the following core questions. Each core question has three (3) specific questions made up of binary queries. A project must receive at least two (2) positive responses from each reviewer in two of the binary questions, to warrant a postive response for the core question. Each core question must receive a positive response from both project reviewers to pass the Project Health Assessment for Incubator Projects. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Graduation Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Health Assessment==&lt;br /&gt;
The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation for projects going from Incubator to LAB and from LAB to Flagship. The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Health Assessment Criteria Document]. If a project passes the assessment, it then becomes eligible to graduate into the OWASP Labs Project stage. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Deliverable/Release Assessment==&lt;br /&gt;
The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to  review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception. &lt;br /&gt;
&lt;br /&gt;
Reviews must be performed by two (2) OWASP Chapter or Project Leaders, and their review must answer affirmatively to at least the first two (2) core Project Deliverable/Release Review questions. A project must pass the OWASP Project Deliverable/Release Assessment in order to graduate into the OWASP Labs Project stage. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Deliverable/Release Assessment Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Brand Resources  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The Brand Usage Rules==&lt;br /&gt;
See OWASP's [[Marketing/Resources#tab=BRAND_GUIDELINES|The Brand Usage Rules]] for details.&lt;br /&gt;
&lt;br /&gt;
==Project Icons &amp;amp; Templates==&lt;br /&gt;
See OWASP'S [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
(Following links and images are provided for a quick overview only, the primary page is [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]]).&lt;br /&gt;
&lt;br /&gt;
If you require more assistance with these files and/or templates, please contact the OWASP staff for assistance &lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Operations_Project_Template|OWASP Operational Wiki Template]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Documentation_Project_Template|OWASP Example Template: DO NOT EDIT]]'''&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_Project_Header.jpg|Owasp logo|500px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_TOOL.jpg|Owasp logo|200px]] [[Image:Project_Type_Files_DOC.jpg||Owasp logo 1c|200px]]  &lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_CODE.jpg|Owasp logo|200px]] [[Image:Owasp-defenders-small.png|Owasp logo|100px]] [[Image:Owasp-builders-small.png|Owasp logo|100px]] [[Image:Owasp-breakers-small.png|Owasp logo|100px]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-incubator-trans-200.png|Owasp logo rev icon|100px]] [[Image:Owasp-labs-trans-85.png|Owasp logo flat|100px]] [[Image:Owasp-flagship-trans-85.png|Owasp logo icon|100px]]&lt;br /&gt;
&lt;br /&gt;
===OpenSAMM===&lt;br /&gt;
'''[[Media:OpenSAMM_icons.zip|OpenSAMM Icons]]'''&lt;br /&gt;
&lt;br /&gt;
'''Construction:'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Construction black.png| Construction black| 100px]]  [[Image:Construction blue.png| Construction blue| 100px]]  [[image:Construction olive.png |construction olive|100px]]&lt;br /&gt;
&lt;br /&gt;
'''Deployment:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Deployment black.png| Deployment black| 100px]]  [[image:Deployment blue.png| Deployment blue| 100px]]  [[image:Deployment olive.png | Deployment olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Governance:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Governance black.png| governance black| 100px]]  [[image:Governance blue.png | governance blue | 100px]]  [[image:Governance olive.png | governance olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Verification:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Verification black.png | Verification black | 100px]]  [[image:Verification blue.png | verification blue | 100px]]  [[image: Verification olive.png | Verification olive | 100px]]&lt;br /&gt;
&lt;br /&gt;
==Book Cover Files==&lt;br /&gt;
See OWASP's [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
[[Media:Lulu-guide.pdf|Lulu Guide]]&lt;br /&gt;
&lt;br /&gt;
'''[https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip Download the Book Cover Zip File]'''&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;300&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:BookImage_01.jpg‎|500px| link=https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Terminology =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== OWASP Project Infrastructure ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Lifecycle:''' The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Project:''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway. The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Labs Project:''' OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Flagship Project:''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Benefits:''' The standard list of resources and incentives made available to project leaders based on their project's current maturity level. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Reviews ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviews:''' Project reviews are the method OWASP uses to establish a minimal baseline of project characteristics and release quality. Reviews are not mandatory, but they are necessary if a project leader wishes to graduate to the next level of maturity within the OWASP Global Projects infrastructure. Projects can be reviewed when an Incubator project wishes to graduate into the OWASP Labs designation, and project releases can be reviewed if they want the quality of their deliverable to be vouched for by OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviewer Pool:''' The project reviewer pool is made up of veteran reviewers who have proven themselves dedicated to executing quality reviews of projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Graduation:''' The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Health Assessment:''' The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE#gid=1 Project Health Assessment Criteria Document].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Release:''' A project release refers to the final deliverable a project produces. It is the final product of the project. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Deliverable/Release Review:''' The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects Processes == &lt;br /&gt;
&lt;br /&gt;
*'''Project Processes:''' The set of streamlined processes that exist to help projects move smoothly through the OWASP Project Lifecycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Inception Process:''' The Project Inception Process is how a brand new idea becomes an OWASP Project. Such projects are labeled as OWASP Incubator projects. The process involves submitting the proposed project name, project leader information, project description, project roadmap, and selecting an appropriate open-source license for the project using the New Project Form on the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Donation Process:''' The Project Donation Process is used for a project that has an existing functional release, but is not currently associated with OWASP. This process is the primary mechanism by which individuals or organizations can transfer the ownership of their project’s copyright to OWASP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Transition Process:''' The Project Transition Process is used to transition leadership of a project to a new project leader. This is a simple automated process to transfer the relevant accounts, mailing lists, and other project resources to the new project leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Abandonment Process:''' The Project Abandonment Process was put in place for those occasions in which a project leader is no longer able to manage their project, and has not been able to find a suitable replacement for the leader role. Project Abandonment can also occur when the project leader feels his/her project has become obsolete. Under these circumstances, the acting project leader is encourage do submit the Project Abandonment Form found in the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Graduation Process:''' The Incubator Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Projects at Conferences == &lt;br /&gt;
&lt;br /&gt;
*'''AppSec Conferences:''' OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Open Source Showcase:''' The Open Source Showcase is an OWASP AppSec Conference event module designed to give Open Source project leaders the opportunity to demo their projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Track:''' The OWASP Project Track is an OWASP AppSec Conference event module designed to give OWASP Project leaders the opportunity to showcase their projects as an official conference presenter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects General ==  &lt;br /&gt;
&lt;br /&gt;
*'''OWASP Code of Ethics:''' The OWASP Code of Ethics are the set of guidelines and principles that the OWASP Foundation expects all of its members and conference attendees to abide by. A copy of the Code of Ethics can be found here in the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#Code_of_Ethics OWASP About page]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sponsorships and Donations  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate to OWASP Global Projects ==&lt;br /&gt;
OWASP Projects, a global division of the OWASP Foundation, is run under the same world wide not-for-profit charitable status as all the foundation strategic groups. OWASP provides a platform for contributors to share their work while providing them with the project and community support they need throughout their project development. All OWASP Projects are run by volunteers and they rely on personal donations and sponsorship to continue their development. Donate to OWASP Projects, and we promise to spend your money wisely on open source initiatives.&lt;br /&gt;
&lt;br /&gt;
'''This is how your money can help:'''&lt;br /&gt;
&lt;br /&gt;
* $20 could help us spread the word on the importance of open source initiatives in the Application Security industry.&lt;br /&gt;
* $100 could help fund OWASP project demos at major conferences.&lt;br /&gt;
* $250 could help get our volunteer Project Leaders to speaking engagements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_Button.jpg | link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Contact US  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you need any help with anything projects related, or if you simply need some more information, please do not hesitate to [http://owasp4.owasp.org/contactus.html Contact Us].&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=193549</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=193549"/>
				<updated>2015-04-17T06:41:14Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Project Process Forms */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Welcome to the OWASP Global Projects Page ===&lt;br /&gt;
&lt;br /&gt;
An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. OWASP currently has over 142 active projects, and new project applications are submitted every week.  &lt;br /&gt;
&lt;br /&gt;
This is one of the most popular divisions of OWASP as it gives members an opportunity to freely test theories and ideas with the professional advice and support of the OWASP community. Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any project by visiting the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. A summary of recent project announcements is available on the [[OWASP Updates]] page. &lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:PROJECT_LEADER-HANDBOOK_2014.pdf|OWASP Project Handbook 2014]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_2014_Project_Handbook|OWASP Project Handbook Wiki 2014]]'''&lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:OWASP_Projects_Handbook_2013.pdf|OWASP Projects Handbook 2013]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[Project_Online_Resources|Project Online Resources]]'''&lt;br /&gt;
&lt;br /&gt;
=== Who Should Start an OWASP Project? ===&lt;br /&gt;
&lt;br /&gt;
*Application Developers. &lt;br /&gt;
*Software Architects. &lt;br /&gt;
* Information Security Authors.  &lt;br /&gt;
*Those who would like the support of a world wide professional community to develop or test an idea.&lt;br /&gt;
*Anyone wishing to take advantage of the professional body of knowledge OWASP has to offer.&lt;br /&gt;
&lt;br /&gt;
=== Contact Us===&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please do not hesitate to  [http://owasp4.owasp.org/contactus.html Contact Us] by using the form provided here. Please allow five working days for your question or comment to be answered. This is due to the large amount of queries the foundation staff receive every day. We thank you for your patience. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Project Inventory ===&lt;br /&gt;
&lt;br /&gt;
All OWASP tools, document, and code library projects are organized into the following [[OWASP_Project_Stages|categories:]] &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Flagship_Projects|Flagship Projects:]]''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Labs_Projects|Lab Projects:]]''' OWASP Labs projects represent projects that have produced an OWASP reviewed deliverable of value. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Incubator_Projects|Incubator Projects:]]''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.&lt;br /&gt;
&lt;br /&gt;
=== Social Media ===&lt;br /&gt;
&lt;br /&gt;
We recommend using the links below to find our official OWASP social media channels. These are a great way to keep in touch with the different initiatives going on at OWASP throughout the world. They are all updated regularly by chapter leaders, project leaders, the OWASP Board Members, and our OWASP Staff. If you have any questions or concerns about any of these accounts, please drop us a line using our [http://www.tfaforms.com/308703 &amp;quot;Contact Us&amp;quot;] form found above.  &lt;br /&gt;
&lt;br /&gt;
[[Image:Blogger-32x32.png|32px|link=http://owasp.blogspot.co.uk/]] [[Image:Twitter-32x32.png|32px|link=https://twitter.com/OWASP]] [[Image:Facebook-32x32.png|32px|link=https://www.facebook.com/groups/172892372831444/]] [[Image:Linkedin-32x32.png|32px|link=http://www.linkedin.com/groups/Global-OWASP-Foundation-36874]] [[Image:Google-32x32.png|32px|link=https://plus.google.com/u/0/communities/105181517914716500346?cfem=1]] [[Image:Ning-32x32.png|32px|link=http://myowasp.ning.com/]]&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 3px solid rgb(204, 204, 204); vertical-align: top; width: 95%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; |  &lt;br /&gt;
&amp;lt;div style=&amp;quot;padding:2em;padding-bottom:0px;&amp;quot;&amp;gt;&amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL; also 2 empty lines between images --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:New_initiatives.png|center|300px| link=http://owasp.force.com/volunteers/GW_Volunteers__VolunteersJobListing]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_here_banner.png|center|300px| link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project Inventory  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Project Dashboard lists the all project information at a glance, including release links, the current status of the project and project leader contact information. The Project Dashboard can be found here: https://www.owasp.org/index.php/OWASP_Project_Dashboard&lt;br /&gt;
&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
[[File:Flagship_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole.&lt;br /&gt;
After a major review process [[https://www.owasp.org/index.php/LAB_Projects_Code_Analysis_Report More info here]] the following projects are considered to be flagship candidate projects. These project will be evaluated more deeply to confirm their flagship status:&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy]]&lt;br /&gt;
* [[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment Project]]&lt;br /&gt;
* [[OWASP_OWTF|OWASP OWTF]]&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency Check]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed November 2014]====&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
* [[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard Project]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP System Vulnerable Code Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed February 2015] in progress====&lt;br /&gt;
* [[:Category:OWASP_Application_Security_Verification_Standard_Project|OWASP Application Security Verification Standard Project]]&lt;br /&gt;
* [[:Category:Software_Assurance_Maturity_Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[:Category:OWASP_Top_Ten_Project|OWASP Top Ten Project]]&lt;br /&gt;
* [[OWASP_Testing_Project|OWASP Testing Guide Project]]&lt;br /&gt;
&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
[[File:Lab banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to LAB projects showing a steady progress in their development, had very active and continuous releases and commits, regular update of information on their wiki page and have quite complete documentation. These projects are almost ready to become flagship&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed February 2015]====&lt;br /&gt;
* [[OWASP_Hackademic_Challenges_Project|OWASP Hackademic Challenges Project]]&lt;br /&gt;
* [[OWASP_Mantra_-_Security_Framework|OWASP Mantra Security Framework]]&lt;br /&gt;
* [[OWASP_O2_Platform|OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP_Dependency_Track_Project|OWASP Dependency Track Project]]&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
* [[O-Saft|O-Saft]]&lt;br /&gt;
* [[:Category:OWASP_EnDe|OWASP EnDe Project]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] &lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security Project]]&lt;br /&gt;
*[[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]]&lt;br /&gt;
&lt;br /&gt;
====Documentation [In Progress-Results by February/March 2015] ====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Podcast|OWASP Podcast Project]]&lt;br /&gt;
* [[:Category:OWASP_Code_Review_Project|OWASP Code Review Guide Project]]&lt;br /&gt;
* [[:Category:OWASP_Guide_Project|OWASP Development Guide Project]]&lt;br /&gt;
*[[OWASP_CISO_Survey|OWASP CISO Survey]] &lt;br /&gt;
*[[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]]&lt;br /&gt;
*[[OWASP_Cornucopia|OWASP Cornucopia]]&lt;br /&gt;
*[[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Contests====&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]] &lt;br /&gt;
* [[:Category:OWASP_CTF_Project|OWASP CTF Project]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed February 2015]====&lt;br /&gt;
* [[:Category:OWASP_Enterprise_Security_API|OWASP Enterprise Security API]]&lt;br /&gt;
&lt;br /&gt;
======Low Activity (LABS)[Reviewed February 2015] ======&lt;br /&gt;
[[File:low_activity.jpg]]&lt;br /&gt;
&lt;br /&gt;
These projects had no releases in at least a year, however have shown to be valuable tools&lt;br /&gt;
Code [Low Activity]&lt;br /&gt;
* [[Project_Information:template_Vicnum_Project|OWASP Vicnum Project]]&lt;br /&gt;
* [[OWASP_Broken_Web_Applications_Project|OWASP Broken Web Applications Project]]&lt;br /&gt;
&lt;br /&gt;
Documentation [Low Activity]&lt;br /&gt;
* [[OWASP_Appsec_Tutorial_Series|OWASP AppSec Tutorial Series]]&lt;br /&gt;
* [[:Category:OWASP_Legal_Project|OWASP Legal Project]]&lt;br /&gt;
* [[Virtual_Patching_Best_Practices|Virtual Patching Best Practices]]&lt;br /&gt;
* [[OWASP_Codes_of_Conduct|OWASP Codes of Conduct]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
[[File:Incubator_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to incubator projects showing a steady progress in their development, had continuous releases and commits or have delivered a complete product, including open source repository location, basic user guidelines and documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed March 2015]====&lt;br /&gt;
* [[OWASP_Java_Encoder_Project|OWASP Java Encoder Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Java_File_I_O_Security_Project|OWASP Java File I/O Security Project]]&lt;br /&gt;
* [[OWASP_PHPRBAC_Project|OWASP PHPRBAC Project]] &lt;br /&gt;
* [[OWASP_iMAS_iOS_Mobile_Application_Security_Project|OWASP iMAS - iOS Mobile Application Security Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_PHP_Security_Project|OWASP PHP Security Project]] [[File:Thumbsup.png|15px]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Node_js_Goat_Project|OWASP Node.js Goat Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_System_Vulnerable_Code_Project|OWASP System Vulnerable Code Project]]&lt;br /&gt;
* [[OWASP_ISO_IEC_27034_Application_Security_Controls_Project|OWASP ISO/IEC 27034 Application Security Controls Project]]&lt;br /&gt;
* [[OWASP_Hardened_Phalcon_Project|OWASP Hardened Phalcon Project]]&lt;br /&gt;
* [[OWASP_Faux_Bank_Project|OWASP Faux Bank Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Security_Research_and_Development_Framework|OWASP Security Research and Development Framework]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_File_Format_Validation_Project|OWASP File Format Validation Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
*[[OWASP_Security_Logging_Project|OWASP Security Logging Project]]&lt;br /&gt;
*[[OWASP_Droid10_Project|OWASP Droid]]&lt;br /&gt;
&lt;br /&gt;
====Tools [Review in progress-April 2015]====&lt;br /&gt;
*[[Benchmark|OWASP WebGoat Benchmark]]&lt;br /&gt;
*[[OWASP_WAP-Web_Application_Protection|WAP Web Application_Protection]]&lt;br /&gt;
*[[OWASP_Java_HTML_Sanitizer|OWASP Java HTML Sanitizer Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Security_Shepherd|OWASP Security Shepherd]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Mantra_OS|OWASP Mantra OS]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_iGoat_Project|OWASP iGoat Project]]&lt;br /&gt;
*[[OWASP_Bricks|OWASP Bricks]]&lt;br /&gt;
*[[OWASP_Bywaf_Project|OWASP Bywaf Project]]&lt;br /&gt;
*[[OWASP_Mutillidae_2_Project|OWASP Mutillidae 2 Project]] &lt;br /&gt;
*[[OWASP_SeraphimDroid_Project|OWASP SeraphimDroid Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Python_Security_Project|OWASP Python Security Project]]&lt;br /&gt;
*[[OWASP_WebSpa_Project|OWASP WebSpa Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_NINJA_PingU_Project|OWASP NINJA PingU Project]]&lt;br /&gt;
*[[OWASP_Encoder_Comparison_Reference_Project|OWASP Encoder Comparison Reference Project]]&lt;br /&gt;
*[[:Category:OWASP_SQLiX_Project|OWASP sqliX Project]]&lt;br /&gt;
*[[OWASP_Click_Me_Project|OWASP Click Me Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Secure_TDD_Project|OWASP Secure TDD Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_XSecurity_Project|OWASP XSecurity Project]]&lt;br /&gt;
*[[OWASP_Pyttacker_Project|OWASP Pyttacker Project]]&lt;br /&gt;
*[[OWASP_Code_Pulse_Project|OWASP Code Pulse Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_HTTP_Post_Tool|OWASP HTTP POST Tool]]&lt;br /&gt;
*[[OWASP_PHP_Security_Training_Project|OWASP PHP Security Training Project]]&lt;br /&gt;
*[[Projects/OWASP_iOSForensic|OWASP iOSForensic]]&lt;br /&gt;
*[[OWASP_Project_Metrics|OWASP Project Metrics]]&lt;br /&gt;
*[[OWASP_Store_Sheep_Project|OWASP Store Sheep Project]]&lt;br /&gt;
*[[OWASP_SonarQube_Project|OWASP SonarQube Project]]&lt;br /&gt;
*[[OWASP Rainbow Maker Project | OWASP Rainbow Maker Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP JSEC CVE Details | OWASP JSEC CVE Details]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_WebGoat.NET|OWASP WebGoat.NET]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASIDE_Project|OWASP ASIDE Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASVS_Assessment_tool | OWASP Assesment Tool]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Review: March 2015-In progress]====&lt;br /&gt;
*[[OWASP Automated Threats to Web Applications]]&lt;br /&gt;
*[[OWASP_Data_Exchange_Format_Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
*[[OWASP_Proactive_Controls|OWASP Proactive Controls]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Enterprise_Application_Security_Project|OWASP Enterprise Application Security Project]]&lt;br /&gt;
*[[Projects/OWASP_GoatDroid_Project|OWASP GoatDroid Project]]&lt;br /&gt;
*[[OWASP_RFP-Criteria|OWASP Request For Proposal]]&lt;br /&gt;
*[[OWASP_Hacking_Lab|OWASP Hacking-Lab]]&lt;br /&gt;
*[[WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project|WASC/OWASP Web Application Firewall Evaluation Criteria (WAFEC)]]&lt;br /&gt;
*[[OWASP_Secure_Application_Design_Project|OWASP Secure Application Design Project]]&lt;br /&gt;
*[[OWASP_Top_10_Fuer_Entwickler_Project|OWASP Top 10 Fuer Entwickler Project]]&lt;br /&gt;
*[[OWASP_Security_Principles_Project|OWASP Security Principles Project]]&lt;br /&gt;
*[[OWASP_Media_Project|OWASP Media Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Global_Chapter_Meetings_Project|OWASP Global Chapter Meetings Project]]&lt;br /&gt;
*[[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
*[[OWASP_Insecure_Web_Components_Project|OWASP Insecure Web Components Project]]&lt;br /&gt;
*[[OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project|OWASP Reverse Engineering and Code Modification Prevention Project]]&lt;br /&gt;
*[[OWASP_Student_Chapters_Program|OWASP Student Chapters Project]]&lt;br /&gt;
*[[:Category:OWASP_Education_Project|OWASP Education Project]]&lt;br /&gt;
*[[:Category:OWASP_Speakers_Project|OWASP Speakers Project]]&lt;br /&gt;
*[[OWASP_Internet_of_Things_Top_Ten_Project|OWASP Internet of Things Top Ten Project]]&lt;br /&gt;
*[[:Category:OWASP_.NET_Project|OWASP .NET Project]]&lt;br /&gt;
*[[OWASP_Open_Cyber_Security_Framework_Project|OWASP Open Cyber Security Framework Project]]&lt;br /&gt;
*[[OWASP_Top_10_Privacy_Risks_Project|OWASP Top 10 Privacy Risks Project]]&lt;br /&gt;
*[[OWASP_WASC_Web_Hacking_Incidents_Database_Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
*[[OWASP_Security_Frameworks_Project|OWASP Security Frameworks Project]]&lt;br /&gt;
*[[OWASP_Incident_Response_Project|OWASP Incident Response Project]]&lt;br /&gt;
*[[OWASP_Embedded_Application_Security|OWASP Embedded Application Security]]&lt;br /&gt;
*[[OWASP_STING_Game_Project|OWASP STING Game Project]]&lt;br /&gt;
*[[Projects/OWASP_Ruby_on_Rails_and_friends_Security_Guide|OWASP Ruby on Rails and Friends Security Guide]]&lt;br /&gt;
*[[OWASP_Secure_Development_Training|OWASP Secure Development Training]]&lt;br /&gt;
*[[OWASP_Periodic_Table_of_Vulnerabilities|OWASP Periodic Table of Vulnerabilities]]&lt;br /&gt;
*[[OWASP_Top_Trumps_for_Projects|OWASP Top Trumps for Projects]]&lt;br /&gt;
*[[OWASP_Supporting_Legacy_Web_Applications_in_the_Current_Environment_Project|OWASP Supporting Legacy Web Applications in the Current Environment Project]]&lt;br /&gt;
*[[OWASP KALP Mobile Project | OWASP KALP Mobile Project]]&lt;br /&gt;
*[[OWASP Persian Translation Project | OWASP Persian Translation Project]]&lt;br /&gt;
*[[OWASP_Security_Controls_in_Web_Application_Development_Lifecycle |OWASP Security Controls in Web Application Development Lifecycle Project]]&lt;br /&gt;
*[[OWASP_Application_Security_Program_Quick_Start_Guide_Project|OWASP_Application_Security_Program_Quick_Start_Guide_Project]]&lt;br /&gt;
*[[OWASP_Secure_Configuration_Guide|OWASP_Secure_Configuration_Guide]]&lt;br /&gt;
*[[OWASP_Product_Requirement_Recommendations_Library|OWASP_Product_Requirement_Recommendations_Library]]&lt;br /&gt;
*[[OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project|OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project]]&lt;br /&gt;
*[[OWASP_Knowledge_Graph|OWASP_Knowledge_Graph]]&lt;br /&gt;
&lt;br /&gt;
====Educational Project====&lt;br /&gt;
*[[OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project#tab=Main | OWASP Visual Crime Scene and Security Incident Project]]&lt;br /&gt;
&lt;br /&gt;
==Donated Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Donated Projects are inactive projects that have been donated to the OWASP Projects Infrastructure. &lt;br /&gt;
&lt;br /&gt;
====Tools====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Excess_XSS_Project|OWASP Excess XSS Project]]&lt;br /&gt;
* [[OWASP_JOTP_Project|OWASP jOTP Project]]&lt;br /&gt;
&lt;br /&gt;
==OWASP Archived Projects==&lt;br /&gt;
OWASP Archived Projects are projects that have developed outside OWASP umbrella or have become inactive. If you are interested in pursuing any of the inactive projects (click hyperlink for list), please contact us and let us know of your interest.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project_Archived_Projects&lt;br /&gt;
&lt;br /&gt;
= Project Task Force =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OWASP Project Task Force====&lt;br /&gt;
&lt;br /&gt;
{{:Task_Force/OWASP_Projects}}&lt;br /&gt;
&lt;br /&gt;
= Online Resources =&lt;br /&gt;
&lt;br /&gt;
===Project Online Resources===&lt;br /&gt;
&lt;br /&gt;
{{:Project_Online_Resources}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Starting a New Project  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== So you want to start a project... ==&lt;br /&gt;
&lt;br /&gt;
Starting an OWASP project is quite easy, and your desire to contribute and make it happen is essential.&lt;br /&gt;
[[File:HowToStartProjectoWasp.png | 600px | right]]&lt;br /&gt;
&lt;br /&gt;
Here are some of the guidelines for running a successful OWASP project:&lt;br /&gt;
&lt;br /&gt;
-Start exploring the actual OWASP projects Inventory. Many projects handle specific areas of security it is a good idea to start looking how other successful projects do this (LABS/Flagship)&lt;br /&gt;
&lt;br /&gt;
-Place your idea or project on the [https://www.owasp.org/index.php/Project_Ideas_Board#From_Idea_to_Project_Incubator Project Ideas Board].This phase will help you to define the project goals and also explore and exchange with other OWASP leaders and volunteers how to develop the idea into a tangible project&lt;br /&gt;
&lt;br /&gt;
-Explore and research if your idea covers a unique segment in the Security arena.Think of your project as a product, if you really want people using it, think how this project will cover a necessity in the security area you are working on &lt;br /&gt;
&lt;br /&gt;
-Define what kind of project you would like to start. Is it a code, tool or documentation?&lt;br /&gt;
&lt;br /&gt;
-Communicate through the Project leader mailing list about your idea and get feedback and  meet potential contributors&lt;br /&gt;
&lt;br /&gt;
-Develop your project based on the type of project. For example if you are willing to start a documentation project, begin by defining a Table of Content and work it through with potential contributors. First of all begin by creating a Road-map for your project. This is essential to submit your project. We highly recommend to read  documentation such as &amp;quot;[http://www2.econ.iastate.edu/tesfatsi/ProducingOSS.KarlFogel2005.pdf How to start /run a successful Open Source Projects]&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 500px | left]]&lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Road-map===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Start defining a development, documentation and marketing plan for your project. Set short , medium and long term plans. Include promotion of your project, this is very important in order to engage users and consumers of your project. Contact project coordinator and the Project Task Force to help you achieve this goal. You ''can'' run a single person project, but it's usually best to get the community involved.  You should be prepared to support a mailing list, build a team, speak at conferences, and promote your project.&lt;br /&gt;
&lt;br /&gt;
* You can contribute existing documents or tools to OWASP! Assuming you have the intellectual property rights to a work, you can open it to the world as an OWASP Project.  Please coordinate this with OWASP by contacting owasp(at)owasp.org.&lt;br /&gt;
&lt;br /&gt;
* Available Grants to consider if you need funding - [[Grants|Click Here]]&lt;br /&gt;
&lt;br /&gt;
* You should promote your project through the OWASP channels as well as by outside means.  Get people to blog about it!&lt;br /&gt;
&lt;br /&gt;
== Creating a new project ==&lt;br /&gt;
Once you have passed the Project Ideas phase, then you will be ready to start a new project&lt;br /&gt;
To Submit your project please use the following form&lt;br /&gt;
. [http://www.tfaforms.com/263506 Please submit a new project application here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* You will need to gather the following information together for your application:&lt;br /&gt;
A - PROJECT&lt;br /&gt;
# Project Name,&lt;br /&gt;
# Project purpose / overview,&lt;br /&gt;
# Project Roadmap,&lt;br /&gt;
# Project links (if any) to external sites,&lt;br /&gt;
# [[Guidelines_for_OWASP_Projects#Project_Licensing|Project License],]&lt;br /&gt;
# Project Leader name,&lt;br /&gt;
# Project Leader email address,&lt;br /&gt;
# Project Leader wiki account - the username (you'll need this to edit the wiki),&lt;br /&gt;
# Project Contributor(s) (if any) - name email and wiki account (if any),&lt;br /&gt;
# Project Main Links (if any).&lt;br /&gt;
# For Documentation: A table of Contents&lt;br /&gt;
# For Code: A prototype hosted in an open source repository of your choice. Make sure it has read access.&lt;br /&gt;
&lt;br /&gt;
* Check out the '''[[Guidelines for OWASP Projects]]'''.&lt;br /&gt;
* [[Grant_Spending_Policy|Grant Spending Policy]]&lt;br /&gt;
* [[Project_Spending_Policy|Project Spending Policy]]&lt;br /&gt;
* [[Project_Sponsorship_Operational_Guidelines|Project Sponsorship Operational Guidelines]]&lt;br /&gt;
&lt;br /&gt;
==OWASP	Recommended Licenses==&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Funding your Project==&lt;br /&gt;
An OWASP project does not receive any funding for development at project inception; however, a new project does have the opportunity to submit a request to receive funds if they are available for the year. Additionally, project leaders have the option of seeking sponsorship from outside organizations, but project leaders are required to seek funding through their own initiative. Please contact the OWASP Projects Manager for more information. &lt;br /&gt;
&lt;br /&gt;
== Project Release ==&lt;br /&gt;
&lt;br /&gt;
As your project reaches a point that you'd like OWASP to assist in its promotion, the will need the following information to help spread the word about your project:&lt;br /&gt;
&lt;br /&gt;
# Short 5 sentence paragraph outlining what your project is about, what you hope to accomplish with your project, what value your project brings to software security, and contributor and project leader names and contact information.&lt;br /&gt;
# Link to your wiki page.&lt;br /&gt;
# Link to your code repository or a link to where readers can download your project.&lt;br /&gt;
# Latest Release description answering the following questions: What is it?, What does it do?, Where can I get it?, Who should I contact if something goes wrong?.&lt;br /&gt;
&lt;br /&gt;
==Project Process Forms==&lt;br /&gt;
