Z
                                
                                
                                Zed Attack Proxy
by Zed Attack Proxy
Empower your web security testing with ZAP's robust automation and extensive add-ons.
                                
                                    
                                        
                                            
                                        
                                    
                                        
                                            
                                        
                                    
                                        
                                            
                                        
                                    
                                        
                                            
                                        
                                    
                                        
                                            
                                        
                                    
                                
                                0.00
                                (0 reviews)
                            
                            
                                DAST Tools
                                
                                    Commercial
                                
                            
                            
                        Description
Zed Attack Proxy (ZAP) is a versatile open-source web application security scanner that caters to both novices and seasoned professionals. With its extensive add-on marketplace and automation capabilities, ZAP excels in identifying vulnerabilities like SQL Injection and XSS. It offers a user-friendly interface, detailed documentation, and powerful tools for vulnerability assessment and penetration testing, making it essential for securing web applications against a wide range of threats.
Key Features
- Open-source and community-driven development
 - Extensive add-on marketplace for enhanced functionality
 - Automated vulnerability scanning and reporting
 - Support for both manual and automated penetration testing
 - User-friendly interface with detailed documentation
 - Compatible with major operating systems and Docker
 - Powerful API for integration with CI/CD pipelines
 - Real-time alerts and reporting for quick vulnerability management
 
Vulnerability Types Detected
                    
                    csrf
                    
                    sql injection
                    
                    xss
                    
                    command injection
                    
                    information disclosure
                    
                    network vulnerabilities
                    
                    web application vulnerabilities
                    
                    business logic flaws
                    
                    credential leaks
                    
                    misconfigurations
                    
                    path traversal
                    
                    remote file inclusion
                    
                    plugin vulnerabilities
                    
                    server side request forgery
                    
                    token misuse
                    
                
            Technical Information
                            Deployment:
                            
                        
                                Software as a Service
                            
                        
                            Support Level:
                            
                    
                                Community Support
                            
                        Quick Actions
Tool Information
| Category: | DAST Tools | 
| License: | Commercial | 
| Vendor: | Zed Attack Proxy | 
| Views: | 0 | 
| Added: | Aug 20, 2025 | 
Compliance Standards
                    
                    CIS
                    
                    GDPR
                    
                    HIPAA
                    
                    ISO 27001
                    
                    NIST
                    
                    OWASP
                    
                    PCI DSS
                    
                    SOC 2
                    
                    data protection regulations
                    
                
            Tags
                    
                    and-macintosh
                    
                    apache-2.0
                    
                    open-source
                    
                    the-zap-development-team
                    
                    unix/linux
                    
                    windows
                    
                    zed-attack-proxy
                    
                    web-scanner
                    
                    sql-injection
                    
                    xss
                    
                    automated-scanning
                    
                    developer-friendly
                    
                    real-time-alerts
                    
                    api-security
                    
                    vulnerability-scanning
                    
                    penetration-testing
                    
                    community-supported
                    
                    docker
                    
                    multi-language
                    
                    automation-framework
                    
                    ajax-spider
                    
                    risk-analytics
                    
                    continuous-integration
                    
                    automated-pentesting
                    
                    security-testing
                    
                    vulnerability-assessment
                    
                    web-application-security
                    
                    openapi-security
                    
                    graph-ql-security
                    
                    jwt-support
                    
                    graphql-security
                    
                    automation
                    
                    security-automation
                    
                    penetration-testing-tools
                    
                    vulnerability-discovery
                    
                    risk-assessment
                    
                    pentesting
                    
                    security-automation-tools
                    
                    security-testing-framework
                    
                    manual-testing
                    
                    vulnerability-scanner
                    
                    web-application-testing
                    
                    owasp-top-10
                    
                    dynamic-security-testing
                    
                    continuous-api-testing
                    
                    threat-exposure-management