OWASP Projects and Application Security

  1. OWASP Security Tools and Utilities
    1. OWASP Zed Attack Proxy
      1. ZAP Architecture and Components
        1. Proxy Server
          1. Active Scanner
            1. Passive Scanner
              1. Spider
                1. Fuzzer
                2. ZAP Installation and Configuration
                  1. Installation Methods
                    1. Initial Configuration
                      1. Certificate Management
                        1. Proxy Configuration
                        2. ZAP Core Features
                          1. Manual Exploration
                            1. Automated Scanning
                              1. Passive Scanning
                                1. Active Scanning
                                  1. Spidering
                                    1. Fuzzing
                                    2. ZAP Advanced Features
                                      1. Authentication Configuration
                                        1. Session Management
                                          1. Context Configuration
                                            1. Script Integration
                                            2. ZAP Add-ons and Extensions
                                              1. Add-on Marketplace
                                                1. Custom Script Development
                                                2. ZAP Integration
                                                  1. CI/CD Pipeline Integration
                                                    1. API Usage
                                                      1. Reporting and Export
                                                    2. OWASP Dependency-Check
                                                      1. Software Composition Analysis Concepts
                                                        1. Dependency Management
                                                          1. Vulnerability Databases
                                                            1. Risk Assessment
                                                            2. Dependency-Check Features
                                                              1. Supported Languages and Ecosystems
                                                                1. Vulnerability Detection
                                                                  1. False Positive Management
                                                                    1. Reporting Capabilities
                                                                    2. Integration Options
                                                                      1. Build Tool Integration
                                                                        1. Maven Plugin
                                                                          1. Gradle Plugin
                                                                            1. Ant Task
                                                                            2. CI/CD Integration
                                                                              1. Jenkins Plugin
                                                                                1. GitHub Actions
                                                                                  1. Azure DevOps
                                                                                  2. IDE Integration
                                                                                  3. Configuration and Customization
                                                                                    1. Suppression Files
                                                                                      1. Custom Analyzers
                                                                                        1. Database Updates
                                                                                      2. OWASP Amass
                                                                                        1. Network Reconnaissance Fundamentals
                                                                                          1. Asset Discovery
                                                                                            1. Attack Surface Mapping
                                                                                              1. Subdomain Enumeration
                                                                                              2. Amass Capabilities
                                                                                                1. Passive Information Gathering
                                                                                                  1. Active Information Gathering
                                                                                                    1. DNS Enumeration
                                                                                                      1. Certificate Transparency Logs
                                                                                                      2. Amass Usage and Configuration
                                                                                                        1. Command Line Interface
                                                                                                          1. Configuration Files
                                                                                                            1. Data Sources
                                                                                                              1. Output Formats
                                                                                                              2. Integration and Automation
                                                                                                                1. Scripting Integration
                                                                                                                  1. Continuous Monitoring
                                                                                                                    1. Visualization Tools
                                                                                                                  2. OWASP CycloneDX
                                                                                                                    1. Software Bill of Materials Concepts
                                                                                                                      1. SBOM Standards
                                                                                                                        1. Supply Chain Transparency
                                                                                                                          1. Vulnerability Management
                                                                                                                          2. CycloneDX Specification
                                                                                                                            1. Component Information
                                                                                                                              1. Dependency Relationships
                                                                                                                                1. Vulnerability Data
                                                                                                                                  1. License Information
                                                                                                                                  2. SBOM Generation
                                                                                                                                    1. Language-Specific Tools
                                                                                                                                      1. Build System Integration
                                                                                                                                        1. Container Image Analysis
                                                                                                                                        2. SBOM Consumption
                                                                                                                                          1. Vulnerability Analysis
                                                                                                                                            1. License Compliance
                                                                                                                                              1. Risk Assessment
                                                                                                                                            2. OWASP ModSecurity
                                                                                                                                              1. Web Application Firewall Concepts
                                                                                                                                                1. Request Filtering
                                                                                                                                                  1. Attack Detection
                                                                                                                                                    1. Response Modification
                                                                                                                                                    2. ModSecurity Architecture
                                                                                                                                                      1. Rules Engine
                                                                                                                                                        1. Audit Logging
                                                                                                                                                          1. Data Collection
                                                                                                                                                          2. Core Rule Set
                                                                                                                                                            1. Rule Categories
                                                                                                                                                              1. Attack Detection Rules
                                                                                                                                                                1. Anomaly Scoring
                                                                                                                                                                2. Configuration and Tuning
                                                                                                                                                                  1. Rule Customization
                                                                                                                                                                    1. False Positive Reduction
                                                                                                                                                                      1. Performance Optimization