Publishers

Application OWASP Zed Attack Proxy 2.13.0





A way to uninstall OWASP Zed Attack Proxy 2.13.0 from your PC

This page is about OWASP Zed Attack Proxy 2.13.0 for Windows. Below you can find details on how to remove it from your computer. The Windows release was created by OWASP ZAP. Take a look here where you can find out more on OWASP ZAP. More details about OWASP Zed Attack Proxy 2.13.0 can be seen at . OWASP Zed Attack Proxy 2.13.0 is usually set up in the C:\Program Files\OWASP\Zed Attack Proxy directory, depending on the user's choice. The full command line for uninstalling OWASP Zed Attack Proxy 2.13.0 is C:\Program Files\OWASP\Zed Attack Proxy\uninstall.exe. Keep in mind that if you will type this command in Start / Run Note you may get a notification for admin rights. i4jdel.exe is the OWASP Zed Attack Proxy 2.13.0's primary executable file and it occupies about 93.69 KB (95936 bytes) on disk.

OWASP Zed Attack Proxy 2.13.0 contains of the executables below. They occupy 735.19 KB (752832 bytes) on disk.




  • uninstall.exe (457.00 KB)
  • ZAP.exe (184.50 KB)
  • i4jdel.exe (93.69 KB)


The current web page applies to OWASP Zed Attack Proxy 2.13.0 version 2.13.0 alone. OWASP Zed Attack Proxy 2.13.0 has the habit of leaving behind some leftovers.

Folders left behind when you uninstall OWASP Zed Attack Proxy 2.13.0:
  • C:\Program Files\OWASP\Zed Attack Proxy

Check for and delete the following files from your disk when you uninstall OWASP Zed Attack Proxy 2.13.0:
  • C:\Program Files\OWASP\Zed Attack Proxy\db\db.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\db\hsqldb.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\db\mysql.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\db\mysql.schema
  • C:\Program Files\OWASP\Zed Attack Proxy\db\zapdb.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\db\zapdb.script
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ar_SA.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_az_AZ.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_bn_BD.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_bs_BA.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ceb_PH.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_da_DK.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_de_DE.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_el_GR.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_es_ES.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fa_IR.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fil_PH.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fr_FR.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ha_HG.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_he_IL.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hi_IN.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hr_HR.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hu_HU.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_id_ID.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_it_IT.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ja_JP.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ko_KR.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_mk_MK.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ms_MY.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_nb_NO.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_nl_NL.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pcm_NG.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pl_PL.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pt_BR.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pt_PT.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ro_RO.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ru_RU.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_si_LK.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sk_SK.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sl_SI.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sq_AL.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sr_CS.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sr_SP.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_tr_TR.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_uk_UA.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ur_PK.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_vi_VN.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_yo_NG.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_zh_CN.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_zh_TW.properties
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ar_SA.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_az_AZ.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_bn_BD.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_bs_BA.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ceb_PH.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_da_DK.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_de_DE.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_el_GR.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_es_ES.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fa_IR.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fil_PH.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fr_FR.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ha_HG.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_he_IL.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hi_IN.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hr_HR.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hu_HU.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_id_ID.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_it_IT.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ja_JP.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ko_KR.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_mk_MK.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ms_MY.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_nb_NO.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_nl_NL.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pcm_NG.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pl_PL.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pt_BR.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pt_PT.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ro_RO.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ru_RU.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_si_LK.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sk_SK.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sl_SI.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sq_AL.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sr_CS.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sr_SP.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_tr_TR.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_uk_UA.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ur_PK.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_vi_VN.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_yo_NG.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_zh_CN.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_zh_TW.xml
  • C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-beanutils-1.9.4.jar
  • C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-codec-1.16.0.jar
  • C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-collections-3.2.2.jar
  • C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-configuration-1.10.jar

Registry that is not removed:
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\OWASP ZAP

Registry values that are not removed from your PC:
  • HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\Program Files\OWASP\Zed Attack Proxy\ZAP.exe.ApplicationCompany
  • HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\Program Files\OWASP\Zed Attack Proxy\ZAP.exe.FriendlyAppName


How to delete OWASP Zed Attack Proxy 2.13.0 with Advanced Uninstaller PRO

OWASP Zed Attack Proxy 2.13.0 is a program offered by OWASP ZAP. Some computer users try to erase it. This can be hard because deleting this by hand takes some know-how regarding Windows internal functioning. The best EASY manner to erase OWASP Zed Attack Proxy 2.13.0 is to use Advanced Uninstaller PRO. Take the following steps on how to do this:





1. If you don't have Advanced Uninstaller PRO on your system, add it. This is good because Advanced Uninstaller PRO is an efficient uninstaller and general utility to take care of your PC.

DOWNLOAD NOW

  • visit Download Link
  • download the program by clicking on the green DOWNLOAD button
  • install Advanced Uninstaller PRO
2. Start Advanced Uninstaller PRO. Take your time to admire Advanced Uninstaller PRO's interface and wealth of tools available. Advanced Uninstaller PRO is a powerful program.

3. Press the General Tools category
Go to General Tools


4. Activate the Uninstall Programs feature
Go to Uninstall Programs


5. All the programs existing on the computer will appear

6. Navigate the list of programs until you find OWASP Zed Attack Proxy 2.13.0 or simply activate the Search field and type in "OWASP Zed Attack Proxy 2.13.0". The OWASP Zed Attack Proxy 2.13.0 application will be found very quickly. Notice that after you click OWASP Zed Attack Proxy 2.13.0 in the list , the following information about the program is available to you:


  • Star rating (in the lower left corner). This tells you the opinion other users have about OWASP Zed Attack Proxy 2.13.0, from "Highly recommended" to "Very dangerous".
  • Reviews by other users - Press the Read reviews button.
  • Details about the application you want to remove, by clicking on the Properties button.
For example you can see that for OWASP Zed Attack Proxy 2.13.0:





  • The web site of the program is: https://www.zaproxy.org/
  • The uninstall string is: C:\Program Files\OWASP\Zed Attack Proxy\uninstall.exe
7. Click the Uninstall button. A confirmation page will appear. Confirm the removal by clicking the Uninstall button. Advanced Uninstaller PRO will automatically uninstall OWASP Zed Attack Proxy 2.13.0.
Uninstall OWASP Zed Attack Proxy 2.13.0


8. After uninstalling OWASP Zed Attack Proxy 2.13.0, Advanced Uninstaller PRO will offer to run an additional cleanup. Click Next to proceed with the cleanup. All the items of OWASP Zed Attack Proxy 2.13.0 which have been left behind will be found and you will be asked if you want to delete them. By removing OWASP Zed Attack Proxy 2.13.0 using Advanced Uninstaller PRO, you are assured that no Windows registry entries, files or directories are left behind on your PC.

Your Windows computer will remain clean, speedy and ready to serve you properly.



Disclaimer

This page is not a piece of advice to remove OWASP Zed Attack Proxy 2.13.0 by OWASP ZAP from your computer, we are not saying that OWASP Zed Attack Proxy 2.13.0 by OWASP ZAP is not a good application. This text only contains detailed instructions on how to remove OWASP Zed Attack Proxy 2.13.0 in case you want to. Here you can find registry and disk entries that our application Advanced Uninstaller PRO stumbled upon and classified as "leftovers" on other users' computers.

2023-08-19 / Written by Dan Armano for Advanced Uninstaller PRO

follow @danarm
Last update on: 2023-08-19 05:56:08.890