These forms were created to help project leaders, and those interested in a going through a process in the OWASP projects infrastructure. They facilitate the management of each query based on the specific task an applicant will need help with. The forms are described below, and they are linked with their designated online application form. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264422 Project Transition Application]:The OWASP project transition form gives current project leaders an easy way of handing over project administration information to individuals wishing to take over a project.  &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264413 Project Review Application]:This form is for current project leaders to request a review of their project based on OWASP graduation criteria. The aim is to designate an OWASP volunteer to review these projects within 3 months time. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264418 Project Donation Application]:This form is for projects outside of the OWASP project infrastructure. Project Leaders for these open source projects can choose to partner or give their project to OWASP directly through this form.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264428 Project Adoption Request]:This form is used when someone is interested in adopting an archived project. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264426 Project Abandonment Request]:The OWASP project abandonment form gives current project leaders an easy way of letting the OWASP Foundation know that they wish to resign their project leader duties. This form should be used when no replacement project leader exists to take over these duties.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264392 Incubator Project Graduation Application]:This application form is for Incubator Projects to apply for Labs Project status.&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project Project Request (Bangladesh)]:For Information Security Project contact with OWASP Bangladesh Project Leader [[S. M. Shezan]][http://www.facebook.com/smshezan]&lt;br /&gt;
&lt;br /&gt;
= Project Assessments  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==OWASP Project Lifecycle==&lt;br /&gt;
The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state. The greater the maturity of the project, the greater the level of responsibility for the project leader. These responsibilities are not trivial as OWASP provides incentives and benefits (Section 7) for projects who take on these added responsibilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====The OWASP Project Lifecycle is broken down into the following stages:====&lt;br /&gt;
&lt;br /&gt;
'''Incubator Projects''': OWASP Incubator projects represent the experimental playground where projects are still being designed, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity; moreover, the label allows project leaders to leverage the OWASP name while their project is still maturing. OWASP Incubator projects are given a place on the OWASP Projects Portal to leverage the organizations' infrastructure, and establish their presence and project history.&lt;br /&gt;
&lt;br /&gt;
'''Lab Projects''': OWASP Labs projects represent projects that have produced a deliverable of significant value. Leaders of OWASP Labs projects are expected to stand behind the quality of their projects as these projects have matured to the point where they are accepted by a significant portion of the OWASP community. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are ready for mainstream usage. OWASP Labs Projects are meant to be the collection of established projects that have gained community support and acclaim by undergoing the project review process. &lt;br /&gt;
&lt;br /&gt;
'''Flagship Projects''': The OWASP Flagship designation is given to projects that have demonstrated superior maturity, established quality, and strategic value to OWASP and application security as a whole. Eligible projects are selected from the OWASP Labs project pool. This selection process generally ensures that there is only one project of each type covering any particular security space. OWASP Flagship projects represent projects that are not only mature, but are also projects that OWASP as an organization provides direct support to maintaining. The core mission of OWASP is to make application security visible and so as an organization, OWASP has a vested interest in the success of its Flagship projects. Since Flagship projects have such high visibility, these projects are expected to uphold the most stringent requirements of all OWASP Projects.&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Stage Benefits==&lt;br /&gt;
This section outlines the benefits of starting an OWASP project, and the benefits of being at each different stage in the projects lifecycle. In my short time here at OWASP as the PM, I have had several potential project leaders ask me what the benefits are of starting their project with OWASP. Below is my proposal for each Stage’s benefits.&lt;br /&gt;
&lt;br /&gt;
'''Incubator'''&lt;br /&gt;
* Financial Donation Management Assistance &lt;br /&gt;
* Project Review Support&lt;br /&gt;
* WASPY Awards Nominations&lt;br /&gt;
* OWASP OSS and OPT Participation&lt;br /&gt;
* Opportunity to submit proposal: $500 for Development.&lt;br /&gt;
* Community Engagement and Support&lt;br /&gt;
* Recognition and visibility of being associated with the OWASP Brand.&lt;br /&gt;
&lt;br /&gt;
'''Labs'''&lt;br /&gt;
* All benefits given to Incubator Projects &lt;br /&gt;
* Technical Writing Support&lt;br /&gt;
* Graphic Design Support&lt;br /&gt;
* Project Promotion Support&lt;br /&gt;
* OWASP OSS and OPT: Preference&lt;br /&gt;
&lt;br /&gt;
'''Flagship'''&lt;br /&gt;
* All benefits given to Incubator &amp;amp; Labs Projects&lt;br /&gt;
* Grant finding and proposal writing help&lt;br /&gt;
* Yearly marketing plan development&lt;br /&gt;
* OWASP OSS and OPT participation preference&lt;br /&gt;
&lt;br /&gt;
For more detailed information on OWASP Project Stage Benefits, please see the 2013 Project Handbook.&lt;br /&gt;
&lt;br /&gt;
== Project Monitoring Incubator/Documentation ==&lt;br /&gt;
Every 6 months, a project monitoring assessment takes place to evaluate if projects had any releases during this period.A warning will be sent to projects without any activity in 90 days and after 180 days, the project will be set automatically as inactive.&lt;br /&gt;
You can set your project active at any time, as long as:&lt;br /&gt;
* There has been commits to the project's open repository or&lt;br /&gt;
* There has been a beta release of the documentation produced so far or&lt;br /&gt;
* Provide a detailed Roadmap &lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Roadmap===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 600px]]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project Monitoring for LABS/Flagship==&lt;br /&gt;
These project represent the best OWASP has to offer, therefore monitoring of these projects is closely supervised.&lt;br /&gt;
===For Code and Tools===&lt;br /&gt;
For projects holding Flagship status, we closely monitor their health every 6 months on the following, among other key indicators:&lt;br /&gt;
*Can the project be built correctly?&lt;br /&gt;
*Does the project has any activity(commits) in the last 6 months?&lt;br /&gt;
*Does the project had any releases in the last 6 months?&lt;br /&gt;
*Has the project leaders updated his wiki or website to reflect latest releases?&lt;br /&gt;
===For Documentation===&lt;br /&gt;
For this part, we are working on the development of an adequate assessment criteria&lt;br /&gt;
The following is a draft of the new process proposal: [[https://www.owasp.org/index.php/File:Qualitative_and_Quantitative_Content_Audit.pdf Proposal for Reviewing OWASP Document projects]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Graduation==&lt;br /&gt;
The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
The review centers around the following core questions. Each core question has three (3) specific questions made up of binary queries. A project must receive at least two (2) positive responses from each reviewer in two of the binary questions, to warrant a postive response for the core question. Each core question must receive a positive response from both project reviewers to pass the Project Health Assessment for Incubator Projects. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Graduation Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Health Assessment==&lt;br /&gt;
The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation for projects going from Incubator to LAB and from LAB to Flagship. The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Health Assessment Criteria Document]. If a project passes the assessment, it then becomes eligible to graduate into the OWASP Labs Project stage. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Deliverable/Release Assessment==&lt;br /&gt;
The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to  review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception. &lt;br /&gt;
&lt;br /&gt;
Reviews must be performed by two (2) OWASP Chapter or Project Leaders, and their review must answer affirmatively to at least the first two (2) core Project Deliverable/Release Review questions. A project must pass the OWASP Project Deliverable/Release Assessment in order to graduate into the OWASP Labs Project stage. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Deliverable/Release Assessment Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Brand Resources  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The Brand Usage Rules==&lt;br /&gt;
See OWASP's [[Marketing/Resources#tab=BRAND_GUIDELINES|The Brand Usage Rules]] for details.&lt;br /&gt;
&lt;br /&gt;
==Project Icons &amp;amp; Templates==&lt;br /&gt;
See OWASP'S [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
(Following links and images are provided for a quick overview only, the primary page is [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]]).&lt;br /&gt;
&lt;br /&gt;
If you require more assistance with these files and/or templates, please contact the OWASP staff for assistance &lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Operations_Project_Template|OWASP Operational Wiki Template]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Documentation_Project_Template|OWASP Example Template: DO NOT EDIT]]'''&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_Project_Header.jpg|Owasp logo|500px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_TOOL.jpg|Owasp logo|200px]] [[Image:Project_Type_Files_DOC.jpg||Owasp logo 1c|200px]]  &lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_CODE.jpg|Owasp logo|200px]] [[Image:Owasp-defenders-small.png|Owasp logo|100px]] [[Image:Owasp-builders-small.png|Owasp logo|100px]] [[Image:Owasp-breakers-small.png|Owasp logo|100px]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-incubator-trans-200.png|Owasp logo rev icon|100px]] [[Image:Owasp-labs-trans-85.png|Owasp logo flat|100px]] [[Image:Owasp-flagship-trans-85.png|Owasp logo icon|100px]]&lt;br /&gt;
&lt;br /&gt;
===OpenSAMM===&lt;br /&gt;
'''[[Media:OpenSAMM_icons.zip|OpenSAMM Icons]]'''&lt;br /&gt;
&lt;br /&gt;
'''Construction:'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Construction black.png| Construction black| 100px]]  [[Image:Construction blue.png| Construction blue| 100px]]  [[image:Construction olive.png |construction olive|100px]]&lt;br /&gt;
&lt;br /&gt;
'''Deployment:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Deployment black.png| Deployment black| 100px]]  [[image:Deployment blue.png| Deployment blue| 100px]]  [[image:Deployment olive.png | Deployment olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Governance:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Governance black.png| governance black| 100px]]  [[image:Governance blue.png | governance blue | 100px]]  [[image:Governance olive.png | governance olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Verification:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Verification black.png | Verification black | 100px]]  [[image:Verification blue.png | verification blue | 100px]]  [[image: Verification olive.png | Verification olive | 100px]]&lt;br /&gt;
&lt;br /&gt;
==Book Cover Files==&lt;br /&gt;
See OWASP's [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
[[Media:Lulu-guide.pdf|Lulu Guide]]&lt;br /&gt;
&lt;br /&gt;
'''[https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip Download the Book Cover Zip File]'''&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;300&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:BookImage_01.jpg‎|500px| link=https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Terminology =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== OWASP Project Infrastructure ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Lifecycle:''' The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Project:''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway. The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Labs Project:''' OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Flagship Project:''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Benefits:''' The standard list of resources and incentives made available to project leaders based on their project's current maturity level. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Reviews ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviews:''' Project reviews are the method OWASP uses to establish a minimal baseline of project characteristics and release quality. Reviews are not mandatory, but they are necessary if a project leader wishes to graduate to the next level of maturity within the OWASP Global Projects infrastructure. Projects can be reviewed when an Incubator project wishes to graduate into the OWASP Labs designation, and project releases can be reviewed if they want the quality of their deliverable to be vouched for by OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviewer Pool:''' The project reviewer pool is made up of veteran reviewers who have proven themselves dedicated to executing quality reviews of projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Graduation:''' The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Health Assessment:''' The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE#gid=1 Project Health Assessment Criteria Document].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Release:''' A project release refers to the final deliverable a project produces. It is the final product of the project. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Deliverable/Release Review:''' The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects Processes == &lt;br /&gt;
&lt;br /&gt;
*'''Project Processes:''' The set of streamlined processes that exist to help projects move smoothly through the OWASP Project Lifecycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Inception Process:''' The Project Inception Process is how a brand new idea becomes an OWASP Project. Such projects are labeled as OWASP Incubator projects. The process involves submitting the proposed project name, project leader information, project description, project roadmap, and selecting an appropriate open-source license for the project using the New Project Form on the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Donation Process:''' The Project Donation Process is used for a project that has an existing functional release, but is not currently associated with OWASP. This process is the primary mechanism by which individuals or organizations can transfer the ownership of their project’s copyright to OWASP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Transition Process:''' The Project Transition Process is used to transition leadership of a project to a new project leader. This is a simple automated process to transfer the relevant accounts, mailing lists, and other project resources to the new project leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Abandonment Process:''' The Project Abandonment Process was put in place for those occasions in which a project leader is no longer able to manage their project, and has not been able to find a suitable replacement for the leader role. Project Abandonment can also occur when the project leader feels his/her project has become obsolete. Under these circumstances, the acting project leader is encourage do submit the Project Abandonment Form found in the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Graduation Process:''' The Incubator Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Projects at Conferences == &lt;br /&gt;
&lt;br /&gt;
*'''AppSec Conferences:''' OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Open Source Showcase:''' The Open Source Showcase is an OWASP AppSec Conference event module designed to give Open Source project leaders the opportunity to demo their projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Track:''' The OWASP Project Track is an OWASP AppSec Conference event module designed to give OWASP Project leaders the opportunity to showcase their projects as an official conference presenter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects General ==  &lt;br /&gt;
&lt;br /&gt;
*'''OWASP Code of Ethics:''' The OWASP Code of Ethics are the set of guidelines and principles that the OWASP Foundation expects all of its members and conference attendees to abide by. A copy of the Code of Ethics can be found here in the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#Code_of_Ethics OWASP About page]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sponsorships and Donations  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate to OWASP Global Projects ==&lt;br /&gt;
OWASP Projects, a global division of the OWASP Foundation, is run under the same world wide not-for-profit charitable status as all the foundation strategic groups. OWASP provides a platform for contributors to share their work while providing them with the project and community support they need throughout their project development. All OWASP Projects are run by volunteers and they rely on personal donations and sponsorship to continue their development. Donate to OWASP Projects, and we promise to spend your money wisely on open source initiatives.&lt;br /&gt;
&lt;br /&gt;
'''This is how your money can help:'''&lt;br /&gt;
&lt;br /&gt;
* $20 could help us spread the word on the importance of open source initiatives in the Application Security industry.&lt;br /&gt;
* $100 could help fund OWASP project demos at major conferences.&lt;br /&gt;
* $250 could help get our volunteer Project Leaders to speaking engagements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_Button.jpg | link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Contact US  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you need any help with anything projects related, or if you simply need some more information, please do not hesitate to [http://owasp4.owasp.org/contactus.html Contact Us].&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=193548</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=193548"/>
				<updated>2015-04-17T06:39:51Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Project Process Forms */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Welcome to the OWASP Global Projects Page ===&lt;br /&gt;
&lt;br /&gt;
An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. OWASP currently has over 142 active projects, and new project applications are submitted every week.  &lt;br /&gt;
&lt;br /&gt;
This is one of the most popular divisions of OWASP as it gives members an opportunity to freely test theories and ideas with the professional advice and support of the OWASP community. Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any project by visiting the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. A summary of recent project announcements is available on the [[OWASP Updates]] page. &lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:PROJECT_LEADER-HANDBOOK_2014.pdf|OWASP Project Handbook 2014]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_2014_Project_Handbook|OWASP Project Handbook Wiki 2014]]'''&lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:OWASP_Projects_Handbook_2013.pdf|OWASP Projects Handbook 2013]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[Project_Online_Resources|Project Online Resources]]'''&lt;br /&gt;
&lt;br /&gt;
=== Who Should Start an OWASP Project? ===&lt;br /&gt;
&lt;br /&gt;
*Application Developers. &lt;br /&gt;
*Software Architects. &lt;br /&gt;
* Information Security Authors.  &lt;br /&gt;
*Those who would like the support of a world wide professional community to develop or test an idea.&lt;br /&gt;
*Anyone wishing to take advantage of the professional body of knowledge OWASP has to offer.&lt;br /&gt;
&lt;br /&gt;
=== Contact Us===&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please do not hesitate to  [http://owasp4.owasp.org/contactus.html Contact Us] by using the form provided here. Please allow five working days for your question or comment to be answered. This is due to the large amount of queries the foundation staff receive every day. We thank you for your patience. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Project Inventory ===&lt;br /&gt;
&lt;br /&gt;
All OWASP tools, document, and code library projects are organized into the following [[OWASP_Project_Stages|categories:]] &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Flagship_Projects|Flagship Projects:]]''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Labs_Projects|Lab Projects:]]''' OWASP Labs projects represent projects that have produced an OWASP reviewed deliverable of value. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Incubator_Projects|Incubator Projects:]]''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.&lt;br /&gt;
&lt;br /&gt;
=== Social Media ===&lt;br /&gt;
&lt;br /&gt;
We recommend using the links below to find our official OWASP social media channels. These are a great way to keep in touch with the different initiatives going on at OWASP throughout the world. They are all updated regularly by chapter leaders, project leaders, the OWASP Board Members, and our OWASP Staff. If you have any questions or concerns about any of these accounts, please drop us a line using our [http://www.tfaforms.com/308703 &amp;quot;Contact Us&amp;quot;] form found above.  &lt;br /&gt;
&lt;br /&gt;
[[Image:Blogger-32x32.png|32px|link=http://owasp.blogspot.co.uk/]] [[Image:Twitter-32x32.png|32px|link=https://twitter.com/OWASP]] [[Image:Facebook-32x32.png|32px|link=https://www.facebook.com/groups/172892372831444/]] [[Image:Linkedin-32x32.png|32px|link=http://www.linkedin.com/groups/Global-OWASP-Foundation-36874]] [[Image:Google-32x32.png|32px|link=https://plus.google.com/u/0/communities/105181517914716500346?cfem=1]] [[Image:Ning-32x32.png|32px|link=http://myowasp.ning.com/]]&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 3px solid rgb(204, 204, 204); vertical-align: top; width: 95%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; |  &lt;br /&gt;
&amp;lt;div style=&amp;quot;padding:2em;padding-bottom:0px;&amp;quot;&amp;gt;&amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL; also 2 empty lines between images --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:New_initiatives.png|center|300px| link=http://owasp.force.com/volunteers/GW_Volunteers__VolunteersJobListing]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_here_banner.png|center|300px| link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project Inventory  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Project Dashboard lists the all project information at a glance, including release links, the current status of the project and project leader contact information. The Project Dashboard can be found here: https://www.owasp.org/index.php/OWASP_Project_Dashboard&lt;br /&gt;
&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
[[File:Flagship_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole.&lt;br /&gt;
After a major review process [[https://www.owasp.org/index.php/LAB_Projects_Code_Analysis_Report More info here]] the following projects are considered to be flagship candidate projects. These project will be evaluated more deeply to confirm their flagship status:&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy]]&lt;br /&gt;
* [[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment Project]]&lt;br /&gt;
* [[OWASP_OWTF|OWASP OWTF]]&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency Check]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed November 2014]====&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
* [[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard Project]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP System Vulnerable Code Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed February 2015] in progress====&lt;br /&gt;
* [[:Category:OWASP_Application_Security_Verification_Standard_Project|OWASP Application Security Verification Standard Project]]&lt;br /&gt;
* [[:Category:Software_Assurance_Maturity_Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[:Category:OWASP_Top_Ten_Project|OWASP Top Ten Project]]&lt;br /&gt;
* [[OWASP_Testing_Project|OWASP Testing Guide Project]]&lt;br /&gt;
&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
[[File:Lab banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to LAB projects showing a steady progress in their development, had very active and continuous releases and commits, regular update of information on their wiki page and have quite complete documentation. These projects are almost ready to become flagship&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed February 2015]====&lt;br /&gt;
* [[OWASP_Hackademic_Challenges_Project|OWASP Hackademic Challenges Project]]&lt;br /&gt;
* [[OWASP_Mantra_-_Security_Framework|OWASP Mantra Security Framework]]&lt;br /&gt;
* [[OWASP_O2_Platform|OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP_Dependency_Track_Project|OWASP Dependency Track Project]]&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
* [[O-Saft|O-Saft]]&lt;br /&gt;
* [[:Category:OWASP_EnDe|OWASP EnDe Project]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] &lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security Project]]&lt;br /&gt;
*[[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]]&lt;br /&gt;
&lt;br /&gt;
====Documentation [In Progress-Results by February/March 2015] ====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Podcast|OWASP Podcast Project]]&lt;br /&gt;
* [[:Category:OWASP_Code_Review_Project|OWASP Code Review Guide Project]]&lt;br /&gt;
* [[:Category:OWASP_Guide_Project|OWASP Development Guide Project]]&lt;br /&gt;
*[[OWASP_CISO_Survey|OWASP CISO Survey]] &lt;br /&gt;
*[[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]]&lt;br /&gt;
*[[OWASP_Cornucopia|OWASP Cornucopia]]&lt;br /&gt;
*[[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Contests====&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]] &lt;br /&gt;
* [[:Category:OWASP_CTF_Project|OWASP CTF Project]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed February 2015]====&lt;br /&gt;
* [[:Category:OWASP_Enterprise_Security_API|OWASP Enterprise Security API]]&lt;br /&gt;
&lt;br /&gt;
======Low Activity (LABS)[Reviewed February 2015] ======&lt;br /&gt;
[[File:low_activity.jpg]]&lt;br /&gt;
&lt;br /&gt;
These projects had no releases in at least a year, however have shown to be valuable tools&lt;br /&gt;
Code [Low Activity]&lt;br /&gt;
* [[Project_Information:template_Vicnum_Project|OWASP Vicnum Project]]&lt;br /&gt;
* [[OWASP_Broken_Web_Applications_Project|OWASP Broken Web Applications Project]]&lt;br /&gt;
&lt;br /&gt;
Documentation [Low Activity]&lt;br /&gt;
* [[OWASP_Appsec_Tutorial_Series|OWASP AppSec Tutorial Series]]&lt;br /&gt;
* [[:Category:OWASP_Legal_Project|OWASP Legal Project]]&lt;br /&gt;
* [[Virtual_Patching_Best_Practices|Virtual Patching Best Practices]]&lt;br /&gt;
* [[OWASP_Codes_of_Conduct|OWASP Codes of Conduct]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
[[File:Incubator_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to incubator projects showing a steady progress in their development, had continuous releases and commits or have delivered a complete product, including open source repository location, basic user guidelines and documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed March 2015]====&lt;br /&gt;
* [[OWASP_Java_Encoder_Project|OWASP Java Encoder Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Java_File_I_O_Security_Project|OWASP Java File I/O Security Project]]&lt;br /&gt;
* [[OWASP_PHPRBAC_Project|OWASP PHPRBAC Project]] &lt;br /&gt;
* [[OWASP_iMAS_iOS_Mobile_Application_Security_Project|OWASP iMAS - iOS Mobile Application Security Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_PHP_Security_Project|OWASP PHP Security Project]] [[File:Thumbsup.png|15px]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Node_js_Goat_Project|OWASP Node.js Goat Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_System_Vulnerable_Code_Project|OWASP System Vulnerable Code Project]]&lt;br /&gt;
* [[OWASP_ISO_IEC_27034_Application_Security_Controls_Project|OWASP ISO/IEC 27034 Application Security Controls Project]]&lt;br /&gt;
* [[OWASP_Hardened_Phalcon_Project|OWASP Hardened Phalcon Project]]&lt;br /&gt;
* [[OWASP_Faux_Bank_Project|OWASP Faux Bank Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Security_Research_and_Development_Framework|OWASP Security Research and Development Framework]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_File_Format_Validation_Project|OWASP File Format Validation Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
*[[OWASP_Security_Logging_Project|OWASP Security Logging Project]]&lt;br /&gt;
*[[OWASP_Droid10_Project|OWASP Droid]]&lt;br /&gt;
&lt;br /&gt;
====Tools [Review in progress-April 2015]====&lt;br /&gt;
*[[Benchmark|OWASP WebGoat Benchmark]]&lt;br /&gt;
*[[OWASP_WAP-Web_Application_Protection|WAP Web Application_Protection]]&lt;br /&gt;
*[[OWASP_Java_HTML_Sanitizer|OWASP Java HTML Sanitizer Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Security_Shepherd|OWASP Security Shepherd]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Mantra_OS|OWASP Mantra OS]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_iGoat_Project|OWASP iGoat Project]]&lt;br /&gt;
*[[OWASP_Bricks|OWASP Bricks]]&lt;br /&gt;
*[[OWASP_Bywaf_Project|OWASP Bywaf Project]]&lt;br /&gt;
*[[OWASP_Mutillidae_2_Project|OWASP Mutillidae 2 Project]] &lt;br /&gt;
*[[OWASP_SeraphimDroid_Project|OWASP SeraphimDroid Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Python_Security_Project|OWASP Python Security Project]]&lt;br /&gt;
*[[OWASP_WebSpa_Project|OWASP WebSpa Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_NINJA_PingU_Project|OWASP NINJA PingU Project]]&lt;br /&gt;
*[[OWASP_Encoder_Comparison_Reference_Project|OWASP Encoder Comparison Reference Project]]&lt;br /&gt;
*[[:Category:OWASP_SQLiX_Project|OWASP sqliX Project]]&lt;br /&gt;
*[[OWASP_Click_Me_Project|OWASP Click Me Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Secure_TDD_Project|OWASP Secure TDD Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_XSecurity_Project|OWASP XSecurity Project]]&lt;br /&gt;
*[[OWASP_Pyttacker_Project|OWASP Pyttacker Project]]&lt;br /&gt;
*[[OWASP_Code_Pulse_Project|OWASP Code Pulse Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_HTTP_Post_Tool|OWASP HTTP POST Tool]]&lt;br /&gt;
*[[OWASP_PHP_Security_Training_Project|OWASP PHP Security Training Project]]&lt;br /&gt;
*[[Projects/OWASP_iOSForensic|OWASP iOSForensic]]&lt;br /&gt;
*[[OWASP_Project_Metrics|OWASP Project Metrics]]&lt;br /&gt;
*[[OWASP_Store_Sheep_Project|OWASP Store Sheep Project]]&lt;br /&gt;
*[[OWASP_SonarQube_Project|OWASP SonarQube Project]]&lt;br /&gt;
*[[OWASP Rainbow Maker Project | OWASP Rainbow Maker Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP JSEC CVE Details | OWASP JSEC CVE Details]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_WebGoat.NET|OWASP WebGoat.NET]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASIDE_Project|OWASP ASIDE Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASVS_Assessment_tool | OWASP Assesment Tool]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Review: March 2015-In progress]====&lt;br /&gt;
*[[OWASP Automated Threats to Web Applications]]&lt;br /&gt;
*[[OWASP_Data_Exchange_Format_Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
*[[OWASP_Proactive_Controls|OWASP Proactive Controls]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Enterprise_Application_Security_Project|OWASP Enterprise Application Security Project]]&lt;br /&gt;
*[[Projects/OWASP_GoatDroid_Project|OWASP GoatDroid Project]]&lt;br /&gt;
*[[OWASP_RFP-Criteria|OWASP Request For Proposal]]&lt;br /&gt;
*[[OWASP_Hacking_Lab|OWASP Hacking-Lab]]&lt;br /&gt;
*[[WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project|WASC/OWASP Web Application Firewall Evaluation Criteria (WAFEC)]]&lt;br /&gt;
*[[OWASP_Secure_Application_Design_Project|OWASP Secure Application Design Project]]&lt;br /&gt;
*[[OWASP_Top_10_Fuer_Entwickler_Project|OWASP Top 10 Fuer Entwickler Project]]&lt;br /&gt;
*[[OWASP_Security_Principles_Project|OWASP Security Principles Project]]&lt;br /&gt;
*[[OWASP_Media_Project|OWASP Media Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Global_Chapter_Meetings_Project|OWASP Global Chapter Meetings Project]]&lt;br /&gt;
*[[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
*[[OWASP_Insecure_Web_Components_Project|OWASP Insecure Web Components Project]]&lt;br /&gt;
*[[OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project|OWASP Reverse Engineering and Code Modification Prevention Project]]&lt;br /&gt;
*[[OWASP_Student_Chapters_Program|OWASP Student Chapters Project]]&lt;br /&gt;
*[[:Category:OWASP_Education_Project|OWASP Education Project]]&lt;br /&gt;
*[[:Category:OWASP_Speakers_Project|OWASP Speakers Project]]&lt;br /&gt;
*[[OWASP_Internet_of_Things_Top_Ten_Project|OWASP Internet of Things Top Ten Project]]&lt;br /&gt;
*[[:Category:OWASP_.NET_Project|OWASP .NET Project]]&lt;br /&gt;
*[[OWASP_Open_Cyber_Security_Framework_Project|OWASP Open Cyber Security Framework Project]]&lt;br /&gt;
*[[OWASP_Top_10_Privacy_Risks_Project|OWASP Top 10 Privacy Risks Project]]&lt;br /&gt;
*[[OWASP_WASC_Web_Hacking_Incidents_Database_Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
*[[OWASP_Security_Frameworks_Project|OWASP Security Frameworks Project]]&lt;br /&gt;
*[[OWASP_Incident_Response_Project|OWASP Incident Response Project]]&lt;br /&gt;
*[[OWASP_Embedded_Application_Security|OWASP Embedded Application Security]]&lt;br /&gt;
*[[OWASP_STING_Game_Project|OWASP STING Game Project]]&lt;br /&gt;
*[[Projects/OWASP_Ruby_on_Rails_and_friends_Security_Guide|OWASP Ruby on Rails and Friends Security Guide]]&lt;br /&gt;
*[[OWASP_Secure_Development_Training|OWASP Secure Development Training]]&lt;br /&gt;
*[[OWASP_Periodic_Table_of_Vulnerabilities|OWASP Periodic Table of Vulnerabilities]]&lt;br /&gt;
*[[OWASP_Top_Trumps_for_Projects|OWASP Top Trumps for Projects]]&lt;br /&gt;
*[[OWASP_Supporting_Legacy_Web_Applications_in_the_Current_Environment_Project|OWASP Supporting Legacy Web Applications in the Current Environment Project]]&lt;br /&gt;
*[[OWASP KALP Mobile Project | OWASP KALP Mobile Project]]&lt;br /&gt;
*[[OWASP Persian Translation Project | OWASP Persian Translation Project]]&lt;br /&gt;
*[[OWASP_Security_Controls_in_Web_Application_Development_Lifecycle |OWASP Security Controls in Web Application Development Lifecycle Project]]&lt;br /&gt;
*[[OWASP_Application_Security_Program_Quick_Start_Guide_Project|OWASP_Application_Security_Program_Quick_Start_Guide_Project]]&lt;br /&gt;
*[[OWASP_Secure_Configuration_Guide|OWASP_Secure_Configuration_Guide]]&lt;br /&gt;
*[[OWASP_Product_Requirement_Recommendations_Library|OWASP_Product_Requirement_Recommendations_Library]]&lt;br /&gt;
*[[OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project|OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project]]&lt;br /&gt;
*[[OWASP_Knowledge_Graph|OWASP_Knowledge_Graph]]&lt;br /&gt;
&lt;br /&gt;
====Educational Project====&lt;br /&gt;
*[[OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project#tab=Main | OWASP Visual Crime Scene and Security Incident Project]]&lt;br /&gt;
&lt;br /&gt;
==Donated Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Donated Projects are inactive projects that have been donated to the OWASP Projects Infrastructure. &lt;br /&gt;
&lt;br /&gt;
====Tools====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Excess_XSS_Project|OWASP Excess XSS Project]]&lt;br /&gt;
* [[OWASP_JOTP_Project|OWASP jOTP Project]]&lt;br /&gt;
&lt;br /&gt;
==OWASP Archived Projects==&lt;br /&gt;
OWASP Archived Projects are projects that have developed outside OWASP umbrella or have become inactive. If you are interested in pursuing any of the inactive projects (click hyperlink for list), please contact us and let us know of your interest.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project_Archived_Projects&lt;br /&gt;
&lt;br /&gt;
= Project Task Force =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OWASP Project Task Force====&lt;br /&gt;
