This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Project Summit 2015/Project Participation"

From OWASP
Jump to: navigation, search
(Created page with "==Projects Participating== '''https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project''' The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing to...")
 
Line 1: Line 1:
 
==Projects Participating==
 
==Projects Participating==
  
 +
===OWASP ZAP===
 
'''https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project'''
 
'''https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project'''
 +
 
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.
 
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.
 
It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.
 
It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.
 
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.
 
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

Revision as of 16:55, 24 January 2015

Projects Participating

OWASP ZAP

https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.