This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Project Summit 2015/Project Participation"
From OWASP
(→OWASP ZAP) |
|||
Line 7: | Line 7: | ||
It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. | It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. | ||
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. | ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. | ||
+ | |||
+ | ===OWASP OWTF=== | ||
+ | |||
+ | ===OWASP Cornucopia=== | ||
+ | |||
+ | ===OWASP Appsensor=== | ||
+ | |||
+ | ===OWASP ASVS === | ||
+ | |||
+ | ===Hackademics=== | ||
+ | |||
+ | ===Snakes and Ladders === | ||
+ | |||
+ | ===OWASP Knowledge Based Authentication Performance Metrics === |
Revision as of 01:51, 5 March 2015
Projects Participating
OWASP ZAP
https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.