&lt;br /&gt;
{{:Task_Force/OWASP_Projects}}&lt;br /&gt;
&lt;br /&gt;
= Online Resources =&lt;br /&gt;
&lt;br /&gt;
===Project Online Resources===&lt;br /&gt;
&lt;br /&gt;
{{:Project_Online_Resources}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Starting a New Project  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== So you want to start a project... ==&lt;br /&gt;
&lt;br /&gt;
Starting an OWASP project is quite easy, and your desire to contribute and make it happen is essential.&lt;br /&gt;
[[File:HowToStartProjectoWasp.png | 600px | right]]&lt;br /&gt;
&lt;br /&gt;
Here are some of the guidelines for running a successful OWASP project:&lt;br /&gt;
&lt;br /&gt;
-Start exploring the actual OWASP projects Inventory. Many projects handle specific areas of security it is a good idea to start looking how other successful projects do this (LABS/Flagship)&lt;br /&gt;
&lt;br /&gt;
-Place your idea or project on the [https://www.owasp.org/index.php/Project_Ideas_Board#From_Idea_to_Project_Incubator Project Ideas Board].This phase will help you to define the project goals and also explore and exchange with other OWASP leaders and volunteers how to develop the idea into a tangible project&lt;br /&gt;
&lt;br /&gt;
-Explore and research if your idea covers a unique segment in the Security arena.Think of your project as a product, if you really want people using it, think how this project will cover a necessity in the security area you are working on &lt;br /&gt;
&lt;br /&gt;
-Define what kind of project you would like to start. Is it a code, tool or documentation?&lt;br /&gt;
&lt;br /&gt;
-Communicate through the Project leader mailing list about your idea and get feedback and  meet potential contributors&lt;br /&gt;
&lt;br /&gt;
-Develop your project based on the type of project. For example if you are willing to start a documentation project, begin by defining a Table of Content and work it through with potential contributors. First of all begin by creating a Road-map for your project. This is essential to submit your project. We highly recommend to read  documentation such as &amp;quot;[http://www2.econ.iastate.edu/tesfatsi/ProducingOSS.KarlFogel2005.pdf How to start /run a successful Open Source Projects]&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 500px | left]]&lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Road-map===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Start defining a development, documentation and marketing plan for your project. Set short , medium and long term plans. Include promotion of your project, this is very important in order to engage users and consumers of your project. Contact project coordinator and the Project Task Force to help you achieve this goal. You ''can'' run a single person project, but it's usually best to get the community involved.  You should be prepared to support a mailing list, build a team, speak at conferences, and promote your project.&lt;br /&gt;
&lt;br /&gt;
* You can contribute existing documents or tools to OWASP! Assuming you have the intellectual property rights to a work, you can open it to the world as an OWASP Project.  Please coordinate this with OWASP by contacting owasp(at)owasp.org.&lt;br /&gt;
&lt;br /&gt;
* Available Grants to consider if you need funding - [[Grants|Click Here]]&lt;br /&gt;
&lt;br /&gt;
* You should promote your project through the OWASP channels as well as by outside means.  Get people to blog about it!&lt;br /&gt;
&lt;br /&gt;
== Creating a new project ==&lt;br /&gt;
Once you have passed the Project Ideas phase, then you will be ready to start a new project&lt;br /&gt;
To Submit your project please use the following form&lt;br /&gt;
. [http://www.tfaforms.com/263506 Please submit a new project application here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* You will need to gather the following information together for your application:&lt;br /&gt;
A - PROJECT&lt;br /&gt;
# Project Name,&lt;br /&gt;
# Project purpose / overview,&lt;br /&gt;
# Project Roadmap,&lt;br /&gt;
# Project links (if any) to external sites,&lt;br /&gt;
# [[Guidelines_for_OWASP_Projects#Project_Licensing|Project License],]&lt;br /&gt;
# Project Leader name,&lt;br /&gt;
# Project Leader email address,&lt;br /&gt;
# Project Leader wiki account - the username (you'll need this to edit the wiki),&lt;br /&gt;
# Project Contributor(s) (if any) - name email and wiki account (if any),&lt;br /&gt;
# Project Main Links (if any).&lt;br /&gt;
# For Documentation: A table of Contents&lt;br /&gt;
# For Code: A prototype hosted in an open source repository of your choice. Make sure it has read access.&lt;br /&gt;
&lt;br /&gt;
* Check out the '''[[Guidelines for OWASP Projects]]'''.&lt;br /&gt;
* [[Grant_Spending_Policy|Grant Spending Policy]]&lt;br /&gt;
* [[Project_Spending_Policy|Project Spending Policy]]&lt;br /&gt;
* [[Project_Sponsorship_Operational_Guidelines|Project Sponsorship Operational Guidelines]]&lt;br /&gt;
&lt;br /&gt;
==OWASP	Recommended Licenses==&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Funding your Project==&lt;br /&gt;
An OWASP project does not receive any funding for development at project inception; however, a new project does have the opportunity to submit a request to receive funds if they are available for the year. Additionally, project leaders have the option of seeking sponsorship from outside organizations, but project leaders are required to seek funding through their own initiative. Please contact the OWASP Projects Manager for more information. &lt;br /&gt;
&lt;br /&gt;
== Project Release ==&lt;br /&gt;
&lt;br /&gt;
As your project reaches a point that you'd like OWASP to assist in its promotion, the will need the following information to help spread the word about your project:&lt;br /&gt;
&lt;br /&gt;
# Short 5 sentence paragraph outlining what your project is about, what you hope to accomplish with your project, what value your project brings to software security, and contributor and project leader names and contact information.&lt;br /&gt;
# Link to your wiki page.&lt;br /&gt;
# Link to your code repository or a link to where readers can download your project.&lt;br /&gt;
# Latest Release description answering the following questions: What is it?, What does it do?, Where can I get it?, Who should I contact if something goes wrong?.&lt;br /&gt;
&lt;br /&gt;
==Project Process Forms==&lt;br /&gt;
These forms were created to help project leaders, and those interested in a going through a process in the OWASP projects infrastructure. They facilitate the management of each query based on the specific task an applicant will need help with. The forms are described below, and they are linked with their designated online application form. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264422 Project Transition Application]:The OWASP project transition form gives current project leaders an easy way of handing over project administration information to individuals wishing to take over a project.  &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264413 Project Review Application]:This form is for current project leaders to request a review of their project based on OWASP graduation criteria. The aim is to designate an OWASP volunteer to review these projects within 3 months time. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264418 Project Donation Application]:This form is for projects outside of the OWASP project infrastructure. Project Leaders for these open source projects can choose to partner or give their project to OWASP directly through this form.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264428 Project Adoption Request]:This form is used when someone is interested in adopting an archived project. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264426 Project Abandonment Request]:The OWASP project abandonment form gives current project leaders an easy way of letting the OWASP Foundation know that they wish to resign their project leader duties. This form should be used when no replacement project leader exists to take over these duties.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264392 Incubator Project Graduation Application]:This application form is for Incubator Projects to apply for Labs Project status.&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project Project Request (Bangladesh)]:For Information Security Project contact with OWASP Bangladesh Project Leader[[S. M. Shezan]][http://www.facebook.com/smshezan]&lt;br /&gt;
&lt;br /&gt;
= Project Assessments  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==OWASP Project Lifecycle==&lt;br /&gt;
The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state. The greater the maturity of the project, the greater the level of responsibility for the project leader. These responsibilities are not trivial as OWASP provides incentives and benefits (Section 7) for projects who take on these added responsibilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====The OWASP Project Lifecycle is broken down into the following stages:====&lt;br /&gt;
&lt;br /&gt;
'''Incubator Projects''': OWASP Incubator projects represent the experimental playground where projects are still being designed, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity; moreover, the label allows project leaders to leverage the OWASP name while their project is still maturing. OWASP Incubator projects are given a place on the OWASP Projects Portal to leverage the organizations' infrastructure, and establish their presence and project history.&lt;br /&gt;
&lt;br /&gt;
'''Lab Projects''': OWASP Labs projects represent projects that have produced a deliverable of significant value. Leaders of OWASP Labs projects are expected to stand behind the quality of their projects as these projects have matured to the point where they are accepted by a significant portion of the OWASP community. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are ready for mainstream usage. OWASP Labs Projects are meant to be the collection of established projects that have gained community support and acclaim by undergoing the project review process. &lt;br /&gt;
&lt;br /&gt;
'''Flagship Projects''': The OWASP Flagship designation is given to projects that have demonstrated superior maturity, established quality, and strategic value to OWASP and application security as a whole. Eligible projects are selected from the OWASP Labs project pool. This selection process generally ensures that there is only one project of each type covering any particular security space. OWASP Flagship projects represent projects that are not only mature, but are also projects that OWASP as an organization provides direct support to maintaining. The core mission of OWASP is to make application security visible and so as an organization, OWASP has a vested interest in the success of its Flagship projects. Since Flagship projects have such high visibility, these projects are expected to uphold the most stringent requirements of all OWASP Projects.&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Stage Benefits==&lt;br /&gt;
This section outlines the benefits of starting an OWASP project, and the benefits of being at each different stage in the projects lifecycle. In my short time here at OWASP as the PM, I have had several potential project leaders ask me what the benefits are of starting their project with OWASP. Below is my proposal for each Stage’s benefits.&lt;br /&gt;
&lt;br /&gt;
'''Incubator'''&lt;br /&gt;
* Financial Donation Management Assistance &lt;br /&gt;
* Project Review Support&lt;br /&gt;
* WASPY Awards Nominations&lt;br /&gt;
* OWASP OSS and OPT Participation&lt;br /&gt;
* Opportunity to submit proposal: $500 for Development.&lt;br /&gt;
* Community Engagement and Support&lt;br /&gt;
* Recognition and visibility of being associated with the OWASP Brand.&lt;br /&gt;
&lt;br /&gt;
'''Labs'''&lt;br /&gt;
* All benefits given to Incubator Projects &lt;br /&gt;
* Technical Writing Support&lt;br /&gt;
* Graphic Design Support&lt;br /&gt;
* Project Promotion Support&lt;br /&gt;
* OWASP OSS and OPT: Preference&lt;br /&gt;
&lt;br /&gt;
'''Flagship'''&lt;br /&gt;
* All benefits given to Incubator &amp;amp; Labs Projects&lt;br /&gt;
* Grant finding and proposal writing help&lt;br /&gt;
* Yearly marketing plan development&lt;br /&gt;
* OWASP OSS and OPT participation preference&lt;br /&gt;
&lt;br /&gt;
For more detailed information on OWASP Project Stage Benefits, please see the 2013 Project Handbook.&lt;br /&gt;
&lt;br /&gt;
== Project Monitoring Incubator/Documentation ==&lt;br /&gt;
Every 6 months, a project monitoring assessment takes place to evaluate if projects had any releases during this period.A warning will be sent to projects without any activity in 90 days and after 180 days, the project will be set automatically as inactive.&lt;br /&gt;
You can set your project active at any time, as long as:&lt;br /&gt;
* There has been commits to the project's open repository or&lt;br /&gt;
* There has been a beta release of the documentation produced so far or&lt;br /&gt;
* Provide a detailed Roadmap &lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Roadmap===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 600px]]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project Monitoring for LABS/Flagship==&lt;br /&gt;
These project represent the best OWASP has to offer, therefore monitoring of these projects is closely supervised.&lt;br /&gt;
===For Code and Tools===&lt;br /&gt;
For projects holding Flagship status, we closely monitor their health every 6 months on the following, among other key indicators:&lt;br /&gt;
*Can the project be built correctly?&lt;br /&gt;
*Does the project has any activity(commits) in the last 6 months?&lt;br /&gt;
*Does the project had any releases in the last 6 months?&lt;br /&gt;
*Has the project leaders updated his wiki or website to reflect latest releases?&lt;br /&gt;
===For Documentation===&lt;br /&gt;
For this part, we are working on the development of an adequate assessment criteria&lt;br /&gt;
The following is a draft of the new process proposal: [[https://www.owasp.org/index.php/File:Qualitative_and_Quantitative_Content_Audit.pdf Proposal for Reviewing OWASP Document projects]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Graduation==&lt;br /&gt;
The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
The review centers around the following core questions. Each core question has three (3) specific questions made up of binary queries. A project must receive at least two (2) positive responses from each reviewer in two of the binary questions, to warrant a postive response for the core question. Each core question must receive a positive response from both project reviewers to pass the Project Health Assessment for Incubator Projects. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Graduation Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Health Assessment==&lt;br /&gt;
The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation for projects going from Incubator to LAB and from LAB to Flagship. The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Health Assessment Criteria Document]. If a project passes the assessment, it then becomes eligible to graduate into the OWASP Labs Project stage. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Deliverable/Release Assessment==&lt;br /&gt;
The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to  review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception. &lt;br /&gt;
&lt;br /&gt;
Reviews must be performed by two (2) OWASP Chapter or Project Leaders, and their review must answer affirmatively to at least the first two (2) core Project Deliverable/Release Review questions. A project must pass the OWASP Project Deliverable/Release Assessment in order to graduate into the OWASP Labs Project stage. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Deliverable/Release Assessment Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Brand Resources  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The Brand Usage Rules==&lt;br /&gt;
See OWASP's [[Marketing/Resources#tab=BRAND_GUIDELINES|The Brand Usage Rules]] for details.&lt;br /&gt;
&lt;br /&gt;
==Project Icons &amp;amp; Templates==&lt;br /&gt;
See OWASP'S [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
(Following links and images are provided for a quick overview only, the primary page is [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]]).&lt;br /&gt;
&lt;br /&gt;
If you require more assistance with these files and/or templates, please contact the OWASP staff for assistance &lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Operations_Project_Template|OWASP Operational Wiki Template]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Documentation_Project_Template|OWASP Example Template: DO NOT EDIT]]'''&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_Project_Header.jpg|Owasp logo|500px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_TOOL.jpg|Owasp logo|200px]] [[Image:Project_Type_Files_DOC.jpg||Owasp logo 1c|200px]]  &lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_CODE.jpg|Owasp logo|200px]] [[Image:Owasp-defenders-small.png|Owasp logo|100px]] [[Image:Owasp-builders-small.png|Owasp logo|100px]] [[Image:Owasp-breakers-small.png|Owasp logo|100px]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-incubator-trans-200.png|Owasp logo rev icon|100px]] [[Image:Owasp-labs-trans-85.png|Owasp logo flat|100px]] [[Image:Owasp-flagship-trans-85.png|Owasp logo icon|100px]]&lt;br /&gt;
&lt;br /&gt;
===OpenSAMM===&lt;br /&gt;
'''[[Media:OpenSAMM_icons.zip|OpenSAMM Icons]]'''&lt;br /&gt;
&lt;br /&gt;
'''Construction:'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Construction black.png| Construction black| 100px]]  [[Image:Construction blue.png| Construction blue| 100px]]  [[image:Construction olive.png |construction olive|100px]]&lt;br /&gt;
&lt;br /&gt;
'''Deployment:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Deployment black.png| Deployment black| 100px]]  [[image:Deployment blue.png| Deployment blue| 100px]]  [[image:Deployment olive.png | Deployment olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Governance:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Governance black.png| governance black| 100px]]  [[image:Governance blue.png | governance blue | 100px]]  [[image:Governance olive.png | governance olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Verification:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Verification black.png | Verification black | 100px]]  [[image:Verification blue.png | verification blue | 100px]]  [[image: Verification olive.png | Verification olive | 100px]]&lt;br /&gt;
&lt;br /&gt;
==Book Cover Files==&lt;br /&gt;
See OWASP's [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
[[Media:Lulu-guide.pdf|Lulu Guide]]&lt;br /&gt;
&lt;br /&gt;
'''[https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip Download the Book Cover Zip File]'''&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;300&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:BookImage_01.jpg‎|500px| link=https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Terminology =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== OWASP Project Infrastructure ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Lifecycle:''' The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Project:''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway. The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Labs Project:''' OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Flagship Project:''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Benefits:''' The standard list of resources and incentives made available to project leaders based on their project's current maturity level. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Reviews ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviews:''' Project reviews are the method OWASP uses to establish a minimal baseline of project characteristics and release quality. Reviews are not mandatory, but they are necessary if a project leader wishes to graduate to the next level of maturity within the OWASP Global Projects infrastructure. Projects can be reviewed when an Incubator project wishes to graduate into the OWASP Labs designation, and project releases can be reviewed if they want the quality of their deliverable to be vouched for by OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviewer Pool:''' The project reviewer pool is made up of veteran reviewers who have proven themselves dedicated to executing quality reviews of projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Graduation:''' The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Health Assessment:''' The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE#gid=1 Project Health Assessment Criteria Document].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Release:''' A project release refers to the final deliverable a project produces. It is the final product of the project. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Deliverable/Release Review:''' The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects Processes == &lt;br /&gt;
&lt;br /&gt;
*'''Project Processes:''' The set of streamlined processes that exist to help projects move smoothly through the OWASP Project Lifecycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Inception Process:''' The Project Inception Process is how a brand new idea becomes an OWASP Project. Such projects are labeled as OWASP Incubator projects. The process involves submitting the proposed project name, project leader information, project description, project roadmap, and selecting an appropriate open-source license for the project using the New Project Form on the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Donation Process:''' The Project Donation Process is used for a project that has an existing functional release, but is not currently associated with OWASP. This process is the primary mechanism by which individuals or organizations can transfer the ownership of their project’s copyright to OWASP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Transition Process:''' The Project Transition Process is used to transition leadership of a project to a new project leader. This is a simple automated process to transfer the relevant accounts, mailing lists, and other project resources to the new project leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Abandonment Process:''' The Project Abandonment Process was put in place for those occasions in which a project leader is no longer able to manage their project, and has not been able to find a suitable replacement for the leader role. Project Abandonment can also occur when the project leader feels his/her project has become obsolete. Under these circumstances, the acting project leader is encourage do submit the Project Abandonment Form found in the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Graduation Process:''' The Incubator Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Projects at Conferences == &lt;br /&gt;
&lt;br /&gt;
*'''AppSec Conferences:''' OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Open Source Showcase:''' The Open Source Showcase is an OWASP AppSec Conference event module designed to give Open Source project leaders the opportunity to demo their projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Track:''' The OWASP Project Track is an OWASP AppSec Conference event module designed to give OWASP Project leaders the opportunity to showcase their projects as an official conference presenter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects General ==  &lt;br /&gt;
&lt;br /&gt;
*'''OWASP Code of Ethics:''' The OWASP Code of Ethics are the set of guidelines and principles that the OWASP Foundation expects all of its members and conference attendees to abide by. A copy of the Code of Ethics can be found here in the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#Code_of_Ethics OWASP About page]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sponsorships and Donations  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate to OWASP Global Projects ==&lt;br /&gt;
OWASP Projects, a global division of the OWASP Foundation, is run under the same world wide not-for-profit charitable status as all the foundation strategic groups. OWASP provides a platform for contributors to share their work while providing them with the project and community support they need throughout their project development. All OWASP Projects are run by volunteers and they rely on personal donations and sponsorship to continue their development. Donate to OWASP Projects, and we promise to spend your money wisely on open source initiatives.&lt;br /&gt;
&lt;br /&gt;
'''This is how your money can help:'''&lt;br /&gt;
&lt;br /&gt;
* $20 could help us spread the word on the importance of open source initiatives in the Application Security industry.&lt;br /&gt;
* $100 could help fund OWASP project demos at major conferences.&lt;br /&gt;
* $250 could help get our volunteer Project Leaders to speaking engagements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_Button.jpg | link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Contact US  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you need any help with anything projects related, or if you simply need some more information, please do not hesitate to [http://owasp4.owasp.org/contactus.html Contact Us].&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=193547</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=193547"/>
				<updated>2015-04-17T06:38:11Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Project Process Forms */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Welcome to the OWASP Global Projects Page ===&lt;br /&gt;
&lt;br /&gt;
An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. OWASP currently has over 142 active projects, and new project applications are submitted every week.  &lt;br /&gt;
&lt;br /&gt;
This is one of the most popular divisions of OWASP as it gives members an opportunity to freely test theories and ideas with the professional advice and support of the OWASP community. Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any project by visiting the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. A summary of recent project announcements is available on the [[OWASP Updates]] page. &lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:PROJECT_LEADER-HANDBOOK_2014.pdf|OWASP Project Handbook 2014]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_2014_Project_Handbook|OWASP Project Handbook Wiki 2014]]'''&lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:OWASP_Projects_Handbook_2013.pdf|OWASP Projects Handbook 2013]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[Project_Online_Resources|Project Online Resources]]'''&lt;br /&gt;
&lt;br /&gt;
=== Who Should Start an OWASP Project? ===&lt;br /&gt;
&lt;br /&gt;
*Application Developers. &lt;br /&gt;
*Software Architects. &lt;br /&gt;
* Information Security Authors.  &lt;br /&gt;
*Those who would like the support of a world wide professional community to develop or test an idea.&lt;br /&gt;
*Anyone wishing to take advantage of the professional body of knowledge OWASP has to offer.&lt;br /&gt;
&lt;br /&gt;
=== Contact Us===&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please do not hesitate to  [http://owasp4.owasp.org/contactus.html Contact Us] by using the form provided here. Please allow five working days for your question or comment to be answered. This is due to the large amount of queries the foundation staff receive every day. We thank you for your patience. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Project Inventory ===&lt;br /&gt;
&lt;br /&gt;
All OWASP tools, document, and code library projects are organized into the following [[OWASP_Project_Stages|categories:]] &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Flagship_Projects|Flagship Projects:]]''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Labs_Projects|Lab Projects:]]''' OWASP Labs projects represent projects that have produced an OWASP reviewed deliverable of value. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Incubator_Projects|Incubator Projects:]]''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.&lt;br /&gt;
&lt;br /&gt;
=== Social Media ===&lt;br /&gt;
&lt;br /&gt;
We recommend using the links below to find our official OWASP social media channels. These are a great way to keep in touch with the different initiatives going on at OWASP throughout the world. They are all updated regularly by chapter leaders, project leaders, the OWASP Board Members, and our OWASP Staff. If you have any questions or concerns about any of these accounts, please drop us a line using our [http://www.tfaforms.com/308703 &amp;quot;Contact Us&amp;quot;] form found above.  &lt;br /&gt;
&lt;br /&gt;
[[Image:Blogger-32x32.png|32px|link=http://owasp.blogspot.co.uk/]] [[Image:Twitter-32x32.png|32px|link=https://twitter.com/OWASP]] [[Image:Facebook-32x32.png|32px|link=https://www.facebook.com/groups/172892372831444/]] [[Image:Linkedin-32x32.png|32px|link=http://www.linkedin.com/groups/Global-OWASP-Foundation-36874]] [[Image:Google-32x32.png|32px|link=https://plus.google.com/u/0/communities/105181517914716500346?cfem=1]] [[Image:Ning-32x32.png|32px|link=http://myowasp.ning.com/]]&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 3px solid rgb(204, 204, 204); vertical-align: top; width: 95%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; |  &lt;br /&gt;
&amp;lt;div style=&amp;quot;padding:2em;padding-bottom:0px;&amp;quot;&amp;gt;&amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL; also 2 empty lines between images --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:New_initiatives.png|center|300px| link=http://owasp.force.com/volunteers/GW_Volunteers__VolunteersJobListing]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_here_banner.png|center|300px| link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project Inventory  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Project Dashboard lists the all project information at a glance, including release links, the current status of the project and project leader contact information. The Project Dashboard can be found here: https://www.owasp.org/index.php/OWASP_Project_Dashboard&lt;br /&gt;
&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
[[File:Flagship_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole.&lt;br /&gt;
After a major review process [[https://www.owasp.org/index.php/LAB_Projects_Code_Analysis_Report More info here]] the following projects are considered to be flagship candidate projects. These project will be evaluated more deeply to confirm their flagship status:&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy]]&lt;br /&gt;
* [[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment Project]]&lt;br /&gt;
* [[OWASP_OWTF|OWASP OWTF]]&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency Check]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed November 2014]====&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
* [[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard Project]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP System Vulnerable Code Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed February 2015] in progress====&lt;br /&gt;
* [[:Category:OWASP_Application_Security_Verification_Standard_Project|OWASP Application Security Verification Standard Project]]&lt;br /&gt;
* [[:Category:Software_Assurance_Maturity_Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[:Category:OWASP_Top_Ten_Project|OWASP Top Ten Project]]&lt;br /&gt;
* [[OWASP_Testing_Project|OWASP Testing Guide Project]]&lt;br /&gt;
&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
[[File:Lab banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to LAB projects showing a steady progress in their development, had very active and continuous releases and commits, regular update of information on their wiki page and have quite complete documentation. These projects are almost ready to become flagship&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed February 2015]====&lt;br /&gt;
* [[OWASP_Hackademic_Challenges_Project|OWASP Hackademic Challenges Project]]&lt;br /&gt;
* [[OWASP_Mantra_-_Security_Framework|OWASP Mantra Security Framework]]&lt;br /&gt;
* [[OWASP_O2_Platform|OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP_Dependency_Track_Project|OWASP Dependency Track Project]]&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
* [[O-Saft|O-Saft]]&lt;br /&gt;
* [[:Category:OWASP_EnDe|OWASP EnDe Project]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] &lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security Project]]&lt;br /&gt;
*[[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]]&lt;br /&gt;
&lt;br /&gt;
====Documentation [In Progress-Results by February/March 2015] ====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Podcast|OWASP Podcast Project]]&lt;br /&gt;
* [[:Category:OWASP_Code_Review_Project|OWASP Code Review Guide Project]]&lt;br /&gt;
* [[:Category:OWASP_Guide_Project|OWASP Development Guide Project]]&lt;br /&gt;
*[[OWASP_CISO_Survey|OWASP CISO Survey]] &lt;br /&gt;
*[[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]]&lt;br /&gt;
*[[OWASP_Cornucopia|OWASP Cornucopia]]&lt;br /&gt;
*[[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Contests====&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]] &lt;br /&gt;
* [[:Category:OWASP_CTF_Project|OWASP CTF Project]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed February 2015]====&lt;br /&gt;
* [[:Category:OWASP_Enterprise_Security_API|OWASP Enterprise Security API]]&lt;br /&gt;
&lt;br /&gt;
======Low Activity (LABS)[Reviewed February 2015] ======&lt;br /&gt;
[[File:low_activity.jpg]]&lt;br /&gt;
&lt;br /&gt;
These projects had no releases in at least a year, however have shown to be valuable tools&lt;br /&gt;
Code [Low Activity]&lt;br /&gt;
* [[Project_Information:template_Vicnum_Project|OWASP Vicnum Project]]&lt;br /&gt;
* [[OWASP_Broken_Web_Applications_Project|OWASP Broken Web Applications Project]]&lt;br /&gt;
&lt;br /&gt;
Documentation [Low Activity]&lt;br /&gt;
* [[OWASP_Appsec_Tutorial_Series|OWASP AppSec Tutorial Series]]&lt;br /&gt;
* [[:Category:OWASP_Legal_Project|OWASP Legal Project]]&lt;br /&gt;
* [[Virtual_Patching_Best_Practices|Virtual Patching Best Practices]]&lt;br /&gt;
* [[OWASP_Codes_of_Conduct|OWASP Codes of Conduct]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
[[File:Incubator_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to incubator projects showing a steady progress in their development, had continuous releases and commits or have delivered a complete product, including open source repository location, basic user guidelines and documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed March 2015]====&lt;br /&gt;
* [[OWASP_Java_Encoder_Project|OWASP Java Encoder Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Java_File_I_O_Security_Project|OWASP Java File I/O Security Project]]&lt;br /&gt;
* [[OWASP_PHPRBAC_Project|OWASP PHPRBAC Project]] &lt;br /&gt;
* [[OWASP_iMAS_iOS_Mobile_Application_Security_Project|OWASP iMAS - iOS Mobile Application Security Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_PHP_Security_Project|OWASP PHP Security Project]] [[File:Thumbsup.png|15px]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Node_js_Goat_Project|OWASP Node.js Goat Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_System_Vulnerable_Code_Project|OWASP System Vulnerable Code Project]]&lt;br /&gt;
* [[OWASP_ISO_IEC_27034_Application_Security_Controls_Project|OWASP ISO/IEC 27034 Application Security Controls Project]]&lt;br /&gt;
* [[OWASP_Hardened_Phalcon_Project|OWASP Hardened Phalcon Project]]&lt;br /&gt;
* [[OWASP_Faux_Bank_Project|OWASP Faux Bank Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Security_Research_and_Development_Framework|OWASP Security Research and Development Framework]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_File_Format_Validation_Project|OWASP File Format Validation Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
*[[OWASP_Security_Logging_Project|OWASP Security Logging Project]]&lt;br /&gt;
*[[OWASP_Droid10_Project|OWASP Droid]]&lt;br /&gt;
&lt;br /&gt;
====Tools [Review in progress-April 2015]====&lt;br /&gt;
*[[Benchmark|OWASP WebGoat Benchmark]]&lt;br /&gt;
