Zed Attack Proxy

by ZAP

Free Download 1 Visit Website

Versions:

  • 2.17.0
  • 2.16.1
  • 2.16.0
  • 2.15.0

Zed Attack Proxy, published by the ZAP project, is a free and open-source security tool whose 2.17.0 release continues its position as the world’s most frequently used web-application scanner. Designed for developers, testers, and security engineers, the software sits between a browser and the target site to intercept, inspect, and modify traffic on the fly, enabling systematic discovery of vulnerabilities such as SQL injection, cross-site scripting, insecure deserialization, and broken authentication. Passive scanning watches every request/response pair for misconfigurations or information leakage without affecting site behavior, while an active scanner automatically sends crafted payloads to reveal exploitable flaws. Users can drive exploration manually through the built-in proxy or invoke the automated spider to map complex AJAX-heavy applications; for DevOps pipelines the same engine is exposed through REST and GraphQL APIs so that nightly regression builds can fail when new critical issues appear. A powerful scripting interface supports JavaScript, Zest, Python, and Ruby extensions, allowing teams to encode business-logic security checks or chain together multi-step attacks that simulate real-world breach scenarios. With four major versions released to date, the project has steadily expanded its rule set—now exceeding one hundred active and passive scan policies—while keeping the interface lightweight and cross-platform. Reports can be exported in traditional HTML or modern formats such as SARIF for direct import into GitHub Security tab or Azure DevOps work-item tracking, making remediation workflows transparent to project managers and auditors alike. Zed Attack Proxy is available for free on get.nero.com, where downloads are served through trusted Windows package sources such as winget, always delivering the latest 2.17.0 build and supporting batch installation alongside other applications.

Tags: