<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div><span></span></div><div><div>Would you consider running a card sort? Ask members to sort the project list based on open (they choose) and closed (we choose) categories? There are online tools like <a href="http://trello.com">trello.com</a> and Optimal Sort that make the task easy. Optimal Sort provides statistics, but it is not free. You could also run it as a team activity at AppSecEU with colored post it notes.<br><br><span style="background-color: rgba(255, 255, 255, 0);">Noreen Whysel<br></span><span style="background-color: rgba(255, 255, 255, 0); font-size: 13pt;">Community Manager</span><div><span style="background-color: rgba(255, 255, 255, 0);">OWASP Foundation</span></div></div><div><br>On May 11, 2015, at 9:00 AM, Munir Njiru <<a href="mailto:munir.njiru@owasp.org">munir.njiru@owasp.org</a>> wrote:<br><br></div><blockquote type="cite"><div><div dir="ltr">A finer detail would be detailed tags . looking at it from a user perspective it would be nice if tags also covered what they can be used for e.g. SQL Injection , XSS, etc most people search on this aspect. <br></div><div class="gmail_extra"><br clear="all"><div><div class="gmail_signature"><div dir="ltr"><div><span style="background-color:rgb(255,255,255)"><span style="color:rgb(153,153,153)"><span></span>Munir Njenga,<br>OWASP Chapter Leader (Kenya) || Information Security Consultant || Developer<br>Mob   (KE) +254 (0) 734960670<br><br>=============================<br></span></span></div><div><span style="background-color:rgb(255,255,255)"><span style="color:rgb(153,153,153)">Chapter Page: <a href="https://www.owasp.org/index.php/Kenya" target="_blank">www.owasp.org/index.php/Kenya</a><br></span></span></div><div><span style="background-color:rgb(255,255,255)"><span style="color:rgb(153,153,153)">Email: <a href="mailto:munir.njiru@owasp.org" target="_blank">munir.njiru@owasp.org</a></span></span></div><div><span style="background-color:rgb(255,255,255)"><span style="color:rgb(153,153,153)">Facebook: <a href="https://www.facebook.com/OWASP.Kenya" target="_blank">https://www.facebook.com/OWASP.Kenya</a><br></span></span></div><div><span style="background-color:rgb(255,255,255)"><span style="color:rgb(153,153,153)">Mailing List: <a href="https://lists.owasp.org/mailman/listinfo/owasp-Kenya" target="_blank">https://lists.owasp.org/mailman/listinfo/owasp-Kenya</a><br></span></span></div><div><span style="background-color:rgb(255,255,255)"><span style="color:rgb(153,153,153)"><br></span></span></div></div></div></div>
<br><div class="gmail_quote">On Mon, May 11, 2015 at 3:57 PM, johanna curiel curiel <span dir="ltr"><<a href="mailto:johanna.curiel@owasp.org" target="_blank">johanna.curiel@owasp.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">Simon , I'll incorporate your change. My idea is to make a 'searchable' data of projects out of this info<div>Easier for users looking for information about OWASP projects</div><div><br></div><div>Regards</div><div><br></div><div>Johanna</div></div><div><div class="h5"><div class="gmail_extra"><br><div class="gmail_quote">On Mon, May 11, 2015 at 5:45 AM, psiinon <span dir="ltr"><<a href="mailto:psiinon@gmail.com" target="_blank">psiinon@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div><div><div><div>Hi Johanna,<br><br></div><div>Thanks for doing this, I think it will be very helpful.<br><br></div>Minor feedback - I'd recommend either using a short description OR keywords / tags, or having separate columns for them.<br></div>My preference would be for tags (or separate columns) as they are then easier for cross-linking, eg for ZAP: "Proxy", "Attack", "Vulnerability Scanner".<br><br></div>Cheers,<br><br></div>Simon<br><div><div><div><br></div></div></div></div><div class="gmail_extra"><br><div class="gmail_quote"><div><div>On Sun, May 10, 2015 at 1:47 AM, johanna curiel curiel <span dir="ltr"><<a href="mailto:johanna.curiel@owasp.org" target="_blank">johanna.curiel@owasp.org</a>></span> wrote:<br></div></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div><div dir="ltr">Hi All<div><br></div><div>I have been working on categorising the Owasp projects based on the kind of tool/code library and programming language used</div><div><br></div><div>I would like very much your feedback an ideas on the kind of categories</div><div><br></div><div>We do not want to make it to granular, feel free to reply</div><div><br></div><div>Regards</div><div><br></div><div>Johanna Curiel</div><div>Project Review Team Leader</div><div><br></div><div><table dir="ltr" style="table-layout:fixed;font-size:13px;font-family:arial,sans,sans-serif;border-collapse:collapse;border:1px solid rgb(204,204,204)" border="1" cellpadding="0" cellspacing="0"><colgroup><col width="355"><col width="252"><col width="252"><col width="307"></colgroup><tbody><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;font-size:120%;font-weight:bold">Code/Tools</td><td style="padding:2px 3px;vertical-align:bottom;font-size:120%;font-weight:bold">Maturity Level</td><td style="padding:2px 3px;vertical-align:bottom;font-size:120%;font-weight:bold">Programming language written</td><td style="padding:2px 3px;vertical-align:bottom;font-size:120%;font-weight:bold">Keywords/short description</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,229,153);font-weight:bold">Vulnerable Websites/Vulnerability training apps</td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">WebGoat</td><td style="padding:2px 