Suggested Categories:

Penetration Testing Tools
Penetration testing software tools enable security professionals to test applications and IT systems to identify vulnerabilities. Penetration testing tools, sometimes known as "pen testing" tools, can simulate a hack or attack in order to test the security of a given application or system.
Software Testing Tools
Software testing tools help developers and QA teams assess the functionality, performance, and security of applications by automating and streamlining the testing process. These tools offer various testing methods, such as unit testing, integration testing, and load testing, to identify bugs, vulnerabilities, and other issues before deployment. They often include features like test case management, real-time reporting, and bug tracking to enhance collaboration and ensure thorough testing coverage. By automating repetitive testing tasks, software testing tools improve efficiency, reduce human error, and speed up the development lifecycle. Ultimately, these tools ensure that software is reliable, secure, and meets quality standards before it is released to users.
Usability Testing Software
Usability testing software enables product designers and teams to test the usability of a website, web application, or mobile app. Usability testing tools streamline the process of user testing.
Email Testing Tools
Email testing tools help marketers and developers preview, test, and optimize email campaigns to ensure they display correctly across various email clients, devices, and browsers. They check for rendering issues, broken links, spam score, load times, and accessibility compliance before sending emails to recipients. These tools often provide inbox previews, A/B testing features, and analytics to improve deliverability and engagement rates. By automating quality checks and identifying potential problems early, email testing tools enhance campaign effectiveness and reduce errors. They are essential for businesses aiming to maximize the impact of their email marketing efforts.
Unit Testing Software
Unit testing software is a type of software tool and/or framework that enables developers and programmers to test small and individual source code units in order to ensure that each unit of the source code functions as it should.
Performance Testing Software
Performance testing software is software designed to evaluate the speed, responsiveness, and stability of applications under various conditions. It simulates multiple users or workloads to assess how well the software performs under stress, heavy usage, or high traffic. This type of software helps identify bottlenecks, resource limitations, and areas for optimization before the application is released to end-users. It provides detailed reports on metrics such as load times, throughput, and error rates to guide developers in improving application performance. By using performance testing software, businesses can ensure their applications deliver a smooth and reliable experience even during peak usage.
Automated Testing Software
Automated testing software is a type of software tool that is used to test the functionality of other software applications or products. It is typically used to verify that the software works as expected and to identify any bugs or issues that need to be addressed. Automated testing software typically includes a set of scripts that are executed by the program, and results are reported back to the user. This type of testing can be an efficient way to ensure that a software product meets its requirements.
Functional Testing Tools
Functional testing tools are software platforms designed to verify that a system or application performs as expected according to its functional requirements. These tools automate the process of testing individual features and functionalities of an application to ensure they work correctly. Functional testing tools typically support a variety of testing types, including unit testing, integration testing, and user acceptance testing (UAT). They allow testers to simulate user interactions with the application, execute test cases, and identify bugs or issues in the functional behavior of the software. By automating repetitive testing tasks and improving accuracy, functional testing tools help accelerate the software development lifecycle and ensure high-quality releases.
AB Testing Software
A/B testing software allows businesses to compare two or more versions of a webpage, app, or marketing campaign to determine which performs better based on user behavior and key metrics. It enables marketers and product teams to run controlled experiments by splitting traffic between variants and collecting data on conversions, engagement, and other goals. The software often includes tools for test setup, audience segmentation, real-time analytics, and statistical significance calculation. Many platforms integrate with analytics and marketing tools to help optimize user experiences and drive data-driven decisions. By leveraging A/B testing software, organizations can improve conversion rates, reduce bounce rates, and enhance overall customer satisfaction.
Load Testing Tools
Load testing tools are used to test and verify the quality and performance of an application under workload in order to get rid of problems.
Test Management Tools
Test management tools help organizations plan, track, and organize software testing processes to ensure that applications meet the desired quality standards. These platforms typically include features for creating and managing test cases, tracking defects, and automating test execution. Test management tools also provide reporting and analytics capabilities, allowing teams to monitor test progress, identify bottlenecks, and improve testing efficiency. By using these tools, teams can streamline the testing process, ensure comprehensive test coverage, and improve collaboration among development and quality assurance (QA) teams.