*[[OWASP_WAP-Web_Application_Protection|WAP Web Application_Protection]]&lt;br /&gt;
*[[OWASP_Java_HTML_Sanitizer|OWASP Java HTML Sanitizer Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Security_Shepherd|OWASP Security Shepherd]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Mantra_OS|OWASP Mantra OS]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_iGoat_Project|OWASP iGoat Project]]&lt;br /&gt;
*[[OWASP_Bricks|OWASP Bricks]]&lt;br /&gt;
*[[OWASP_Bywaf_Project|OWASP Bywaf Project]]&lt;br /&gt;
*[[OWASP_Mutillidae_2_Project|OWASP Mutillidae 2 Project]] &lt;br /&gt;
*[[OWASP_SeraphimDroid_Project|OWASP SeraphimDroid Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Python_Security_Project|OWASP Python Security Project]]&lt;br /&gt;
*[[OWASP_WebSpa_Project|OWASP WebSpa Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_NINJA_PingU_Project|OWASP NINJA PingU Project]]&lt;br /&gt;
*[[OWASP_Encoder_Comparison_Reference_Project|OWASP Encoder Comparison Reference Project]]&lt;br /&gt;
*[[:Category:OWASP_SQLiX_Project|OWASP sqliX Project]]&lt;br /&gt;
*[[OWASP_Click_Me_Project|OWASP Click Me Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Secure_TDD_Project|OWASP Secure TDD Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_XSecurity_Project|OWASP XSecurity Project]]&lt;br /&gt;
*[[OWASP_Pyttacker_Project|OWASP Pyttacker Project]]&lt;br /&gt;
*[[OWASP_Code_Pulse_Project|OWASP Code Pulse Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_HTTP_Post_Tool|OWASP HTTP POST Tool]]&lt;br /&gt;
*[[OWASP_PHP_Security_Training_Project|OWASP PHP Security Training Project]]&lt;br /&gt;
*[[Projects/OWASP_iOSForensic|OWASP iOSForensic]]&lt;br /&gt;
*[[OWASP_Project_Metrics|OWASP Project Metrics]]&lt;br /&gt;
*[[OWASP_Store_Sheep_Project|OWASP Store Sheep Project]]&lt;br /&gt;
*[[OWASP_SonarQube_Project|OWASP SonarQube Project]]&lt;br /&gt;
*[[OWASP Rainbow Maker Project | OWASP Rainbow Maker Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP JSEC CVE Details | OWASP JSEC CVE Details]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_WebGoat.NET|OWASP WebGoat.NET]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASIDE_Project|OWASP ASIDE Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASVS_Assessment_tool | OWASP Assesment Tool]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Review: March 2015-In progress]====&lt;br /&gt;
*[[OWASP Automated Threats to Web Applications]]&lt;br /&gt;
*[[OWASP_Data_Exchange_Format_Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
*[[OWASP_Proactive_Controls|OWASP Proactive Controls]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Enterprise_Application_Security_Project|OWASP Enterprise Application Security Project]]&lt;br /&gt;
*[[Projects/OWASP_GoatDroid_Project|OWASP GoatDroid Project]]&lt;br /&gt;
*[[OWASP_RFP-Criteria|OWASP Request For Proposal]]&lt;br /&gt;
*[[OWASP_Hacking_Lab|OWASP Hacking-Lab]]&lt;br /&gt;
*[[WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project|WASC/OWASP Web Application Firewall Evaluation Criteria (WAFEC)]]&lt;br /&gt;
*[[OWASP_Secure_Application_Design_Project|OWASP Secure Application Design Project]]&lt;br /&gt;
*[[OWASP_Top_10_Fuer_Entwickler_Project|OWASP Top 10 Fuer Entwickler Project]]&lt;br /&gt;
*[[OWASP_Security_Principles_Project|OWASP Security Principles Project]]&lt;br /&gt;
*[[OWASP_Media_Project|OWASP Media Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Global_Chapter_Meetings_Project|OWASP Global Chapter Meetings Project]]&lt;br /&gt;
*[[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
*[[OWASP_Insecure_Web_Components_Project|OWASP Insecure Web Components Project]]&lt;br /&gt;
*[[OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project|OWASP Reverse Engineering and Code Modification Prevention Project]]&lt;br /&gt;
*[[OWASP_Student_Chapters_Program|OWASP Student Chapters Project]]&lt;br /&gt;
*[[:Category:OWASP_Education_Project|OWASP Education Project]]&lt;br /&gt;
*[[:Category:OWASP_Speakers_Project|OWASP Speakers Project]]&lt;br /&gt;
*[[OWASP_Internet_of_Things_Top_Ten_Project|OWASP Internet of Things Top Ten Project]]&lt;br /&gt;
*[[:Category:OWASP_.NET_Project|OWASP .NET Project]]&lt;br /&gt;
*[[OWASP_Open_Cyber_Security_Framework_Project|OWASP Open Cyber Security Framework Project]]&lt;br /&gt;
*[[OWASP_Top_10_Privacy_Risks_Project|OWASP Top 10 Privacy Risks Project]]&lt;br /&gt;
*[[OWASP_WASC_Web_Hacking_Incidents_Database_Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
*[[OWASP_Security_Frameworks_Project|OWASP Security Frameworks Project]]&lt;br /&gt;
*[[OWASP_Incident_Response_Project|OWASP Incident Response Project]]&lt;br /&gt;
*[[OWASP_Embedded_Application_Security|OWASP Embedded Application Security]]&lt;br /&gt;
*[[OWASP_STING_Game_Project|OWASP STING Game Project]]&lt;br /&gt;
*[[Projects/OWASP_Ruby_on_Rails_and_friends_Security_Guide|OWASP Ruby on Rails and Friends Security Guide]]&lt;br /&gt;
*[[OWASP_Secure_Development_Training|OWASP Secure Development Training]]&lt;br /&gt;
*[[OWASP_Periodic_Table_of_Vulnerabilities|OWASP Periodic Table of Vulnerabilities]]&lt;br /&gt;
*[[OWASP_Top_Trumps_for_Projects|OWASP Top Trumps for Projects]]&lt;br /&gt;
*[[OWASP_Supporting_Legacy_Web_Applications_in_the_Current_Environment_Project|OWASP Supporting Legacy Web Applications in the Current Environment Project]]&lt;br /&gt;
*[[OWASP KALP Mobile Project | OWASP KALP Mobile Project]]&lt;br /&gt;
*[[OWASP Persian Translation Project | OWASP Persian Translation Project]]&lt;br /&gt;
*[[OWASP_Security_Controls_in_Web_Application_Development_Lifecycle |OWASP Security Controls in Web Application Development Lifecycle Project]]&lt;br /&gt;
*[[OWASP_Application_Security_Program_Quick_Start_Guide_Project|OWASP_Application_Security_Program_Quick_Start_Guide_Project]]&lt;br /&gt;
*[[OWASP_Secure_Configuration_Guide|OWASP_Secure_Configuration_Guide]]&lt;br /&gt;
*[[OWASP_Product_Requirement_Recommendations_Library|OWASP_Product_Requirement_Recommendations_Library]]&lt;br /&gt;
*[[OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project|OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project]]&lt;br /&gt;
*[[OWASP_Knowledge_Graph|OWASP_Knowledge_Graph]]&lt;br /&gt;
&lt;br /&gt;
====Educational Project====&lt;br /&gt;
*[[OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project#tab=Main | OWASP Visual Crime Scene and Security Incident Project]]&lt;br /&gt;
&lt;br /&gt;
==Donated Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Donated Projects are inactive projects that have been donated to the OWASP Projects Infrastructure. &lt;br /&gt;
&lt;br /&gt;
====Tools====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Excess_XSS_Project|OWASP Excess XSS Project]]&lt;br /&gt;
* [[OWASP_JOTP_Project|OWASP jOTP Project]]&lt;br /&gt;
&lt;br /&gt;
==OWASP Archived Projects==&lt;br /&gt;
OWASP Archived Projects are projects that have developed outside OWASP umbrella or have become inactive. If you are interested in pursuing any of the inactive projects (click hyperlink for list), please contact us and let us know of your interest.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project_Archived_Projects&lt;br /&gt;
&lt;br /&gt;
= Project Task Force =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OWASP Project Task Force====&lt;br /&gt;
&lt;br /&gt;
{{:Task_Force/OWASP_Projects}}&lt;br /&gt;
&lt;br /&gt;
= Online Resources =&lt;br /&gt;
&lt;br /&gt;
===Project Online Resources===&lt;br /&gt;
&lt;br /&gt;
{{:Project_Online_Resources}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Starting a New Project  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== So you want to start a project... ==&lt;br /&gt;
&lt;br /&gt;
Starting an OWASP project is quite easy, and your desire to contribute and make it happen is essential.&lt;br /&gt;
[[File:HowToStartProjectoWasp.png | 600px | right]]&lt;br /&gt;
&lt;br /&gt;
Here are some of the guidelines for running a successful OWASP project:&lt;br /&gt;
&lt;br /&gt;
-Start exploring the actual OWASP projects Inventory. Many projects handle specific areas of security it is a good idea to start looking how other successful projects do this (LABS/Flagship)&lt;br /&gt;
&lt;br /&gt;
-Place your idea or project on the [https://www.owasp.org/index.php/Project_Ideas_Board#From_Idea_to_Project_Incubator Project Ideas Board].This phase will help you to define the project goals and also explore and exchange with other OWASP leaders and volunteers how to develop the idea into a tangible project&lt;br /&gt;
&lt;br /&gt;
-Explore and research if your idea covers a unique segment in the Security arena.Think of your project as a product, if you really want people using it, think how this project will cover a necessity in the security area you are working on &lt;br /&gt;
&lt;br /&gt;
-Define what kind of project you would like to start. Is it a code, tool or documentation?&lt;br /&gt;
&lt;br /&gt;
-Communicate through the Project leader mailing list about your idea and get feedback and  meet potential contributors&lt;br /&gt;
&lt;br /&gt;
-Develop your project based on the type of project. For example if you are willing to start a documentation project, begin by defining a Table of Content and work it through with potential contributors. First of all begin by creating a Road-map for your project. This is essential to submit your project. We highly recommend to read  documentation such as &amp;quot;[http://www2.econ.iastate.edu/tesfatsi/ProducingOSS.KarlFogel2005.pdf How to start /run a successful Open Source Projects]&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 500px | left]]&lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Road-map===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Start defining a development, documentation and marketing plan for your project. Set short , medium and long term plans. Include promotion of your project, this is very important in order to engage users and consumers of your project. Contact project coordinator and the Project Task Force to help you achieve this goal. You ''can'' run a single person project, but it's usually best to get the community involved.  You should be prepared to support a mailing list, build a team, speak at conferences, and promote your project.&lt;br /&gt;
&lt;br /&gt;
* You can contribute existing documents or tools to OWASP! Assuming you have the intellectual property rights to a work, you can open it to the world as an OWASP Project.  Please coordinate this with OWASP by contacting owasp(at)owasp.org.&lt;br /&gt;
&lt;br /&gt;
* Available Grants to consider if you need funding - [[Grants|Click Here]]&lt;br /&gt;
&lt;br /&gt;
* You should promote your project through the OWASP channels as well as by outside means.  Get people to blog about it!&lt;br /&gt;
&lt;br /&gt;
== Creating a new project ==&lt;br /&gt;
Once you have passed the Project Ideas phase, then you will be ready to start a new project&lt;br /&gt;
To Submit your project please use the following form&lt;br /&gt;
. [http://www.tfaforms.com/263506 Please submit a new project application here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* You will need to gather the following information together for your application:&lt;br /&gt;
A - PROJECT&lt;br /&gt;
# Project Name,&lt;br /&gt;
# Project purpose / overview,&lt;br /&gt;
# Project Roadmap,&lt;br /&gt;
# Project links (if any) to external sites,&lt;br /&gt;
# [[Guidelines_for_OWASP_Projects#Project_Licensing|Project License],]&lt;br /&gt;
# Project Leader name,&lt;br /&gt;
# Project Leader email address,&lt;br /&gt;
# Project Leader wiki account - the username (you'll need this to edit the wiki),&lt;br /&gt;
# Project Contributor(s) (if any) - name email and wiki account (if any),&lt;br /&gt;
# Project Main Links (if any).&lt;br /&gt;
# For Documentation: A table of Contents&lt;br /&gt;
# For Code: A prototype hosted in an open source repository of your choice. Make sure it has read access.&lt;br /&gt;
&lt;br /&gt;
* Check out the '''[[Guidelines for OWASP Projects]]'''.&lt;br /&gt;
* [[Grant_Spending_Policy|Grant Spending Policy]]&lt;br /&gt;
* [[Project_Spending_Policy|Project Spending Policy]]&lt;br /&gt;
* [[Project_Sponsorship_Operational_Guidelines|Project Sponsorship Operational Guidelines]]&lt;br /&gt;
&lt;br /&gt;
==OWASP	Recommended Licenses==&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Funding your Project==&lt;br /&gt;
An OWASP project does not receive any funding for development at project inception; however, a new project does have the opportunity to submit a request to receive funds if they are available for the year. Additionally, project leaders have the option of seeking sponsorship from outside organizations, but project leaders are required to seek funding through their own initiative. Please contact the OWASP Projects Manager for more information. &lt;br /&gt;
&lt;br /&gt;
== Project Release ==&lt;br /&gt;
&lt;br /&gt;
As your project reaches a point that you'd like OWASP to assist in its promotion, the will need the following information to help spread the word about your project:&lt;br /&gt;
&lt;br /&gt;
# Short 5 sentence paragraph outlining what your project is about, what you hope to accomplish with your project, what value your project brings to software security, and contributor and project leader names and contact information.&lt;br /&gt;
# Link to your wiki page.&lt;br /&gt;
# Link to your code repository or a link to where readers can download your project.&lt;br /&gt;
# Latest Release description answering the following questions: What is it?, What does it do?, Where can I get it?, Who should I contact if something goes wrong?.&lt;br /&gt;
&lt;br /&gt;
==Project Process Forms==&lt;br /&gt;
These forms were created to help project leaders, and those interested in a going through a process in the OWASP projects infrastructure. They facilitate the management of each query based on the specific task an applicant will need help with. The forms are described below, and they are linked with their designated online application form. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264422 Project Transition Application]:The OWASP project transition form gives current project leaders an easy way of handing over project administration information to individuals wishing to take over a project.  &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264413 Project Review Application]:This form is for current project leaders to request a review of their project based on OWASP graduation criteria. The aim is to designate an OWASP volunteer to review these projects within 3 months time. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264418 Project Donation Application]:This form is for projects outside of the OWASP project infrastructure. Project Leaders for these open source projects can choose to partner or give their project to OWASP directly through this form.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264428 Project Adoption Request]:This form is used when someone is interested in adopting an archived project. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264426 Project Abandonment Request]:The OWASP project abandonment form gives current project leaders an easy way of letting the OWASP Foundation know that they wish to resign their project leader duties. This form should be used when no replacement project leader exists to take over these duties.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264392 Incubator Project Graduation Application]:This application form is for Incubator Projects to apply for Labs Project status.&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_System_Vulnerable_Code_Project Project Reques, Bangladesh]:For Information Security Project apply to [[S. M. Shezan]][http://www.facebook.com/smshezan]&lt;br /&gt;
&lt;br /&gt;
= Project Assessments  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==OWASP Project Lifecycle==&lt;br /&gt;
The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state. The greater the maturity of the project, the greater the level of responsibility for the project leader. These responsibilities are not trivial as OWASP provides incentives and benefits (Section 7) for projects who take on these added responsibilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====The OWASP Project Lifecycle is broken down into the following stages:====&lt;br /&gt;
&lt;br /&gt;
'''Incubator Projects''': OWASP Incubator projects represent the experimental playground where projects are still being designed, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity; moreover, the label allows project leaders to leverage the OWASP name while their project is still maturing. OWASP Incubator projects are given a place on the OWASP Projects Portal to leverage the organizations' infrastructure, and establish their presence and project history.&lt;br /&gt;
&lt;br /&gt;
'''Lab Projects''': OWASP Labs projects represent projects that have produced a deliverable of significant value. Leaders of OWASP Labs projects are expected to stand behind the quality of their projects as these projects have matured to the point where they are accepted by a significant portion of the OWASP community. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are ready for mainstream usage. OWASP Labs Projects are meant to be the collection of established projects that have gained community support and acclaim by undergoing the project review process. &lt;br /&gt;
&lt;br /&gt;
'''Flagship Projects''': The OWASP Flagship designation is given to projects that have demonstrated superior maturity, established quality, and strategic value to OWASP and application security as a whole. Eligible projects are selected from the OWASP Labs project pool. This selection process generally ensures that there is only one project of each type covering any particular security space. OWASP Flagship projects represent projects that are not only mature, but are also projects that OWASP as an organization provides direct support to maintaining. The core mission of OWASP is to make application security visible and so as an organization, OWASP has a vested interest in the success of its Flagship projects. Since Flagship projects have such high visibility, these projects are expected to uphold the most stringent requirements of all OWASP Projects.&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Stage Benefits==&lt;br /&gt;
This section outlines the benefits of starting an OWASP project, and the benefits of being at each different stage in the projects lifecycle. In my short time here at OWASP as the PM, I have had several potential project leaders ask me what the benefits are of starting their project with OWASP. Below is my proposal for each Stage’s benefits.&lt;br /&gt;
&lt;br /&gt;
'''Incubator'''&lt;br /&gt;
* Financial Donation Management Assistance &lt;br /&gt;
* Project Review Support&lt;br /&gt;
* WASPY Awards Nominations&lt;br /&gt;
* OWASP OSS and OPT Participation&lt;br /&gt;
* Opportunity to submit proposal: $500 for Development.&lt;br /&gt;
* Community Engagement and Support&lt;br /&gt;
* Recognition and visibility of being associated with the OWASP Brand.&lt;br /&gt;
&lt;br /&gt;
'''Labs'''&lt;br /&gt;
* All benefits given to Incubator Projects &lt;br /&gt;
* Technical Writing Support&lt;br /&gt;
* Graphic Design Support&lt;br /&gt;
* Project Promotion Support&lt;br /&gt;
* OWASP OSS and OPT: Preference&lt;br /&gt;
&lt;br /&gt;
'''Flagship'''&lt;br /&gt;
* All benefits given to Incubator &amp;amp; Labs Projects&lt;br /&gt;
* Grant finding and proposal writing help&lt;br /&gt;
* Yearly marketing plan development&lt;br /&gt;
* OWASP OSS and OPT participation preference&lt;br /&gt;
&lt;br /&gt;
For more detailed information on OWASP Project Stage Benefits, please see the 2013 Project Handbook.&lt;br /&gt;
&lt;br /&gt;
== Project Monitoring Incubator/Documentation ==&lt;br /&gt;
Every 6 months, a project monitoring assessment takes place to evaluate if projects had any releases during this period.A warning will be sent to projects without any activity in 90 days and after 180 days, the project will be set automatically as inactive.&lt;br /&gt;
You can set your project active at any time, as long as:&lt;br /&gt;
* There has been commits to the project's open repository or&lt;br /&gt;
* There has been a beta release of the documentation produced so far or&lt;br /&gt;
* Provide a detailed Roadmap &lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Roadmap===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 600px]]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project Monitoring for LABS/Flagship==&lt;br /&gt;
These project represent the best OWASP has to offer, therefore monitoring of these projects is closely supervised.&lt;br /&gt;
===For Code and Tools===&lt;br /&gt;
For projects holding Flagship status, we closely monitor their health every 6 months on the following, among other key indicators:&lt;br /&gt;
*Can the project be built correctly?&lt;br /&gt;
*Does the project has any activity(commits) in the last 6 months?&lt;br /&gt;
*Does the project had any releases in the last 6 months?&lt;br /&gt;
*Has the project leaders updated his wiki or website to reflect latest releases?&lt;br /&gt;
===For Documentation===&lt;br /&gt;
For this part, we are working on the development of an adequate assessment criteria&lt;br /&gt;
The following is a draft of the new process proposal: [[https://www.owasp.org/index.php/File:Qualitative_and_Quantitative_Content_Audit.pdf Proposal for Reviewing OWASP Document projects]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Graduation==&lt;br /&gt;
The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
The review centers around the following core questions. Each core question has three (3) specific questions made up of binary queries. A project must receive at least two (2) positive responses from each reviewer in two of the binary questions, to warrant a postive response for the core question. Each core question must receive a positive response from both project reviewers to pass the Project Health Assessment for Incubator Projects. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Graduation Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Health Assessment==&lt;br /&gt;
The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation for projects going from Incubator to LAB and from LAB to Flagship. The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Health Assessment Criteria Document]. If a project passes the assessment, it then becomes eligible to graduate into the OWASP Labs Project stage. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Deliverable/Release Assessment==&lt;br /&gt;
The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to  review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception. &lt;br /&gt;
&lt;br /&gt;
Reviews must be performed by two (2) OWASP Chapter or Project Leaders, and their review must answer affirmatively to at least the first two (2) core Project Deliverable/Release Review questions. A project must pass the OWASP Project Deliverable/Release Assessment in order to graduate into the OWASP Labs Project stage. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Deliverable/Release Assessment Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Brand Resources  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The Brand Usage Rules==&lt;br /&gt;
See OWASP's [[Marketing/Resources#tab=BRAND_GUIDELINES|The Brand Usage Rules]] for details.&lt;br /&gt;
&lt;br /&gt;
==Project Icons &amp;amp; Templates==&lt;br /&gt;
See OWASP'S [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
(Following links and images are provided for a quick overview only, the primary page is [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]]).&lt;br /&gt;
&lt;br /&gt;
If you require more assistance with these files and/or templates, please contact the OWASP staff for assistance &lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Operations_Project_Template|OWASP Operational Wiki Template]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Documentation_Project_Template|OWASP Example Template: DO NOT EDIT]]'''&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_Project_Header.jpg|Owasp logo|500px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_TOOL.jpg|Owasp logo|200px]] [[Image:Project_Type_Files_DOC.jpg||Owasp logo 1c|200px]]  &lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_CODE.jpg|Owasp logo|200px]] [[Image:Owasp-defenders-small.png|Owasp logo|100px]] [[Image:Owasp-builders-small.png|Owasp logo|100px]] [[Image:Owasp-breakers-small.png|Owasp logo|100px]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-incubator-trans-200.png|Owasp logo rev icon|100px]] [[Image:Owasp-labs-trans-85.png|Owasp logo flat|100px]] [[Image:Owasp-flagship-trans-85.png|Owasp logo icon|100px]]&lt;br /&gt;
&lt;br /&gt;
===OpenSAMM===&lt;br /&gt;
'''[[Media:OpenSAMM_icons.zip|OpenSAMM Icons]]'''&lt;br /&gt;
&lt;br /&gt;
'''Construction:'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Construction black.png| Construction black| 100px]]  [[Image:Construction blue.png| Construction blue| 100px]]  [[image:Construction olive.png |construction olive|100px]]&lt;br /&gt;
&lt;br /&gt;
'''Deployment:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Deployment black.png| Deployment black| 100px]]  [[image:Deployment blue.png| Deployment blue| 100px]]  [[image:Deployment olive.png | Deployment olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Governance:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Governance black.png| governance black| 100px]]  [[image:Governance blue.png | governance blue | 100px]]  [[image:Governance olive.png | governance olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Verification:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Verification black.png | Verification black | 100px]]  [[image:Verification blue.png | verification blue | 100px]]  [[image: Verification olive.png | Verification olive | 100px]]&lt;br /&gt;
&lt;br /&gt;
==Book Cover Files==&lt;br /&gt;
See OWASP's [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
[[Media:Lulu-guide.pdf|Lulu Guide]]&lt;br /&gt;
&lt;br /&gt;
'''[https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip Download the Book Cover Zip File]'''&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;300&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:BookImage_01.jpg‎|500px| link=https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Terminology =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== OWASP Project Infrastructure ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Lifecycle:''' The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Project:''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway. The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Labs Project:''' OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Flagship Project:''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Benefits:''' The standard list of resources and incentives made available to project leaders based on their project's current maturity level. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Reviews ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviews:''' Project reviews are the method OWASP uses to establish a minimal baseline of project characteristics and release quality. Reviews are not mandatory, but they are necessary if a project leader wishes to graduate to the next level of maturity within the OWASP Global Projects infrastructure. Projects can be reviewed when an Incubator project wishes to graduate into the OWASP Labs designation, and project releases can be reviewed if they want the quality of their deliverable to be vouched for by OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviewer Pool:''' The project reviewer pool is made up of veteran reviewers who have proven themselves dedicated to executing quality reviews of projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Graduation:''' The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Health Assessment:''' The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE#gid=1 Project Health Assessment Criteria Document].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Release:''' A project release refers to the final deliverable a project produces. It is the final product of the project. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Deliverable/Release Review:''' The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects Processes == &lt;br /&gt;
&lt;br /&gt;
*'''Project Processes:''' The set of streamlined processes that exist to help projects move smoothly through the OWASP Project Lifecycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Inception Process:''' The Project Inception Process is how a brand new idea becomes an OWASP Project. Such projects are labeled as OWASP Incubator projects. The process involves submitting the proposed project name, project leader information, project description, project roadmap, and selecting an appropriate open-source license for the project using the New Project Form on the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Donation Process:''' The Project Donation Process is used for a project that has an existing functional release, but is not currently associated with OWASP. This process is the primary mechanism by which individuals or organizations can transfer the ownership of their project’s copyright to OWASP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Transition Process:''' The Project Transition Process is used to transition leadership of a project to a new project leader. This is a simple automated process to transfer the relevant accounts, mailing lists, and other project resources to the new project leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Abandonment Process:''' The Project Abandonment Process was put in place for those occasions in which a project leader is no longer able to manage their project, and has not been able to find a suitable replacement for the leader role. Project Abandonment can also occur when the project leader feels his/her project has become obsolete. Under these circumstances, the acting project leader is encourage do submit the Project Abandonment Form found in the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Graduation Process:''' The Incubator Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Projects at Conferences == &lt;br /&gt;
&lt;br /&gt;
*'''AppSec Conferences:''' OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Open Source Showcase:''' The Open Source Showcase is an OWASP AppSec Conference event module designed to give Open Source project leaders the opportunity to demo their projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Track:''' The OWASP Project Track is an OWASP AppSec Conference event module designed to give OWASP Project leaders the opportunity to showcase their projects as an official conference presenter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects General ==  &lt;br /&gt;
&lt;br /&gt;
*'''OWASP Code of Ethics:''' The OWASP Code of Ethics are the set of guidelines and principles that the OWASP Foundation expects all of its members and conference attendees to abide by. A copy of the Code of Ethics can be found here in the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#Code_of_Ethics OWASP About page]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sponsorships and Donations  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate to OWASP Global Projects ==&lt;br /&gt;
OWASP Projects, a global division of the OWASP Foundation, is run under the same world wide not-for-profit charitable status as all the foundation strategic groups. OWASP provides a platform for contributors to share their work while providing them with the project and community support they need throughout their project development. All OWASP Projects are run by volunteers and they rely on personal donations and sponsorship to continue their development. Donate to OWASP Projects, and we promise to spend your money wisely on open source initiatives.&lt;br /&gt;
&lt;br /&gt;
'''This is how your money can help:'''&lt;br /&gt;
&lt;br /&gt;
* $20 could help us spread the word on the importance of open source initiatives in the Application Security industry.&lt;br /&gt;
* $100 could help fund OWASP project demos at major conferences.&lt;br /&gt;
* $250 could help get our volunteer Project Leaders to speaking engagements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_Button.jpg | link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Contact US  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you need any help with anything projects related, or if you simply need some more information, please do not hesitate to [http://owasp4.owasp.org/contactus.html Contact Us].&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193546</id>
		<title>S. M. Shezan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193546"/>
				<updated>2015-04-17T06:35:33Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.facebook.com/smshezan S. M. Shezan]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193543</id>
		<title>S. M. Shezan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193543"/>
				<updated>2015-04-17T06:33:31Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: Blanked the page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193542</id>
		<title>S. M. Shezan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=S._M._Shezan&amp;diff=193542"/>
				<updated>2015-04-17T06:33:00Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: Created page with &amp;quot;[http://www.facebook.com/smshezan S. M. Shezan]&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.facebook.com/smshezan S. M. Shezan]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=193541</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=193541"/>
				<updated>2015-04-17T06:32:04Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Project Process Forms */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Welcome to the OWASP Global Projects Page ===&lt;br /&gt;
&lt;br /&gt;
An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. OWASP currently has over 142 active projects, and new project applications are submitted every week.  &lt;br /&gt;
&lt;br /&gt;
This is one of the most popular divisions of OWASP as it gives members an opportunity to freely test theories and ideas with the professional advice and support of the OWASP community. Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any project by visiting the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. A summary of recent project announcements is available on the [[OWASP Updates]] page. &lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:PROJECT_LEADER-HANDBOOK_2014.pdf|OWASP Project Handbook 2014]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_2014_Project_Handbook|OWASP Project Handbook Wiki 2014]]'''&lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:OWASP_Projects_Handbook_2013.pdf|OWASP Projects Handbook 2013]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[Project_Online_Resources|Project Online Resources]]'''&lt;br /&gt;
&lt;br /&gt;
=== Who Should Start an OWASP Project? ===&lt;br /&gt;
&lt;br /&gt;
*Application Developers. &lt;br /&gt;
*Software Architects. &lt;br /&gt;
* Information Security Authors.  &lt;br /&gt;
*Those who would like the support of a world wide professional community to develop or test an idea.&lt;br /&gt;
*Anyone wishing to take advantage of the professional body of knowledge OWASP has to offer.&lt;br /&gt;
&lt;br /&gt;
=== Contact Us===&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please do not hesitate to  [http://owasp4.owasp.org/contactus.html Contact Us] by using the form provided here. Please allow five working days for your question or comment to be answered. This is due to the large amount of queries the foundation staff receive every day. We thank you for your patience. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Project Inventory ===&lt;br /&gt;
&lt;br /&gt;
All OWASP tools, document, and code library projects are organized into the following [[OWASP_Project_Stages|categories:]] &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Flagship_Projects|Flagship Projects:]]''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Labs_Projects|Lab Projects:]]''' OWASP Labs projects represent projects that have produced an OWASP reviewed deliverable of value. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Incubator_Projects|Incubator Projects:]]''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.&lt;br /&gt;
