Zed attack proxy is open source security software that is used to scan web applications for vulnerabilities. It can detect vulnerabilities like broken access control, misconfiguration, broken authentication, sensitive data exposure, and much more. It comes with tools like passive and automated scanners, proxy server, port identification, directory searching, brute forcing capability, web crawler, and a fuzzer. It is as simple as downloading the software and entering the url you want to attack and it’ll provide you a detailed result afterwards.