Simon, thank you very much for your reply!
>Would you like to help us scan it every day? :D
Of course I want! :D I will publish in this discussion my interim results and an analysis of the work done on testing this vulnerable resource with ZAP settings.
>Did you miss these API endpoints?
No, I did not. It`s work perfect!
By the way, I'm doing a similar test -
https://groups.google.com/g/zaproxy-users/c/fWiGTJDhMJ4Yes, I tried this setting for context. But it doesn't work for me or I don't understand something.
Is "zap_UI_exclude_element.png" and "zap_api_exculde_element_from_context.png" have the same effect for ZAP?
As I see in case of "zap_UI_exclude_element.png" Ajax-Spider don`t click on links and work more efficient to crawl vulnerable urls. But in case of "zap_api_exculde_element_from_context.png" he is clicking on links.
Which value i should use for (
xpath, text, attributeName, attributeValue) to take same affect like in "zap_UI_exclude_element.png"?
I use ZAP in docker and want to configure it via the API so this is important for me!
Thank you very much for your time!