&lt;br /&gt;
=== Social Media ===&lt;br /&gt;
&lt;br /&gt;
We recommend using the links below to find our official OWASP social media channels. These are a great way to keep in touch with the different initiatives going on at OWASP throughout the world. They are all updated regularly by chapter leaders, project leaders, the OWASP Board Members, and our OWASP Staff. If you have any questions or concerns about any of these accounts, please drop us a line using our [http://www.tfaforms.com/308703 &amp;quot;Contact Us&amp;quot;] form found above.  &lt;br /&gt;
&lt;br /&gt;
[[Image:Blogger-32x32.png|32px|link=http://owasp.blogspot.co.uk/]] [[Image:Twitter-32x32.png|32px|link=https://twitter.com/OWASP]] [[Image:Facebook-32x32.png|32px|link=https://www.facebook.com/groups/172892372831444/]] [[Image:Linkedin-32x32.png|32px|link=http://www.linkedin.com/groups/Global-OWASP-Foundation-36874]] [[Image:Google-32x32.png|32px|link=https://plus.google.com/u/0/communities/105181517914716500346?cfem=1]] [[Image:Ning-32x32.png|32px|link=http://myowasp.ning.com/]]&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 3px solid rgb(204, 204, 204); vertical-align: top; width: 95%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; |  &lt;br /&gt;
&amp;lt;div style=&amp;quot;padding:2em;padding-bottom:0px;&amp;quot;&amp;gt;&amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL; also 2 empty lines between images --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:New_initiatives.png|center|300px| link=http://owasp.force.com/volunteers/GW_Volunteers__VolunteersJobListing]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_here_banner.png|center|300px| link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project Inventory  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Project Dashboard lists the all project information at a glance, including release links, the current status of the project and project leader contact information. The Project Dashboard can be found here: https://www.owasp.org/index.php/OWASP_Project_Dashboard&lt;br /&gt;
&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
[[File:Flagship_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole.&lt;br /&gt;
After a major review process [[https://www.owasp.org/index.php/LAB_Projects_Code_Analysis_Report More info here]] the following projects are considered to be flagship candidate projects. These project will be evaluated more deeply to confirm their flagship status:&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy]]&lt;br /&gt;
* [[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment Project]]&lt;br /&gt;
* [[OWASP_OWTF|OWASP OWTF]]&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency Check]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed November 2014]====&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
* [[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard Project]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP System Vulnerable Code Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed February 2015] in progress====&lt;br /&gt;
* [[:Category:OWASP_Application_Security_Verification_Standard_Project|OWASP Application Security Verification Standard Project]]&lt;br /&gt;
* [[:Category:Software_Assurance_Maturity_Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[:Category:OWASP_Top_Ten_Project|OWASP Top Ten Project]]&lt;br /&gt;
* [[OWASP_Testing_Project|OWASP Testing Guide Project]]&lt;br /&gt;
&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
[[File:Lab banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to LAB projects showing a steady progress in their development, had very active and continuous releases and commits, regular update of information on their wiki page and have quite complete documentation. These projects are almost ready to become flagship&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed February 2015]====&lt;br /&gt;
* [[OWASP_Hackademic_Challenges_Project|OWASP Hackademic Challenges Project]]&lt;br /&gt;
* [[OWASP_Mantra_-_Security_Framework|OWASP Mantra Security Framework]]&lt;br /&gt;
* [[OWASP_O2_Platform|OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP_Dependency_Track_Project|OWASP Dependency Track Project]]&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
* [[O-Saft|O-Saft]]&lt;br /&gt;
* [[:Category:OWASP_EnDe|OWASP EnDe Project]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] &lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security Project]]&lt;br /&gt;
*[[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]]&lt;br /&gt;
&lt;br /&gt;
====Documentation [In Progress-Results by February/March 2015] ====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Podcast|OWASP Podcast Project]]&lt;br /&gt;
* [[:Category:OWASP_Code_Review_Project|OWASP Code Review Guide Project]]&lt;br /&gt;
* [[:Category:OWASP_Guide_Project|OWASP Development Guide Project]]&lt;br /&gt;
*[[OWASP_CISO_Survey|OWASP CISO Survey]] &lt;br /&gt;
*[[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]]&lt;br /&gt;
*[[OWASP_Cornucopia|OWASP Cornucopia]]&lt;br /&gt;
*[[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Contests====&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]] &lt;br /&gt;
* [[:Category:OWASP_CTF_Project|OWASP CTF Project]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed February 2015]====&lt;br /&gt;
* [[:Category:OWASP_Enterprise_Security_API|OWASP Enterprise Security API]]&lt;br /&gt;
&lt;br /&gt;
======Low Activity (LABS)[Reviewed February 2015] ======&lt;br /&gt;
[[File:low_activity.jpg]]&lt;br /&gt;
&lt;br /&gt;
These projects had no releases in at least a year, however have shown to be valuable tools&lt;br /&gt;
Code [Low Activity]&lt;br /&gt;
* [[Project_Information:template_Vicnum_Project|OWASP Vicnum Project]]&lt;br /&gt;
* [[OWASP_Broken_Web_Applications_Project|OWASP Broken Web Applications Project]]&lt;br /&gt;
&lt;br /&gt;
Documentation [Low Activity]&lt;br /&gt;
* [[OWASP_Appsec_Tutorial_Series|OWASP AppSec Tutorial Series]]&lt;br /&gt;
* [[:Category:OWASP_Legal_Project|OWASP Legal Project]]&lt;br /&gt;
* [[Virtual_Patching_Best_Practices|Virtual Patching Best Practices]]&lt;br /&gt;
* [[OWASP_Codes_of_Conduct|OWASP Codes of Conduct]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
[[File:Incubator_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to incubator projects showing a steady progress in their development, had continuous releases and commits or have delivered a complete product, including open source repository location, basic user guidelines and documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed March 2015]====&lt;br /&gt;
* [[OWASP_Java_Encoder_Project|OWASP Java Encoder Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Java_File_I_O_Security_Project|OWASP Java File I/O Security Project]]&lt;br /&gt;
* [[OWASP_PHPRBAC_Project|OWASP PHPRBAC Project]] &lt;br /&gt;
* [[OWASP_iMAS_iOS_Mobile_Application_Security_Project|OWASP iMAS - iOS Mobile Application Security Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_PHP_Security_Project|OWASP PHP Security Project]] [[File:Thumbsup.png|15px]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Node_js_Goat_Project|OWASP Node.js Goat Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_System_Vulnerable_Code_Project|OWASP System Vulnerable Code Project]]&lt;br /&gt;
* [[OWASP_ISO_IEC_27034_Application_Security_Controls_Project|OWASP ISO/IEC 27034 Application Security Controls Project]]&lt;br /&gt;
* [[OWASP_Hardened_Phalcon_Project|OWASP Hardened Phalcon Project]]&lt;br /&gt;
* [[OWASP_Faux_Bank_Project|OWASP Faux Bank Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Security_Research_and_Development_Framework|OWASP Security Research and Development Framework]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_File_Format_Validation_Project|OWASP File Format Validation Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
*[[OWASP_Security_Logging_Project|OWASP Security Logging Project]]&lt;br /&gt;
*[[OWASP_Droid10_Project|OWASP Droid]]&lt;br /&gt;
&lt;br /&gt;
====Tools [Review in progress-April 2015]====&lt;br /&gt;
*[[Benchmark|OWASP WebGoat Benchmark]]&lt;br /&gt;
*[[OWASP_WAP-Web_Application_Protection|WAP Web Application_Protection]]&lt;br /&gt;
*[[OWASP_Java_HTML_Sanitizer|OWASP Java HTML Sanitizer Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Security_Shepherd|OWASP Security Shepherd]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Mantra_OS|OWASP Mantra OS]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_iGoat_Project|OWASP iGoat Project]]&lt;br /&gt;
*[[OWASP_Bricks|OWASP Bricks]]&lt;br /&gt;
*[[OWASP_Bywaf_Project|OWASP Bywaf Project]]&lt;br /&gt;
*[[OWASP_Mutillidae_2_Project|OWASP Mutillidae 2 Project]] &lt;br /&gt;
*[[OWASP_SeraphimDroid_Project|OWASP SeraphimDroid Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Python_Security_Project|OWASP Python Security Project]]&lt;br /&gt;
*[[OWASP_WebSpa_Project|OWASP WebSpa Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_NINJA_PingU_Project|OWASP NINJA PingU Project]]&lt;br /&gt;
*[[OWASP_Encoder_Comparison_Reference_Project|OWASP Encoder Comparison Reference Project]]&lt;br /&gt;
*[[:Category:OWASP_SQLiX_Project|OWASP sqliX Project]]&lt;br /&gt;
*[[OWASP_Click_Me_Project|OWASP Click Me Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Secure_TDD_Project|OWASP Secure TDD Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_XSecurity_Project|OWASP XSecurity Project]]&lt;br /&gt;
*[[OWASP_Pyttacker_Project|OWASP Pyttacker Project]]&lt;br /&gt;
*[[OWASP_Code_Pulse_Project|OWASP Code Pulse Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_HTTP_Post_Tool|OWASP HTTP POST Tool]]&lt;br /&gt;
*[[OWASP_PHP_Security_Training_Project|OWASP PHP Security Training Project]]&lt;br /&gt;
*[[Projects/OWASP_iOSForensic|OWASP iOSForensic]]&lt;br /&gt;
*[[OWASP_Project_Metrics|OWASP Project Metrics]]&lt;br /&gt;
*[[OWASP_Store_Sheep_Project|OWASP Store Sheep Project]]&lt;br /&gt;
*[[OWASP_SonarQube_Project|OWASP SonarQube Project]]&lt;br /&gt;
*[[OWASP Rainbow Maker Project | OWASP Rainbow Maker Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP JSEC CVE Details | OWASP JSEC CVE Details]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_WebGoat.NET|OWASP WebGoat.NET]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASIDE_Project|OWASP ASIDE Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASVS_Assessment_tool | OWASP Assesment Tool]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Review: March 2015-In progress]====&lt;br /&gt;
*[[OWASP Automated Threats to Web Applications]]&lt;br /&gt;
*[[OWASP_Data_Exchange_Format_Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
*[[OWASP_Proactive_Controls|OWASP Proactive Controls]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Enterprise_Application_Security_Project|OWASP Enterprise Application Security Project]]&lt;br /&gt;
*[[Projects/OWASP_GoatDroid_Project|OWASP GoatDroid Project]]&lt;br /&gt;
*[[OWASP_RFP-Criteria|OWASP Request For Proposal]]&lt;br /&gt;
*[[OWASP_Hacking_Lab|OWASP Hacking-Lab]]&lt;br /&gt;
*[[WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project|WASC/OWASP Web Application Firewall Evaluation Criteria (WAFEC)]]&lt;br /&gt;
*[[OWASP_Secure_Application_Design_Project|OWASP Secure Application Design Project]]&lt;br /&gt;
*[[OWASP_Top_10_Fuer_Entwickler_Project|OWASP Top 10 Fuer Entwickler Project]]&lt;br /&gt;
*[[OWASP_Security_Principles_Project|OWASP Security Principles Project]]&lt;br /&gt;
*[[OWASP_Media_Project|OWASP Media Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Global_Chapter_Meetings_Project|OWASP Global Chapter Meetings Project]]&lt;br /&gt;
*[[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
*[[OWASP_Insecure_Web_Components_Project|OWASP Insecure Web Components Project]]&lt;br /&gt;
*[[OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project|OWASP Reverse Engineering and Code Modification Prevention Project]]&lt;br /&gt;
*[[OWASP_Student_Chapters_Program|OWASP Student Chapters Project]]&lt;br /&gt;
*[[:Category:OWASP_Education_Project|OWASP Education Project]]&lt;br /&gt;
*[[:Category:OWASP_Speakers_Project|OWASP Speakers Project]]&lt;br /&gt;
*[[OWASP_Internet_of_Things_Top_Ten_Project|OWASP Internet of Things Top Ten Project]]&lt;br /&gt;
*[[:Category:OWASP_.NET_Project|OWASP .NET Project]]&lt;br /&gt;
*[[OWASP_Open_Cyber_Security_Framework_Project|OWASP Open Cyber Security Framework Project]]&lt;br /&gt;
*[[OWASP_Top_10_Privacy_Risks_Project|OWASP Top 10 Privacy Risks Project]]&lt;br /&gt;
*[[OWASP_WASC_Web_Hacking_Incidents_Database_Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
*[[OWASP_Security_Frameworks_Project|OWASP Security Frameworks Project]]&lt;br /&gt;
*[[OWASP_Incident_Response_Project|OWASP Incident Response Project]]&lt;br /&gt;
*[[OWASP_Embedded_Application_Security|OWASP Embedded Application Security]]&lt;br /&gt;
*[[OWASP_STING_Game_Project|OWASP STING Game Project]]&lt;br /&gt;
*[[Projects/OWASP_Ruby_on_Rails_and_friends_Security_Guide|OWASP Ruby on Rails and Friends Security Guide]]&lt;br /&gt;
*[[OWASP_Secure_Development_Training|OWASP Secure Development Training]]&lt;br /&gt;
*[[OWASP_Periodic_Table_of_Vulnerabilities|OWASP Periodic Table of Vulnerabilities]]&lt;br /&gt;
*[[OWASP_Top_Trumps_for_Projects|OWASP Top Trumps for Projects]]&lt;br /&gt;
*[[OWASP_Supporting_Legacy_Web_Applications_in_the_Current_Environment_Project|OWASP Supporting Legacy Web Applications in the Current Environment Project]]&lt;br /&gt;
*[[OWASP KALP Mobile Project | OWASP KALP Mobile Project]]&lt;br /&gt;
*[[OWASP Persian Translation Project | OWASP Persian Translation Project]]&lt;br /&gt;
*[[OWASP_Security_Controls_in_Web_Application_Development_Lifecycle |OWASP Security Controls in Web Application Development Lifecycle Project]]&lt;br /&gt;
*[[OWASP_Application_Security_Program_Quick_Start_Guide_Project|OWASP_Application_Security_Program_Quick_Start_Guide_Project]]&lt;br /&gt;
*[[OWASP_Secure_Configuration_Guide|OWASP_Secure_Configuration_Guide]]&lt;br /&gt;
*[[OWASP_Product_Requirement_Recommendations_Library|OWASP_Product_Requirement_Recommendations_Library]]&lt;br /&gt;
*[[OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project|OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project]]&lt;br /&gt;
*[[OWASP_Knowledge_Graph|OWASP_Knowledge_Graph]]&lt;br /&gt;
&lt;br /&gt;
====Educational Project====&lt;br /&gt;
*[[OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project#tab=Main | OWASP Visual Crime Scene and Security Incident Project]]&lt;br /&gt;
&lt;br /&gt;
==Donated Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Donated Projects are inactive projects that have been donated to the OWASP Projects Infrastructure. &lt;br /&gt;
&lt;br /&gt;
====Tools====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Excess_XSS_Project|OWASP Excess XSS Project]]&lt;br /&gt;
* [[OWASP_JOTP_Project|OWASP jOTP Project]]&lt;br /&gt;
&lt;br /&gt;
==OWASP Archived Projects==&lt;br /&gt;
OWASP Archived Projects are projects that have developed outside OWASP umbrella or have become inactive. If you are interested in pursuing any of the inactive projects (click hyperlink for list), please contact us and let us know of your interest.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project_Archived_Projects&lt;br /&gt;
&lt;br /&gt;
= Project Task Force =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OWASP Project Task Force====&lt;br /&gt;
&lt;br /&gt;
{{:Task_Force/OWASP_Projects}}&lt;br /&gt;
&lt;br /&gt;
= Online Resources =&lt;br /&gt;
&lt;br /&gt;
===Project Online Resources===&lt;br /&gt;
&lt;br /&gt;
{{:Project_Online_Resources}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Starting a New Project  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== So you want to start a project... ==&lt;br /&gt;
&lt;br /&gt;
Starting an OWASP project is quite easy, and your desire to contribute and make it happen is essential.&lt;br /&gt;
[[File:HowToStartProjectoWasp.png | 600px | right]]&lt;br /&gt;
&lt;br /&gt;
Here are some of the guidelines for running a successful OWASP project:&lt;br /&gt;
&lt;br /&gt;
-Start exploring the actual OWASP projects Inventory. Many projects handle specific areas of security it is a good idea to start looking how other successful projects do this (LABS/Flagship)&lt;br /&gt;
&lt;br /&gt;
-Place your idea or project on the [https://www.owasp.org/index.php/Project_Ideas_Board#From_Idea_to_Project_Incubator Project Ideas Board].This phase will help you to define the project goals and also explore and exchange with other OWASP leaders and volunteers how to develop the idea into a tangible project&lt;br /&gt;
&lt;br /&gt;
-Explore and research if your idea covers a unique segment in the Security arena.Think of your project as a product, if you really want people using it, think how this project will cover a necessity in the security area you are working on &lt;br /&gt;
&lt;br /&gt;
-Define what kind of project you would like to start. Is it a code, tool or documentation?&lt;br /&gt;
&lt;br /&gt;
-Communicate through the Project leader mailing list about your idea and get feedback and  meet potential contributors&lt;br /&gt;
&lt;br /&gt;
-Develop your project based on the type of project. For example if you are willing to start a documentation project, begin by defining a Table of Content and work it through with potential contributors. First of all begin by creating a Road-map for your project. This is essential to submit your project. We highly recommend to read  documentation such as &amp;quot;[http://www2.econ.iastate.edu/tesfatsi/ProducingOSS.KarlFogel2005.pdf How to start /run a successful Open Source Projects]&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 500px | left]]&lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Road-map===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Start defining a development, documentation and marketing plan for your project. Set short , medium and long term plans. Include promotion of your project, this is very important in order to engage users and consumers of your project. Contact project coordinator and the Project Task Force to help you achieve this goal. You ''can'' run a single person project, but it's usually best to get the community involved.  You should be prepared to support a mailing list, build a team, speak at conferences, and promote your project.&lt;br /&gt;
&lt;br /&gt;
* You can contribute existing documents or tools to OWASP! Assuming you have the intellectual property rights to a work, you can open it to the world as an OWASP Project.  Please coordinate this with OWASP by contacting owasp(at)owasp.org.&lt;br /&gt;
&lt;br /&gt;
* Available Grants to consider if you need funding - [[Grants|Click Here]]&lt;br /&gt;
&lt;br /&gt;
* You should promote your project through the OWASP channels as well as by outside means.  Get people to blog about it!&lt;br /&gt;
&lt;br /&gt;
== Creating a new project ==&lt;br /&gt;
Once you have passed the Project Ideas phase, then you will be ready to start a new project&lt;br /&gt;
To Submit your project please use the following form&lt;br /&gt;
. [http://www.tfaforms.com/263506 Please submit a new project application here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* You will need to gather the following information together for your application:&lt;br /&gt;
A - PROJECT&lt;br /&gt;
# Project Name,&lt;br /&gt;
# Project purpose / overview,&lt;br /&gt;
# Project Roadmap,&lt;br /&gt;
# Project links (if any) to external sites,&lt;br /&gt;
# [[Guidelines_for_OWASP_Projects#Project_Licensing|Project License],]&lt;br /&gt;
# Project Leader name,&lt;br /&gt;
# Project Leader email address,&lt;br /&gt;
# Project Leader wiki account - the username (you'll need this to edit the wiki),&lt;br /&gt;
# Project Contributor(s) (if any) - name email and wiki account (if any),&lt;br /&gt;
# Project Main Links (if any).&lt;br /&gt;
# For Documentation: A table of Contents&lt;br /&gt;
# For Code: A prototype hosted in an open source repository of your choice. Make sure it has read access.&lt;br /&gt;
&lt;br /&gt;
* Check out the '''[[Guidelines for OWASP Projects]]'''.&lt;br /&gt;
* [[Grant_Spending_Policy|Grant Spending Policy]]&lt;br /&gt;
* [[Project_Spending_Policy|Project Spending Policy]]&lt;br /&gt;
* [[Project_Sponsorship_Operational_Guidelines|Project Sponsorship Operational Guidelines]]&lt;br /&gt;
&lt;br /&gt;
==OWASP	Recommended Licenses==&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Funding your Project==&lt;br /&gt;
An OWASP project does not receive any funding for development at project inception; however, a new project does have the opportunity to submit a request to receive funds if they are available for the year. Additionally, project leaders have the option of seeking sponsorship from outside organizations, but project leaders are required to seek funding through their own initiative. Please contact the OWASP Projects Manager for more information. &lt;br /&gt;
&lt;br /&gt;
== Project Release ==&lt;br /&gt;
&lt;br /&gt;
As your project reaches a point that you'd like OWASP to assist in its promotion, the will need the following information to help spread the word about your project:&lt;br /&gt;
&lt;br /&gt;
# Short 5 sentence paragraph outlining what your project is about, what you hope to accomplish with your project, what value your project brings to software security, and contributor and project leader names and contact information.&lt;br /&gt;
# Link to your wiki page.&lt;br /&gt;
# Link to your code repository or a link to where readers can download your project.&lt;br /&gt;
# Latest Release description answering the following questions: What is it?, What does it do?, Where can I get it?, Who should I contact if something goes wrong?.&lt;br /&gt;
&lt;br /&gt;
==Project Process Forms==&lt;br /&gt;
These forms were created to help project leaders, and those interested in a going through a process in the OWASP projects infrastructure. They facilitate the management of each query based on the specific task an applicant will need help with. The forms are described below, and they are linked with their designated online application form. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264422 Project Transition Application]:The OWASP project transition form gives current project leaders an easy way of handing over project administration information to individuals wishing to take over a project.  &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264413 Project Review Application]:This form is for current project leaders to request a review of their project based on OWASP graduation criteria. The aim is to designate an OWASP volunteer to review these projects within 3 months time. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264418 Project Donation Application]:This form is for projects outside of the OWASP project infrastructure. Project Leaders for these open source projects can choose to partner or give their project to OWASP directly through this form.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264428 Project Adoption Request]:This form is used when someone is interested in adopting an archived project. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264426 Project Abandonment Request]:The OWASP project abandonment form gives current project leaders an easy way of letting the OWASP Foundation know that they wish to resign their project leader duties. This form should be used when no replacement project leader exists to take over these duties.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264392 Incubator Project Graduation Application]:This application form is for Incubator Projects to apply for Labs Project status.&lt;br /&gt;
&lt;br /&gt;
* [Security Project Form]:For Information Security Project apply to [[S. M. Shezan]][http://www.facebook.com/smshezan]&lt;br /&gt;
&lt;br /&gt;
= Project Assessments  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==OWASP Project Lifecycle==&lt;br /&gt;
The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state. The greater the maturity of the project, the greater the level of responsibility for the project leader. These responsibilities are not trivial as OWASP provides incentives and benefits (Section 7) for projects who take on these added responsibilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====The OWASP Project Lifecycle is broken down into the following stages:====&lt;br /&gt;
&lt;br /&gt;
'''Incubator Projects''': OWASP Incubator projects represent the experimental playground where projects are still being designed, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity; moreover, the label allows project leaders to leverage the OWASP name while their project is still maturing. OWASP Incubator projects are given a place on the OWASP Projects Portal to leverage the organizations' infrastructure, and establish their presence and project history.&lt;br /&gt;
&lt;br /&gt;
'''Lab Projects''': OWASP Labs projects represent projects that have produced a deliverable of significant value. Leaders of OWASP Labs projects are expected to stand behind the quality of their projects as these projects have matured to the point where they are accepted by a significant portion of the OWASP community. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are ready for mainstream usage. OWASP Labs Projects are meant to be the collection of established projects that have gained community support and acclaim by undergoing the project review process. &lt;br /&gt;
&lt;br /&gt;
'''Flagship Projects''': The OWASP Flagship designation is given to projects that have demonstrated superior maturity, established quality, and strategic value to OWASP and application security as a whole. Eligible projects are selected from the OWASP Labs project pool. This selection process generally ensures that there is only one project of each type covering any particular security space. OWASP Flagship projects represent projects that are not only mature, but are also projects that OWASP as an organization provides direct support to maintaining. The core mission of OWASP is to make application security visible and so as an organization, OWASP has a vested interest in the success of its Flagship projects. Since Flagship projects have such high visibility, these projects are expected to uphold the most stringent requirements of all OWASP Projects.&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Stage Benefits==&lt;br /&gt;
This section outlines the benefits of starting an OWASP project, and the benefits of being at each different stage in the projects lifecycle. In my short time here at OWASP as the PM, I have had several potential project leaders ask me what the benefits are of starting their project with OWASP. Below is my proposal for each Stage’s benefits.&lt;br /&gt;
&lt;br /&gt;
'''Incubator'''&lt;br /&gt;
* Financial Donation Management Assistance &lt;br /&gt;
* Project Review Support&lt;br /&gt;
* WASPY Awards Nominations&lt;br /&gt;
* OWASP OSS and OPT Participation&lt;br /&gt;
* Opportunity to submit proposal: $500 for Development.&lt;br /&gt;
* Community Engagement and Support&lt;br /&gt;
* Recognition and visibility of being associated with the OWASP Brand.&lt;br /&gt;
&lt;br /&gt;
'''Labs'''&lt;br /&gt;
* All benefits given to Incubator Projects &lt;br /&gt;
* Technical Writing Support&lt;br /&gt;
* Graphic Design Support&lt;br /&gt;
* Project Promotion Support&lt;br /&gt;
* OWASP OSS and OPT: Preference&lt;br /&gt;
&lt;br /&gt;
'''Flagship'''&lt;br /&gt;
* All benefits given to Incubator &amp;amp; Labs Projects&lt;br /&gt;
* Grant finding and proposal writing help&lt;br /&gt;
* Yearly marketing plan development&lt;br /&gt;
* OWASP OSS and OPT participation preference&lt;br /&gt;
&lt;br /&gt;
For more detailed information on OWASP Project Stage Benefits, please see the 2013 Project Handbook.&lt;br /&gt;
&lt;br /&gt;
== Project Monitoring Incubator/Documentation ==&lt;br /&gt;
Every 6 months, a project monitoring assessment takes place to evaluate if projects had any releases during this period.A warning will be sent to projects without any activity in 90 days and after 180 days, the project will be set automatically as inactive.&lt;br /&gt;
You can set your project active at any time, as long as:&lt;br /&gt;
* There has been commits to the project's open repository or&lt;br /&gt;
* There has been a beta release of the documentation produced so far or&lt;br /&gt;
* Provide a detailed Roadmap &lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Roadmap===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 600px]]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project Monitoring for LABS/Flagship==&lt;br /&gt;
These project represent the best OWASP has to offer, therefore monitoring of these projects is closely supervised.&lt;br /&gt;
===For Code and Tools===&lt;br /&gt;
For projects holding Flagship status, we closely monitor their health every 6 months on the following, among other key indicators:&lt;br /&gt;
*Can the project be built correctly?&lt;br /&gt;
*Does the project has any activity(commits) in the last 6 months?&lt;br /&gt;
*Does the project had any releases in the last 6 months?&lt;br /&gt;
*Has the project leaders updated his wiki or website to reflect latest releases?&lt;br /&gt;
===For Documentation===&lt;br /&gt;
For this part, we are working on the development of an adequate assessment criteria&lt;br /&gt;
The following is a draft of the new process proposal: [[https://www.owasp.org/index.php/File:Qualitative_and_Quantitative_Content_Audit.pdf Proposal for Reviewing OWASP Document projects]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Graduation==&lt;br /&gt;
The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
The review centers around the following core questions. Each core question has three (3) specific questions made up of binary queries. A project must receive at least two (2) positive responses from each reviewer in two of the binary questions, to warrant a postive response for the core question. Each core question must receive a positive response from both project reviewers to pass the Project Health Assessment for Incubator Projects. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Graduation Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Health Assessment==&lt;br /&gt;
The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation for projects going from Incubator to LAB and from LAB to Flagship. The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Health Assessment Criteria Document]. If a project passes the assessment, it then becomes eligible to graduate into the OWASP Labs Project stage. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Deliverable/Release Assessment==&lt;br /&gt;
The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to  review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception. &lt;br /&gt;
&lt;br /&gt;
Reviews must be performed by two (2) OWASP Chapter or Project Leaders, and their review must answer affirmatively to at least the first two (2) core Project Deliverable/Release Review questions. A project must pass the OWASP Project Deliverable/Release Assessment in order to graduate into the OWASP Labs Project stage. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Deliverable/Release Assessment Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Brand Resources  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The Brand Usage Rules==&lt;br /&gt;
See OWASP's [[Marketing/Resources#tab=BRAND_GUIDELINES|The Brand Usage Rules]] for details.&lt;br /&gt;
&lt;br /&gt;
==Project Icons &amp;amp; Templates==&lt;br /&gt;
See OWASP'S [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
(Following links and images are provided for a quick overview only, the primary page is [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]]).&lt;br /&gt;
&lt;br /&gt;
If you require more assistance with these files and/or templates, please contact the OWASP staff for assistance &lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Operations_Project_Template|OWASP Operational Wiki Template]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Documentation_Project_Template|OWASP Example Template: DO NOT EDIT]]'''&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_Project_Header.jpg|Owasp logo|500px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_TOOL.jpg|Owasp logo|200px]] [[Image:Project_Type_Files_DOC.jpg||Owasp logo 1c|200px]]  &lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_CODE.jpg|Owasp logo|200px]] [[Image:Owasp-defenders-small.png|Owasp logo|100px]] [[Image:Owasp-builders-small.png|Owasp logo|100px]] [[Image:Owasp-breakers-small.png|Owasp logo|100px]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-incubator-trans-200.png|Owasp logo rev icon|100px]] [[Image:Owasp-labs-trans-85.png|Owasp logo flat|100px]] [[Image:Owasp-flagship-trans-85.png|Owasp logo icon|100px]]&lt;br /&gt;
&lt;br /&gt;
===OpenSAMM===&lt;br /&gt;
'''[[Media:OpenSAMM_icons.zip|OpenSAMM Icons]]'''&lt;br /&gt;
&lt;br /&gt;
'''Construction:'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Construction black.png| Construction black| 100px]]  [[Image:Construction blue.png| Construction blue| 100px]]  [[image:Construction olive.png |construction olive|100px]]&lt;br /&gt;
&lt;br /&gt;
'''Deployment:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Deployment black.png| Deployment black| 100px]]  [[image:Deployment blue.png| Deployment blue| 100px]]  [[image:Deployment olive.png | Deployment olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Governance:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Governance black.png| governance black| 100px]]  [[image:Governance blue.png | governance blue | 100px]]  [[image:Governance olive.png | governance olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Verification:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Verification black.png | Verification black | 100px]]  [[image:Verification blue.png | verification blue | 100px]]  [[image: Verification olive.png | Verification olive | 100px]]&lt;br /&gt;
&lt;br /&gt;
==Book Cover Files==&lt;br /&gt;
See OWASP's [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
[[Media:Lulu-guide.pdf|Lulu Guide]]&lt;br /&gt;
&lt;br /&gt;
'''[https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip Download the Book Cover Zip File]'''&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;300&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:BookImage_01.jpg‎|500px| link=https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Terminology =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== OWASP Project Infrastructure ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Lifecycle:''' The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Project:''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway. The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Labs Project:''' OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Flagship Project:''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Benefits:''' The standard list of resources and incentives made available to project leaders based on their project's current maturity level. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Reviews ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviews:''' Project reviews are the method OWASP uses to establish a minimal baseline of project characteristics and release quality. Reviews are not mandatory, but they are necessary if a project leader wishes to graduate to the next level of maturity within the OWASP Global Projects infrastructure. Projects can be reviewed when an Incubator project wishes to graduate into the OWASP Labs designation, and project releases can be reviewed if they want the quality of their deliverable to be vouched for by OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviewer Pool:''' The project reviewer pool is made up of veteran reviewers who have proven themselves dedicated to executing quality reviews of projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Graduation:''' The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Health Assessment:''' The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE#gid=1 Project Health Assessment Criteria Document].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Release:''' A project release refers to the final deliverable a project produces. It is the final product of the project. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Deliverable/Release Review:''' The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects Processes == &lt;br /&gt;
&lt;br /&gt;
*'''Project Processes:''' The set of streamlined processes that exist to help projects move smoothly through the OWASP Project Lifecycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Inception Process:''' The Project Inception Process is how a brand new idea becomes an OWASP Project. Such projects are labeled as OWASP Incubator projects. The process involves submitting the proposed project name, project leader information, project description, project roadmap, and selecting an appropriate open-source license for the project using the New Project Form on the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Donation Process:''' The Project Donation Process is used for a project that has an existing functional release, but is not currently associated with OWASP. This process is the primary mechanism by which individuals or organizations can transfer the ownership of their project’s copyright to OWASP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Transition Process:''' The Project Transition Process is used to transition leadership of a project to a new project leader. This is a simple automated process to transfer the relevant accounts, mailing lists, and other project resources to the new project leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Abandonment Process:''' The Project Abandonment Process was put in place for those occasions in which a project leader is no longer able to manage their project, and has not been able to find a suitable replacement for the leader role. Project Abandonment can also occur when the project leader feels his/her project has become obsolete. Under these circumstances, the acting project leader is encourage do submit the Project Abandonment Form found in the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Graduation Process:''' The Incubator Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Projects at Conferences == &lt;br /&gt;
&lt;br /&gt;
*'''AppSec Conferences:''' OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Open Source Showcase:''' The Open Source Showcase is an OWASP AppSec Conference event module designed to give Open Source project leaders the opportunity to demo their projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Track:''' The OWASP Project Track is an OWASP AppSec Conference event module designed to give OWASP Project leaders the opportunity to showcase their projects as an official conference presenter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects General ==  &lt;br /&gt;
&lt;br /&gt;
*'''OWASP Code of Ethics:''' The OWASP Code of Ethics are the set of guidelines and principles that the OWASP Foundation expects all of its members and conference attendees to abide by. A copy of the Code of Ethics can be found here in the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#Code_of_Ethics OWASP About page]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sponsorships and Donations  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate to OWASP Global Projects ==&lt;br /&gt;
OWASP Projects, a global division of the OWASP Foundation, is run under the same world wide not-for-profit charitable status as all the foundation strategic groups. OWASP provides a platform for contributors to share their work while providing them with the project and community support they need throughout their project development. All OWASP Projects are run by volunteers and they rely on personal donations and sponsorship to continue their development. Donate to OWASP Projects, and we promise to spend your money wisely on open source initiatives.&lt;br /&gt;
&lt;br /&gt;
'''This is how your money can help:'''&lt;br /&gt;
&lt;br /&gt;
* $20 could help us spread the word on the importance of open source initiatives in the Application Security industry.&lt;br /&gt;
* $100 could help fund OWASP project demos at major conferences.&lt;br /&gt;
* $250 could help get our volunteer Project Leaders to speaking engagements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_Button.jpg | link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Contact US  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you need any help with anything projects related, or if you simply need some more information, please do not hesitate to [http://owasp4.owasp.org/contactus.html Contact Us].&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Task_Force/OWASP_Projects&amp;diff=193540</id>
		<title>Task Force/OWASP Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Task_Force/OWASP_Projects&amp;diff=193540"/>
				<updated>2015-04-17T06:25:45Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Current Members */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This task force is focused on OWASP Projects with a first focus on cleaning up the OWASP incubator list&lt;br /&gt;
&lt;br /&gt;
==Current To-do list==&lt;br /&gt;
&lt;br /&gt;
Tracking of current stuff is done temporary [https://docs.google.com/a/owasp.org/spreadsheets/d/1n1qoVJTd7dP7GbIJvXwGUspkb4mfcmo9IorM9rZGVtE/edit?usp=sharing here] as we plan to use Jira in the long run.&lt;br /&gt;
&lt;br /&gt;
* Clean up of Incubator Projects and inactivate projects without a release or updates for over a year. &lt;br /&gt;
* Inactive/Active Project Audits:https://groups.google.com/a/owasp.org/forum/?hl=en#!forum/projects-task-force (must be OWASP member)&lt;br /&gt;
* Project Reviews: [https://groups.google.com/a/owasp.org/forum/?hl=en#!forum/projects-task-force See here for more details]&lt;br /&gt;
* [Task: Project Metrics Collection Project Metrics Collection: Data needed]&lt;br /&gt;
&lt;br /&gt;
* Plan next EU Project Summit 2015 Amsterdam&lt;br /&gt;
* [[AppSecUSA 2014 Projects Summit Rescue]]&lt;br /&gt;
** USA Summit 2014 is happening [https://www.owasp.org/index.php/OWASP_Project_Summit_USA_2014 wiki page here]&lt;br /&gt;
* [[LAB Projects Code Analysis Report]]&lt;br /&gt;
* The Proposal Evaluation Methodology for OWASP Projects - Johanna has put together a proposal for evaluating project. The proposal can be found here: [https://docs.google.com/a/owasp.org/viewer?a=v&amp;amp;pid=forums&amp;amp;srcid=MDM4NTc0NDY0NjkwMzEwMTMzMzkBMDU3ODU2MTQ5MTQ0OTI0ODk1OTYBcWUxcGRuaHppUVVKATAuMQFvd2FzcC5vcmcBdjI Proposal Evaluation].&lt;br /&gt;
*Create a coherent wiki page for the Project Dashboard.&lt;br /&gt;
&lt;br /&gt;
==To-do list: Future Tasks==&lt;br /&gt;
* Gather support and funding to have 1 large OWASP Summit. &lt;br /&gt;
* Design a more sustainable revenue stream using the Project’s IP.&lt;br /&gt;
* Identify &amp;amp; promote cross-project collaboration to move clusters of projects forward, with e.g. work groups that work on a certain domain.&lt;br /&gt;
* Start a task force of people with spare cycles that can help projects that need extra man-power of are falling behind in delivery of new releases (especially the flag ship projects).&lt;br /&gt;
&lt;br /&gt;
==Completed Tasks==&lt;br /&gt;
* create a new mailing list (in google groups) for this task force: https://groups.google.com/a/owasp.org/forum/?hl=en#!forum/projects-task-force&lt;br /&gt;
* Submissions for Open Source Showcase at AppSec EU: [https://groups.google.com/a/owasp.org/d/msg/projects-task-force/IZdd-4CpUNg/WqSpxf92n8gJ See here for more details]: Completed by Team. - May 02, 2014&lt;br /&gt;
* Need to review [[OWASP_Java_HTML_Sanitizer_Project|Java HTML Sanitizer Project]]: [https://groups.google.com/a/owasp.org/d/msg/projects-task-force/Wdg6dGr6mj4/N89imuYLqFoJ See here for more details]: Removed from the Review List - Samantha - May 02, 2014&lt;br /&gt;
*Wikify Projects Dashboard: Removed as agreed it is unnecessary - Samantha - May 02, 2014&lt;br /&gt;
*Move the Google Groups to OWASP Google App - Jonathan - July 16, 2014&lt;br /&gt;
*Inactivated all Incubator Documentation projects with no release in over a year and no updates. - August 2, 2014.&lt;br /&gt;
* Need to get all project repos added to https://www.openhub.net/orgs/OWASP: DONE- 88 projects have an open repository&lt;br /&gt;
* Created the Project Dashboard. Look for link once the wiki page has been created.&lt;br /&gt;
&lt;br /&gt;
==Failed Tasks==&lt;br /&gt;
* [https://groups.google.com/a/owasp.org/d/msg/projects-task-force/T87T1KfTlzg/KDkrGDqVuj4J 2014 Cambridge Summit Sponsorship Needs]&lt;br /&gt;
&lt;br /&gt;
==Execution Power==&lt;br /&gt;
&lt;br /&gt;
This task force exists on the assumption that it has a mandate from the OWASP leaders to act on behalf of the OWASP community on what is best for OWASP Projects. We are in the process of submitting a Committee Proposal for Project reviews&lt;br /&gt;
&lt;br /&gt;
If somebody (namely an OWASP Leader or Board member) disagree with any of the decisions made, he/she has two options:&lt;br /&gt;
&lt;br /&gt;
* join this Task Force/Committe&lt;br /&gt;
* create another equivalent 'OWASP Projects group' and do a better job there&lt;br /&gt;
&lt;br /&gt;
''note that Committee 2.0 will change this as this task force might converge to a new Committee or fall under one if needed''&lt;br /&gt;
&lt;br /&gt;
==Current Members==&lt;br /&gt;
&lt;br /&gt;
* Johanna Curiel &lt;br /&gt;
*Timo Goosen&lt;br /&gt;
* Jonathan Marcil&lt;br /&gt;
* Jason Johnson&lt;br /&gt;
* Noreen Whysel - OWASP Community Manager (Staff)&lt;br /&gt;
* S. M. Shezan - OWASP Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP Projects Task Force (Concept)==&lt;br /&gt;
&lt;br /&gt;
This is a new type of OWASP initiative, focused on 'getting things done', the concept is still evolving but here are the current (in draft) guiding principles:&lt;br /&gt;
&lt;br /&gt;
#  this 'task force is an invitation-only group' (to join the task force, requests should be made directly with existing task force members)&lt;br /&gt;
# all existing members have VETO power, and it is assumed that all decisions are backed up with all existing members&lt;br /&gt;
# only existing members can send the invitations&lt;br /&gt;
# there is a 1 month minimum activity required (or the member is temporarily out). &lt;br /&gt;
# invitations are automatically approved in 24h &lt;br /&gt;
# existing members can VETO new members (and existing members can be kickout by majority)&lt;br /&gt;
# there an one special member who has veto power the responsibility to enforce the 'one month contribution MIA scenario' (i.e. to kick out the 'non contributing members')&lt;br /&gt;
# all communication MUST be made (as much as practically possible) under public mediums: Wiki, public mailings, public Hangout sessions&lt;br /&gt;
# there are NO decisions made BEHIND closed doors, or without a solid digital (hyperlinkable) trail&lt;br /&gt;
&lt;br /&gt;
==Discussions==&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/a/owasp.org/forum/#!forum/projects-task-force Google Group] You must be logged in your OWASP Google App account to view and post to the group.&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=193539</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=193539"/>
				<updated>2015-04-17T06:23:40Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: /* Code [Reviewed November 2014] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Welcome to the OWASP Global Projects Page ===&lt;br /&gt;
&lt;br /&gt;
An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. OWASP currently has over 142 active projects, and new project applications are submitted every week.  &lt;br /&gt;
&lt;br /&gt;
This is one of the most popular divisions of OWASP as it gives members an opportunity to freely test theories and ideas with the professional advice and support of the OWASP community. Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any project by visiting the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. A summary of recent project announcements is available on the [[OWASP Updates]] page. &lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:PROJECT_LEADER-HANDBOOK_2014.pdf|OWASP Project Handbook 2014]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_2014_Project_Handbook|OWASP Project Handbook Wiki 2014]]'''&lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:OWASP_Projects_Handbook_2013.pdf|OWASP Projects Handbook 2013]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[Project_Online_Resources|Project Online Resources]]'''&lt;br /&gt;
&lt;br /&gt;
=== Who Should Start an OWASP Project? ===&lt;br /&gt;
&lt;br /&gt;
*Application Developers. &lt;br /&gt;
*Software Architects. &lt;br /&gt;
* Information Security Authors.  &lt;br /&gt;
*Those who would like the support of a world wide professional community to develop or test an idea.&lt;br /&gt;
*Anyone wishing to take advantage of the professional body of knowledge OWASP has to offer.&lt;br /&gt;
&lt;br /&gt;
=== Contact Us===&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please do not hesitate to  [http://owasp4.owasp.org/contactus.html Contact Us] by using the form provided here. Please allow five working days for your question or comment to be answered. This is due to the large amount of queries the foundation staff receive every day. We thank you for your patience. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Project Inventory ===&lt;br /&gt;
&lt;br /&gt;
All OWASP tools, document, and code library projects are organized into the following [[OWASP_Project_Stages|categories:]] &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Flagship_Projects|Flagship Projects:]]''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Labs_Projects|Lab Projects:]]''' OWASP Labs projects represent projects that have produced an OWASP reviewed deliverable of value. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Incubator_Projects|Incubator Projects:]]''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.&lt;br /&gt;
&lt;br /&gt;
=== Social Media ===&lt;br /&gt;
&lt;br /&gt;
We recommend using the links below to find our official OWASP social media channels. These are a great way to keep in touch with the different initiatives going on at OWASP throughout the world. They are all updated regularly by chapter leaders, project leaders, the OWASP Board Members, and our OWASP Staff. If you have any questions or concerns about any of these accounts, please drop us a line using our [http://www.tfaforms.com/308703 &amp;quot;Contact Us&amp;quot;] form found above.  &lt;br /&gt;
&lt;br /&gt;
[[Image:Blogger-32x32.png|32px|link=http://owasp.blogspot.co.uk/]] [[Image:Twitter-32x32.png|32px|link=https://twitter.com/OWASP]] [[Image:Facebook-32x32.png|32px|link=https://www.facebook.com/groups/172892372831444/]] [[Image:Linkedin-32x32.png|32px|link=http://www.linkedin.com/groups/Global-OWASP-Foundation-36874]] [[Image:Google-32x32.png|32px|link=https://plus.google.com/u/0/communities/105181517914716500346?cfem=1]] [[Image:Ning-32x32.png|32px|link=http://myowasp.ning.com/]]&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 3px solid rgb(204, 204, 204); vertical-align: top; width: 95%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; |  &lt;br /&gt;
&amp;lt;div style=&amp;quot;padding:2em;padding-bottom:0px;&amp;quot;&amp;gt;&amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL; also 2 empty lines between images --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:New_initiatives.png|center|300px| link=http://owasp.force.com/volunteers/GW_Volunteers__VolunteersJobListing]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_here_banner.png|center|300px| link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project Inventory  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Project Dashboard lists the all project information at a glance, including release links, the current status of the project and project leader contact information. The Project Dashboard can be found here: https://www.owasp.org/index.php/OWASP_Project_Dashboard&lt;br /&gt;
&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
[[File:Flagship_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole.&lt;br /&gt;
After a major review process [[https://www.owasp.org/index.php/LAB_Projects_Code_Analysis_Report More info here]] the following projects are considered to be flagship candidate projects. These project will be evaluated more deeply to confirm their flagship status:&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy]]&lt;br /&gt;
* [[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment Project]]&lt;br /&gt;
* [[OWASP_OWTF|OWASP OWTF]]&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency Check]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed November 2014]====&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
* [[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard Project]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP System Vulnerable Code Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed February 2015] in progress====&lt;br /&gt;
* [[:Category:OWASP_Application_Security_Verification_Standard_Project|OWASP Application Security Verification Standard Project]]&lt;br /&gt;
* [[:Category:Software_Assurance_Maturity_Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[:Category:OWASP_Top_Ten_Project|OWASP Top Ten Project]]&lt;br /&gt;
* [[OWASP_Testing_Project|OWASP Testing Guide Project]]&lt;br /&gt;
&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
[[File:Lab banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to LAB projects showing a steady progress in their development, had very active and continuous releases and commits, regular update of information on their wiki page and have quite complete documentation. These projects are almost ready to become flagship&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed February 2015]====&lt;br /&gt;
* [[OWASP_Hackademic_Challenges_Project|OWASP Hackademic Challenges Project]]&lt;br /&gt;
* [[OWASP_Mantra_-_Security_Framework|OWASP Mantra Security Framework]]&lt;br /&gt;
* [[OWASP_O2_Platform|OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP_Dependency_Track_Project|OWASP Dependency Track Project]]&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
* [[O-Saft|O-Saft]]&lt;br /&gt;
* [[:Category:OWASP_EnDe|OWASP EnDe Project]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] &lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security Project]]&lt;br /&gt;
*[[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]]&lt;br /&gt;
&lt;br /&gt;
====Documentation [In Progress-Results by February/March 2015] ====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Podcast|OWASP Podcast Project]]&lt;br /&gt;
* [[:Category:OWASP_Code_Review_Project|OWASP Code Review Guide Project]]&lt;br /&gt;
* [[:Category:OWASP_Guide_Project|OWASP Development Guide Project]]&lt;br /&gt;
*[[OWASP_CISO_Survey|OWASP CISO Survey]] &lt;br /&gt;
*[[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]]&lt;br /&gt;
*[[OWASP_Cornucopia|OWASP Cornucopia]]&lt;br /&gt;
*[[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Contests====&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]] &lt;br /&gt;
* [[:Category:OWASP_CTF_Project|OWASP CTF Project]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed February 2015]====&lt;br /&gt;
* [[:Category:OWASP_Enterprise_Security_API|OWASP Enterprise Security API]]&lt;br /&gt;
&lt;br /&gt;
======Low Activity (LABS)[Reviewed February 2015] ======&lt;br /&gt;
[[File:low_activity.jpg]]&lt;br /&gt;
&lt;br /&gt;
These projects had no releases in at least a year, however have shown to be valuable tools&lt;br /&gt;
Code [Low Activity]&lt;br /&gt;
* [[Project_Information:template_Vicnum_Project|OWASP Vicnum Project]]&lt;br /&gt;
* [[OWASP_Broken_Web_Applications_Project|OWASP Broken Web Applications Project]]&lt;br /&gt;
&lt;br /&gt;
Documentation [Low Activity]&lt;br /&gt;
* [[OWASP_Appsec_Tutorial_Series|OWASP AppSec Tutorial Series]]&lt;br /&gt;
* [[:Category:OWASP_Legal_Project|OWASP Legal Project]]&lt;br /&gt;
* [[Virtual_Patching_Best_Practices|Virtual Patching Best Practices]]&lt;br /&gt;
* [[OWASP_Codes_of_Conduct|OWASP Codes of Conduct]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
[[File:Incubator_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to incubator projects showing a steady progress in their development, had continuous releases and commits or have delivered a complete product, including open source repository location, basic user guidelines and documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed March 2015]====&lt;br /&gt;
* [[OWASP_Java_Encoder_Project|OWASP Java Encoder Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Java_File_I_O_Security_Project|OWASP Java File I/O Security Project]]&lt;br /&gt;
* [[OWASP_PHPRBAC_Project|OWASP PHPRBAC Project]] &lt;br /&gt;
* [[OWASP_iMAS_iOS_Mobile_Application_Security_Project|OWASP iMAS - iOS Mobile Application Security Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_PHP_Security_Project|OWASP PHP Security Project]] [[File:Thumbsup.png|15px]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Node_js_Goat_Project|OWASP Node.js Goat Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_System_Vulnerable_Code_Project|OWASP System Vulnerable Code Project]]&lt;br /&gt;
* [[OWASP_ISO_IEC_27034_Application_Security_Controls_Project|OWASP ISO/IEC 27034 Application Security Controls Project]]&lt;br /&gt;
* [[OWASP_Hardened_Phalcon_Project|OWASP Hardened Phalcon Project]]&lt;br /&gt;
* [[OWASP_Faux_Bank_Project|OWASP Faux Bank Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Security_Research_and_Development_Framework|OWASP Security Research and Development Framework]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_File_Format_Validation_Project|OWASP File Format Validation Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
*[[OWASP_Security_Logging_Project|OWASP Security Logging Project]]&lt;br /&gt;
*[[OWASP_Droid10_Project|OWASP Droid]]&lt;br /&gt;
&lt;br /&gt;
====Tools [Review in progress-April 2015]====&lt;br /&gt;
*[[Benchmark|OWASP WebGoat Benchmark]]&lt;br /&gt;
*[[OWASP_WAP-Web_Application_Protection|WAP Web Application_Protection]]&lt;br /&gt;
*[[OWASP_Java_HTML_Sanitizer|OWASP Java HTML Sanitizer Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Security_Shepherd|OWASP Security Shepherd]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Mantra_OS|OWASP Mantra OS]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_iGoat_Project|OWASP iGoat Project]]&lt;br /&gt;
*[[OWASP_Bricks|OWASP Bricks]]&lt;br /&gt;
*[[OWASP_Bywaf_Project|OWASP Bywaf Project]]&lt;br /&gt;
*[[OWASP_Mutillidae_2_Project|OWASP Mutillidae 2 Project]] &lt;br /&gt;
*[[OWASP_SeraphimDroid_Project|OWASP SeraphimDroid Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Python_Security_Project|OWASP Python Security Project]]&lt;br /&gt;
*[[OWASP_WebSpa_Project|OWASP WebSpa Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_NINJA_PingU_Project|OWASP NINJA PingU Project]]&lt;br /&gt;
*[[OWASP_Encoder_Comparison_Reference_Project|OWASP Encoder Comparison Reference Project]]&lt;br /&gt;
*[[:Category:OWASP_SQLiX_Project|OWASP sqliX Project]]&lt;br /&gt;
*[[OWASP_Click_Me_Project|OWASP Click Me Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Secure_TDD_Project|OWASP Secure TDD Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_XSecurity_Project|OWASP XSecurity Project]]&lt;br /&gt;
*[[OWASP_Pyttacker_Project|OWASP Pyttacker Project]]&lt;br /&gt;
*[[OWASP_Code_Pulse_Project|OWASP Code Pulse Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_HTTP_Post_Tool|OWASP HTTP POST Tool]]&lt;br /&gt;
*[[OWASP_PHP_Security_Training_Project|OWASP PHP Security Training Project]]&lt;br /&gt;
*[[Projects/OWASP_iOSForensic|OWASP iOSForensic]]&lt;br /&gt;
*[[OWASP_Project_Metrics|OWASP Project Metrics]]&lt;br /&gt;
*[[OWASP_Store_Sheep_Project|OWASP Store Sheep Project]]&lt;br /&gt;
*[[OWASP_SonarQube_Project|OWASP SonarQube Project]]&lt;br /&gt;
*[[OWASP Rainbow Maker Project | OWASP Rainbow Maker Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP JSEC CVE Details | OWASP JSEC CVE Details]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_WebGoat.NET|OWASP WebGoat.NET]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASIDE_Project|OWASP ASIDE Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASVS_Assessment_tool | OWASP Assesment Tool]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Review: March 2015-In progress]====&lt;br /&gt;
*[[OWASP Automated Threats to Web Applications]]&lt;br /&gt;
*[[OWASP_Data_Exchange_Format_Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
*[[OWASP_Proactive_Controls|OWASP Proactive Controls]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Enterprise_Application_Security_Project|OWASP Enterprise Application Security Project]]&lt;br /&gt;
*[[Projects/OWASP_GoatDroid_Project|OWASP GoatDroid Project]]&lt;br /&gt;
*[[OWASP_RFP-Criteria|OWASP Request For Proposal]]&lt;br /&gt;
*[[OWASP_Hacking_Lab|OWASP Hacking-Lab]]&lt;br /&gt;
*[[WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project|WASC/OWASP Web Application Firewall Evaluation Criteria (WAFEC)]]&lt;br /&gt;
*[[OWASP_Secure_Application_Design_Project|OWASP Secure Application Design Project]]&lt;br /&gt;
*[[OWASP_Top_10_Fuer_Entwickler_Project|OWASP Top 10 Fuer Entwickler Project]]&lt;br /&gt;
*[[OWASP_Security_Principles_Project|OWASP Security Principles Project]]&lt;br /&gt;
*[[OWASP_Media_Project|OWASP Media Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Global_Chapter_Meetings_Project|OWASP Global Chapter Meetings Project]]&lt;br /&gt;
*[[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
*[[OWASP_Insecure_Web_Components_Project|OWASP Insecure Web Components Project]]&lt;br /&gt;
*[[OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project|OWASP Reverse Engineering and Code Modification Prevention Project]]&lt;br /&gt;
*[[OWASP_Student_Chapters_Program|OWASP Student Chapters Project]]&lt;br /&gt;
*[[:Category:OWASP_Education_Project|OWASP Education Project]]&lt;br /&gt;
*[[:Category:OWASP_Speakers_Project|OWASP Speakers Project]]&lt;br /&gt;
*[[OWASP_Internet_of_Things_Top_Ten_Project|OWASP Internet of Things Top Ten Project]]&lt;br /&gt;
*[[:Category:OWASP_.NET_Project|OWASP .NET Project]]&lt;br /&gt;
*[[OWASP_Open_Cyber_Security_Framework_Project|OWASP Open Cyber Security Framework Project]]&lt;br /&gt;
*[[OWASP_Top_10_Privacy_Risks_Project|OWASP Top 10 Privacy Risks Project]]&lt;br /&gt;
*[[OWASP_WASC_Web_Hacking_Incidents_Database_Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
*[[OWASP_Security_Frameworks_Project|OWASP Security Frameworks Project]]&lt;br /&gt;
*[[OWASP_Incident_Response_Project|OWASP Incident Response Project]]&lt;br /&gt;
*[[OWASP_Embedded_Application_Security|OWASP Embedded Application Security]]&lt;br /&gt;
*[[OWASP_STING_Game_Project|OWASP STING Game Project]]&lt;br /&gt;
*[[Projects/OWASP_Ruby_on_Rails_and_friends_Security_Guide|OWASP Ruby on Rails and Friends Security Guide]]&lt;br /&gt;
*[[OWASP_Secure_Development_Training|OWASP Secure Development Training]]&lt;br /&gt;
*[[OWASP_Periodic_Table_of_Vulnerabilities|OWASP Periodic Table of Vulnerabilities]]&lt;br /&gt;
*[[OWASP_Top_Trumps_for_Projects|OWASP Top Trumps for Projects]]&lt;br /&gt;
*[[OWASP_Supporting_Legacy_Web_Applications_in_the_Current_Environment_Project|OWASP Supporting Legacy Web Applications in the Current Environment Project]]&lt;br /&gt;
*[[OWASP KALP Mobile Project | OWASP KALP Mobile Project]]&lt;br /&gt;
*[[OWASP Persian Translation Project | OWASP Persian Translation Project]]&lt;br /&gt;
*[[OWASP_Security_Controls_in_Web_Application_Development_Lifecycle |OWASP Security Controls in Web Application Development Lifecycle Project]]&lt;br /&gt;
*[[OWASP_Application_Security_Program_Quick_Start_Guide_Project|OWASP_Application_Security_Program_Quick_Start_Guide_Project]]&lt;br /&gt;
*[[OWASP_Secure_Configuration_Guide|OWASP_Secure_Configuration_Guide]]&lt;br /&gt;
*[[OWASP_Product_Requirement_Recommendations_Library|OWASP_Product_Requirement_Recommendations_Library]]&lt;br /&gt;
*[[OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project|OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project]]&lt;br /&gt;
*[[OWASP_Knowledge_Graph|OWASP_Knowledge_Graph]]&lt;br /&gt;
&lt;br /&gt;
====Educational Project====&lt;br /&gt;
*[[OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project#tab=Main | OWASP Visual Crime Scene and Security Incident Project]]&lt;br /&gt;
&lt;br /&gt;
==Donated Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Donated Projects are inactive projects that have been donated to the OWASP Projects Infrastructure. &lt;br /&gt;
&lt;br /&gt;
====Tools====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Excess_XSS_Project|OWASP Excess XSS Project]]&lt;br /&gt;
* [[OWASP_JOTP_Project|OWASP jOTP Project]]&lt;br /&gt;
&lt;br /&gt;
==OWASP Archived Projects==&lt;br /&gt;
OWASP Archived Projects are projects that have developed outside OWASP umbrella or have become inactive. If you are interested in pursuing any of the inactive projects (click hyperlink for list), please contact us and let us know of your interest.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project_Archived_Projects&lt;br /&gt;
&lt;br /&gt;
= Project Task Force =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OWASP Project Task Force====&lt;br /&gt;
&lt;br /&gt;
{{:Task_Force/OWASP_Projects}}&lt;br /&gt;
&lt;br /&gt;
= Online Resources =&lt;br /&gt;
&lt;br /&gt;
===Project Online Resources===&lt;br /&gt;
&lt;br /&gt;
{{:Project_Online_Resources}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Starting a New Project  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== So you want to start a project... ==&lt;br /&gt;
&lt;br /&gt;
Starting an OWASP project is quite easy, and your desire to contribute and make it happen is essential.&lt;br /&gt;
[[File:HowToStartProjectoWasp.png | 600px | right]]&lt;br /&gt;
&lt;br /&gt;
Here are some of the guidelines for running a successful OWASP project:&lt;br /&gt;
&lt;br /&gt;
-Start exploring the actual OWASP projects Inventory. Many projects handle specific areas of security it is a good idea to start looking how other successful projects do this (LABS/Flagship)&lt;br /&gt;
&lt;br /&gt;
-Place your idea or project on the [https://www.owasp.org/index.php/Project_Ideas_Board#From_Idea_to_Project_Incubator Project Ideas Board].This phase will help you to define the project goals and also explore and exchange with other OWASP leaders and volunteers how to develop the idea into a tangible project&lt;br /&gt;
&lt;br /&gt;
-Explore and research if your idea covers a unique segment in the Security arena.Think of your project as a product, if you really want people using it, think how this project will cover a necessity in the security area you are working on &lt;br /&gt;
&lt;br /&gt;
-Define what kind of project you would like to start. Is it a code, tool or documentation?&lt;br /&gt;
&lt;br /&gt;
-Communicate through the Project leader mailing list about your idea and get feedback and  meet potential contributors&lt;br /&gt;
&lt;br /&gt;
-Develop your project based on the type of project. For example if you are willing to start a documentation project, begin by defining a Table of Content and work it through with potential contributors. First of all begin by creating a Road-map for your project. This is essential to submit your project. We highly recommend to read  documentation such as &amp;quot;[http://www2.econ.iastate.edu/tesfatsi/ProducingOSS.KarlFogel2005.pdf How to start /run a successful Open Source Projects]&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 500px | left]]&lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Road-map===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Start defining a development, documentation and marketing plan for your project. Set short , medium and long term plans. Include promotion of your project, this is very important in order to engage users and consumers of your project. Contact project coordinator and the Project Task Force to help you achieve this goal. You ''can'' run a single person project, but it's usually best to get the community involved.  You should be prepared to support a mailing list, build a team, speak at conferences, and promote your project.&lt;br /&gt;
&lt;br /&gt;
* You can contribute existing documents or tools to OWASP! Assuming you have the intellectual property rights to a work, you can open it to the world as an OWASP Project.  Please coordinate this with OWASP by contacting owasp(at)owasp.org.&lt;br /&gt;
&lt;br /&gt;
* Available Grants to consider if you need funding - [[Grants|Click Here]]&lt;br /&gt;
&lt;br /&gt;
* You should promote your project through the OWASP channels as well as by outside means.  Get people to blog about it!&lt;br /&gt;
&lt;br /&gt;
== Creating a new project ==&lt;br /&gt;
Once you have passed the Project Ideas phase, then you will be ready to start a new project&lt;br /&gt;
To Submit your project please use the following form&lt;br /&gt;
. [http://www.tfaforms.com/263506 Please submit a new project application here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* You will need to gather the following information together for your application:&lt;br /&gt;
A - PROJECT&lt;br /&gt;
# Project Name,&lt;br /&gt;
# Project purpose / overview,&lt;br /&gt;
# Project Roadmap,&lt;br /&gt;
# Project links (if any) to external sites,&lt;br /&gt;
# [[Guidelines_for_OWASP_Projects#Project_Licensing|Project License],]&lt;br /&gt;
# Project Leader name,&lt;br /&gt;
# Project Leader email address,&lt;br /&gt;
# Project Leader wiki account - the username (you'll need this to edit the wiki),&lt;br /&gt;
# Project Contributor(s) (if any) - name email and wiki account (if any),&lt;br /&gt;
# Project Main Links (if any).&lt;br /&gt;
# For Documentation: A table of Contents&lt;br /&gt;
# For Code: A prototype hosted in an open source repository of your choice. Make sure it has read access.&lt;br /&gt;
&lt;br /&gt;
* Check out the '''[[Guidelines for OWASP Projects]]'''.&lt;br /&gt;
* [[Grant_Spending_Policy|Grant Spending Policy]]&lt;br /&gt;
* [[Project_Spending_Policy|Project Spending Policy]]&lt;br /&gt;
* [[Project_Sponsorship_Operational_Guidelines|Project Sponsorship Operational Guidelines]]&lt;br /&gt;
&lt;br /&gt;
==OWASP	Recommended Licenses==&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Funding your Project==&lt;br /&gt;
An OWASP project does not receive any funding for development at project inception; however, a new project does have the opportunity to submit a request to receive funds if they are available for the year. Additionally, project leaders have the option of seeking sponsorship from outside organizations, but project leaders are required to seek funding through their own initiative. Please contact the OWASP Projects Manager for more information. &lt;br /&gt;
&lt;br /&gt;
== Project Release ==&lt;br /&gt;
&lt;br /&gt;
As your project reaches a point that you'd like OWASP to assist in its promotion, the will need the following information to help spread the word about your project:&lt;br /&gt;
&lt;br /&gt;
# Short 5 sentence paragraph outlining what your project is about, what you hope to accomplish with your project, what value your project brings to software security, and contributor and project leader names and contact information.&lt;br /&gt;
# Link to your wiki page.&lt;br /&gt;
# Link to your code repository or a link to where readers can download your project.&lt;br /&gt;
# Latest Release description answering the following questions: What is it?, What does it do?, Where can I get it?, Who should I contact if something goes wrong?.&lt;br /&gt;
&lt;br /&gt;
==Project Process Forms==&lt;br /&gt;
These forms were created to help project leaders, and those interested in a going through a process in the OWASP projects infrastructure. They facilitate the management of each query based on the specific task an applicant will need help with. The forms are described below, and they are linked with their designated online application form. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264422 Project Transition Application]:The OWASP project transition form gives current project leaders an easy way of handing over project administration information to individuals wishing to take over a project.  &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264413 Project Review Application]:This form is for current project leaders to request a review of their project based on OWASP graduation criteria. The aim is to designate an OWASP volunteer to review these projects within 3 months time. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264418 Project Donation Application]:This form is for projects outside of the OWASP project infrastructure. Project Leaders for these open source projects can choose to partner or give their project to OWASP directly through this form.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264428 Project Adoption Request]:This form is used when someone is interested in adopting an archived project. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264426 Project Abandonment Request]:The OWASP project abandonment form gives current project leaders an easy way of letting the OWASP Foundation know that they wish to resign their project leader duties. This form should be used when no replacement project leader exists to take over these duties.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264392 Incubator Project Graduation Application]:This application form is for Incubator Projects to apply for Labs Project status. &lt;br /&gt;
