Publishers

Application OWASP Zed Attack Proxy 2.12.0





A guide to uninstall OWASP Zed Attack Proxy 2.12.0 from your PC

OWASP Zed Attack Proxy 2.12.0 is a computer program. This page is comprised of details on how to remove it from your computer. The Windows version was created by OWASP ZAP. Take a look here where you can read more on OWASP ZAP. More details about OWASP Zed Attack Proxy 2.12.0 can be found at . Usually the OWASP Zed Attack Proxy 2.12.0 application is found in the C:\Program Files\OWASP\Zed Attack Proxy folder, depending on the user's option during setup. OWASP Zed Attack Proxy 2.12.0's complete uninstall command line is C:\Program Files\OWASP\Zed Attack Proxy\uninstall.exe. OWASP Zed Attack Proxy 2.12.0's main file takes around 91.26 KB (93448 bytes) and is called i4jdel.exe.

The executable files below are installed alongside OWASP Zed Attack Proxy 2.12.0. They take about 707.26 KB (724232 bytes) on disk.

  • uninstall.exe (457.00 KB)
  • ZAP.exe (159.00 KB)
  • i4jdel.exe (91.26 KB)


The current page applies to OWASP Zed Attack Proxy 2.12.0 version 2.12.0 alone. Several files, folders and Windows registry entries will not be deleted when you are trying to remove OWASP Zed Attack Proxy 2.12.0 from your PC.

Directories found on disk:
  • C:\Program Files\OWASP\Zed Attack Proxy

Check for and delete the following files from your disk when you uninstall OWASP Zed Attack Proxy 2.12.0:
  • C:\Program Files\OWASP\Zed Attack Proxy\db\db.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\db\hsqldb.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\db\mysql.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\db\mysql.schema
  • C:\Program Files\OWASP\Zed Attack Proxy\db\zapdb.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\db\zapdb.script
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ar_SA.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_az_AZ.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_bn_BD.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_bs_BA.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ceb_PH.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_da_DK.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_de_DE.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_el_GR.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_es_ES.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fa_IR.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fil_PH.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fr_FR.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ha_HG.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_he_IL.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hi_IN.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hr_HR.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hu_HU.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_id_ID.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_it_IT.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ja_JP.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ko_KR.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_mk_MK.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ms_MY.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_nb_NO.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_nl_NL.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pcm_NG.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pl_PL.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pt_BR.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pt_PT.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ro_RO.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ru_RU.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_si_LK.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sk_SK.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sl_SI.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sq_AL.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sr_CS.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sr_SP.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_tr_TR.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_uk_UA.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ur_PK.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_vi_VN.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_yo_NG.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_zh_CN.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_zh_TW.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ar_SA.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_az_AZ.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_bn_BD.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_bs_BA.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ceb_PH.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_da_DK.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_de_DE.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_el_GR.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_es_ES.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fa_IR.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fil_PH.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fr_FR.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ha_HG.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_he_IL.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hi_IN.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hr_HR.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hu_HU.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_id_ID.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_it_IT.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ja_JP.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ko_KR.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_mk_MK.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ms_MY.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_nb_NO.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_nl_NL.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pcm_NG.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pl_PL.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pt_BR.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pt_PT.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ro_RO.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ru_RU.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_si_LK.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sk_SK.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sl_SI.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sq_AL.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sr_CS.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sr_SP.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_tr_TR.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_uk_UA.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ur_PK.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_vi_VN.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_yo_NG.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_zh_CN.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_zh_TW.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-beanutils-1.9.4.jar
  • C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-codec-1.15.jar
  • C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-collections-3.2.2.jar
  • C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-configuration-1.10.jar

Use regedit.exe to manually remove from the Windows Registry the data below:
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\OWASP ZAP


A way to uninstall OWASP Zed Attack Proxy 2.12.0 using Advanced Uninstaller PRO

OWASP Zed Attack Proxy 2.12.0 is an application released by the software company OWASP ZAP. Some computer users try to remove this program. Sometimes this can be easier said than done because performing this by hand takes some know-how regarding PCs. The best QUICK procedure to remove OWASP Zed Attack Proxy 2.12.0 is to use Advanced Uninstaller PRO. Take the following steps on how to do this:





1. If you don't have Advanced Uninstaller PRO on your Windows system, install it. This is good because Advanced Uninstaller PRO is the best uninstaller and general utility to optimize your Windows system.

DOWNLOAD NOW

  • visit Download Link
  • download the setup by pressing the green DOWNLOAD button
  • install Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. It's recommended to take your time to get familiar with Advanced Uninstaller PRO's design and number of functions available. Advanced Uninstaller PRO is a very useful PC management program.

3. Click on the General Tools button
Go to General Tools


4. Activate the Uninstall Programs button
Go to Uninstall Programs


5. A list of the programs existing on your PC will be shown to you

6. Scroll the list of programs until you find OWASP Zed Attack Proxy 2.12.0 or simply activate the Search field and type in "OWASP Zed Attack Proxy 2.12.0". The OWASP Zed Attack Proxy 2.12.0 program will be found very quickly. After you click OWASP Zed Attack Proxy 2.12.0 in the list , some data about the program is shown to you:


  • Star rating (in the lower left corner). The star rating tells you the opinion other users have about OWASP Zed Attack Proxy 2.12.0, from "Highly recommended" to "Very dangerous".
  • Opinions by other users - Click on the Read reviews button.
  • Technical information about the app you are about to uninstall, by pressing the Properties button.
For instance you can see that for OWASP Zed Attack Proxy 2.12.0:





  • The software company is: https://www.zaproxy.org/
  • The uninstall string is: C:\Program Files\OWASP\Zed Attack Proxy\uninstall.exe
7. Click the Uninstall button. A window asking you to confirm will show up. Confirm the removal by pressing the Uninstall button. Advanced Uninstaller PRO will remove OWASP Zed Attack Proxy 2.12.0.
Uninstall OWASP Zed Attack Proxy 2.12.0


8. After uninstalling OWASP Zed Attack Proxy 2.12.0, Advanced Uninstaller PRO will ask you to run an additional cleanup. Press Next to perform the cleanup. All the items of OWASP Zed Attack Proxy 2.12.0 that have been left behind will be found and you will be asked if you want to delete them. By uninstalling OWASP Zed Attack Proxy 2.12.0 with Advanced Uninstaller PRO, you are assured that no Windows registry entries, files or directories are left behind on your computer.

Your Windows system will remain clean, speedy and able to take on new tasks.



Disclaimer

The text above is not a recommendation to remove OWASP Zed Attack Proxy 2.12.0 by OWASP ZAP from your PC, nor are we saying that OWASP Zed Attack Proxy 2.12.0 by OWASP ZAP is not a good software application. This text only contains detailed instructions on how to remove OWASP Zed Attack Proxy 2.12.0 in case you decide this is what you want to do. The information above contains registry and disk entries that our application Advanced Uninstaller PRO stumbled upon and classified as "leftovers" on other users' PCs.

2022-11-16 / Written by Andreea Kartman for Advanced Uninstaller PRO

follow @DeeaKartman
Last update on: 2022-11-16 20:11:30.483