3px;vertical-align:bottom">LAB</td><td style="padding:2px 3px;vertical-align:bottom">Java</td><td style="padding:2px 3px;vertical-align:bottom">Vulnerabilities Java Learning</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">WebGoatPHP</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">PHP</td><td style="padding:2px 3px;vertical-align:bottom">Vulnerabilities learning PHP</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;text-decoration:underline;color:rgb(17,85,204)"><a href="//www.google.com/url?q=http%3A%2F%2FWebGoat.NET" target="_blank">WebGoat.NET</a></td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">.NET</td><td style="padding:2px 3px;vertical-align:bottom">Vulnerabilities learning .NET</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Hackademic Challenges Project</td><td style="padding:2px 3px;vertical-align:bottom">LAB</td><td style="padding:2px 3px;vertical-align:bottom">Java</td><td style="padding:2px 3px;vertical-align:bottom">Vulnerabilities Java Learning</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Security Shepherd </td><td style="padding:2px 3px;vertical-align:bottom">LAB</td><td style="padding:2px 3px;vertical-align:bottom">Java</td><td style="padding:2px 3px;vertical-align:bottom">Vulnerabilities Java Learning</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP iGoat </td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Objective C</td><td style="padding:2px 3px;vertical-align:bottom">Vulnerabilties Android Mobile</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Bricks</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">PHP</td><td style="padding:2px 3px;vertical-align:bottom">Vulnerabilities learning PHP</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Mutillidae 2</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">PHP</td><td style="padding:2px 3px;vertical-align:bottom">Vulnerabilty app</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP SeraphimDroid</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Java</td><td style="padding:2px 3px;vertical-align:bottom">Vulnerabilties Android Mobile</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Node js Goat</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Javascript/Node.js framework</td><td style="padding:2px 3px;vertical-align:bottom">Vulnerabilities Node.js</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Faux Bank Project</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">ASP</td><td style="padding:2px 3px;vertical-align:bottom">Vulnerabilities Banking app</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204);font-weight:bold">Pen testing tools</td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Zed Attack Proxy</td><td style="padding:2px 3px;vertical-align:bottom">Flagship</td><td style="padding:2px 3px;vertical-align:bottom">Java</td><td style="padding:2px 3px;vertical-align:bottom">attack proxy</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP OWTF</td><td style="padding:2px 3px;vertical-align:bottom">Flagship</td><td style="padding:2px 3px;vertical-align:bottom">JavaScript/HTML/CSS</td><td style="padding:2px 3px;vertical-align:bottom">attack application layer</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">O-Saft</td><td style="padding:2px 3px;vertical-align:bottom">LAB</td><td style="padding:2px 3px;vertical-align:bottom">Perl/Command line</td><td style="padding:2px 3px;vertical-align:bottom">verification SSL</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Web Testing Environment Project</td><td style="padding:2px 3px;vertical-align:bottom">Flagship</td><td style="padding:2px 3px;vertical-align:bottom">Virtual Machine with multiple owasp tools</td><td style="padding:2px 3px;vertical-align:bottom">testing framework</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP EnDe</td><td style="padding:2px 3px;vertical-align:bottom">LAB</td><td style="padding:2px 3px;vertical-align:bottom">Javascript/HTML/CSS</td><td style="padding:2px 3px;vertical-align:bottom">Decoder Encoder</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Dependency Check</td><td style="padding:2px 3px;vertical-align:bottom">Flagship</td><td style="padding:2px 3px;vertical-align:bottom">Java plugin</td><td style="padding:2px 3px;vertical-align:bottom">Control vulnerabilities dependencies in libraries</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Passfault</td><td style="padding:2px 3px;vertical-align:bottom">LAB</td><td style="padding:2px 3px;vertical-align:bottom">PHP</td><td style="padding:2px 3px;vertical-align:bottom">Password weaknesses crack control</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Xenotix XSS Exploit Framework</td><td style="padding:2px 3px;vertical-align:bottom">LAB</td><td style="padding:2px 3px;vertical-align:bottom">Javascript/HTML/CSS</td><td style="padding:2px 3px;vertical-align:bottom">XSS attacks testing</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Mantra Security Framework</td><td style="padding:2px 3px;vertical-align:bottom">LAB</td><td style="padding:2px 3px;vertical-align:bottom">Distribution</td><td style="padding:2px 3px;vertical-align:bottom">testing framework</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Mantra OS</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Attack Platform OS Ubuntu</td><td style="padding:2px 3px;vertical-align:bottom">Attack platform </td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Bywaf </td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Python</td><td