API Testing Tools
API testing software is used to test and validate the functionality, performance, security, and reliability of Application Programming Interfaces (APIs). These tools help ensure that APIs perform as expected under various conditions and meet the required business and technical requirements. Features typically include automated testing, request/response validation, load testing, security testing (e.g., for vulnerabilities and authentication), and performance testing. API testing software often supports integration with continuous integration/continuous deployment (CI/CD) pipelines to facilitate automated testing as part of the software development lifecycle.
Speed Test Websites
Speed test websites and speed test apps are tools that enable individuals or IT professionals to test the speed of an internet connection on any device. Speed tests can measure upload speed, download speed, ping, latency, jitter, and more. Speed test websites can be used to test the internet speed of a WiFi or ethernet connection from a web browser on a desktop or laptop, while speed test apps can be downloaded natively to smartphones so that the wireless connection can be tested from the mobile device.
Test Automation Frameworks
Test automation frameworks are sets of tools, components, and practices that automate the process of testing software applications. These frameworks enable testers to write, execute, and manage test scripts for various types of software testing, including functional, regression, load, and performance testing. They often provide features such as reusable test scripts, integration with continuous integration/continuous deployment (CI/CD) tools, reporting, and test result tracking. Test automation frameworks help improve test efficiency, reduce manual errors, and speed up the overall testing process, especially in large and complex software environments.
Mobile App Testing Tools
Mobile app testing tools are software solutions designed to help developers and quality assurance teams ensure that mobile applications perform as expected across different devices, platforms, and network conditions. These tools provide functionality for testing app performance, user interfaces (UI), compatibility, security, and usability. They often include features like automated testing, performance monitoring, bug tracking, and support for both iOS and Android apps. Mobile app testing tools help identify issues before an app is released to ensure it provides a smooth user experience and meets quality standards.
Test Data Management Tools
Test data management tools enable IT professionals and developers to create non-production test data that simulates real company data in order to reliably test applications and systems with data that's similar to production data.
Web Accessibility Testing Tools
Web accessibility testing tools are designed to evaluate websites and applications for compliance with accessibility standards such as WCAG, Section 508, and ADA. They scan and analyze elements like color contrast, keyboard navigation, semantic structure, and screen reader compatibility to ensure digital content is usable by people with disabilities. Many tools provide automated reports, recommendations, and simulations of accessibility barriers to guide developers in fixing issues. They are used by web designers, developers, and compliance teams to create inclusive digital experiences and reduce legal or reputational risks. By integrating into workflows, these tools help organizations continuously monitor, test, and improve accessibility across web properties.
Pre-employment Testing Software
Pre-employment testing software helps organizations evaluate job candidates through objective assessments before hiring. It typically includes tools for skills testing, personality assessments, cognitive ability evaluations, and role-specific challenges. This software automates the screening process, providing data-driven insights to identify the best candidates efficiently. It enhances hiring accuracy, reduces bias, and saves time by filtering out unqualified applicants early. Companies use pre-employment testing software to improve the quality of hires and create a fairer, more effective recruitment process.
Crowd Testing Platforms
Crowd testing platforms are digital tools that allow businesses to leverage the power of crowdsourcing to test their software applications. They enable organizations to outsource testing tasks to a large pool of qualified testers who can provide feedback on the quality and functionality of their products. Crowd testing platforms typically include features such as bug tracking, project management, analytics and real-time communication tools that help teams collect test results quickly and efficiently. Many also offer flexible pricing options, allowing companies to pay based on the number of tests they need or the amount of time they need testers.
Drug Testing Software
Drug testing software is software used to manage and store drug test results for individuals in the workplace or other fields. It is designed to provide accurate information about an individual's drug use, as well as give notifications to employers and personnel about drug test results. The software can also include features such as employee tracking and data storage, which are documented and retained for inspection if necessary. Security measures are typically included in the system to protect the privacy of the individuals being tested. This software makes it easier for organizations to comply with regulations regarding drug testing while still providing reliable results.
  • 1
    Secure CommNet