&lt;br /&gt;
= Project Assessments  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==OWASP Project Lifecycle==&lt;br /&gt;
The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state. The greater the maturity of the project, the greater the level of responsibility for the project leader. These responsibilities are not trivial as OWASP provides incentives and benefits (Section 7) for projects who take on these added responsibilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====The OWASP Project Lifecycle is broken down into the following stages:====&lt;br /&gt;
&lt;br /&gt;
'''Incubator Projects''': OWASP Incubator projects represent the experimental playground where projects are still being designed, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity; moreover, the label allows project leaders to leverage the OWASP name while their project is still maturing. OWASP Incubator projects are given a place on the OWASP Projects Portal to leverage the organizations' infrastructure, and establish their presence and project history.&lt;br /&gt;
&lt;br /&gt;
'''Lab Projects''': OWASP Labs projects represent projects that have produced a deliverable of significant value. Leaders of OWASP Labs projects are expected to stand behind the quality of their projects as these projects have matured to the point where they are accepted by a significant portion of the OWASP community. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are ready for mainstream usage. OWASP Labs Projects are meant to be the collection of established projects that have gained community support and acclaim by undergoing the project review process. &lt;br /&gt;
&lt;br /&gt;
'''Flagship Projects''': The OWASP Flagship designation is given to projects that have demonstrated superior maturity, established quality, and strategic value to OWASP and application security as a whole. Eligible projects are selected from the OWASP Labs project pool. This selection process generally ensures that there is only one project of each type covering any particular security space. OWASP Flagship projects represent projects that are not only mature, but are also projects that OWASP as an organization provides direct support to maintaining. The core mission of OWASP is to make application security visible and so as an organization, OWASP has a vested interest in the success of its Flagship projects. Since Flagship projects have such high visibility, these projects are expected to uphold the most stringent requirements of all OWASP Projects.&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Stage Benefits==&lt;br /&gt;
This section outlines the benefits of starting an OWASP project, and the benefits of being at each different stage in the projects lifecycle. In my short time here at OWASP as the PM, I have had several potential project leaders ask me what the benefits are of starting their project with OWASP. Below is my proposal for each Stage’s benefits.&lt;br /&gt;
&lt;br /&gt;
'''Incubator'''&lt;br /&gt;
* Financial Donation Management Assistance &lt;br /&gt;
* Project Review Support&lt;br /&gt;
* WASPY Awards Nominations&lt;br /&gt;
* OWASP OSS and OPT Participation&lt;br /&gt;
* Opportunity to submit proposal: $500 for Development.&lt;br /&gt;
* Community Engagement and Support&lt;br /&gt;
* Recognition and visibility of being associated with the OWASP Brand.&lt;br /&gt;
&lt;br /&gt;
'''Labs'''&lt;br /&gt;
* All benefits given to Incubator Projects &lt;br /&gt;
* Technical Writing Support&lt;br /&gt;
* Graphic Design Support&lt;br /&gt;
* Project Promotion Support&lt;br /&gt;
* OWASP OSS and OPT: Preference&lt;br /&gt;
&lt;br /&gt;
'''Flagship'''&lt;br /&gt;
* All benefits given to Incubator &amp;amp; Labs Projects&lt;br /&gt;
* Grant finding and proposal writing help&lt;br /&gt;
* Yearly marketing plan development&lt;br /&gt;
* OWASP OSS and OPT participation preference&lt;br /&gt;
&lt;br /&gt;
For more detailed information on OWASP Project Stage Benefits, please see the 2013 Project Handbook.&lt;br /&gt;
&lt;br /&gt;
== Project Monitoring Incubator/Documentation ==&lt;br /&gt;
Every 6 months, a project monitoring assessment takes place to evaluate if projects had any releases during this period.A warning will be sent to projects without any activity in 90 days and after 180 days, the project will be set automatically as inactive.&lt;br /&gt;
You can set your project active at any time, as long as:&lt;br /&gt;
* There has been commits to the project's open repository or&lt;br /&gt;
* There has been a beta release of the documentation produced so far or&lt;br /&gt;
* Provide a detailed Roadmap &lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Roadmap===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 600px]]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project Monitoring for LABS/Flagship==&lt;br /&gt;
These project represent the best OWASP has to offer, therefore monitoring of these projects is closely supervised.&lt;br /&gt;
===For Code and Tools===&lt;br /&gt;
For projects holding Flagship status, we closely monitor their health every 6 months on the following, among other key indicators:&lt;br /&gt;
*Can the project be built correctly?&lt;br /&gt;
*Does the project has any activity(commits) in the last 6 months?&lt;br /&gt;
*Does the project had any releases in the last 6 months?&lt;br /&gt;
*Has the project leaders updated his wiki or website to reflect latest releases?&lt;br /&gt;
===For Documentation===&lt;br /&gt;
For this part, we are working on the development of an adequate assessment criteria&lt;br /&gt;
The following is a draft of the new process proposal: [[https://www.owasp.org/index.php/File:Qualitative_and_Quantitative_Content_Audit.pdf Proposal for Reviewing OWASP Document projects]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Graduation==&lt;br /&gt;
The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
The review centers around the following core questions. Each core question has three (3) specific questions made up of binary queries. A project must receive at least two (2) positive responses from each reviewer in two of the binary questions, to warrant a postive response for the core question. Each core question must receive a positive response from both project reviewers to pass the Project Health Assessment for Incubator Projects. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Graduation Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Health Assessment==&lt;br /&gt;
The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation for projects going from Incubator to LAB and from LAB to Flagship. The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Health Assessment Criteria Document]. If a project passes the assessment, it then becomes eligible to graduate into the OWASP Labs Project stage. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Deliverable/Release Assessment==&lt;br /&gt;
The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to  review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception. &lt;br /&gt;
&lt;br /&gt;
Reviews must be performed by two (2) OWASP Chapter or Project Leaders, and their review must answer affirmatively to at least the first two (2) core Project Deliverable/Release Review questions. A project must pass the OWASP Project Deliverable/Release Assessment in order to graduate into the OWASP Labs Project stage. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Deliverable/Release Assessment Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Brand Resources  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The Brand Usage Rules==&lt;br /&gt;
See OWASP's [[Marketing/Resources#tab=BRAND_GUIDELINES|The Brand Usage Rules]] for details.&lt;br /&gt;
&lt;br /&gt;
==Project Icons &amp;amp; Templates==&lt;br /&gt;
See OWASP'S [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
(Following links and images are provided for a quick overview only, the primary page is [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]]).&lt;br /&gt;
&lt;br /&gt;
If you require more assistance with these files and/or templates, please contact the OWASP staff for assistance &lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Operations_Project_Template|OWASP Operational Wiki Template]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Documentation_Project_Template|OWASP Example Template: DO NOT EDIT]]'''&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_Project_Header.jpg|Owasp logo|500px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_TOOL.jpg|Owasp logo|200px]] [[Image:Project_Type_Files_DOC.jpg||Owasp logo 1c|200px]]  &lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_CODE.jpg|Owasp logo|200px]] [[Image:Owasp-defenders-small.png|Owasp logo|100px]] [[Image:Owasp-builders-small.png|Owasp logo|100px]] [[Image:Owasp-breakers-small.png|Owasp logo|100px]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-incubator-trans-200.png|Owasp logo rev icon|100px]] [[Image:Owasp-labs-trans-85.png|Owasp logo flat|100px]] [[Image:Owasp-flagship-trans-85.png|Owasp logo icon|100px]]&lt;br /&gt;
&lt;br /&gt;
===OpenSAMM===&lt;br /&gt;
'''[[Media:OpenSAMM_icons.zip|OpenSAMM Icons]]'''&lt;br /&gt;
&lt;br /&gt;
'''Construction:'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Construction black.png| Construction black| 100px]]  [[Image:Construction blue.png| Construction blue| 100px]]  [[image:Construction olive.png |construction olive|100px]]&lt;br /&gt;
&lt;br /&gt;
'''Deployment:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Deployment black.png| Deployment black| 100px]]  [[image:Deployment blue.png| Deployment blue| 100px]]  [[image:Deployment olive.png | Deployment olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Governance:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Governance black.png| governance black| 100px]]  [[image:Governance blue.png | governance blue | 100px]]  [[image:Governance olive.png | governance olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Verification:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Verification black.png | Verification black | 100px]]  [[image:Verification blue.png | verification blue | 100px]]  [[image: Verification olive.png | Verification olive | 100px]]&lt;br /&gt;
&lt;br /&gt;
==Book Cover Files==&lt;br /&gt;
See OWASP's [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
[[Media:Lulu-guide.pdf|Lulu Guide]]&lt;br /&gt;
&lt;br /&gt;
'''[https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip Download the Book Cover Zip File]'''&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;300&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:BookImage_01.jpg‎|500px| link=https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Terminology =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== OWASP Project Infrastructure ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Lifecycle:''' The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Project:''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway. The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Labs Project:''' OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Flagship Project:''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Benefits:''' The standard list of resources and incentives made available to project leaders based on their project's current maturity level. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Reviews ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviews:''' Project reviews are the method OWASP uses to establish a minimal baseline of project characteristics and release quality. Reviews are not mandatory, but they are necessary if a project leader wishes to graduate to the next level of maturity within the OWASP Global Projects infrastructure. Projects can be reviewed when an Incubator project wishes to graduate into the OWASP Labs designation, and project releases can be reviewed if they want the quality of their deliverable to be vouched for by OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviewer Pool:''' The project reviewer pool is made up of veteran reviewers who have proven themselves dedicated to executing quality reviews of projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Graduation:''' The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Health Assessment:''' The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE#gid=1 Project Health Assessment Criteria Document].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Release:''' A project release refers to the final deliverable a project produces. It is the final product of the project. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Deliverable/Release Review:''' The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects Processes == &lt;br /&gt;
&lt;br /&gt;
*'''Project Processes:''' The set of streamlined processes that exist to help projects move smoothly through the OWASP Project Lifecycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Inception Process:''' The Project Inception Process is how a brand new idea becomes an OWASP Project. Such projects are labeled as OWASP Incubator projects. The process involves submitting the proposed project name, project leader information, project description, project roadmap, and selecting an appropriate open-source license for the project using the New Project Form on the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Donation Process:''' The Project Donation Process is used for a project that has an existing functional release, but is not currently associated with OWASP. This process is the primary mechanism by which individuals or organizations can transfer the ownership of their project’s copyright to OWASP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Transition Process:''' The Project Transition Process is used to transition leadership of a project to a new project leader. This is a simple automated process to transfer the relevant accounts, mailing lists, and other project resources to the new project leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Abandonment Process:''' The Project Abandonment Process was put in place for those occasions in which a project leader is no longer able to manage their project, and has not been able to find a suitable replacement for the leader role. Project Abandonment can also occur when the project leader feels his/her project has become obsolete. Under these circumstances, the acting project leader is encourage do submit the Project Abandonment Form found in the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Graduation Process:''' The Incubator Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Projects at Conferences == &lt;br /&gt;
&lt;br /&gt;
*'''AppSec Conferences:''' OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Open Source Showcase:''' The Open Source Showcase is an OWASP AppSec Conference event module designed to give Open Source project leaders the opportunity to demo their projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Track:''' The OWASP Project Track is an OWASP AppSec Conference event module designed to give OWASP Project leaders the opportunity to showcase their projects as an official conference presenter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects General ==  &lt;br /&gt;
&lt;br /&gt;
*'''OWASP Code of Ethics:''' The OWASP Code of Ethics are the set of guidelines and principles that the OWASP Foundation expects all of its members and conference attendees to abide by. A copy of the Code of Ethics can be found here in the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#Code_of_Ethics OWASP About page]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sponsorships and Donations  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate to OWASP Global Projects ==&lt;br /&gt;
OWASP Projects, a global division of the OWASP Foundation, is run under the same world wide not-for-profit charitable status as all the foundation strategic groups. OWASP provides a platform for contributors to share their work while providing them with the project and community support they need throughout their project development. All OWASP Projects are run by volunteers and they rely on personal donations and sponsorship to continue their development. Donate to OWASP Projects, and we promise to spend your money wisely on open source initiatives.&lt;br /&gt;
&lt;br /&gt;
'''This is how your money can help:'''&lt;br /&gt;
&lt;br /&gt;
* $20 could help us spread the word on the importance of open source initiatives in the Application Security industry.&lt;br /&gt;
* $100 could help fund OWASP project demos at major conferences.&lt;br /&gt;
* $250 could help get our volunteer Project Leaders to speaking engagements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_Button.jpg | link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Contact US  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you need any help with anything projects related, or if you simply need some more information, please do not hesitate to [http://owasp4.owasp.org/contactus.html Contact Us].&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=193538</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=193538"/>
				<updated>2015-04-17T06:20:18Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Welcome to the OWASP Global Projects Page ===&lt;br /&gt;
&lt;br /&gt;
An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. OWASP currently has over 142 active projects, and new project applications are submitted every week.  &lt;br /&gt;
&lt;br /&gt;
This is one of the most popular divisions of OWASP as it gives members an opportunity to freely test theories and ideas with the professional advice and support of the OWASP community. Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any project by visiting the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. A summary of recent project announcements is available on the [[OWASP Updates]] page. &lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:PROJECT_LEADER-HANDBOOK_2014.pdf|OWASP Project Handbook 2014]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_2014_Project_Handbook|OWASP Project Handbook Wiki 2014]]'''&lt;br /&gt;
&lt;br /&gt;
Download the '''[[Media:OWASP_Projects_Handbook_2013.pdf|OWASP Projects Handbook 2013]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[Project_Online_Resources|Project Online Resources]]'''&lt;br /&gt;
&lt;br /&gt;
=== Who Should Start an OWASP Project? ===&lt;br /&gt;
&lt;br /&gt;
*Application Developers. &lt;br /&gt;
*Software Architects. &lt;br /&gt;
* Information Security Authors.  &lt;br /&gt;
*Those who would like the support of a world wide professional community to develop or test an idea.&lt;br /&gt;
*Anyone wishing to take advantage of the professional body of knowledge OWASP has to offer.&lt;br /&gt;
&lt;br /&gt;
=== Contact Us===&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please do not hesitate to  [http://owasp4.owasp.org/contactus.html Contact Us] by using the form provided here. Please allow five working days for your question or comment to be answered. This is due to the large amount of queries the foundation staff receive every day. We thank you for your patience. &lt;br /&gt;
&lt;br /&gt;
=== OWASP Project Inventory ===&lt;br /&gt;
&lt;br /&gt;
All OWASP tools, document, and code library projects are organized into the following [[OWASP_Project_Stages|categories:]] &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Flagship_Projects|Flagship Projects:]]''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Labs_Projects|Lab Projects:]]''' OWASP Labs projects represent projects that have produced an OWASP reviewed deliverable of value. &lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_Project_Inventory#Incubator_Projects|Incubator Projects:]]''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.&lt;br /&gt;
&lt;br /&gt;
=== Social Media ===&lt;br /&gt;
&lt;br /&gt;
We recommend using the links below to find our official OWASP social media channels. These are a great way to keep in touch with the different initiatives going on at OWASP throughout the world. They are all updated regularly by chapter leaders, project leaders, the OWASP Board Members, and our OWASP Staff. If you have any questions or concerns about any of these accounts, please drop us a line using our [http://www.tfaforms.com/308703 &amp;quot;Contact Us&amp;quot;] form found above.  &lt;br /&gt;
&lt;br /&gt;
[[Image:Blogger-32x32.png|32px|link=http://owasp.blogspot.co.uk/]] [[Image:Twitter-32x32.png|32px|link=https://twitter.com/OWASP]] [[Image:Facebook-32x32.png|32px|link=https://www.facebook.com/groups/172892372831444/]] [[Image:Linkedin-32x32.png|32px|link=http://www.linkedin.com/groups/Global-OWASP-Foundation-36874]] [[Image:Google-32x32.png|32px|link=https://plus.google.com/u/0/communities/105181517914716500346?cfem=1]] [[Image:Ning-32x32.png|32px|link=http://myowasp.ning.com/]]&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 3px solid rgb(204, 204, 204); vertical-align: top; width: 95%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; |  &lt;br /&gt;
&amp;lt;div style=&amp;quot;padding:2em;padding-bottom:0px;&amp;quot;&amp;gt;&amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL; also 2 empty lines between images --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:New_initiatives.png|center|300px| link=http://owasp.force.com/volunteers/GW_Volunteers__VolunteersJobListing]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_here_banner.png|center|300px| link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Project Inventory  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Project Dashboard lists the all project information at a glance, including release links, the current status of the project and project leader contact information. The Project Dashboard can be found here: https://www.owasp.org/index.php/OWASP_Project_Dashboard&lt;br /&gt;
&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
[[File:Flagship_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole.&lt;br /&gt;
After a major review process [[https://www.owasp.org/index.php/LAB_Projects_Code_Analysis_Report More info here]] the following projects are considered to be flagship candidate projects. These project will be evaluated more deeply to confirm their flagship status:&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed September 2014]====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy]]&lt;br /&gt;
* [[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment Project]]&lt;br /&gt;
* [[OWASP_OWTF|OWASP OWTF]]&lt;br /&gt;
* [[OWASP_Dependency_Check|OWASP Dependency Check]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed November 2014]====&lt;br /&gt;
* [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
* [[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard Project]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP_System_Vulnerable_Code_Project]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Reviewed February 2015] in progress====&lt;br /&gt;
* [[:Category:OWASP_Application_Security_Verification_Standard_Project|OWASP Application Security Verification Standard Project]]&lt;br /&gt;
* [[:Category:Software_Assurance_Maturity_Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
* [[OWASP_AppSensor_Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[:Category:OWASP_Top_Ten_Project|OWASP Top Ten Project]]&lt;br /&gt;
* [[OWASP_Testing_Project|OWASP Testing Guide Project]]&lt;br /&gt;
&lt;br /&gt;
==Labs Projects==&lt;br /&gt;
[[File:Lab banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to LAB projects showing a steady progress in their development, had very active and continuous releases and commits, regular update of information on their wiki page and have quite complete documentation. These projects are almost ready to become flagship&lt;br /&gt;
&lt;br /&gt;
====Tools [Reviewed February 2015]====&lt;br /&gt;
* [[OWASP_Hackademic_Challenges_Project|OWASP Hackademic Challenges Project]]&lt;br /&gt;
* [[OWASP_Mantra_-_Security_Framework|OWASP Mantra Security Framework]]&lt;br /&gt;
* [[OWASP_O2_Platform|OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP_Dependency_Track_Project|OWASP Dependency Track Project]]&lt;br /&gt;
* [[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
* [[O-Saft|O-Saft]]&lt;br /&gt;
* [[:Category:OWASP_EnDe|OWASP EnDe Project]]&lt;br /&gt;
* [[OWASP_Passfault|OWASP Passfault]] &lt;br /&gt;
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security Project]]&lt;br /&gt;
*[[OWASP_Xenotix_XSS_Exploit_Framework|OWASP Xenotix XSS Exploit Framework]]&lt;br /&gt;
&lt;br /&gt;
====Documentation [In Progress-Results by February/March 2015] ====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Podcast|OWASP Podcast Project]]&lt;br /&gt;
* [[:Category:OWASP_Code_Review_Project|OWASP Code Review Guide Project]]&lt;br /&gt;
* [[:Category:OWASP_Guide_Project|OWASP Development Guide Project]]&lt;br /&gt;
*[[OWASP_CISO_Survey|OWASP CISO Survey]] &lt;br /&gt;
*[[OWASP_Application_Security_Guide_For_CISOs_Project|OWASP Application Security Guide For CISOs]]&lt;br /&gt;
*[[OWASP_Cornucopia|OWASP Cornucopia]]&lt;br /&gt;
*[[Cheat_Sheets|OWASP Cheat Sheets Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
&lt;br /&gt;
====Contests====&lt;br /&gt;
*[[OWASP_University_Challenge|OWASP University Challenge]] &lt;br /&gt;
* [[:Category:OWASP_CTF_Project|OWASP CTF Project]]&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed February 2015]====&lt;br /&gt;
* [[:Category:OWASP_Enterprise_Security_API|OWASP Enterprise Security API]]&lt;br /&gt;
&lt;br /&gt;
======Low Activity (LABS)[Reviewed February 2015] ======&lt;br /&gt;
[[File:low_activity.jpg]]&lt;br /&gt;
&lt;br /&gt;
These projects had no releases in at least a year, however have shown to be valuable tools&lt;br /&gt;
Code [Low Activity]&lt;br /&gt;
* [[Project_Information:template_Vicnum_Project|OWASP Vicnum Project]]&lt;br /&gt;
* [[OWASP_Broken_Web_Applications_Project|OWASP Broken Web Applications Project]]&lt;br /&gt;
&lt;br /&gt;
Documentation [Low Activity]&lt;br /&gt;
* [[OWASP_Appsec_Tutorial_Series|OWASP AppSec Tutorial Series]]&lt;br /&gt;
* [[:Category:OWASP_Legal_Project|OWASP Legal Project]]&lt;br /&gt;
* [[Virtual_Patching_Best_Practices|Virtual Patching Best Practices]]&lt;br /&gt;
* [[OWASP_Codes_of_Conduct|OWASP Codes of Conduct]]&lt;br /&gt;
* [[OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
==Incubator Projects==&lt;br /&gt;
[[File:Incubator_banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
===Thumbs up===&lt;br /&gt;
Thumbs up are given to incubator projects showing a steady progress in their development, had continuous releases and commits or have delivered a complete product, including open source repository location, basic user guidelines and documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Code [Reviewed March 2015]====&lt;br /&gt;
* [[OWASP_Java_Encoder_Project|OWASP Java Encoder Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Java_File_I_O_Security_Project|OWASP Java File I/O Security Project]]&lt;br /&gt;
* [[OWASP_PHPRBAC_Project|OWASP PHPRBAC Project]] &lt;br /&gt;
* [[OWASP_iMAS_iOS_Mobile_Application_Security_Project|OWASP iMAS - iOS Mobile Application Security Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_PHP_Security_Project|OWASP PHP Security Project]] [[File:Thumbsup.png|15px]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Node_js_Goat_Project|OWASP Node.js Goat Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_System_Vulnerable_Code_Project|OWASP System Vulnerable Code Project]]&lt;br /&gt;
* [[OWASP_ISO_IEC_27034_Application_Security_Controls_Project|OWASP ISO/IEC 27034 Application Security Controls Project]]&lt;br /&gt;
* [[OWASP_Hardened_Phalcon_Project|OWASP Hardened Phalcon Project]]&lt;br /&gt;
* [[OWASP_Faux_Bank_Project|OWASP Faux Bank Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_Security_Research_and_Development_Framework|OWASP Security Research and Development Framework]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_File_Format_Validation_Project|OWASP File Format Validation Project]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Wapiti_Project OWASP Wapiti Project]&lt;br /&gt;
*[[OWASP_Security_Logging_Project|OWASP Security Logging Project]]&lt;br /&gt;
*[[OWASP_Droid10_Project|OWASP Droid]]&lt;br /&gt;
&lt;br /&gt;
====Tools [Review in progress-April 2015]====&lt;br /&gt;
*[[Benchmark|OWASP WebGoat Benchmark]]&lt;br /&gt;
*[[OWASP_WAP-Web_Application_Protection|WAP Web Application_Protection]]&lt;br /&gt;
*[[OWASP_Java_HTML_Sanitizer|OWASP Java HTML Sanitizer Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Security_Shepherd|OWASP Security Shepherd]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Mantra_OS|OWASP Mantra OS]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_iGoat_Project|OWASP iGoat Project]]&lt;br /&gt;
*[[OWASP_Bricks|OWASP Bricks]]&lt;br /&gt;
*[[OWASP_Bywaf_Project|OWASP Bywaf Project]]&lt;br /&gt;
*[[OWASP_Mutillidae_2_Project|OWASP Mutillidae 2 Project]] &lt;br /&gt;
*[[OWASP_SeraphimDroid_Project|OWASP SeraphimDroid Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Python_Security_Project|OWASP Python Security Project]]&lt;br /&gt;
*[[OWASP_WebSpa_Project|OWASP WebSpa Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_NINJA_PingU_Project|OWASP NINJA PingU Project]]&lt;br /&gt;
*[[OWASP_Encoder_Comparison_Reference_Project|OWASP Encoder Comparison Reference Project]]&lt;br /&gt;
*[[:Category:OWASP_SQLiX_Project|OWASP sqliX Project]]&lt;br /&gt;
*[[OWASP_Click_Me_Project|OWASP Click Me Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Secure_TDD_Project|OWASP Secure TDD Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_XSecurity_Project|OWASP XSecurity Project]]&lt;br /&gt;
*[[OWASP_Pyttacker_Project|OWASP Pyttacker Project]]&lt;br /&gt;
*[[OWASP_Code_Pulse_Project|OWASP Code Pulse Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_HTTP_Post_Tool|OWASP HTTP POST Tool]]&lt;br /&gt;
*[[OWASP_PHP_Security_Training_Project|OWASP PHP Security Training Project]]&lt;br /&gt;
*[[Projects/OWASP_iOSForensic|OWASP iOSForensic]]&lt;br /&gt;
*[[OWASP_Project_Metrics|OWASP Project Metrics]]&lt;br /&gt;
*[[OWASP_Store_Sheep_Project|OWASP Store Sheep Project]]&lt;br /&gt;
*[[OWASP_SonarQube_Project|OWASP SonarQube Project]]&lt;br /&gt;
*[[OWASP Rainbow Maker Project | OWASP Rainbow Maker Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP JSEC CVE Details | OWASP JSEC CVE Details]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[:Category:OWASP_WebGoat.NET|OWASP WebGoat.NET]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASIDE_Project|OWASP ASIDE Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
* [[OWASP_ASVS_Assessment_tool | OWASP Assesment Tool]]&lt;br /&gt;
&lt;br /&gt;
====Documentation[Review: March 2015-In progress]====&lt;br /&gt;
*[[OWASP Automated Threats to Web Applications]]&lt;br /&gt;
*[[OWASP_Data_Exchange_Format_Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
*[[OWASP_Proactive_Controls|OWASP Proactive Controls]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Enterprise_Application_Security_Project|OWASP Enterprise Application Security Project]]&lt;br /&gt;
*[[Projects/OWASP_GoatDroid_Project|OWASP GoatDroid Project]]&lt;br /&gt;
*[[OWASP_RFP-Criteria|OWASP Request For Proposal]]&lt;br /&gt;
*[[OWASP_Hacking_Lab|OWASP Hacking-Lab]]&lt;br /&gt;
*[[WASC_OWASP_Web_Application_Firewall_Evaluation_Criteria_Project|WASC/OWASP Web Application Firewall Evaluation Criteria (WAFEC)]]&lt;br /&gt;
*[[OWASP_Secure_Application_Design_Project|OWASP Secure Application Design Project]]&lt;br /&gt;
*[[OWASP_Top_10_Fuer_Entwickler_Project|OWASP Top 10 Fuer Entwickler Project]]&lt;br /&gt;
*[[OWASP_Security_Principles_Project|OWASP Security Principles Project]]&lt;br /&gt;
*[[OWASP_Media_Project|OWASP Media Project]] [[File:Thumbsup.png|15px]]&lt;br /&gt;
*[[OWASP_Global_Chapter_Meetings_Project|OWASP Global Chapter Meetings Project]]&lt;br /&gt;
*[[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
*[[OWASP_Insecure_Web_Components_Project|OWASP Insecure Web Components Project]]&lt;br /&gt;
*[[OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project|OWASP Reverse Engineering and Code Modification Prevention Project]]&lt;br /&gt;
*[[OWASP_Student_Chapters_Program|OWASP Student Chapters Project]]&lt;br /&gt;
*[[:Category:OWASP_Education_Project|OWASP Education Project]]&lt;br /&gt;
*[[:Category:OWASP_Speakers_Project|OWASP Speakers Project]]&lt;br /&gt;
*[[OWASP_Internet_of_Things_Top_Ten_Project|OWASP Internet of Things Top Ten Project]]&lt;br /&gt;
*[[:Category:OWASP_.NET_Project|OWASP .NET Project]]&lt;br /&gt;
*[[OWASP_Open_Cyber_Security_Framework_Project|OWASP Open Cyber Security Framework Project]]&lt;br /&gt;
*[[OWASP_Top_10_Privacy_Risks_Project|OWASP Top 10 Privacy Risks Project]]&lt;br /&gt;
*[[OWASP_WASC_Web_Hacking_Incidents_Database_Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
*[[OWASP_Security_Frameworks_Project|OWASP Security Frameworks Project]]&lt;br /&gt;
*[[OWASP_Incident_Response_Project|OWASP Incident Response Project]]&lt;br /&gt;
*[[OWASP_Embedded_Application_Security|OWASP Embedded Application Security]]&lt;br /&gt;
*[[OWASP_STING_Game_Project|OWASP STING Game Project]]&lt;br /&gt;
*[[Projects/OWASP_Ruby_on_Rails_and_friends_Security_Guide|OWASP Ruby on Rails and Friends Security Guide]]&lt;br /&gt;
*[[OWASP_Secure_Development_Training|OWASP Secure Development Training]]&lt;br /&gt;
*[[OWASP_Periodic_Table_of_Vulnerabilities|OWASP Periodic Table of Vulnerabilities]]&lt;br /&gt;
*[[OWASP_Top_Trumps_for_Projects|OWASP Top Trumps for Projects]]&lt;br /&gt;
*[[OWASP_Supporting_Legacy_Web_Applications_in_the_Current_Environment_Project|OWASP Supporting Legacy Web Applications in the Current Environment Project]]&lt;br /&gt;
*[[OWASP KALP Mobile Project | OWASP KALP Mobile Project]]&lt;br /&gt;
*[[OWASP Persian Translation Project | OWASP Persian Translation Project]]&lt;br /&gt;
*[[OWASP_Security_Controls_in_Web_Application_Development_Lifecycle |OWASP Security Controls in Web Application Development Lifecycle Project]]&lt;br /&gt;
*[[OWASP_Application_Security_Program_Quick_Start_Guide_Project|OWASP_Application_Security_Program_Quick_Start_Guide_Project]]&lt;br /&gt;
*[[OWASP_Secure_Configuration_Guide|OWASP_Secure_Configuration_Guide]]&lt;br /&gt;
*[[OWASP_Product_Requirement_Recommendations_Library|OWASP_Product_Requirement_Recommendations_Library]]&lt;br /&gt;
*[[OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project|OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project]]&lt;br /&gt;
*[[OWASP_Knowledge_Graph|OWASP_Knowledge_Graph]]&lt;br /&gt;
&lt;br /&gt;
====Educational Project====&lt;br /&gt;
*[[OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project#tab=Main | OWASP Visual Crime Scene and Security Incident Project]]&lt;br /&gt;
&lt;br /&gt;
==Donated Projects==&lt;br /&gt;
&lt;br /&gt;
OWASP Donated Projects are inactive projects that have been donated to the OWASP Projects Infrastructure. &lt;br /&gt;
&lt;br /&gt;
====Tools====&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Excess_XSS_Project|OWASP Excess XSS Project]]&lt;br /&gt;
* [[OWASP_JOTP_Project|OWASP jOTP Project]]&lt;br /&gt;
&lt;br /&gt;
==OWASP Archived Projects==&lt;br /&gt;
OWASP Archived Projects are projects that have developed outside OWASP umbrella or have become inactive. If you are interested in pursuing any of the inactive projects (click hyperlink for list), please contact us and let us know of your interest.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project_Archived_Projects&lt;br /&gt;
&lt;br /&gt;
= Project Task Force =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OWASP Project Task Force====&lt;br /&gt;
&lt;br /&gt;
