OWASP Zed Attack Proxy 2.11.1
How to uninstall OWASP Zed Attack Proxy 2.11.1 from your PC
This web page contains complete information on how to uninstall OWASP Zed Attack Proxy 2.11.1 for Windows. The Windows release was developed by
OWASP ZAP. Go over
here where you can get more info on OWASP ZAP. You can get more details related to OWASP Zed Attack Proxy 2.11.1 at
https://www.zaproxy.org/. OWASP Zed Attack Proxy 2.11.1 is frequently set up in the C:\Program Files\OWASP\Zed Attack Proxy directory, however this location may vary a lot depending on the user's choice while installing the application. You can remove OWASP Zed Attack Proxy 2.11.1 by clicking on the Start menu of Windows and pasting the command line C:\Program Files\OWASP\Zed Attack Proxy\uninstall.exe. Keep in mind that you might receive a notification for admin rights. i4jdel.exe is the OWASP Zed Attack Proxy 2.11.1's primary executable file and it occupies about 89.03 KB (91168 bytes) on disk.
OWASP Zed Attack Proxy 2.11.1 contains of the executables below. They take 643.03 KB (
658464 bytes) on disk.
- uninstall.exe (395.00 KB)
- ZAP.exe (159.00 KB)
- i4jdel.exe (89.03 KB)
This data is about OWASP Zed Attack Proxy 2.11.1 version
2.11.1 alone.
Some files and registry entries are frequently left behind when you remove OWASP Zed Attack Proxy 2.11.1.
Folders found on disk after you uninstall OWASP Zed Attack Proxy 2.11.1 from your PC:- C:\Program Files\OWASP\Zed Attack Proxy
The files below are left behind on your disk by OWASP Zed Attack Proxy 2.11.1's application uninstaller when you removed it:- C:\Program Files\OWASP\Zed Attack Proxy\db\db.properties
- C:\Program Files\OWASP\Zed Attack Proxy\db\hsqldb.properties
- C:\Program Files\OWASP\Zed Attack Proxy\db\mysql.properties
- C:\Program Files\OWASP\Zed Attack Proxy\db\mysql.schema
- C:\Program Files\OWASP\Zed Attack Proxy\db\zapdb.properties
- C:\Program Files\OWASP\Zed Attack Proxy\db\zapdb.script
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ar_SA.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_az_AZ.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_bn_BD.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_bs_BA.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ceb_PH.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_da_DK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_de_DE.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_el_GR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_es_ES.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fa_IR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fil_PH.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fr_FR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ha_HG.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_he_IL.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hi_IN.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hr_HR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hu_HU.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_id_ID.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_it_IT.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ja_JP.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ko_KR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_mk_MK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ms_MY.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_nb_NO.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_nl_NL.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pcm_NG.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pl_PL.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pt_BR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pt_PT.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ro_RO.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ru_RU.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_si_LK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sk_SK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sl_SI.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sq_AL.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sr_CS.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sr_SP.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_tr_TR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_uk_UA.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ur_PK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_vi_VN.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_yo_NG.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_zh_CN.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ar_SA.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_az_AZ.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_bn_BD.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_bs_BA.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ceb_PH.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_da_DK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_de_DE.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_el_GR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_es_ES.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fa_IR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fil_PH.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fr_FR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ha_HG.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_he_IL.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hi_IN.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hr_HR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hu_HU.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_id_ID.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_it_IT.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ja_JP.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ko_KR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_mk_MK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ms_MY.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_nb_NO.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_nl_NL.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pcm_NG.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pl_PL.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pt_BR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pt_PT.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ro_RO.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ru_RU.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_si_LK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sk_SK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sl_SI.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sq_AL.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sr_CS.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sr_SP.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_tr_TR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_uk_UA.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ur_PK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_vi_VN.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_yo_NG.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_zh_CN.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lib\bcmail-jdk15on-1.68.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\bcpkix-jdk15on-1.68.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\bcprov-jdk15on-1.68.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-beanutils-1.9.4.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-codec-1.15.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-collections-3.2.2.jar
Use regedit.exe to manually remove from the Windows Registry the data below:- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\OWASP ZAP
A way to erase OWASP Zed Attack Proxy 2.11.1 from your computer with Advanced Uninstaller PRO
OWASP Zed Attack Proxy 2.11.1 is a program released by the software company OWASP ZAP. Some people decide to uninstall this application. Sometimes this can be easier said than done because removing this by hand takes some know-how related to removing Windows programs manually. The best EASY manner to uninstall OWASP Zed Attack Proxy 2.11.1 is to use Advanced Uninstaller PRO. Here are some detailed instructions about how to do this:
1. If you don't have Advanced Uninstaller PRO on your Windows PC, install it. This is a good step because Advanced Uninstaller PRO is a very useful uninstaller and all around tool to maximize the performance of your Windows PC.
DOWNLOAD NOW- go to Download Link
- download the program by pressing the green DOWNLOAD button
- set up Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. It's recommended to take your time to get familiar with the program's interface and wealth of tools available. Advanced Uninstaller PRO is a very useful system utility.
3. Click on the General Tools button

4. Click on the Uninstall Programs feature

5. All the applications installed on the computer will appear
6. Navigate the list of applications until you find OWASP Zed Attack Proxy 2.11.1 or simply click the Search field and type in "OWASP Zed Attack Proxy 2.11.1". If it is installed on your PC the OWASP Zed Attack Proxy 2.11.1 application will be found automatically. When you select OWASP Zed Attack Proxy 2.11.1 in the list of programs, some information about the program is available to you:
- Star rating (in the left lower corner). The star rating tells you the opinion other people have about OWASP Zed Attack Proxy 2.11.1, ranging from "Highly recommended" to "Very dangerous".
- Reviews by other people - Click on the Read reviews button.
- Details about the program you are about to uninstall, by pressing the Properties button.
For instance you can see that for OWASP Zed Attack Proxy 2.11.1:
- The web site of the application is: https://www.zaproxy.org/
- The uninstall string is: C:\Program Files\OWASP\Zed Attack Proxy\uninstall.exe
7. Click the Uninstall button. A window asking you to confirm will appear. Confirm the removal by clicking the Uninstall button. Advanced Uninstaller PRO will automatically remove OWASP Zed Attack Proxy 2.11.1.

8. After uninstalling OWASP Zed Attack Proxy 2.11.1, Advanced Uninstaller PRO will offer to run an additional cleanup. Click Next to proceed with the cleanup. All the items that belong OWASP Zed Attack Proxy 2.11.1 that have been left behind will be detected and you will be able to delete them. By uninstalling OWASP Zed Attack Proxy 2.11.1 using Advanced Uninstaller PRO, you can be sure that no Windows registry items, files or folders are left behind on your system.
Your Windows system will remain clean, speedy and able to take on new tasks.
Disclaimer
The text above is not a recommendation to uninstall OWASP Zed Attack Proxy 2.11.1 by OWASP ZAP from your PC, we are not saying that OWASP Zed Attack Proxy 2.11.1 by OWASP ZAP is not a good software application. This page only contains detailed info on how to uninstall OWASP Zed Attack Proxy 2.11.1 in case you want to. Here you can find registry and disk entries that our application Advanced Uninstaller PRO discovered and classified as "leftovers" on other users' computers.
Last update on: 2021-12-16 17:30:40.470