Narzędzia

Selenium:
https://www.seleniumhq.org/download/

Selenium + Docker = Selenoid:
https://aerokube.com/selenoid/latest/

SoapUI:
https://www.soapui.org/downloads/soapui.html

Postman:
https://www.postman.com/downloads/

Hoppscotch (dawniej PostWoman):
https://hoppscotch.io/

JMeter - do testów wydajnościowych:
https://jmeter.apache.org/download_jmeter.cgi

JMeter plugins:
https://jmeter-plugins.org/

Statistical Aggregate Report JMeter listener:
https://rubenlaguna.com/wp/wp-content/uploads/2007/01/stataggvisualizer.zip

Blazemeter:
https://www.blazemeter.com/

Ranorex:
https://www.ranorex.com/free-trial/

TestComplete:
https://smartbear.com/product/testcomplete/free-trial/

Robot Framework:
https://robotframework.org/

Cucumber:
https://cucumber.io/docs/installation/

Wypróbuj produkty Atlassian:
https://www.atlassian.com/pl/try/

BugZilla:
https://www.bugzilla.org/download/

Testlink:
https://testlink.org/

KNIME:
https://www.knime.com/downloads/download-knime/

Badboy 2.2.5 (już nie rozwijany):
https://drive.google.com/file/d/1wsMH6dofAq2VvNKk1CKeHXxPlkfKBUxJ/view?usp=sharing

How well does your browser support HTML5?
https://html5test.com/

Web Standards Compliance Acid Tests:
https://www.acidtests.org/

The W3C Markup Validation Service:
https://validator.w3.org/

Testy bezpieczeństwa

OWASP Top Ten:
https://owasp.org/Top10/

OWASP Web Security Testing Guide:
https://owasp.org/www-project-web-security-testing-guide/stable/

OWASP Application Security Verification Standard:
https://github.com/OWASP/ASVS

OWASP ZAP:
https://www.zaproxy.org/

Burp Suite Community Edition:
https://portswigger.net/burp/communitydownload/

OWASP WebGoat:
https://hub.docker.com/r/webgoat/goatandwolf

OWASP Broken Apps:
https://sourceforge.net/projects/owaspbwa/

OWASP DirBuster:
https://sourceforge.net/projects/dirbuster/

Have I Been Pwned?
https://haveibeenpwned.com/

How secure is your browser?
https://browseraudit.com/

The Internet map:
http://internet-map.net/

IP LOCATION - This free online tool allows you to see the geographical location of any IP address:
https://iplocation.com/

Cyberthreat real-time map by Kaspersky:
https://cybermap.kaspersky.com/

Digital Attack Map, niestety już nie rozwijana:
https://www.digitalattackmap.com/

PrivacyTools:
https://www.privacytools.io/

PRISM-Break:
https://prism-break.org/pl/

„Cover Your Tracks”
Test your browser to see how well you are protected from tracking and fingerprinting.
https://coveryourtracks.eff.org/

Unique machine:
http://uniquemachine.org/

GPG dla przeglądarek:
https://webpg.org/

SSL Server Test:
https://www.ssllabs.com/ssltest/

Yasni - wyszukiwarka informacji o osobach:
http://www.yasni.com/

Shodan - wyszukiwarka niezabezpieczonych urządzeń IoT:
https://www.shodan.io/

Kali Linux - „kombajn” do testów bezpieczeństwa:
https://www.kali.org/downloads/

Santoku Linux - dystrybucja do testów bezpieczeństwa mobilek, niestety już nie rozwijana:
https://santoku-linux.com/download/

Mobile Verification Toolkit:
https://docs.mvt.re/en/latest/

Apktool:
https://bitbucket.org/iBotPeaches/apktool/downloads/

Frida - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers:
https://www.frida.re/docs/installation/

Fiddler Classic:
https://www.telerik.com/download/fiddler

LOKI - darmowy skaner IoC:
https://github.com/Neo23x0/Loki/releases

VirtualBox:
https://www.virtualbox.org/wiki/Downloads

Repozytorium ciągów i zapytań, na które wrażliwe są aplikacje:
https://github.com/fuzzdb-project/fuzzdb/

Charset Encoder / String Encrypter:
http://yehg.net/encoding/

Hash Analyzer:
https://www.tunnelsup.com/hash-analyzer/

Baza exploitów dla systemów:
https://www.exploit-db.com/

Vulnerability database:
https://vuldb.com/

Common Weakness Enumeration:
https://cwe.mitre.org/

The Web Application Security Consortium
(dozwolone od 16 lat):
http://projects.webappsec.org/

„Plain text offenders”
Blog gromadzący strony, które przechowują hasła użytkowników:
https://plaintextoffenders.com/

Rekonesans w KRS:
http://www.osoby-krs.pl/
https://rejestr.io/

Find Hosting Company On Any Website / Owner on Any IP Address:
https://myip.ms/

Whois & checkhost:
https://whois.com
https://www.dns.pl/whois
https://whois.intensys.pl/
https://check-host.net/
https://hostingchecker.com/

FOCA is a tool used mainly to find metadata and hidden information in the documents it scans:
https://github.com/ElevenPaths/FOCA

Zerodium Exploit Acquisition Program:
https://zerodium.com/program.html

The ZMap Project for performing large-scale studies of the hosts and services:
https://zmap.io/

Testy aplikacji mobilnych

Universal ADB drivers:
https://adb.clockworkmod.com/

Vysor:
https://www.vysor.io/

Android Studio:
https://developer.android.com/studio

APPIUM:
https://github.com/appium/appium-desktop/releases/

Repeato:
https://www.repeato.app/

Browser Stack:
https://www.browserstack.com/browser-emulator

Mobile simulator for Chrome:
https://chrome.google.com/webstore/detail/mobile-simulator-responsi/ckejmhbmlajgoklhgbapkiccekfoccmk

LambdaTest:
https://www.lambdatest.com/mobile-emulator-online

Biblioteki programistyczne

Kivy:
https://kivy.org/#home

Volkswagen detects when your tests are being run in a CI server, and makes them pass:
https://github.com/auchenberg/volkswagen

Biblioteka OpenCV do rozpoznawania obrazu:
https://github.com/opencv/opencv/

Biblioteka Pythona do obrabiania PDF:
https://pypi.org/project/pyPdf/

Beautiful Soup is a library that makes it easy to scrape information from web pages:
https://launchpad.net/beautifulsoup/