This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Project Summit 2015/Project Participation"
From OWASP
(Created page with "==Projects Participating== '''https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project''' The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing to...") |
|||
Line 1: | Line 1: | ||
==Projects Participating== | ==Projects Participating== | ||
+ | ===OWASP ZAP=== | ||
'''https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project''' | '''https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project''' | ||
+ | |||
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. | The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. | ||
It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. | It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. | ||
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. | ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. |
Revision as of 16:55, 24 January 2015
Projects Participating
OWASP ZAP
https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.