Skip to content

Commit

Permalink
Merge pull request #1528 from zapbot/update-site-content
Browse files Browse the repository at this point in the history
Update site content
  • Loading branch information
psiinon authored Aug 9, 2024
2 parents 1977442 + 9ed9094 commit 794f655
Show file tree
Hide file tree
Showing 6 changed files with 9 additions and 10 deletions.
4 changes: 2 additions & 2 deletions evangelists/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -2114,7 +2114,7 @@ <h1 class="text--white">ZAP Evangelists</h1>
</td>
<td>
<div style="max-width:100%;">
<a href="https://thetestdoctor.co.uk/" rel="nofollow">Blog: The Test Doctor</a>
<a href="https://thetestdoctor.wordpress.com/" rel="nofollow">Blog: The Test Doctor</a>
</div>
</td>
</tr>
Expand Down Expand Up @@ -2618,7 +2618,7 @@ <h1 class="text--white">ZAP Evangelists</h1>
</td>
<td>
<div style="max-width:100%;">
ZAP Evangelist, <a href="https://www.omerlh.info/" rel="nofollow">Personal Site with previous talks</a>
ZAP Evangelist
</div>
</td>
</tr>
Expand Down
2 changes: 1 addition & 1 deletion faq/can-zap-be-used-to-test-mobile-apps/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -157,7 +157,7 @@ <h2>Can ZAP be used to test mobile apps?</h2>
<ul>
<li><a href="https://thezero.org/blog/2016/01/25/android_proxy_zap/">Intercepting Android traffic using OWASP ZAP</a> - TheZero blog</li>
<li><a href="https://blog.netspi.com/four-ways-bypass-android-ssl-verification-certificate-pinning/">Four Ways to Bypass Android SSL Verification and Certificate Pinning</a> - NetSPI Blog</li>
<li><a href="https://www.omerlh.info/2019/05/15/debugging-ios-apps-with-zaproxy/">Debugging iOS apps with Zaproxy</a> - Omer Levi Hevroni&rsquo;s blog</li>
<li><a href="https://web.archive.org/web/20240418164405/https://www.omerlh.info/2019/05/15/debugging-ios-apps-with-zaproxy/">Debugging iOS apps with Zaproxy</a> - Omer Levi Hevroni&rsquo;s blog - Via The Way Back Machine</li>
</ul>

</main>
Expand Down
2 changes: 1 addition & 1 deletion faq/index.xml
Original file line number Diff line number Diff line change
Expand Up @@ -299,7 +299,7 @@
<link>/faq/can-zap-be-used-to-test-mobile-apps/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>/faq/can-zap-be-used-to-test-mobile-apps/</guid>
<description>Yes, see this video from ZAPCon 2021:&#xA;These videos from @SecureCloudDev:&#xA;Setting up ZAP for Android Setting up ZAP for iPhone/iPad And these articles:&#xA;Intercepting Android traffic using OWASP ZAP - TheZero blog Four Ways to Bypass Android SSL Verification and Certificate Pinning - NetSPI Blog Debugging iOS apps with Zaproxy - Omer Levi Hevroni&amp;rsquo;s blog </description>
<description>Yes, see this video from ZAPCon 2021:&#xA;These videos from @SecureCloudDev:&#xA;Setting up ZAP for Android Setting up ZAP for iPhone/iPad And these articles:&#xA;Intercepting Android traffic using OWASP ZAP - TheZero blog Four Ways to Bypass Android SSL Verification and Certificate Pinning - NetSPI Blog Debugging iOS apps with Zaproxy - Omer Levi Hevroni&amp;rsquo;s blog - Via The Way Back Machine </description>
</item>
<item>
<title>Can ZAP be used to test my favorite framework or technology?</title>
Expand Down
2 changes: 1 addition & 1 deletion index.xml
Original file line number Diff line number Diff line change
Expand Up @@ -2684,7 +2684,7 @@ Right click menu Right clicking on a breakpoint will bring up a menu which will
<description>Yes, see this video from ZAPCon 2021:
These videos from @SecureCloudDev:
Setting up ZAP for Android Setting up ZAP for iPhone/iPad And these articles:
Intercepting Android traffic using OWASP ZAP - TheZero blog Four Ways to Bypass Android SSL Verification and Certificate Pinning - NetSPI Blog Debugging iOS apps with Zaproxy - Omer Levi Hevroni&amp;rsquo;s blog </description>
Intercepting Android traffic using OWASP ZAP - TheZero blog Four Ways to Bypass Android SSL Verification and Certificate Pinning - NetSPI Blog Debugging iOS apps with Zaproxy - Omer Levi Hevroni&amp;rsquo;s blog - Via The Way Back Machine </description>
</item>