    Secure CommNet

    Radient Software

    ... you really need and it's been tested for over 20 years. There's no risk to trying it -- you can download a free 30-day trial at any time. Telnet and modem dial-up. Telnet Host Mode Server to allow other Telnet clients to connect to your system. Zmodem and FTP during Telnet connections.
    Starting Price: $29 one-time payment
  • 2
    K7 Endpoint Security
    K7 Endpoint Security is easy to install, deploy, configure, and manage, reducing IT workload. The console for the On-premises version can be installed on any client in the network, avoiding additional investment in server hardware and software. The Cloud deployed version supports 100% remote deployment and cybersecurity management of all endpoints in the organization anytime, anywhere. K7’s international award-winning scan engine has been tested and proven to protect endpoints without affecting...
  • 3
    Infection Monkey
    Unleash the Infection Monkey in your network and discover security flaws in no time. Get a visual map of your network as seen from the attacker's eyes with a breakdown of the machines the Monkey managed to breach. Simply infect a random machine with the Infection Monkey and automatically discover your security risks. Test for different scenarios - credential theft, compromised machines and other security flaws. The Infection Monkey assessment produces a detailed report with remediation tips...
  • 4
    YARA

    YARA

    YARA

    YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression which determine its logic. YARA-CI may be a useful addition to your toolbelt. This is GitHub application that provides continuous testing for your rules, helping you...
  • 5
    Nxt

    Nxt

    Jelurida Swiss

    Nxt is an open source blockchain platform and the first to rely entirely on a proof-of-stake consensus protocol. Launched in November 2013 and written from scratch in Java, Nxt is proof that blockchain technology is not only about simple transfer of value but also has the potential to revolutionize many aspects of our lives with the various decentralized applications that can be built with it. Today, Nxt remains one of the most tested and reliable platforms in the industry, influencing numerous...
  • 6
    SQUAD1

    SQUAD1

    Talakunchi Networks

    SQUAD1 VM is a Risk-Based Vulnerability Management and Orchestration Platform. Aggregates the Vulnerability data from various technology solutions, vulnerability scanners, and manual penetration testing assessments. Squad1 performs cyber risk quantification for all the vulnerability feed and these vulnerability insights with supporting risk scoring make the security team's life easier for quick actions. These insights are built with contextual information relating to the mitigation patterns...
  • 7
    First Strike

    First Strike

    1Strike.io

    First Strike (1Strike.io) platform in a SaaS model is the only European Breach and Attack Simulation tool working with GenAI. Ready to use templates help to: -> focus on real, crucial risk pain points, -> allocate time and IT forces smartly & effectively, -> improve processes of protection their digital assets by CONTINUOUSLY, STRATEGICALLY, CYCLICALLY AND AUTOMATICALLY executing in ethically practices the sequences of techniques and scenarios that hackers perform to test...
    Starting Price: $1000/month
  • 8
    Saint Security Suite

    Saint Security Suite

    Carson & SAINT

    This single, fully integrated solution conducts active, passive and agent-based assessments while its extensive flexibility evaluates risk according to each business. SAINT’s impressive, flexible and scalable scanning capabilities set it apart from many others in this space. SAINT has partnered with AWS, allowing its customers to take advantage of AWS’s efficient scanning. Should subscribers prefer, SAINT also offers a Windows scanning agent. Security teams can schedule scans easily,...
    Starting Price: $1500.00/year/user
  • 9
    IRI Voracity

    IRI Voracity

    IRI, The CoSort Company

    ...) FIND PII everywhere and consistently MASK it for referential integrity 5) Score re-ID risk and ANONYMIZE quasi-identifiers 6) Create and manage DB subsets or intelligently synthesize TEST data 7) Package, protect and provision BIG data 8) Validate, scrub, enrich and unify data to improve its QUALITY 9) Manage metadata and MASTER data. Use Voracity to comply with data privacy laws, de-muck and govern the data lake, improve the reliability of your analytics, and create safe, smart test data
  • 10
    SecurityHQ

    SecurityHQ

    SecurityHQ

    ... capabilities, to accelerate business and reduce risk and overall security costs. Most Popular Services: Managed Detection and Response (MDR) Endpoint Detection and Response (EDR) Managed Extended Detection and Response (XDR) Vulnerability Management Services Managed Firewall Digital Forensics & Incident Response Managed Network Detection and Response (NDR) Penetration Testing CISO as a Service
  • 11
    Cove Data Protection
    ... a single dashboard. Automated recovery testing provides screenshot backup verification. TrueDelta deduplication, compression, and WAN optimization make daily backups lightweight and fast. Find out how easy fast, reliable data protection can be, with Cove Data Protection.
  • 12
    DataSunrise Database Security
    ... aware Data Access Control & Protection. Secure corporate databases in cloud & on-prem against hostile, negligent actions. Secures sensitive data in development and testing environments; Encryption; completely eliminates the possibility to reverse engineer the masked data. Real-time role and location based data masking of production data. Prevents exposure of sensitive privacy data while production data is not changed physically.
  • 13
    DESwrap

