OWASP Zed Attack Proxy Project

= Main = The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.

It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.

ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

 And you can now buy ZAP related gear in the, er, ZAP Gear Store!



ZAP 2.0.0 is now available via the above link!

For more details about 2.0.0 see the OWASP Blog post

You can also get cross platform weekly releases which include all of the latest changes.

For a quick overview of ZAP and an introduction to version 2.0.0 see these tutorial videos on YouTube:

For more videos see the links on the wiki videos page.

Want a very quick introduction? See the.

For a slightly longer introduction see the project presentation.

For more details about ZAP, including the full user guide, see the wiki.

Zed Attack Proxy

= Screenshots =

= News = Latest News:
 * 2013/01/30 Version 2.0.0 released
 * 2012/11/27 Started a new zaproxy-test project of unit and integrations tests
 * 2012/10/29 Adopted Crowdin for translations
 * 2012/10/22 Started generating weekly releases
 * 2012/10/12 ZAP Overview tutorial video published
 * 2012/09/18 ZAP Gear Store goes live
 * 2012/08/05 Version 1.4.1 released
 * 2012/07/08 Version 1.4.0.1 downloaded over 15,000 times
 * 2012/07/05 Python API released
 * 2012/06/15 ZAP accepted for the OWASP Project Reboot
 * 2012/06/13 Using ZAP for Security Regression tests video published
 * 2012/06/04 Version 1.4.0.1 downloaded over 10,000 times
 * 2012/05/28 Simon's Introduction to ZAP talk at App Sec USA becomes the most watched OWASP video on vimeo
 * 2012/04/23 3 ZAP related Google Summer of Code 2012 projects accepted. To find out how these are progressing please see their wiki pages.
 * 2012/04/23 OWASP ZAP SmartCard Project officially launched.
 * 2012/04/08 Version 1.4.0.1 released
 * 2012/02/10 Version 1.3.4 downloaded over 10,000 times
 * 2012/02/01 OWASP ZAP is named the Toolsmith Tool of the Year for 2011!

= ZAP Gear =

Yes, you can now buy ZAP related gear!

Its your chance to show your support for the project, c/o `CafePress`.

Click on the tshirt to enter the ZAP Gear Store:



= Sponsors =

ZAP is developed by a worldwide team of volunteers.

But we have also been helped by many organizations, either financially or by encouraging their employees to work on ZAP:

= Functionality = Some of ZAP's functionality:
 * OWASP
 * Mozilla
 * Sage
 * Google
 * Microsoft
 * Hacktics, Ernst & Young
 * Taddong
 * Denim Group
 * SecureIdeas
 * UtiliSec
 * encription


 * Intercepting Proxy
 * Traditional and AJAX spiders
 * Automated scanner
 * Passive scanner
 * Forced browsing
 * Fuzzer
 * Dynamic SSL certificates
 * Smartcard and Client Digital Certificates support
 * Web sockets support
 * Authentication and session support
 * Powerful REST based API
 * Support for a wide range of scripting languages
 * Automatic updating option
 * Integrated and growing marketplace of add-ons

= Features = Some of ZAP's features:


 * Open source
 * Cross platform
 * Easy to install (just requires java 1.7)
 * Completely free (no paid for 'Pro' version)
 * Ease of use a priority
 * Comprehensive help pages
 * Fully internationalized
 * Translated into a dozen languages
 * Community based, with involvement actively encouraged
 * Under active development by an international team of volunteers

ZAP is a fork of the well regarded Paros Proxy.

= Languages =

ZAP supports the following languages:


 * English
 * Brazilian Portuguese
 * Chinese
 * Danish
 * Filipino
 * French
 * German
 * Greek
 * Indonesian
 * Italian
 * Japanese
 * Korean
 * Persian
 * Polish
 * Russian
 * Spanish

You can use Crowdin to help improve these translations or add new ones right now!

= Roadmap =

Release 2.0.0
ZAP 2.0.0 has been released, and includes:
 * An integrated add-ons marketplace
 * A replacement for the 'standard' spider, c/o Google Summer of Code 2012
 * A new 'Ajax' spider, c/o Crawljax and Google Summer of Code 2012
 * Web Sockets support, c/o Google Summer of Code 2012
 * Session awareness, c/o Google Summer of Code 2012
 * A quick start tab - type in a URL and scan with one click
 * User defined Contexts
 * Session scope
 * Different modes (Safe, Protected and Standard)
 * A scripting console (with support for any language that conforms to JSR 223)
 * Authentication handling
 * More API support
 * Fine grained scanning controls
 * New and improved active and passive scanning rules
 * Enhancements and fixes logged on the issues page

For more details see http://owasp.blogspot.com/2013/01/owasp-zed-attack-proxy-v-200.html

Details of previous releases can be found here

= Get Involved =

Involvement in the development of ZAP is actively encouraged!

You do not have to be a security expert in order to contribute.

Some of the ways you can help:

Feature Requests
Please raise new feature requests as enhancement requests here: http://code.google.com/p/zaproxy/issues/list

If there are existing requests you are also interested in then please 'star' them - that way we can see which features people are most interested in and can prioritize them accordingly.

Feedback
Please use the zaproxy-develop Google Group for feedback:
 * What do like?
 * What don't you like?
 * What features could be made easier to use?
 * How could the help pages be improved?

Log issues
Have you had a problem using ZAP?

If so and its not already been logged then please report it

Localization
Are you fluent in another language? Can you help translate ZAP into that language?

You can use Crowdin to do that!

Development
If you fancy having a go at adding functionality to ZAP then please get in touch via the zaproxy-develop Google Group.

Again, you do not have to be a security expert to contribute code - working on ZAP could be great way to learn more about web application security!

If you actively contribute to ZAP then you will be invited to join the project.

= Project About =