OWASP Zed Attack Proxy 2.7.0
A guide to uninstall OWASP Zed Attack Proxy 2.7.0 from your PC
OWASP Zed Attack Proxy 2.7.0 is a Windows application. Read below about how to uninstall it from your computer. The Windows version was developed by
OWASP ZAP. Go over
here for more info on OWASP ZAP. Click on
https://www.owasp.org/index.php/ZAP to get more facts about OWASP Zed Attack Proxy 2.7.0 on OWASP ZAP's website. OWASP Zed Attack Proxy 2.7.0 is frequently set up in the C:\Program Files\OWASP\Zed Attack Proxy folder, depending on the user's choice. OWASP Zed Attack Proxy 2.7.0's complete uninstall command line is C:\Program Files\OWASP\Zed Attack Proxy\uninstall.exe. i4jdel.exe is the OWASP Zed Attack Proxy 2.7.0's main executable file and it occupies around 78.48 KB (80368 bytes) on disk.
The following executables are incorporated in OWASP Zed Attack Proxy 2.7.0. They occupy 596.98 KB (
611312 bytes) on disk.
- uninstall.exe (369.50 KB)
- ZAP.exe (149.00 KB)
- i4jdel.exe (78.48 KB)
This page is about OWASP Zed Attack Proxy 2.7.0 version
2.7.0 only.
OWASP Zed Attack Proxy 2.7.0 has the habit of leaving behind some leftovers.
Directories left on disk:- C:\Program Files\OWASP\Zed Attack Proxy
Generally, the following files are left on disk:- C:\Program Files\OWASP\Zed Attack Proxy\AcceptedLicense
- C:\Program Files\OWASP\Zed Attack Proxy\db\db.properties
- C:\Program Files\OWASP\Zed Attack Proxy\db\hsqldb.properties
- C:\Program Files\OWASP\Zed Attack Proxy\db\mysql.properties
- C:\Program Files\OWASP\Zed Attack Proxy\db\mysql.schema
- C:\Program Files\OWASP\Zed Attack Proxy\db\zapdb.properties
- C:\Program Files\OWASP\Zed Attack Proxy\db\zapdb.script
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ar_SA.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_az_AZ.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_bn_BD.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_bs_BA.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_da_DK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_de_DE.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_el_GR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_es_ES.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fa_IR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fil_PH.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_fr_FR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_he_IL.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hi_IN.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hr_HR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_hu_HU.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_id_ID.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_it_IT.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ja_JP.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ko_KR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_mk_MK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ms_MY.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_nb_NO.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_nl_NL.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pl_PL.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_pt_BR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ro_RO.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ru_RU.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_si_LK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sk_SK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sl_SI.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sq_AL.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sr_CS.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_sr_SP.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_tr_TR.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_uk_UA.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_ur_PK.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_vi_VN.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\Messages_zh_CN.properties
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ar_SA.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_az_AZ.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_bn_BD.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_bs_BA.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_da_DK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_de_DE.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_el_GR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_es_ES.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fa_IR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fil_PH.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_fr_FR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_he_IL.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hi_IN.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hr_HR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_hu_HU.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_id_ID.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_it_IT.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ja_JP.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ko_KR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_mk_MK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ms_MY.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_nb_NO.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_nl_NL.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pl_PL.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_pt_BR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ro_RO.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ru_RU.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_si_LK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sk_SK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sl_SI.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sq_AL.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sr_CS.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_sr_SP.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_tr_TR.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_uk_UA.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_ur_PK.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_vi_VN.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lang\vulnerabilities_zh_CN.xml
- C:\Program Files\OWASP\Zed Attack Proxy\lib\bcmail-jdk15on-152.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\bcpkix-jdk15on-152.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\bcprov-jdk15on-152.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\BrowserLauncher2-1_3.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-beanutils-1.8.3.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-codec-1.9.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-collections-3.2.2.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-configuration-1.9.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-csv-1.1.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-httpclient-3.1.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-io-2.4.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-jxpath-1.3.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-lang-2.6.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-logging-1.2.jar
- C:\Program Files\OWASP\Zed Attack Proxy\lib\commons-logging-api-1.1.1.jar
Registry keys:- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\OWASP ZAP
A way to remove OWASP Zed Attack Proxy 2.7.0 from your PC with Advanced Uninstaller PRO
OWASP Zed Attack Proxy 2.7.0 is an application offered by the software company OWASP ZAP. Some users want to uninstall this program. This is difficult because doing this by hand takes some skill regarding removing Windows programs manually. The best QUICK way to uninstall OWASP Zed Attack Proxy 2.7.0 is to use Advanced Uninstaller PRO. Take the following steps on how to do this:
1. If you don't have Advanced Uninstaller PRO on your Windows PC, install it. This is good because Advanced Uninstaller PRO is a very potent uninstaller and all around utility to maximize the performance of your Windows system.
DOWNLOAD NOW- navigate to Download Link
- download the setup by clicking on the green DOWNLOAD NOW button
- set up Advanced Uninstaller PRO
2. Run Advanced Uninstaller PRO. It's recommended to take some time to get familiar with the program's interface and wealth of tools available. Advanced Uninstaller PRO is a powerful Windows optimizer.
3. Click on the General Tools category

4. Press the Uninstall Programs feature

5. A list of the programs installed on the computer will be shown to you
6. Scroll the list of programs until you locate OWASP Zed Attack Proxy 2.7.0 or simply click the Search feature and type in "OWASP Zed Attack Proxy 2.7.0". If it is installed on your PC the OWASP Zed Attack Proxy 2.7.0 application will be found automatically. Notice that after you select OWASP Zed Attack Proxy 2.7.0 in the list of applications, the following data regarding the application is shown to you:
- Safety rating (in the left lower corner). This tells you the opinion other users have regarding OWASP Zed Attack Proxy 2.7.0, ranging from "Highly recommended" to "Very dangerous".
- Reviews by other users - Click on the Read reviews button.
- Details regarding the program you wish to remove, by clicking on the Properties button.
For example you can see that for OWASP Zed Attack Proxy 2.7.0:
- The web site of the application is: https://www.owasp.org/index.php/ZAP
- The uninstall string is: C:\Program Files\OWASP\Zed Attack Proxy\uninstall.exe
7. Press the Uninstall button. A confirmation page will appear. accept the uninstall by pressing Uninstall. Advanced Uninstaller PRO will then uninstall OWASP Zed Attack Proxy 2.7.0.

8. After uninstalling OWASP Zed Attack Proxy 2.7.0, Advanced Uninstaller PRO will ask you to run a cleanup. Click Next to proceed with the cleanup. All the items of OWASP Zed Attack Proxy 2.7.0 that have been left behind will be found and you will be able to delete them. By removing OWASP Zed Attack Proxy 2.7.0 using Advanced Uninstaller PRO, you can be sure that no Windows registry items, files or folders are left behind on your system.
Your Windows PC will remain clean, speedy and ready to take on new tasks.
Disclaimer
The text above is not a piece of advice to remove OWASP Zed Attack Proxy 2.7.0 by OWASP ZAP from your PC, nor are we saying that OWASP Zed Attack Proxy 2.7.0 by OWASP ZAP is not a good application for your computer. This text simply contains detailed info on how to remove OWASP Zed Attack Proxy 2.7.0 in case you want to. Here you can find registry and disk entries that our application Advanced Uninstaller PRO stumbled upon and classified as "leftovers" on other users' PCs.
Last update on: 2017-12-07 12:35:21.117