OWASP Zed Attack Proxy Project

= Main =  {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 * valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.

It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.

ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.



For a quick overview of ZAP and an introduction to version 2.4.0 see these tutorial videos on YouTube:

For more videos see the links on the wiki videos page.

Interested in a ZAP talk or training event? See the talks tab. Not one near you? Contact a Zap Evangelist to arrange one!

Want a very quick introduction? See the.

For a slightly longer introduction see the project presentation.

For more details about ZAP, including the full user guide, see the wiki.

We recently asked our users for feedback about ZAP, you can see their responses (which are separate for each languages) here: English, French, Spanish, Arabic

Zed Attack Proxy


 * valign="top" style="padding-left:25px;width:200px;" |

Quick Download
Download OWASP ZAP!

News and Events
Please see the News and Talks tabs

Change Log

 * zaproxy
 * zap-extensions

Code Repo

 * zaproxy
 * zap-extensions

Email List
Questions? Please ask on the ZAP User Group

Project Leader
Project Leader Simon Bennetts [mailto:psiinon@gmail.com @]

Related Projects

 * OWASP WTE
 * OWASP OWTF

Ohloh

 * https://www.openhub.net/p/zaproxy

Classifications

 * }

= Screenshots =

= Talks =

= News =

= ZAP Gear =

Yes, you can now buy ZAP related gear!

Its your chance to show your support for the project, c/o `CafePress`.

Click on the tshirt to enter the ZAP Gear Store:



= Supporters =

ZAP is developed by a worldwide team of volunteers.

But we have also been helped by many organizations, either financially or by encouraging their employees to work on ZAP:


 * OWASP
 * Mozilla
 * Sage
 * Google
 * Microsoft
 * Hacktics, Ernst & Young
 * DinoSec
 * Denim Group
 * Aspect Security
 * SecureIdeas
 * UtiliSec
 * encription

= Functionality = Some of ZAP's functionality:


 * Intercepting Proxy
 * Traditional and AJAX spiders
 * Automated scanner
 * Passive scanner
 * Forced browsing
 * Fuzzer
 * Dynamic SSL certificates
 * Smartcard and Client Digital Certificates support
 * Web sockets support
 * Support for a wide range of scripting languages
 * Plug-n-Hack support
 * Authentication and session support
 * Powerful REST based API
 * Automatic updating option
 * Integrated and growing marketplace of add-ons

= Features = Some of ZAP's features:


 * Open source
 * Cross platform (it even runs on a Raspberry Pi!)
 * Easy to install (just requires java 1.7)
 * Completely free (no paid for 'Pro' version)
 * Ease of use a priority
 * Comprehensive help pages
 * Fully internationalized
 * Translated into over 20 languages
 * Community based, with involvement actively encouraged
 * Under active development by an international team of volunteers

ZAP is a fork of the well regarded Paros Proxy.

= Languages =

ZAP supports the following languages:


 * English
 * Arabic
 * Bosnian
 * Brazilian Portuguese
 * Chinese
 * Danish
 * Filipino
 * French
 * German
 * Greek
 * Indonesian
 * Italian
 * Japanese
 * Korean
 * Persian
 * Polish
 * Russian
 * Sinhala
 * Spanish
 * Urdu

You can use Crowdin to help improve these translations or add new ones right now!

= Roadmap =

Release 2.4.0
ZAP 2.4.0 has been released, which includes:
 * Attack Mode
 * Advanced Fuzzing
 * Scan Policies
 * Scan Dialogs with Advanced Options
 * Hiding Unused Tabs
 * New Add-ons
 * New Scan Rules
 * Changed Scan Rules
 * More User Interface Changes
 * Extended API Support
 * Internationalized Help Add-ons

For more details see http://owasp.blogspot.co.uk/2015/04/owasp-zap-240.html

= Get Involved =

Involvement in the development of ZAP is actively encouraged!

You do not have to be a security expert in order to contribute.

Some of the ways you can help:

Feature Requests
Please raise new feature requests as enhancement requests here: https://github.com/zaproxy/zaproxy/issues

If there are existing requests you are also interested in then please 'star' them - that way we can see which features people are most interested in and can prioritize them accordingly.

Feedback
Please use the zaproxy-users Google Group for feedback:
 * What do like?
 * What don't you like?
 * What features could be made easier to use?
 * How could the help pages be improved?

Log issues
Have you had a problem using ZAP?

If so and its not already been logged then please report it

Localization
Are you fluent in another language? Can you help translate ZAP into that language?

You can use Crowdin to do that!

Development
If you fancy having a go at adding functionality to ZAP then please get in touch via the zaproxy-develop Google Group.

Again, you do not have to be a security expert to contribute code - working on ZAP could be great way to learn more about web application security!

If you actively contribute to ZAP then you will be invited to join the project.