<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Template%3AFlagshipProjects</id>
		<title>Template:FlagshipProjects - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Template%3AFlagshipProjects"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:FlagshipProjects&amp;action=history"/>
		<updated>2026-05-08T19:05:24Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:FlagshipProjects&amp;diff=253496&amp;oldid=prev</id>
		<title>Hblankenship: Hblankenship moved page Main Pageindex.php/Template:FlagshipProjects to Template:FlagshipProjects without leaving a redirect: Write Page Name</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:FlagshipProjects&amp;diff=253496&amp;oldid=prev"/>
				<updated>2019-08-02T17:01:16Z</updated>
		
		<summary type="html">&lt;p&gt;Hblankenship moved page &lt;a href=&quot;/index.php?title=Main_Pageindex.php/Template:FlagshipProjects&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Main Pageindex.php/Template:FlagshipProjects (page does not exist)&quot;&gt;Main Pageindex.php/Template:FlagshipProjects&lt;/a&gt; to &lt;a href=&quot;/index.php/Template:FlagshipProjects&quot; title=&quot;Template:FlagshipProjects&quot;&gt;Template:FlagshipProjects&lt;/a&gt; without leaving a redirect: Write Page Name&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='1' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='1' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 17:01, 2 August 2019&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan='2' style='text-align: center;' lang='en'&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(No difference)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;</summary>
		<author><name>Hblankenship</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:FlagshipProjects&amp;diff=253495&amp;oldid=prev</id>
		<title>Hblankenship: Created page with &quot;&lt;h2&gt;Flagship Projects&lt;/h2&gt; &lt;h4&gt; Projects that have demonstrated strategic value to OWASP and application security as a whole&lt;/h4&gt; &lt;div style=&quot;margin:auto;&quot;&gt;         &lt;div style...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:FlagshipProjects&amp;diff=253495&amp;oldid=prev"/>
				<updated>2019-08-02T16:59:23Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;h2&amp;gt;Flagship Projects&amp;lt;/h2&amp;gt; &amp;lt;h4&amp;gt; Projects that have demonstrated strategic value to OWASP and application security as a whole&amp;lt;/h4&amp;gt; &amp;lt;div style=&amp;quot;margin:auto;&amp;quot;&amp;gt;         &amp;lt;div style...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;h2&amp;gt;Flagship Projects&amp;lt;/h2&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;&lt;br /&gt;
Projects that have demonstrated strategic value to OWASP and application security as a whole&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin:auto;&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;display:inline-block;width:100%;text-align:center;border:0px;padding:0px;border-bottom:1px solid #000;border-top:1px solid #000;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div style=&amp;quot;font-weight:bold;background:lightblue;&amp;quot;&amp;gt;Tool Projects&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;/div&amp;gt;&lt;br /&gt;
         &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:transparent;&amp;quot;&amp;gt;&lt;br /&gt;
             &amp;lt;div&amp;gt;[[OWASP_Zed_Attack_Proxy_Project|OWASP Zed Attack Proxy (ZAP)]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
             &amp;lt;div&amp;gt;Automatically finds security vulnerabilities in your web applications while you are developing and testing your applications&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:lightgray;&amp;quot;&amp;gt;&lt;br /&gt;
             &amp;lt;div&amp;gt;[[OWASP_Web_Testing_Environment_Project|OWASP Web Testing Environment (WTE)]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:lightgray;&amp;quot;&amp;gt;&lt;br /&gt;
             &amp;lt;div&amp;gt;A collection of easy-to-use application security tools and documentation available in multiple formats&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
             &amp;lt;div&amp;gt;[[OWASP_OWTF|OWASP OWTF]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
             &amp;lt;div&amp;gt;Pentesting tool to more efficiently find, verify and combine vulnerabilities in short timeframes&amp;lt;/div&amp;gt; &lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:lightgray;&amp;quot;&amp;gt;&lt;br /&gt;
             &amp;lt;div&amp;gt;[[OWASP_Dependency_Check|OWASP Dependency Check]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:lightgray;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;A utility that identifies project dependencies and checks if there are any known, publicly disclosed, vulnerabilities&amp;lt;/div&amp;gt;  &lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