<item>
Expand Down
6 changes: 3 additions & 3 deletions search/index.json
Original file line number Diff line number Diff line change
Expand Up @@ -2060,8 +2060,8 @@
"title": "Can ZAP be used to test mobile apps?",
"keywords": ["","apps?","be","can","mobile","test","to","used","zap"],
"tags": null,
"summary": "Yes, see this video from ZAPCon 2021:\nThese videos from @SecureCloudDev:\nSetting up ZAP for Android Setting up ZAP for iPhone/iPad And these articles:\nIntercepting Android traffic using OWASP ZAP - TheZero blog Four Ways to Bypass Android SSL Verification and Certificate Pinning - NetSPI Blog Debugging iOS apps with Zaproxy - Omer Levi Hevroni\u0026rsquo;s blog ",
"content": "see video from zapcon 2021: these videos secureclouddev: setting up zap android iphoneipad articles: intercepting traffic using owasp thezero blog four ways bypass ssl verification certificate pinning netspi debugging ios apps zaproxy omer levi hevronis "
"summary": "Yes, see this video from ZAPCon 2021:\nThese videos from @SecureCloudDev:\nSetting up ZAP for Android Setting up ZAP for iPhone/iPad And these articles:\nIntercepting Android traffic using OWASP ZAP - TheZero blog Four Ways to Bypass Android SSL Verification and Certificate Pinning - NetSPI Blog Debugging iOS apps with Zaproxy - Omer Levi Hevroni\u0026rsquo;s blog - Via The Way Back Machine ",
"content": "see video from zapcon 2021: these videos secureclouddev: setting up zap android iphoneipad articles: intercepting traffic using owasp thezero blog four ways bypass ssl verification certificate pinning netspi debugging ios apps zaproxy omer levi hevronis via way back machine "
},
{
"url": "/faq/can-zap-be-used-to-test-my-favorite-framework-or-technology/",
Expand Down Expand Up @@ -7533,7 +7533,7 @@
"keywords": ["","evangelists","zap"],
"tags": null,
"summary": "The following people are happy to give free ZAP talks and/or training in their respective locations.\nTo contact all evangelists please use the zaproxy-evangelists group.\nName Contact Region Languages Talks Training Notes Simon Bennetts UK / Worldwide / Remote English ZAP Project Lead. Slides available via Slideshare - feel free to rip them off ;) Yvan Boily Canada English ZAP Enthusiast.",
"content": "following people happy give free zap talks andor training their respective locations contact all evangelists please use zaproxyevangelists group name region languages notes simon bennetts uk worldwide remote english project lead slides available via slideshare feel rip them off yvan boily canada enthusiast webpage adam baso sf bay area duane blanchard pacific northwest source seattle sjsu cyber bootcamp uscc black lodge research zakaria rachid france french arabic homepage mauro risonho de paula assumpo brazil latin america portuguese amro alolaqi gulf cooperation council kim carter nz cofounder chcon creator purpleteam host software engineering radio published author many infosec books dan cornell usa adrien beaupre sans teacher sec542 course mateo martnez spanish malik mesellem belgium dutch founder bwapp training: attacking defending web apps mark goodwin ben walther los angeles johanna curiel netherlands caribbean spanishenglish papiamento owasp creating add ons playing fuzzer mennouchi islam azeddine algeria dzwebdaysblidaconstantinealgiers meeting sudan bside algiers russ mcree toolsmith tools evangelist top 10 tactics presented sansfire secureworld issa international etc azzeddine ramrami morocco ivory coast translation ahmed neil egypt jerome athias middle east michael coates chairman aaron guzman florencio cano gabarda spain talk: fuzzing browsers peach david epler washington dc mordecai kraushar leader vicnum slide share https:wwwslidesharenetmkrausharvicnumdescription jonathan fernndez tranlation yuho kameda japan japanese manual chetan karande previous minoru sakai supervision serg belokamen melbourne australia russian chapter application security designerarchitect http:wwwbugcrowdcom derek armstrong malware researcher sec504 mentor marudhamaran gunasekaran india developer blog vimeo channel billing europe blog: test doctor jess vermont american midwest missouri kansas illinois focus extensibility general app sec usagepen testingvulnerability detection yassia savadogo burkina faso network ammar hassan brohi pakistan swiss army knife marcin kope poland polish sumanth damarla hindi telugu fossasia mwos amf support kunal relan evangelistmozilla delhincr information workshop robert kerby southwest rocky mountains claudius omer levi hevroni israel hebrew personal site chhagan lal mathuriya bangalore have worked automated testing usig my github page amit kulkarni perth using sanket mishra boston us experience mohammed imran singapore devsecops studio devslop raul siles webapp