This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP Security Catalyst
OWASP Security CatalystOWASP Security Catalyst project is a collection of dummy applications (fully secure and fully vulnerable versions) in various programming languages and platforms including .NET, JAVA, PHP, Android, iPhone, etc, demonstrating implementation of OWASP's secure design and development guidelines. DescriptionVision of this project is to demonstrate the implementation of OWASP's secure design and development guidelines as working applications in all leading programming languages and platforms including .NET, JAVA, PHP, Android, iPhone, etc. All the dummy applications will be available as Fully Vulnerable and Fully Secure versions. Vulnerable version will highlight the application security vulnerabilities, and can be used for Hands-on practice for application VAPT. At the same time, Secure version of the same application will map OWASP's security development guidelines in the code files, demonstrating secure coding. User's can not only use the vulnerable apps for VAPT practice, but they will very easily be able to compare the vulnerable code with the secure code, from the secure version of the same application. 1. Security hobbyist, enthusiasts, analysts and testers can use the vulnerable versions of the applications for Hand-on practice. 2. Developers will also be able to pick up security libraries from our secure version of the applications, to use them in their own applications and projects. 3. Training organizations can use this project's applications for VAPT and Secure Coding training programs.
LicensingGNU GPL v3 License |
Project ResourcesCurrently under development, this project's deliverable will be downloadable secure and vulnerable versions of dummy application in various programming languages including .NET, JAVA, PHP, Android, iPhone, etc. Project LeaderPraful Agarwal User:Praful Related ProjectsOWASP_WebGoat_Project OWASP_PHP_Security_Project OWASP_Java_File_I_O_Security_Project |
Classifications
News and Events
24-Nov-2014: Project Repository Creation on GitHub
GitHub project repository created for project deliverable and distribution, which can be found here.
How can I participate in your project?
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.
If I am not a programmer can I participate in your project?
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.
Volunteers
Currently OWASP_Security_Catalyst project is led by Praful Agarwal. This project's deliverable and distributions are available here.
We invite you to become a contributor for this project.
The first contributors to the project were:
{mailto:[email protected] Praful Agarwal]
Roadmap
Q1 2015
1. Developing "Training Management System" in PHP/MySQL as Vulnerable and Secure versions.
2. Walk-through/User-guide (preferably videos) for practicing vulnerabilities in "Training Management System"
3. Walk-through/User-guide (preferably videos) for exploring security libraries in "Training Management System"
Q2 2015
1. Developing "Training Management System" in ASP.NET/C#/SQL as Vulnerable and Secure versions.
2. Walk-through/User-guide (preferably videos) for practicing vulnerabilities in "Training Management System"
3. Walk-through/User-guide (preferably videos) for exploring security libraries in "Training Management System"
Q3 2015
1. Developing "Training Management System" in JAVA/ORACLE as Vulnerable and Secure versions.
2. Walk-through/User-guide (preferably videos) for practicing vulnerabilities in "Training Management System"
3. Walk-through/User-guide (preferably videos) for exploring security libraries in "Training Management System"
This page is where you should indicate what is the minimum set of functionality that is required to make this a useful product that addresses your core security concern. Defining this information helps the project leader to think about what is the critical functionality that a user needs for this project to be useful, thereby helping determine what the priorities should be on the roadmap. And it also helps reviewers who are evaluating the project to determine if the functionality sufficiently provides the critical functionality to determine if the project should be promoted to the next project category.