style="padding:2px 3px;vertical-align:bottom">Attack Web layer</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP NINJA PingU Project</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">C</td><td style="padding:2px 3px;vertical-align:bottom">Ping Utility</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP SQLiX </td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Perl</td><td style="padding:2px 3px;vertical-align:bottom">Scanner Attacks</td></tr><tr style="height:27px"><td style="padding:2px 3px;vertical-align:bottom"><br>OWASP Pyttacker </td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Python</td><td style="padding:2px 3px;vertical-align:bottom">Reporting pen testing results</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP HTTP POST Tool</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">C++</td><td style="padding:2px 3px;vertical-align:bottom">Load testing web application</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Rainbow Maker </td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Python</td><td style="padding:2px 3px;vertical-align:bottom">Crack hashes</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Wapiti Project</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Python</td><td style="padding:2px 3px;vertical-align:bottom">Web Vulnerability Scanner attack</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Droid10</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Java</td><td style="padding:2px 3px;vertical-align:bottom">Android web vulnerability scanner</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Droid</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Java</td><td style="padding:2px 3px;vertical-align:bottom">Android web vulnerability scanner</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204);font-weight:bold">Static Analysis Tools/Libraries</td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP O2 Platform</td><td style="padding:2px 3px;vertical-align:bottom">LAB</td><td style="padding:2px 3px;vertical-align:bottom">.NET</td><td style="padding:2px 3px;vertical-align:bottom">Static analysis</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Dependency Track Project</td><td style="padding:2px 3px;vertical-align:bottom">LAB</td><td style="padding:2px 3px;vertical-align:bottom">Java</td><td style="padding:2px 3px;vertical-align:bottom">Track code vulnerabilities</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP WAP</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">PHP</td><td style="padding:2px 3px;vertical-align:bottom">Static analysis/Protection agains attacks</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP SonarQube</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Java plugins</td><td style="padding:2px 3px;vertical-align:bottom">Static Analysis check vulnerabilities</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204);font-weight:bold">Dependency check in libraries - tools</td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">WebGoat Benchmark </td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Java</td><td style="padding:2px 3px;vertical-align:bottom">Track code vulnerabilities</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Python Security Project</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Python </td><td style="padding:2px 3px;vertical-align:bottom">Code analysis Python libraries vulnerabilities</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Encoder Comparison </td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Javascript/HTML/CSS</td><td style="padding:2px 3px;vertical-align:bottom">Encoder ASCII ESAPI</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP JSEC CVE</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Java</td><td style="padding:2px 3px;vertical-align:bottom">Common vulnerabilities check</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204);font-weight:bold">Protection against vulnerabilties -Sanitizer tools</td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Java HTML Sanitizer Project</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Java</td><td style="padding:2px 3px;vertical-align:bottom">Sanitizer Input validation</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP WebSpa</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Java</td><td style="padding:2px 3px;vertical-align:bottom">Port knocking</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204);font-weight:bold">Protection against vulnerabilties - Security code libraries</td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP ModSecurity Core Rule Set Project</td><td style="padding:2px 3px;vertical-align:bottom">Flagship</td><td style="padding:2px 3px;vertical-align:bottom">Configuration files Apache</td><td style="padding:2px 3px;vertical-align:bottom">Mod security Apache rules Web Firewall</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP CSRFGuard Project</td><td style="padding:2px 3px;vertical-align:bottom">Flagship</td><td style="padding:2px 3px;vertical-align:bottom">Java library</td><td style="padding:2px 3px;vertical-align:bottom">Protection against CRSF attacks</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP AppSensor Project</td><td style="padding:2px 3px;vertical-align:bottom">Flagship</td><td style="padding:2px 3px;vertical-align:bottom">Java library</td><td style="padding:2px 3px;vertical-align:bottom">Protection vulnerabilities Secure development</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Enterprise