{{:Task_Force/OWASP_Projects}}&lt;br /&gt;
&lt;br /&gt;
= Online Resources =&lt;br /&gt;
&lt;br /&gt;
===Project Online Resources===&lt;br /&gt;
&lt;br /&gt;
{{:Project_Online_Resources}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Starting a New Project  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== So you want to start a project... ==&lt;br /&gt;
&lt;br /&gt;
Starting an OWASP project is quite easy, and your desire to contribute and make it happen is essential.&lt;br /&gt;
[[File:HowToStartProjectoWasp.png | 600px | right]]&lt;br /&gt;
&lt;br /&gt;
Here are some of the guidelines for running a successful OWASP project:&lt;br /&gt;
&lt;br /&gt;
-Start exploring the actual OWASP projects Inventory. Many projects handle specific areas of security it is a good idea to start looking how other successful projects do this (LABS/Flagship)&lt;br /&gt;
&lt;br /&gt;
-Place your idea or project on the [https://www.owasp.org/index.php/Project_Ideas_Board#From_Idea_to_Project_Incubator Project Ideas Board].This phase will help you to define the project goals and also explore and exchange with other OWASP leaders and volunteers how to develop the idea into a tangible project&lt;br /&gt;
&lt;br /&gt;
-Explore and research if your idea covers a unique segment in the Security arena.Think of your project as a product, if you really want people using it, think how this project will cover a necessity in the security area you are working on &lt;br /&gt;
&lt;br /&gt;
-Define what kind of project you would like to start. Is it a code, tool or documentation?&lt;br /&gt;
&lt;br /&gt;
-Communicate through the Project leader mailing list about your idea and get feedback and  meet potential contributors&lt;br /&gt;
&lt;br /&gt;
-Develop your project based on the type of project. For example if you are willing to start a documentation project, begin by defining a Table of Content and work it through with potential contributors. First of all begin by creating a Road-map for your project. This is essential to submit your project. We highly recommend to read  documentation such as &amp;quot;[http://www2.econ.iastate.edu/tesfatsi/ProducingOSS.KarlFogel2005.pdf How to start /run a successful Open Source Projects]&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 500px | left]]&lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Road-map===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Start defining a development, documentation and marketing plan for your project. Set short , medium and long term plans. Include promotion of your project, this is very important in order to engage users and consumers of your project. Contact project coordinator and the Project Task Force to help you achieve this goal. You ''can'' run a single person project, but it's usually best to get the community involved.  You should be prepared to support a mailing list, build a team, speak at conferences, and promote your project.&lt;br /&gt;
&lt;br /&gt;
* You can contribute existing documents or tools to OWASP! Assuming you have the intellectual property rights to a work, you can open it to the world as an OWASP Project.  Please coordinate this with OWASP by contacting owasp(at)owasp.org.&lt;br /&gt;
&lt;br /&gt;
* Available Grants to consider if you need funding - [[Grants|Click Here]]&lt;br /&gt;
&lt;br /&gt;
* You should promote your project through the OWASP channels as well as by outside means.  Get people to blog about it!&lt;br /&gt;
&lt;br /&gt;
== Creating a new project ==&lt;br /&gt;
Once you have passed the Project Ideas phase, then you will be ready to start a new project&lt;br /&gt;
To Submit your project please use the following form&lt;br /&gt;
. [http://www.tfaforms.com/263506 Please submit a new project application here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* You will need to gather the following information together for your application:&lt;br /&gt;
A - PROJECT&lt;br /&gt;
# Project Name,&lt;br /&gt;
# Project purpose / overview,&lt;br /&gt;
# Project Roadmap,&lt;br /&gt;
# Project links (if any) to external sites,&lt;br /&gt;
# [[Guidelines_for_OWASP_Projects#Project_Licensing|Project License],]&lt;br /&gt;
# Project Leader name,&lt;br /&gt;
# Project Leader email address,&lt;br /&gt;
# Project Leader wiki account - the username (you'll need this to edit the wiki),&lt;br /&gt;
# Project Contributor(s) (if any) - name email and wiki account (if any),&lt;br /&gt;
# Project Main Links (if any).&lt;br /&gt;
# For Documentation: A table of Contents&lt;br /&gt;
# For Code: A prototype hosted in an open source repository of your choice. Make sure it has read access.&lt;br /&gt;
&lt;br /&gt;
* Check out the '''[[Guidelines for OWASP Projects]]'''.&lt;br /&gt;
* [[Grant_Spending_Policy|Grant Spending Policy]]&lt;br /&gt;
* [[Project_Spending_Policy|Project Spending Policy]]&lt;br /&gt;
* [[Project_Sponsorship_Operational_Guidelines|Project Sponsorship Operational Guidelines]]&lt;br /&gt;
&lt;br /&gt;
==OWASP	Recommended Licenses==&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Funding your Project==&lt;br /&gt;
An OWASP project does not receive any funding for development at project inception; however, a new project does have the opportunity to submit a request to receive funds if they are available for the year. Additionally, project leaders have the option of seeking sponsorship from outside organizations, but project leaders are required to seek funding through their own initiative. Please contact the OWASP Projects Manager for more information. &lt;br /&gt;
&lt;br /&gt;
== Project Release ==&lt;br /&gt;
&lt;br /&gt;
As your project reaches a point that you'd like OWASP to assist in its promotion, the will need the following information to help spread the word about your project:&lt;br /&gt;
&lt;br /&gt;
# Short 5 sentence paragraph outlining what your project is about, what you hope to accomplish with your project, what value your project brings to software security, and contributor and project leader names and contact information.&lt;br /&gt;
# Link to your wiki page.&lt;br /&gt;
# Link to your code repository or a link to where readers can download your project.&lt;br /&gt;
# Latest Release description answering the following questions: What is it?, What does it do?, Where can I get it?, Who should I contact if something goes wrong?.&lt;br /&gt;
&lt;br /&gt;
==Project Process Forms==&lt;br /&gt;
These forms were created to help project leaders, and those interested in a going through a process in the OWASP projects infrastructure. They facilitate the management of each query based on the specific task an applicant will need help with. The forms are described below, and they are linked with their designated online application form. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264422 Project Transition Application]:The OWASP project transition form gives current project leaders an easy way of handing over project administration information to individuals wishing to take over a project.  &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264413 Project Review Application]:This form is for current project leaders to request a review of their project based on OWASP graduation criteria. The aim is to designate an OWASP volunteer to review these projects within 3 months time. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264418 Project Donation Application]:This form is for projects outside of the OWASP project infrastructure. Project Leaders for these open source projects can choose to partner or give their project to OWASP directly through this form.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264428 Project Adoption Request]:This form is used when someone is interested in adopting an archived project. &lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264426 Project Abandonment Request]:The OWASP project abandonment form gives current project leaders an easy way of letting the OWASP Foundation know that they wish to resign their project leader duties. This form should be used when no replacement project leader exists to take over these duties.&lt;br /&gt;
&lt;br /&gt;
* [http://www.tfaforms.com/264392 Incubator Project Graduation Application]:This application form is for Incubator Projects to apply for Labs Project status. &lt;br /&gt;
&lt;br /&gt;
= Project Assessments  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
==OWASP Project Lifecycle==&lt;br /&gt;
The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state. The greater the maturity of the project, the greater the level of responsibility for the project leader. These responsibilities are not trivial as OWASP provides incentives and benefits (Section 7) for projects who take on these added responsibilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====The OWASP Project Lifecycle is broken down into the following stages:====&lt;br /&gt;
&lt;br /&gt;
'''Incubator Projects''': OWASP Incubator projects represent the experimental playground where projects are still being designed, ideas are still being proven, and development is still underway.  The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity; moreover, the label allows project leaders to leverage the OWASP name while their project is still maturing. OWASP Incubator projects are given a place on the OWASP Projects Portal to leverage the organizations' infrastructure, and establish their presence and project history.&lt;br /&gt;
&lt;br /&gt;
'''Lab Projects''': OWASP Labs projects represent projects that have produced a deliverable of significant value. Leaders of OWASP Labs projects are expected to stand behind the quality of their projects as these projects have matured to the point where they are accepted by a significant portion of the OWASP community. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are ready for mainstream usage. OWASP Labs Projects are meant to be the collection of established projects that have gained community support and acclaim by undergoing the project review process. &lt;br /&gt;
&lt;br /&gt;
'''Flagship Projects''': The OWASP Flagship designation is given to projects that have demonstrated superior maturity, established quality, and strategic value to OWASP and application security as a whole. Eligible projects are selected from the OWASP Labs project pool. This selection process generally ensures that there is only one project of each type covering any particular security space. OWASP Flagship projects represent projects that are not only mature, but are also projects that OWASP as an organization provides direct support to maintaining. The core mission of OWASP is to make application security visible and so as an organization, OWASP has a vested interest in the success of its Flagship projects. Since Flagship projects have such high visibility, these projects are expected to uphold the most stringent requirements of all OWASP Projects.&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Stage Benefits==&lt;br /&gt;
This section outlines the benefits of starting an OWASP project, and the benefits of being at each different stage in the projects lifecycle. In my short time here at OWASP as the PM, I have had several potential project leaders ask me what the benefits are of starting their project with OWASP. Below is my proposal for each Stage’s benefits.&lt;br /&gt;
&lt;br /&gt;
'''Incubator'''&lt;br /&gt;
* Financial Donation Management Assistance &lt;br /&gt;
* Project Review Support&lt;br /&gt;
* WASPY Awards Nominations&lt;br /&gt;
* OWASP OSS and OPT Participation&lt;br /&gt;
* Opportunity to submit proposal: $500 for Development.&lt;br /&gt;
* Community Engagement and Support&lt;br /&gt;
* Recognition and visibility of being associated with the OWASP Brand.&lt;br /&gt;
&lt;br /&gt;
'''Labs'''&lt;br /&gt;
* All benefits given to Incubator Projects &lt;br /&gt;
* Technical Writing Support&lt;br /&gt;
* Graphic Design Support&lt;br /&gt;
* Project Promotion Support&lt;br /&gt;
* OWASP OSS and OPT: Preference&lt;br /&gt;
&lt;br /&gt;
'''Flagship'''&lt;br /&gt;
* All benefits given to Incubator &amp;amp; Labs Projects&lt;br /&gt;
* Grant finding and proposal writing help&lt;br /&gt;
* Yearly marketing plan development&lt;br /&gt;
* OWASP OSS and OPT participation preference&lt;br /&gt;
&lt;br /&gt;
For more detailed information on OWASP Project Stage Benefits, please see the 2013 Project Handbook.&lt;br /&gt;
&lt;br /&gt;
== Project Monitoring Incubator/Documentation ==&lt;br /&gt;
Every 6 months, a project monitoring assessment takes place to evaluate if projects had any releases during this period.A warning will be sent to projects without any activity in 90 days and after 180 days, the project will be set automatically as inactive.&lt;br /&gt;
You can set your project active at any time, as long as:&lt;br /&gt;
* There has been commits to the project's open repository or&lt;br /&gt;
* There has been a beta release of the documentation produced so far or&lt;br /&gt;
* Provide a detailed Roadmap &lt;br /&gt;
&lt;br /&gt;
===Importance of a well thought out Roadmap===&lt;br /&gt;
Many Incubator project leaders struggle with creating a realistic planning, which should be based on their available resources and time. A well thought out plan makes a difference between a procrastinating project and a successful one. The important aspect of this is, that the project leader is able to create a plan based on his situation. The following is an example of a Roadmap, which has focused to produce a Documentation first release in a year and a basic outline how they plan to cover 4 essential aspects which are Research &amp;amp; Development, Marketing, Planning and Goals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:RoadmapIncubatorProjectExample2.PNG | 600px]]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Your [project] roadmap should tell a coherent story about the likely growth of your product. Each release should build on the previous one and move you closer towards your vision. Your roadmap should be convincing and realistic: Don’t speculate or oversell your [project]. Be clear who your audience is: An internal roadmap talks to development, marketing, sales, service, and the other groups involved in making your [project] a success; and external one talks to existing and prospective customers.&amp;quot;&lt;br /&gt;
Extracted from : &amp;quot;[[http://www.romanpichler.com/blog/10-tips-creating-agile-product-roadmap/ 10 Tips for Creating an Agile Product Roadmap]]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Project Monitoring for LABS/Flagship==&lt;br /&gt;
These project represent the best OWASP has to offer, therefore monitoring of these projects is closely supervised.&lt;br /&gt;
===For Code and Tools===&lt;br /&gt;
For projects holding Flagship status, we closely monitor their health every 6 months on the following, among other key indicators:&lt;br /&gt;
*Can the project be built correctly?&lt;br /&gt;
*Does the project has any activity(commits) in the last 6 months?&lt;br /&gt;
*Does the project had any releases in the last 6 months?&lt;br /&gt;
*Has the project leaders updated his wiki or website to reflect latest releases?&lt;br /&gt;
===For Documentation===&lt;br /&gt;
For this part, we are working on the development of an adequate assessment criteria&lt;br /&gt;
The following is a draft of the new process proposal: [[https://www.owasp.org/index.php/File:Qualitative_and_Quantitative_Content_Audit.pdf Proposal for Reviewing OWASP Document projects]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Graduation==&lt;br /&gt;
The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
The review centers around the following core questions. Each core question has three (3) specific questions made up of binary queries. A project must receive at least two (2) positive responses from each reviewer in two of the binary questions, to warrant a postive response for the core question. Each core question must receive a positive response from both project reviewers to pass the Project Health Assessment for Incubator Projects. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Graduation Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Health Assessment==&lt;br /&gt;
The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation for projects going from Incubator to LAB and from LAB to Flagship. The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Health Assessment Criteria Document]. If a project passes the assessment, it then becomes eligible to graduate into the OWASP Labs Project stage. In order to be considered for OWASP Labs, an Incubator project must have submitted an OWASP reviewed deliverable, and obtained at least two (2) positive responses for each of the core criteria project health questions.&lt;br /&gt;
&lt;br /&gt;
==OWASP Project Deliverable/Release Assessment==&lt;br /&gt;
The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to  review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception. &lt;br /&gt;
&lt;br /&gt;
Reviews must be performed by two (2) OWASP Chapter or Project Leaders, and their review must answer affirmatively to at least the first two (2) core Project Deliverable/Release Review questions. A project must pass the OWASP Project Deliverable/Release Assessment in order to graduate into the OWASP Labs Project stage. &lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE Project Deliverable/Release Assessment Criteria Checklist]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Brand Resources  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==The Brand Usage Rules==&lt;br /&gt;
See OWASP's [[Marketing/Resources#tab=BRAND_GUIDELINES|The Brand Usage Rules]] for details.&lt;br /&gt;
&lt;br /&gt;
==Project Icons &amp;amp; Templates==&lt;br /&gt;
See OWASP'S [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
(Following links and images are provided for a quick overview only, the primary page is [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]]).&lt;br /&gt;
&lt;br /&gt;
If you require more assistance with these files and/or templates, please contact the OWASP staff for assistance &lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Operations_Project_Template|OWASP Operational Wiki Template]]'''&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP_Documentation_Project_Template|OWASP Example Template: DO NOT EDIT]]'''&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_Project_Header.jpg|Owasp logo|500px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_TOOL.jpg|Owasp logo|200px]] [[Image:Project_Type_Files_DOC.jpg||Owasp logo 1c|200px]]  &lt;br /&gt;
&lt;br /&gt;
[[Image:Project_Type_Files_CODE.jpg|Owasp logo|200px]] [[Image:Owasp-defenders-small.png|Owasp logo|100px]] [[Image:Owasp-builders-small.png|Owasp logo|100px]] [[Image:Owasp-breakers-small.png|Owasp logo|100px]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-incubator-trans-200.png|Owasp logo rev icon|100px]] [[Image:Owasp-labs-trans-85.png|Owasp logo flat|100px]] [[Image:Owasp-flagship-trans-85.png|Owasp logo icon|100px]]&lt;br /&gt;
&lt;br /&gt;
===OpenSAMM===&lt;br /&gt;
'''[[Media:OpenSAMM_icons.zip|OpenSAMM Icons]]'''&lt;br /&gt;
&lt;br /&gt;
'''Construction:'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Construction black.png| Construction black| 100px]]  [[Image:Construction blue.png| Construction blue| 100px]]  [[image:Construction olive.png |construction olive|100px]]&lt;br /&gt;
&lt;br /&gt;
'''Deployment:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Deployment black.png| Deployment black| 100px]]  [[image:Deployment blue.png| Deployment blue| 100px]]  [[image:Deployment olive.png | Deployment olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Governance:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Governance black.png| governance black| 100px]]  [[image:Governance blue.png | governance blue | 100px]]  [[image:Governance olive.png | governance olive| 100px]]&lt;br /&gt;
&lt;br /&gt;
'''Verification:'''&lt;br /&gt;
&lt;br /&gt;
[[image:Verification black.png | Verification black | 100px]]  [[image:Verification blue.png | verification blue | 100px]]  [[image: Verification olive.png | Verification olive | 100px]]&lt;br /&gt;
&lt;br /&gt;
==Book Cover Files==&lt;br /&gt;
See OWASP's [[Marketing/Resources#PROJECT_RESOURCES|Project Icons &amp;amp; Templates]] for details.&lt;br /&gt;
&lt;br /&gt;
[[Media:Lulu-guide.pdf|Lulu Guide]]&lt;br /&gt;
&lt;br /&gt;
'''[https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip Download the Book Cover Zip File]'''&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;300&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:BookImage_01.jpg‎|500px| link=https://www.dropbox.com/s/h27gsbe5m7idg0y/Finished%20Covers.zip]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Terminology =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
== OWASP Project Infrastructure ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Lifecycle:''' The OWASP Projects Lifecycle represents a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality. The lifecycle stage allows consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Project:''' OWASP Incubator projects represent the experimental playground where projects are still being fleshed out, ideas are still being proven, and development is still underway. The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label also allows project leaders to leverage the OWASP name while their project is still maturing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Labs Project:''' OWASP Labs projects represent projects that have produced a deliverable of value. While these projects are typically not production ready, the OWASP community expects that an OWASP Labs project leader is producing releases that are at least ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Flagship Project:''' The OWASP Flagship designation is given to projects that have demonstrated strategic value to OWASP and application security as a whole. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Benefits:''' The standard list of resources and incentives made available to project leaders based on their project's current maturity level. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Reviews ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviews:''' Project reviews are the method OWASP uses to establish a minimal baseline of project characteristics and release quality. Reviews are not mandatory, but they are necessary if a project leader wishes to graduate to the next level of maturity within the OWASP Global Projects infrastructure. Projects can be reviewed when an Incubator project wishes to graduate into the OWASP Labs designation, and project releases can be reviewed if they want the quality of their deliverable to be vouched for by OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Reviewer Pool:''' The project reviewer pool is made up of veteran reviewers who have proven themselves dedicated to executing quality reviews of projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Graduation:''' The Project Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Health Assessment:''' The Project Health Assessment is an optional process undertaken at the request of a project leader when he/she applies for Project Graduation The purpose of this assessment is to determine whether a project meets the minimum criteria of an OWASP Project outlined in the [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0AllOCxlYdf1AdG5NZGhzTjZpT1RDcnRibjd0aXhfOUE#gid=1 Project Health Assessment Criteria Document].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Release:''' A project release refers to the final deliverable a project produces. It is the final product of the project. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Deliverable/Release Review:''' The Project Deliverable/Release Review is an optional process undertaken at the request of a project leader using the Project Deliverable Review Form. The purpose of this process is to review a project’s progress, and to make sure the project is heading in the right direction based on the roadmap they provided at project inception.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects Processes == &lt;br /&gt;
&lt;br /&gt;
*'''Project Processes:''' The set of streamlined processes that exist to help projects move smoothly through the OWASP Project Lifecycle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Inception Process:''' The Project Inception Process is how a brand new idea becomes an OWASP Project. Such projects are labeled as OWASP Incubator projects. The process involves submitting the proposed project name, project leader information, project description, project roadmap, and selecting an appropriate open-source license for the project using the New Project Form on the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Donation Process:''' The Project Donation Process is used for a project that has an existing functional release, but is not currently associated with OWASP. This process is the primary mechanism by which individuals or organizations can transfer the ownership of their project’s copyright to OWASP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Transition Process:''' The Project Transition Process is used to transition leadership of a project to a new project leader. This is a simple automated process to transfer the relevant accounts, mailing lists, and other project resources to the new project leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Project Abandonment Process:''' The Project Abandonment Process was put in place for those occasions in which a project leader is no longer able to manage their project, and has not been able to find a suitable replacement for the leader role. Project Abandonment can also occur when the project leader feels his/her project has become obsolete. Under these circumstances, the acting project leader is encourage do submit the Project Abandonment Form found in the Projects Portal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Incubator Graduation Process:''' The Incubator Graduation Process is an optional process undertaken at the request of a project leader using the Incubator Graduation Form. The purpose of this process is to move a project from the OWASP Incubator into the OWASP Labs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Projects at Conferences == &lt;br /&gt;
&lt;br /&gt;
*'''AppSec Conferences:''' OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''Open Source Showcase:''' The Open Source Showcase is an OWASP AppSec Conference event module designed to give Open Source project leaders the opportunity to demo their projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*'''OWASP Project Track:''' The OWASP Project Track is an OWASP AppSec Conference event module designed to give OWASP Project leaders the opportunity to showcase their projects as an official conference presenter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Projects General ==  &lt;br /&gt;
&lt;br /&gt;
*'''OWASP Code of Ethics:''' The OWASP Code of Ethics are the set of guidelines and principles that the OWASP Foundation expects all of its members and conference attendees to abide by. A copy of the Code of Ethics can be found here in the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#Code_of_Ethics OWASP About page]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sponsorships and Donations  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Donate to OWASP Global Projects ==&lt;br /&gt;
OWASP Projects, a global division of the OWASP Foundation, is run under the same world wide not-for-profit charitable status as all the foundation strategic groups. OWASP provides a platform for contributors to share their work while providing them with the project and community support they need throughout their project development. All OWASP Projects are run by volunteers and they rely on personal donations and sponsorship to continue their development. Donate to OWASP Projects, and we promise to spend your money wisely on open source initiatives.&lt;br /&gt;
&lt;br /&gt;
'''This is how your money can help:'''&lt;br /&gt;
&lt;br /&gt;
* $20 could help us spread the word on the importance of open source initiatives in the Application Security industry.&lt;br /&gt;
* $100 could help fund OWASP project demos at major conferences.&lt;br /&gt;
* $250 could help get our volunteer Project Leaders to speaking engagements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Donate_Button.jpg | link=http://www.regonline.com/Register/Checkin.aspx?EventID=1044369]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Contact US  =&lt;br /&gt;
&amp;lt;font size=2pt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you need any help with anything projects related, or if you simply need some more information, please do not hesitate to [http://owasp4.owasp.org/contactus.html Contact Us].&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=183503</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=183503"/>
				<updated>2014-10-10T06:21:27Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan&lt;br /&gt;
&lt;br /&gt;
Information Security Consultant&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [http://www.shezan.cf/Contact-Me/ me@shezan.cf]&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 [http://shezan.cf shezan]&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=183502</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=183502"/>
				<updated>2014-10-10T06:19:30Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan&lt;br /&gt;
&lt;br /&gt;
Information Security Consultant&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [http://www.shezan.cf/Contact-Me/ me@shezan.cf]&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 shezan.cf&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Me@shezan.cf&amp;diff=183312</id>
		<title>Me@shezan.cf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Me@shezan.cf&amp;diff=183312"/>
				<updated>2014-10-06T05:23:09Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.shezan.cf/Contact-Me/]&lt;br /&gt;
http://www.shezan.cf/&lt;br /&gt;
webmail: me@shezan.cf&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=181779</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=181779"/>
				<updated>2014-09-05T04:42:09Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan&lt;br /&gt;
&lt;br /&gt;
Information Security Consultant&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [http://www.shezan.cf/Contact-Me/ me@shezan.cf]&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Me@shezan.cf&amp;diff=181778</id>
		<title>Me@shezan.cf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Me@shezan.cf&amp;diff=181778"/>
				<updated>2014-09-05T04:39:09Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.shezan.cf/Contact-Me/]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Me@shezan.cf&amp;diff=181777</id>
		<title>Me@shezan.cf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Me@shezan.cf&amp;diff=181777"/>
				<updated>2014-09-05T04:37:36Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: Created page with &amp;quot;http://shezan.cf/Contact-Me/&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;http://shezan.cf/Contact-Me/&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=181776</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=181776"/>
				<updated>2014-09-05T04:36:49Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan&lt;br /&gt;
&lt;br /&gt;
Information Security Consultant&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: [[me@shezan.cf]]&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=181775</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=181775"/>
				<updated>2014-09-05T04:34:48Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan&lt;br /&gt;
&lt;br /&gt;
Information Security Consultant&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
webmail: me@shezan.cf&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=181597</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=181597"/>
				<updated>2014-09-03T18:11:30Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan&lt;br /&gt;
&lt;br /&gt;
Information Security Consultant&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://shezan.cf&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=181429</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=181429"/>
				<updated>2014-08-29T13:05:46Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan&lt;br /&gt;
&lt;br /&gt;
Information Security Consultant&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://smshezan.tk&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance ==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=181075</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=181075"/>
				<updated>2014-08-25T11:34:46Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan&lt;br /&gt;
&lt;br /&gt;
Information Security Consultant&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
&lt;br /&gt;
website: http://smshezan.tk&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance competition ==&lt;br /&gt;
&lt;br /&gt;
Hey guys&lt;br /&gt;
Next 187 days we will try to perform our better performance to win the game.&lt;br /&gt;
Best of luck.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=181074</id>
		<title>OWASP System Vulnerable Code Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_System_Vulnerable_Code_Project&amp;diff=181074"/>
				<updated>2014-08-25T11:34:19Z</updated>
		
		<summary type="html">&lt;p&gt;Shezan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP System Vulnerable Code Project==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is trying to make a computer security tool named Lappy Framework.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project is making a tool that can find out vulnerabilities of a system and fix them.It can also scan your network to find network hole. This tool can ensure your security for your business firm. This tool &lt;br /&gt;
also provide a secure tunnel for business communications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
System Vulnerable Code Project will provide a security tool under OWASP and GNU LGPL version 3.0 projects. This project main tool name will be Lappy Framework and basically this tool will use for Vulnerability Assessment. Its a opensource and freeware tool. It will carry three types code with latest encryption system. It can provide secure web server, database server, mail server etc.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP System Vulnerable Code Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is System Vulnerable Code Project? ==&lt;br /&gt;
&lt;br /&gt;
OWASP System Vulnerable Code Project  provides:&lt;br /&gt;
&lt;br /&gt;
* Secure System.&lt;br /&gt;
* Secure Network for Business.&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Project leader's name:&lt;br /&gt;
&lt;br /&gt;
S. M. Shezan&lt;br /&gt;
&lt;br /&gt;
Information Security Consultant&lt;br /&gt;
&lt;br /&gt;
email: shezan@owasp.org&lt;br /&gt;
website: http://smshezan.tk&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_CISO_Survey]]&lt;br /&gt;
&lt;br /&gt;
== Project Performance competition ==&lt;br /&gt;
&lt;br /&gt;
Hey guys&lt;br /&gt;
Next 187 days we will try to perform our better performance to win the game.&lt;br /&gt;
Best of luck.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download:&lt;br /&gt;
&lt;br /&gt;
http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com &amp;amp; http://lappyframework.blogspot.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWASP System Vulnerable Code Project is developed by a worldwide team of security developer. The malformed code writer name list of the project :&lt;br /&gt;
&lt;br /&gt;
* Ajin&lt;br /&gt;
* Sarker&lt;br /&gt;
* Nicol&lt;br /&gt;
* Breaker&lt;br /&gt;
* Simon&lt;br /&gt;
&lt;br /&gt;
User Interface Designer (License: GNU LGPL v.3):&lt;br /&gt;
&lt;br /&gt;
* Mehedi Hasan Shuvo&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of OWASP System Vulnerable Code Project, the priorities are:&lt;br /&gt;
* CVE&lt;br /&gt;
* NIST&lt;br /&gt;
* Offensive Security&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of  OWASP System Vulnerable Code Project&lt;br /&gt;
Jump to: navigation, search&lt;br /&gt;
 is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Sending the security error of the application based code.&lt;br /&gt;
* Find out the bug of operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_System_Vulnerable_Code_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Shezan</name></author>	</entry>

	</feed>