Jump to content

WebScarab

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Hidden Weasel (talk | contribs) at 17:05, 23 May 2025 (Added list of features). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
WebScarab
Developer(s)The Open Web Application Security Project
Repositorygithub.com/OWASP/OWASP-WebScarab
Written inJava
Type Web security testing tool
LicenseGPLv2
WebsiteWebScarab

WebScarab is a web security application testing tool. It serves as a proxy that intercepts and allows people to alter web browser web requests (both HTTP and HTTPS) and web server replies. WebScarab also may record traffic for further review.[1]

Overview

WebScarab is an open source tool developed by The Open Web Application Security Project (OWASP), and was implemented in Java so it could run across multiple operating systems.[2]

WebScarab is meant to act as a framework, being extensible and with most features being implemented as plugins.[3]

Features

Some of the features provided by plugins include: [3]

In 2013 official development of WebScarab slowed, and it appears that OWASP's Zed Attack Proxy ("ZAP") Project (another Java-based, open source proxy tool but with more features and active development) is WebScarab's official successor,[4][5] although ZAP itself was forked from the Paros Proxy, not WebScarab.[6]

References

  1. ^ Hope, Brian; Walther, Ben (2009). Web security testing cookbook : systematic techniques to find problems fast. Internet Archive. Sebastopol, Ca. : O'Reilly. ISBN 978-0-596-51483-9.
  2. ^ "Website Design for Crafting a Captivating Online Presence". Retrieved 2023-10-20.
  3. ^ a b "OWASP-WebScarab website". OWASP. Archived from the original on 12 May 2025. Retrieved 23 May 2025.
  4. ^ "OWASP-WebScarab check-in history". GitHub. Retrieved 5 May 2014.
  5. ^ "zaproxy change list". Google Code. Retrieved 5 May 2014.
  6. ^ "OWASP Zed Attack Proxy Project - Features". OWASP. Retrieved 5 May 2014.