awesome-vulnerable VS ZAP

Compare awesome-vulnerable vs ZAP and see what are their differences.

Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
awesome-vulnerable ZAP
3 61
850 11,987
- 1.8%
5.1 9.2
4 months ago 4 days ago
Java
MIT License Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

awesome-vulnerable

Posts with mentions or reviews of awesome-vulnerable. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-10-06.

ZAP

Posts with mentions or reviews of ZAP. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-03-09.
  • Bruno
    20 projects | news.ycombinator.com | 9 Mar 2024
    I use ZAP [1] with the OAST add-on for this at the moment. I admit the UX isn't perfect, but it serves my purpose.

    If I also want control over the responses (e.g. return a 401 status code for every fifth request), I have a custom extender script [2] for that.

    [1]: https://www.zaproxy.org/

  • What is API Discovery, and How to Use it to Reduce Your Attack Surface
    3 projects | dev.to | 7 Mar 2024
    Implement tools like Burp Suite or OWASP ZAP for in-depth security scanning of your APIs.
  • Best Hacking Tools for Beginners 2024
    5 projects | dev.to | 1 Feb 2024
    OWASP ZAP
  • Autorize – The most popular tool to discover AuthZ/AuthN flaws
    4 projects | news.ycombinator.com | 28 Dec 2023
    The use of capital punctuation implies a warning? an alert? Would this same response be warranted for Burp which is also a commercial, closed source product?

    If this is an issue for some, then ZAP being open source[1] maybe favourable.

    That said, Burp is the defacto tool for a reason - it's best in class. Every pentester I know, including myself, has a paid subscription. The fact that it's closed source hasn't been an issue.

    [1] https://github.com/zaproxy/zaproxy

  • Show HN: Pākiki Proxy – An intercepting proxy for penetration pesting
    4 projects | news.ycombinator.com | 27 Oct 2023
    Briefly reviewed your product. Seems like OWASP ZAP is your competition: https://www.zaproxy.org/

    It runs entirely in the browser so it uses the browser "native" frameworks.

  • Vulnerability Scanning of Node.js Applications
    4 projects | dev.to | 25 Sep 2023
    Dynamic analysis involves testing your application while it's running. Tools like OWASP ZAP and Burp Suite can help identify vulnerabilities like SQL injection or Cross-Site Scripting by sending malicious requests to your application and analyzing the responses.
  • Is this fraud? And if so, to what extent am I responsible?
    1 project | news.ycombinator.com | 16 Sep 2023
    > Lying is not an embellishment or puffery, it's a lie. Engaging a company for a 3 day pen test that's totally insufficient, that would be an embellishment.

    I agree, but if the RFP question was phrased "have you done penetration testing?" then that leaves a lot of room for embellishment. If the question is "do you have SOC2 certification?" and you answer "yes" untruthfully, then that is a lie. If they ask for the SOC2 or pentest report and you give them a falsified document, that's where you're (probably) committing fraud.

    > One of the most important part of pen tests is that they are external.

    AWS/Google/etc have internal security teams doing their pen tests, so no, this isn't true.

    > Just doing your job as an engineer and looking for bugs is not a pen test.

    What about an engineer spending an afternoon running ZAP[0]?

    > It's like saying, "what is an audit really? We have accountants and they check our books for anomalies."

    Yeah, which is why you don't just ask a company "do you keep track of your finances?" if you're investing in them, you request external auditors.

    [0] https://www.zaproxy.org/

  • The essential security checklist for user identity
    3 projects | dev.to | 3 Jul 2023
    In addition to manual security reviews, you can also implement DevSecOps practices to automate security checks. For example, you can set up a CI/CD pipeline to run static code analysis tools like CodeQL and automatically run penetration tests using tools like OWASP ZAP.
  • The 36 tools that SaaS can use to keep their product and data safe from criminal hackers (manual research)
    18 projects | /r/SaaS | 22 May 2023
    OWASP ZAP (open source)
  • How can i make web server from scratch
    2 projects | /r/webdev | 24 Apr 2023
    I would start by installing Burp Suite or OWASP Zap and seeing what the actual messages look like

What are some alternatives?

When comparing awesome-vulnerable and ZAP you can also consider the following projects:

hacker-roadmap - A collection of hacking tools, resources and references to practice ethical hacking.

nuclei - Fast and customizable vulnerability scanner based on simple YAML based DSL.

HackersCave4StaticAndroidSec - A comprehensive resource for Android static analysis and vulnerability assessment. Tutorials, tools, and resources for identifying and mitigating security vulnerabilities in Android applications.

SonarQube - Continuous Inspection

mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

Ciphey - ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡

SQLMap - Automatic SQL injection and database takeover tool

bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.

HTML Purifier - Standards compliant HTML filter written in PHP

nps-lab-notes - Concise notes for NPS Lab, ICT Dept, MIT, Manipal

awesome-dva - A curated list of "damn vulnerable apps" and exploitable VMs / wargames. See contributing.md for information.