Narzędzia
Selenium:
https://www.seleniumhq.org/download/
Selenium + Docker = Selenoid:
https://aerokube.com/selenoid/latest/
SoapUI:
https://www.soapui.org/downloads/soapui.html
Postman:
https://www.postman.com/downloads/
Hoppscotch (dawniej PostWoman):
https://hoppscotch.io/
JMeter - do testów wydajnościowych:
https://jmeter.apache.org/download_jmeter.cgi
JMeter plugins:
https://jmeter-plugins.org/
Statistical Aggregate Report JMeter listener:
https://rubenlaguna.com/wp/wp-content/uploads/2007/01/stataggvisualizer.zip
Blazemeter:
https://www.blazemeter.com/
Ranorex:
https://www.ranorex.com/free-trial/
TestComplete:
https://smartbear.com/product/testcomplete/free-trial/
Robot Framework:
https://robotframework.org/
Cucumber:
https://cucumber.io/docs/installation/
Wypróbuj produkty Atlassian:
https://www.atlassian.com/pl/try/
BugZilla:
https://www.bugzilla.org/download/
Testlink:
https://testlink.org/
KNIME:
https://www.knime.com/downloads/download-knime/
Badboy 2.2.5 (już nie rozwijany):
https://drive.google.com/file/d/1wsMH6dofAq2VvNKk1CKeHXxPlkfKBUxJ/view?usp=sharing
How well does your browser support HTML5?
https://html5test.com/
Web Standards Compliance Acid Tests:
https://www.acidtests.org/
The W3C Markup Validation Service:
https://validator.w3.org/
Testy bezpieczeństwa
OWASP Top Ten:
https://owasp.org/Top10/
OWASP Web Security Testing Guide:
https://owasp.org/www-project-web-security-testing-guide/stable/
OWASP Application Security Verification Standard:
https://github.com/OWASP/ASVS
OWASP ZAP:
https://www.zaproxy.org/
Burp Suite Community Edition:
https://portswigger.net/burp/communitydownload/
OWASP WebGoat:
https://hub.docker.com/r/webgoat/goatandwolf
OWASP Broken Apps:
https://sourceforge.net/projects/owaspbwa/
OWASP DirBuster:
https://sourceforge.net/projects/dirbuster/
Have I Been Pwned?
https://haveibeenpwned.com/
How secure is your browser?
https://browseraudit.com/
The Internet map:
http://internet-map.net/
IP LOCATION - This free online tool allows you to see the geographical location of any IP address:
https://iplocation.com/
Cyberthreat real-time map by Kaspersky:
https://cybermap.kaspersky.com/
Digital Attack Map, niestety już nie rozwijana:
https://www.digitalattackmap.com/
PrivacyTools:
https://www.privacytools.io/
PRISM-Break:
https://prism-break.org/pl/
„Cover Your Tracks”
Test your browser to see how well you are protected from tracking and fingerprinting.
https://coveryourtracks.eff.org/
Unique machine:
http://uniquemachine.org/
GPG dla przeglądarek:
https://webpg.org/
SSL Server Test:
https://www.ssllabs.com/ssltest/
Yasni - wyszukiwarka informacji o osobach:
http://www.yasni.com/
Shodan - wyszukiwarka niezabezpieczonych urządzeń IoT:
https://www.shodan.io/
Kali Linux - „kombajn” do testów bezpieczeństwa:
https://www.kali.org/downloads/
Santoku Linux - dystrybucja do testów bezpieczeństwa mobilek, niestety już nie rozwijana:
https://santoku-linux.com/download/
Mobile Verification Toolkit:
https://docs.mvt.re/en/latest/
Apktool:
https://bitbucket.org/iBotPeaches/apktool/downloads/
Frida - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers:
https://www.frida.re/docs/installation/
Fiddler Classic:
https://www.telerik.com/download/fiddler
LOKI - darmowy skaner IoC:
https://github.com/Neo23x0/Loki/releases
VirtualBox:
https://www.virtualbox.org/wiki/Downloads
Repozytorium ciągów i zapytań, na które wrażliwe są aplikacje:
https://github.com/fuzzdb-project/fuzzdb/
Charset Encoder / String Encrypter:
http://yehg.net/encoding/
Hash Analyzer:
https://www.tunnelsup.com/hash-analyzer/
Baza exploitów dla systemów:
https://www.exploit-db.com/
Vulnerability database:
https://vuldb.com/
Common Weakness Enumeration:
https://cwe.mitre.org/
The Web Application Security Consortium
(dozwolone od 16 lat):
http://projects.webappsec.org/
„Plain text offenders”
Blog gromadzący strony, które przechowują hasła użytkowników:
https://plaintextoffenders.com/
Rekonesans w KRS:
http://www.osoby-krs.pl/
https://rejestr.io/
Find Hosting Company On Any Website / Owner on Any IP Address:
https://myip.ms/
Whois & checkhost:
https://whois.com
https://www.dns.pl/whois
https://whois.intensys.pl/
https://check-host.net/
https://hostingchecker.com/
FOCA is a tool used mainly to find metadata and hidden information in the documents it scans:
https://github.com/ElevenPaths/FOCA
Zerodium Exploit Acquisition Program:
https://zerodium.com/program.html
The ZMap Project for performing large-scale studies of the hosts and services:
https://zmap.io/
Testy aplikacji mobilnych
Universal ADB drivers:
https://adb.clockworkmod.com/
Vysor:
https://www.vysor.io/
Android Studio:
https://developer.android.com/studio
APPIUM:
https://github.com/appium/appium-desktop/releases/
Repeato:
https://www.repeato.app/
Browser Stack:
https://www.browserstack.com/browser-emulator
Mobile simulator for Chrome:
https://chrome.google.com/webstore/detail/mobile-simulator-responsi/ckejmhbmlajgoklhgbapkiccekfoccmk
LambdaTest:
https://www.lambdatest.com/mobile-emulator-online
Biblioteki programistyczne
Kivy:
https://kivy.org/#home
Volkswagen detects when your tests are being run in a CI server, and makes them pass:
https://github.com/auchenberg/volkswagen
Biblioteka OpenCV do rozpoznawania obrazu:
https://github.com/opencv/opencv/
Biblioteka Pythona do obrabiania PDF:
https://pypi.org/project/pyPdf/
Beautiful Soup is a library that makes it easy to scrape information from web pages:
https://launchpad.net/beautifulsoup/