Category: Security

Compare Add to favorites
software testing tool

Calliope Pro, test results reporting and...

Calliope Pro is a DevOps tool for reporting and monitoring test results and was created to allow a development team…

Read More

Price
from 250€ per month
Rating
0 / 5
Views
1534
software testing tool

RIPS

RIPS is a security software for web applications that are written in PHP programming language. RIPS automatically detects security vulnerabilities in PHP code,…

Read More

Rating
0 / 5
Views
2128
software testing tool

CROSS

The CROSS (Codenomicon Robust Open Source Software) program is designed to help open source projects fix critical flaws in their…

Read More

Rating
0 / 5
Views
1682
software testing tool

Requestly

Requestly is a cross platform tool available as a browser extension & desktop app to intercept & modify network requests.…

Read More

Price
Freemium
Rating
0 / 5
Views
1715
software testing tool

Paros

A Java based HTTP/HTTPS proxy for assessing web application vulnerability. It supports editing/viewing HTTP messages on-the-fly. Other featuers include spiders,…

Read More

Rating
0 / 5
Views
2010
software testing tool

BFBTester

BFBTester: Brute Force Binary Tester BFBTester is great for doing quick, proactive, security checks of binary programs. BFBTester will perform…

Read More

Rating
0 / 5
Views
2155
software testing tool

ModHeader

ModHeader is a popular browser extension to modify request and response headers. What can ModHeader do? – Add, modify, and…

Read More

Price
4€
Rating
0 / 5
Views
90
Compare Add to favorites
software testing tool

OWASP Zed Attack Proxy Project

The OWASP Zed Attack Proxy (ZAP) is a free security tools actively maintained by hundreds of international volunteers. It can help…

Read More

Rating
0 / 5
Views
2087
software testing tool

Brakeman

Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications. It statically analyzes Rails application code…

Read More

Rating
0 / 5
Views
2058
software testing tool

Nessus

Identify the vulnerabilities, policy-violating configurations and malware that attackers could use to penetrate your network.

Read More

Rating
0 / 5
Views
2468
Choose Page Layout
Header Position
Submenu Style