Project Leaders
- OWASP .Net
- OWASP API Security Project
- OWASP APICheck
- OWASP ASVS-Graph
- OWASP AWScanner
- OWASP Access Log Parser
- OWASP Amass
- OWASP AndroGoat
- OWASP Android Security Inspector Toolkit
- OWASP Anti-Ransomware Guide
- OWASP AntiSamy
- OWASP AppSec Days Developer Outreach Program
- OWASP AppSec Minimum Requirements
- OWASP AppSensor
- OWASP Application Gateway
- OWASP Application Security Awareness Campaigns
- OWASP Application Security Curriculum
- OWASP Application Security Hardening
- OWASP Application Security Monitoring Standard
- OWASP Application Security Playbook
- OWASP Application Security Verification Standard
- OWASP Appsec Pipeline
- OWASP Attack Surface Detector
- OWASP Auth
- OWASP Automated Threats to Web Applications
- OWASP Automotive EMB 60
- OWASP Barbarus
- OWASP Benchmark
- OWASP Best Practices In Vulnerability Disclosure And Bug Bounty Programs
- OWASP Big Data Security Verification Standard
- OWASP Blend
- OWASP Blockchain Distributed Infrastructure
- OWASP Broken Web Applications
- OWASP Bug Logging Tool
- OWASP CSRFGuard
- OWASP CSRFProtector Project
- OWASP CWE Toolkit
- OWASP Cervantes
- OWASP ChainGoat
- OWASP Cheat Sheet Series
- OWASP Cloud Security Mentor
- OWASP Cloud Security Testing Guide
- OWASP Cloud Tenant Isolation
- OWASP Cloud Testing Guide
- OWASP Cloud-Native Application Security Top 10
- OWASP Cloud-Native Security Project
- OWASP CloudSheep
- OWASP Code Pulse
- OWASP Code the Flag
- OWASP Container Security Verification Standard
- OWASP Continuous Penetration Testing Framework
- OWASP Coraza Web Application Firewall
- OWASP Core Business Application Security
- OWASP Cornucopia
- OWASP Ctf
- OWASP Cyber Defense Matrix
- OWASP Cyber Scavenger Hunt
- OWASP Cyber Security Enterprise Operations Architecture
- OWASP Cybersecurity Risk Register
- OWASP CycloneDX
- OWASP D4N155
- OWASP DPD (DDOS Prevention using DPI)
- OWASP DVSA
- OWASP Damn Vulnerable Crypto Wallet
- OWASP Damn Vulnerable Thick Client Application
- OWASP Damn Vulnerable Web Sockets
- OWASP Data Security Top 10
- OWASP Defectdojo
- OWASP Dependency-Check
- OWASP Dependency-Track
- OWASP Desktop App Security Top 10
- OWASP DevSecOps Guideline
- OWASP DevSecOps Top 10
- OWASP DevSecOps Verification Standard
- OWASP DevSlop
- OWASP Developer Guide
- OWASP Devsecops Maturity Model
- OWASP Docker Top 10
- OWASP Domain Protect
- OWASP Embedded Application Security
- OWASP Ende
- OWASP Enterprise Security API (ESAPI)
- OWASP Extensions for Apache Drill
- OWASP Financial Systems Security
- OWASP Find Security Bugs
- OWASP G0rKing
- OWASP Game Security Framework
- OWASP Glue Tool
- OWASP Go Secure Coding Practices Guide
- OWASP Honeypot
- OWASP How to Get Into AppSec
- OWASP IDE-VulScanner
- OWASP Igoat Tool
- OWASP Incident Response
- OWASP Information Security Metrics Bank
- OWASP InjectBot
- OWASP Integration Standards
- OWASP Intelligent Intrusion Detection System
- OWASP IoT Security Verification Standard
- OWASP Iot Analytics 4Industry4
- OWASP Java Encoder
- OWASP Java HTML Sanitizer
- OWASP JavaScript Security
- OWASP Joomscan
- OWASP Jotp
- OWASP Json Sanitizer
- OWASP Juice Shop
- OWASP Jupiter
- OWASP Knowledge Based Authentication Performance Metrics
- OWASP KubeLight
- OWASP Kubernetes Security Testing Guide
- OWASP Kubernetes Top Ten
- OWASP Laravel Goat
- OWASP Learning Gateway
- OWASP Lock It
- OWASP Low-Code/No-Code Top 10
- OWASP Machine Learning Security Top 10
- OWASP Machine Learning Security Verification Standard
- OWASP Maryam
- OWASP Mimosa
- OWASP Mobile Application Security
- OWASP Mobile Audit
- OWASP Mobile Top 10