mobile pentester contributor instructor dinosecs lab sec575 mohammad febri ramadlan indonesia southeast asia penetration automation takanori matsumoto marek ottl central czech republic specialties ssdlc pentesting cloud gowtham sundar chennai exploring ricky van rijn caleb kinney maryland appsec api bug bounty bj edward taduran pasig city philippines filipino layers compliance grant ongers london united kingdom part delivery not way paul molin paris lover youtube chad martell california states threat hunting rafa krzpa swietochlowice sharing knowledge https:wwwdlatesterowpl learning hahwul south korea korean securitysoftware engineer najam ul saqib urdu development team member most will travel provided expenses covered anyone can you just need comfortable talking about submit pull request adding your details evangelistsyaml post thread also above advice guidance giving directly "
"content": "following people happy give free zap talks andor training their respective locations contact all evangelists please use zaproxyevangelists group name region languages notes simon bennetts uk worldwide remote english project lead slides available via slideshare feel rip them off yvan boily canada enthusiast webpage adam baso sf bay area duane blanchard pacific northwest source seattle sjsu cyber bootcamp uscc black lodge research zakaria rachid france french arabic homepage mauro risonho de paula assumpo brazil latin america portuguese amro alolaqi gulf cooperation council kim carter nz cofounder chcon creator purpleteam host software engineering radio published author many infosec books dan cornell usa adrien beaupre sans teacher sec542 course mateo martnez spanish malik mesellem belgium dutch founder bwapp training: attacking defending web apps mark goodwin ben walther los angeles johanna curiel netherlands caribbean spanishenglish papiamento owasp creating add ons playing fuzzer mennouchi islam azeddine algeria dzwebdaysblidaconstantinealgiers meeting sudan bside algiers russ mcree toolsmith tools evangelist top 10 tactics presented sansfire secureworld issa international etc azzeddine ramrami morocco ivory coast translation ahmed neil egypt jerome athias middle east michael coates chairman aaron guzman florencio cano gabarda spain talk: fuzzing browsers peach david epler washington dc mordecai kraushar leader vicnum slide share https:wwwslidesharenetmkrausharvicnumdescription jonathan fernndez tranlation yuho kameda japan japanese manual chetan karande previous minoru sakai supervision serg belokamen melbourne australia russian chapter application security designerarchitect http:wwwbugcrowdcom derek armstrong malware researcher sec504 mentor marudhamaran gunasekaran india developer blog vimeo channel billing europe blog: test doctor jess vermont american midwest missouri kansas illinois focus extensibility general app sec usagepen testingvulnerability detection yassia savadogo burkina faso network ammar hassan brohi pakistan swiss army knife marcin kope poland polish sumanth damarla hindi telugu fossasia mwos amf support kunal relan evangelistmozilla delhincr information workshop robert kerby southwest rocky mountains claudius omer levi hevroni israel hebrew chhagan lal mathuriya bangalore have worked automated testing usig my github page amit kulkarni perth using sanket mishra boston us experience mohammed imran singapore devsecops studio devslop raul siles webapp mobile pentester contributor instructor dinosecs lab sec575 mohammad febri ramadlan indonesia southeast asia penetration automation takanori matsumoto marek ottl central czech republic specialties ssdlc pentesting cloud gowtham sundar chennai exploring ricky van rijn caleb kinney maryland appsec api bug bounty bj edward taduran pasig city philippines filipino layers compliance grant ongers london united kingdom part delivery not way paul molin paris lover youtube chad martell california states threat hunting rafa krzpa swietochlowice sharing knowledge https:wwwdlatesterowpl learning hahwul south korea korean securitysoftware engineer najam ul saqib urdu development team member most will travel provided expenses covered anyone can you just need comfortable talking about submit pull request adding your details evangelistsyaml post thread also above advice guidance giving directly "
},
{
"url": "/zap-in-ten/",
Expand Down
3 changes: 1 addition & 2 deletions student-hall-of-fame/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -676,8 +676,7 @@ <h1 class="text--white">Student Hall of Fame</h1>
</td>
<td>
<div style="max-width:100%;">
<a href="https://manosmagnus.github.io/posts/websocket-passive-scan-using-scripts-with-zap/" rel="nofollow">Blog</a>


</div>
</td>
</tr>
Expand Down

0 comments on commit 794f655

Please sign in to comment.