Security API</td><td style="padding:2px 3px;vertical-align:bottom">LAB</td><td style="padding:2px 3px;vertical-align:bottom">Java library</td><td style="padding:2px 3px;vertical-align:bottom">Protection vulnerabilities Secure development</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Java Encoder Project Thumbsup.png</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Java library</td><td style="padding:2px 3px;vertical-align:bottom">Protection vulnerabilities Secure development</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Java File I/O Security Project</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Java library</td><td style="padding:2px 3px;vertical-align:bottom">Protection vulnerabilities Secure development</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP iMAS - iOS Mobile Application Security Project </td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Objective C</td><td style="padding:2px 3px;vertical-align:bottom">IOS mobile Sanitise code Protection vulnerabilities</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP PHP Security Project</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">PHP library</td><td style="padding:2px 3px;vertical-align:bottom">Protection vulnerabilities Secure development</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP File Format Validation Project</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">BIL language</td><td style="padding:2px 3px;vertical-align:bottom">Check file validation format</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Security Logging Project</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Java library</td><td style="padding:2px 3px;vertical-align:bottom">Reporting logging security issues/events</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP PHPRBAC Project</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">PHP library</td><td style="padding:2px 3px;vertical-align:bottom">Role Based Access Control Library</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204);font-weight:bold">Software Testing and Development tools</td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Secure TDD</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">.NET</td><td style="padding:2px 3px;vertical-align:bottom">Test driven development</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP XSecurity</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Objective C</td><td style="padding:2px 3px;vertical-align:bottom">IOS secure development</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP ASIDE</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Java/PHP</td><td style="padding:2px 3px;vertical-align:bottom">Secure development </td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP Code Pulse</td><td style="padding:2px 3px;vertical-align:bottom">LAB</td><td style="padding:2px 3px;vertical-align:bottom">.NET</td><td style="padding:2px 3px;vertical-align:bottom">Code Coverage revision</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204);font-weight:bold">Forensic analysis tools</td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td><td style="padding:2px 3px;vertical-align:bottom;background-color:rgb(255,242,204)"></td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom">OWASP iOSForensic</td><td style="padding:2px 3px;vertical-align:bottom">Incubator</td><td style="padding:2px 3px;vertical-align:bottom">Python</td><td style="padding:2px 3px;vertical-align:bottom">IOS Forensic analysis</td></tr></tbody></table></div><div></div></div>
<br></div></div><span>_______________________________________________<br>
OWASP-Leaders mailing list<br>
<a href="mailto:OWASP-Leaders@lists.owasp.org" target="_blank">OWASP-Leaders@lists.owasp.org</a><br>
<a href="https://lists.owasp.org/mailman/listinfo/owasp-leaders" target="_blank">https://lists.owasp.org/mailman/listinfo/owasp-leaders</a><br>
<br></span></blockquote></div><span><font color="#888888"><br><br clear="all"><br>-- <br><div><a href="https://www.owasp.org/index.php/ZAP" target="_blank">OWASP ZAP</a> Project leader<br></div>
</font></span></div>
</blockquote></div><br></div>

<p></p></div></div><span class="">

-- <br>
You received this message because you are subscribed to the Google Groups "OWASP Projects Task Force" group.<br>
To unsubscribe from this group and stop receiving emails from it, send an email to <a href="mailto:projects-task-force+unsubscribe@owasp.org" target="_blank">projects-task-force+unsubscribe@owasp.org</a>.<br>
To post to this group, send email to <a href="mailto:projects-task-force@owasp.org" target="_blank">projects-task-force@owasp.org</a>.<br></span>
To view this discussion on the web visit <a href="https://groups.google.com/a/owasp.org/d/msgid/projects-task-force/CACxry_3R6v7h2Jn8--_AZWFUdAGPLEx_1WMkAg50HQKCtfX%2BOw%40mail.gmail.com?utm_medium=email&utm_source=footer" target="_blank">https://groups.google.com/a/owasp.org/d/msgid/projects-task-force/CACxry_3R6v7h2Jn8--_AZWFUdAGPLEx_1WMkAg50HQKCtfX%2BOw%40mail.gmail.com</a>.<br>
</blockquote></div><br></div>
</div></blockquote><blockquote type="cite"><div><span>_______________________________________________</span><br><span>OWASP-Leaders mailing list</span><br><span><a href="mailto:OWASP-Leaders@lists.owasp.org">OWASP-Leaders@lists.owasp.org</a></span><br><span><a href="https://lists.owasp.org/mailman/listinfo/owasp-leaders">https://lists.owasp.org/mailman/listinfo/owasp-leaders</a></span><br></div></blockquote></div></body></html>