- OWASP ModSecurity Core Rule Set
- OWASP Mth3L3M3Nt Framework
- OWASP Mutillidae II
- OWASP Nasi Lemak
- OWASP Nettacker
- OWASP Nightingale
- OWASP Node.js Goat
- OWASP O-Saft
- OWASP O2 Platform
- OWASP OWTF
- OWASP Off The Record 4 Java
- OWASP Online Academy
- OWASP Ontology Driven Threat Modeling Framework
- OWASP Open AppSec Tooling API
- OWASP Open Source Security Applications Platform
- OWASP Passfault
- OWASP Patton
- OWASP PenText
- OWASP Penetration Testing Kit
- OWASP Php
- OWASP Php Security Training
- OWASP Podcast
- OWASP Port and Service Information
- OWASP Proactive Controls
- OWASP Project Spotlight Series
- OWASP PurpleTeam
- OWASP Pygoat
- OWASP Python Honeypot
- OWASP Python Security
- OWASP Pyttacker
- OWASP Qrljacker
- OWASP Raider
- OWASP Revelo
- OWASP Reverse Engineering And Code Modification Prevention
- OWASP Risk Assessment Framework
- OWASP SAMM
- OWASP SEDATED®
- OWASP SamuraiWTF
- OWASP Scan IT
- OWASP ScrapPy
- OWASP Seclists
- OWASP Sectudo
- OWASP Secure Coding Dojo
- OWASP Secure Headers Project
- OWASP Secure Logging Benchmark
- OWASP Secure Medical Device Deployment Standard
- OWASP SecureBank
- OWASP SecureFlag Open Platform
- OWASP SecureTea Project
- OWASP Security Busters
- OWASP Security Champions Guide
- OWASP Security Culture
- OWASP Security Integration System
- OWASP Security Knowledge Framework
- OWASP Security Logging
- OWASP Security Pins
- OWASP Security Qualitative Metrics
- OWASP Security Resource Framework
- OWASP Security Shepherd
- OWASP SecurityRAT
- OWASP Seeker
- OWASP Seraphimdroid
- OWASP Serverless Top 10
- OWASP Single Sign-On
- OWASP Smart Contract Security Top 10
- OWASP Snakes And Ladders
- OWASP Snow
- OWASP Software Component Verification Standard
- OWASP Software Composition Security
- OWASP Software Pre-Execution Security Review
- OWASP Software Security 5D Framework
- OWASP State of AppSec Survey
- OWASP SupplyChainGoat
- OWASP TOCTOURex
- OWASP Testability Patterns for Web Applications
- OWASP Thick Client Security Testing Guide
- OWASP Thick Client Top 10 Project
- OWASP Threat Dragon
- OWASP Threat Model Cookbook
- OWASP Threat Modeling Playbook (OTMP)
- OWASP Threat Modeling Project
- OWASP Threatspec
- OWASP TimeGap Theory
- OWASP Top 10 CI/CD Security Risks
- OWASP Top 10 Card Game
- OWASP Top 10 Client-Side Security Risks
- OWASP Top 10 Fuer Entwickler
- OWASP Top 10 Privacy Risks
- OWASP Top 25 Parameters
- OWASP Top Ten
- OWASP TorBot
- OWASP University Challenge
- OWASP VITCC Open Source Initiative
- OWASP Vbscan
- OWASP Vicnum
- OWASP Virtual Patching Best Practices
- OWASP Voice Automated Application Security
- OWASP Vue 3 Password Input
- OWASP Vulnerability Management Center
- OWASP Vulnerability Management Guide
- OWASP Vulnerable Container Hub
- OWASP Vulnerable Web Application
- OWASP Vulnerable Web Applications Directory
- OWASP VulnerableApp
- OWASP VulnerableApp-Facade
- OWASP Watiqay
- OWASP Web Application Firewall Evaluation Criteria Project (WAFEC)
- OWASP Web Mapper
- OWASP Web Security Testing Guide
- OWASP Web Testing Environment
- OWASP WebGoat
- OWASP Webspa
- OWASP WinFIM.NET
- OWASP Wpbullet
- OWASP WrongSecrets
- OWASP ZAP
- OWASP Zezengorri Code
- OWASP Zsc Tool
- OWASP aegis4j
- OWASP cloud security
- OWASP crAPI
- OWASP eBPFShield
- OWASP hacking-lab
- OWASP iGNITA
- OWASP internet of things top 10
- OWASP jvmxray
- OWASP little web application firewall
- OWASP pytm
- OWASP safetypes
- OWASP secureCodeBox
- OWASP webgoat php
Flagship Projects
Projects that have demonstrated strategic value to OWASP and application security as a whole
Standards Projects