    DESwrap

    Data Encryption Systems

    The DK2 and DK3 can be used in conjunction with our DESwrap software to give instant protection to .EXE and .DLL files. This is achieved by wrapping a protective shield around the application using encryption techniques designed and tested during the past 25 years to provide a very secure operating environment for your software. The Down Counter within the DESkey may be called from DESwrap. This feature provides the means to stop your software working after a pre-programmed number of executions...
  • 14
    WiKID Authentication System
    Easily meet PCI-DSS 3.2 with our latest release. Use WiKID two-factor authentication for service and privileged accounts instead of sharing passwords and storing them in spreadsheets or vaults. Prevent pass-the-hash attacks and stop attackers from escalating to admin rights! See how to set it up. Our Enterprise version is free for up to 5 users. Perfect for small organizations or large enterprises that need extended testing. This is the complete Enterprise version, not crippleware. Thanks...
    Starting Price: $2.00/month/user
  • 15
    Nessus

    Nessus

    Tenable

    Nessus is trusted by more than 30,000 organizations worldwide as one of the most widely deployed security technologies on the planet - and the gold standard for vulnerability assessment. From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and...
  • 16
    HTTPCS Security
    Whether you have a showcase site, an e-commerce site or a SaaS application, each module will protect you efficiently against the IT threats facing your organization: web vulnerability scanner, website monitoring, threat intelligence platform and web integrity controller. HTTPCS solutions create a powerful shield against hackers. Don't worry anymore about the security of your websites, adopt the Secure Attitude thanks to HTTPCS. The HTTPCS Cybersecurity Toolkit is composed of 4 additional...
    Starting Price: $65 per month
  • 17
    Deep Instinct

    Deep Instinct

    Deep Instinct

    ... the enterprise, Deep Instinct protects against the most evasive known and unknown cyberattacks with unmatched accuracy, achieving highest detection rates and minimal false positives in tests regularly performed by third parties. Providing protection across endpoints, networks, servers, and mobile devices, the lightweight solution can be applied to most OSs and protects against both file-based and fileless attacks.
  • 18
    ManageEngine Vulnerability Manager Plus
    .... Mitigate the exploitation of security loopholes that exist in your network and prevent further loopholes from developing. Assess and prioritize vulnerabilities based on exploitability, severity, age, affected system count, as well as the availability of the fix. Download, test, and deploy patches automatically to Windows, Mac, Linux, and over 250 third-party applications with an integral patching module—at no additional cost.
    Starting Price: $695 per user per year
  • 19
    Surfshark

    Surfshark

    Surfshark

    ... as an ad-blocker. It also offers Kill Switch for protecting sensitive data in case of connection drops, Whitelister (a.k.a. split-tunneling) for allowing apps and sites to bypass the VPN and MultiHop for connecting via multiple servers. On top of that, it’s one of the few VPN providers that completed a successful independent audit and has received a seal of approval from the AV-TEST. Surfshark Search is a privacy-focused search engine that provides organic, ad-free search results.
    Leader badge
    Starting Price: $2.30/month
  • 20
    Resolve

    Resolve

    Resolve Systems

    ... by Resolve on a daily basis… many of which go well beyond what you imagine is automatable. We know it sounds impossible, but it’s true. Just ask the customers who have cracked the code on tough automations like PIM testing, updating active load balancers, CUCM onboarding in seconds, true end-to-end patch management, interacting with Watson for NLP, maintaining infrastructure in segregated networks and hybrid cloud deployments, and more. Keep reading to see how we do it.
  • 21
    Drone

    Drone

    Harness

    Configuration as a code. Pipelines are configured with a simple, easy‑to‑read file that you commit to your git repository. Each pipeline step is executed inside an isolated Docker container that is automatically downloaded at runtime. Any source code manager. Drone integrates seamlessly with multiple source code management systems, including GitHub, GitHubEnterprise, Bitbucket, and GitLab. Any platform. Drone.io natively supports multiple operating systems and architectures, including Linux...
  • 22
    LUCY Security Awareness Training
    Train. phish. assess. engage. alarm. Lucy Security from Switzerland allows organizations to measure and improve the security awareness of employees and test their IT defenses. Turn employees into a human firewall with simulated attacks and our E-Learning platform with hundreds of preconfigured videos, training, quiz ready for usage. The most powerful IT Security Awareness Solution in the market. Fixed Prices | On-Premise or SaaS | Phish-Button | Threat Analytics | Over 10.000 installations...
  • 23
    Azure Front Door
    Scalable and secure entry point for fast delivery of your global applications. Easily join your distributed microservice architectures into a single global application using HTTP load balancing and path-based routing rules. Automate turning up new regions and scale-out with API-driven global actions, and independent fault-tolerance to your back end microservices in Azure—or anywhere. Deliver and protect your global application close to your end users with a "battle-tested" service built...
  • 24
    GitGuardian

    GitGuardian

    GitGuardian

    GitGuardian is an end-to-end NHI security platform that empowers software-driven organizations to enhance their Non-Human Identity (NHI) security and comply with industry standards. With attackers increasingly targeting NHIs, such as service accounts and applications, GitGuardian integrates Secrets Security and NHI Governance. This dual approach enables the detection of compromised secrets across your dev environments while also managing non human identities and their secrets...
    Leader badge
    Starting Price: $0
  • 25
    Appranix

    Appranix

    Appranix

    Appranix empowers enterprises to achieve cloud application resilience against any cloud application downtime. Average ransomware attack costs 4.54M USD and takes about 26 days to recover. 14% of cloud application downtime occurs due to misconfigurations. Appranix's unique approach delivers unprecedented resilience for distributed and dynamic cloud workloads. Our patented continuous cloud infrastructure backup, cloud-native data backup and replication along with automated recovery-as-code...
    Starting Price: $25/unit/month
  • 26
    Comodo Internet Security
    Our sandbox technology automatically locks unknown files in a secure environment while our Valkyrie system tests their behavior in real-time - protecting you against malware that the virus industry hasn’t even discovered yet. Hot spot protection that encrypts all data transmitted over both wired and wireless Internet connections up to 10GB per month. Secure Shopping lets you shop and bank online with confidence. This breakthrough technology isolates your browser inside a secure container which...
    Starting Price: $29.99 per year
  • 27
    Accelario

    Accelario

    Accelario

    Take the load off of DevOps and eliminate privacy concerns by giving your teams full data autonomy and independence via an easy-to-use self-service portal. Simplify access, eliminate data roadblocks and speed up provisioning for dev, testing, data analysts and more. Accelario Continuous DataOps Platform is a one-stop-shop for handling all of your data needs. Eliminate DevOps bottlenecks and give your teams the high-quality, privacy-compliant data they need. The platform’s four distinct modules...
    Starting Price: $0 Free Forever Up to 10GB
  • 28
    ByteFence

    ByteFence

    ByteFence

    ... in the field of malware detection and removal. Today, we protect millions of users with technology that predicts emerging malware, allowing us to defend against any possible damage. Our software is designed to be easy to install, configure, and run. But in the rare case that you need our help, our skilled support team will get back to you quickly. We also offer a wealth of online resources and free support for our products during testing.
  • 29
    Bitdefender Smart Home Cybersecurity
    ..., smart assistants, gaming consoles, media players, and more. Experience the Internet without worrying about safety. Bitdefender has the best solutions to protect your entire family. Work from home? Do your children study online? We make sure your WiFi is protected. Bitdefender is a global leader in cybersecurity. Enjoy complete protection, guaranteed by powerful, innovative technologies that have won multiple awards from the most trusted independent testing labs in the industry.
  • 30
    Cymune

    Cymune

    Cymune

    ... of the breach. Eliminate threats and prevent cyber attackers from maintaining an untiring presence on your network. Get access to a team of expert cybersecurity analysts and incident responders when you need them most. Field-tested methodologies based on standard and proven frameworks along with skilled and adaptive security experts. It’s time to take a proactive lifecycle approach and build a robust and agile foundation for your enterprise security program.