             &amp;lt;div&amp;gt;[[OWASP_Security_Shepherd|OWASP Security Shephard]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;A web and mobile application security training platform to foster and improve security awareness among a varied skill-set demographic&amp;lt;/div&amp;gt; &lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:lightgray;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;[[OWASP_DefectDojo_Project|OWASP DefectDojo]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:lightgray;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;An open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools&amp;lt;/div&amp;gt; &lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;[[OWASP_Juice_Shop_Project|OWASP Juice Shop]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;An intentionally insecure webapp for security trainings written entirely in JavaScript which encompasses the entire OWASP Top Ten and other severe security flaws&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:lightgray;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;[[OWASP_Security_Knowledge_Framework|OWASP Security Knowledge Framework]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:lightgray;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;A tool that is used as a guide for building and verifying secure software that can also be used to train developers about application security&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;[[OWASP_Dependency_Track_Project|OWASP Dependency Track]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;A Software Composition Analysis (SCA) platform that keeps track of all third-party components used in all the applications an organization creates or consumes. It monitors all applications in its portfolio in order to proactively identify vulnerabilities in components that are placing your applications at risk&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;display:inline-block;width:100%;text-align:center;border:0px;padding:0px;border-bottom:1px solid #000;border-top:1px solid #000;&amp;quot;&amp;gt;&lt;br /&gt;
            &amp;lt;div style=&amp;quot;font-weight:bold;background:lightblue;&amp;quot;&amp;gt;Code Projects&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;[[:Category:OWASP_ModSecurity_Core_Rule_Set_Project| OWASP ModSecurity Core Rule Set (CRS)]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;A set of generic attack detection rules for use with ModSecurity or compatible web application firewalls which aims to protect web applications from a wide range of attacks&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:lightgray;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;[[:Category:OWASP_CSRFGuard_Project|OWASP CSRFGuard]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:lightgray;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;A library that implements a variant of the synchronizer token pattern to mitigate the risk of Cross-Site Request Forgery (CSRF) attacks&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;display:inline-block;width:100%;text-align:center;border:0px;padding:0px;border-bottom:1px solid #000;border-top:1px solid #000;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div style=&amp;quot;font-weight:bold;background:lightblue;&amp;quot;&amp;gt;Documentation Projects&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;[[:Category:OWASP_Application_Security_Verification_Standard_Project| OWASP Application Security Verification Standard]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;Provides a basis for testing web application technical security controls and also provides developers with a list of requirements for secure development&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:lightgray;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;[[OWASP_AppSensor_Project|OWASP AppSensor]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:lightgray;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;A conceptual framework and methodology that offers prescriptive guidance to implement intrusion detection and automated response into applications&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;[[OWASP_SAMM_Project| OWASP Software Assurance Maturity Model (SAMM)]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;An open framework to help organizations formulate and implement a strategy for software security that is tailored to the specific risks facing the organization&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:lightgray;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;[[:Category:OWASP_Top_Ten_Project| OWASP Top Ten]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:lightgray;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;A powerful awareness document for web application security that represents a broad consensus about the most critical security risks to web applications&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;[[OWASP_Testing_Project|OWASP Testing Guide]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;Includes a &amp;quot;best practice&amp;quot; penetration testing framework which users can implement in their own organizations and a &amp;quot;low level&amp;quot; penetration testing guide that describes techniques for testing most common web application and web service security issues&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:lightgray;&amp;quot;&amp;gt;&lt;br /&gt;
          &amp;lt;div&amp;gt;[[OWASP_Cheat_Sheet_Series|OWASP Cheat Sheet Series]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;background:lightgray;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics. These cheat sheets were created by various application security professionals who have expertise in specific topics.&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
               &amp;lt;div&amp;gt;[[OWASP_Mobile_Security_Testing_Guide|OWASP Mobile Security Testing Guide]]&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;div style=&amp;quot;width:50%;text-align:left;padding:0px;margin:0px;float:left;&amp;quot;&amp;gt;&lt;br /&gt;
              &amp;lt;div&amp;gt;A security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.&amp;lt;/div&amp;gt;&lt;br /&gt;
          &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Hblankenship</name></author>	</entry>

	</feed>