OWASP Application Security Verification Standard
The OWASP Application Security Verification Standard (ASVS) Project is a framework of security requirements that focus on defining the security controls required when designing, developing and testing modern web applications and web services.
OWASP CycloneDX
OWASP CycloneDX is a full-stack Bill of Materials (BOM) standard that provides advanced supply chain capabilities for cyber risk reduction.
Tool Projects
OWASP Amass
An advanced open source tool to help information security professionals perform network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques!
OWASP CSRFGuard
OWASP CSRFGuard is a library that implements a variant of the synchronizer token pattern to mitigate the risk of Cross-Site Request Forgery (CSRF) attacks.
OWASP Defectdojo
The leading open source application vulnerability management tool built for DevOps and continuous security integration.
OWASP Dependency-Check
Dependency-Check is a Software Composition Analysis (SCA) tool suite that identifies project dependencies and checks if there are any known, publicly disclosed, vulnerabilities.
OWASP Dependency-Track
Intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
OWASP Juice Shop
Probably the most modern and sophisticated insecure web application for security trainings, awareness demos and CTFs. Also great voluntary guinea pig for your security tools and DevSecOps pipelines!
OWASP OWTF
Offensive Web Testing Framework (OWTF), is an OWASP+PTES focused try to unite great tools and make pen testing more efficient, written mostly in Python.
OWASP Security Knowledge Framework
The OWASP Security Knowledge Framework is an open source web application that explains secure coding principles in multiple programming languages. The goal of OWASP-SKF is to help you learn and integrate security by design in your software development and build applications that are secure by design.
OWASP Security Shepherd
OWASP Security Shepherd is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project is to take AppSec novices or experienced engineers and sharpen their penetration testing skillset to security expert status.
OWASP ZAP
The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by a dedicated international team of volunteers. Great for pentesters, devs, QA, and CI/CD integration.
Documentation Projects
OWASP Cheat Sheet Series
The OWASP Cheat Sheet Series project provides a set of concise good practice guides for application developers and defenders to follow.
OWASP Mobile Application Security
The OWASP Mobile Application Security (MAS) project consists of a series of documents that establish a security standard for mobile apps and a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile application security assessment, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.
OWASP SAMM
A Software Assurance Maturity Model (SAMM) that provides an effective and measurable way for all types of organizations to analyse and improve their software security posture.
OWASP Top Ten
The OWASP Top 10 is the reference standard for the most critical web application security risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing your software development culture focused on producing secure code.
OWASP Web Security Testing Guide
The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and security professionals.
Code Projects
OWASP ModSecurity Core Rule Set
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules for use with ModSecurity or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks, including the OWASP Top Ten, with a minimum of false alerts.