How to Install and Uninstall zaproxy Package on Kali Linux
Last updated: January 23,2025
1. Install "zaproxy" package
This guide covers the steps necessary to install zaproxy on Kali Linux
$
sudo apt update
Copied
$
sudo apt install
zaproxy
Copied
2. Uninstall "zaproxy" package
Please follow the instructions below to uninstall zaproxy on Kali Linux:
$
sudo apt remove
zaproxy
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the zaproxy package on Kali Linux
Package: zaproxy
Version: 2.14.0-0kali1
Architecture: all
Maintainer: Kali Developers
Installed-Size: 241880
Depends: default-jre
Breaks: kali-menu (<< 1.371.1)
Homepage: https://github.com/zaproxy/zaproxy
Priority: optional
Section: utils
Filename: pool/main/z/zaproxy/zaproxy_2.14.0-0kali1_all.deb
Size: 196977600
SHA256: f84c71b07e514bfbb8de5fb2918c38bff7ae0b792bc907fc6826c94baabdb860
SHA1: f14f37b90820a7ce6f71c1834ec8519b35aa28d9
MD5sum: f70b6b6e66efa4fb3839ed83df04fcbb
Description: Testing tool for finding vulnerabilities in web applications
The OWASP Zed Attack Proxy (ZAP) is an easy to use
integrated penetration testing tool for finding
vulnerabilities in web applications.
.
It is designed to be used by people with a wide range of
security experience and as such is ideal for developers and
functional testers who are new to penetration testing as
well as being a useful addition to an experienced pen
testers toolbox.
Description-md5:
Version: 2.14.0-0kali1
Architecture: all
Maintainer: Kali Developers
Installed-Size: 241880
Depends: default-jre
Breaks: kali-menu (<< 1.371.1)
Homepage: https://github.com/zaproxy/zaproxy
Priority: optional
Section: utils
Filename: pool/main/z/zaproxy/zaproxy_2.14.0-0kali1_all.deb
Size: 196977600
SHA256: f84c71b07e514bfbb8de5fb2918c38bff7ae0b792bc907fc6826c94baabdb860
SHA1: f14f37b90820a7ce6f71c1834ec8519b35aa28d9
MD5sum: f70b6b6e66efa4fb3839ed83df04fcbb
Description: Testing tool for finding vulnerabilities in web applications
The OWASP Zed Attack Proxy (ZAP) is an easy to use
integrated penetration testing tool for finding
vulnerabilities in web applications.
.
It is designed to be used by people with a wide range of
security experience and as such is ideal for developers and
functional testers who are new to penetration testing as
well as being a useful addition to an experienced pen
testers toolbox.
Description-md5: