For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
Learn More
Automate Proposals with AI in Microsoft Word.
Streamline proposal creation with the smartest AI, the best content, seamless integration with Microsoft Word, and unmatched efficiency.
Automate your best practices, processes, and standards to guide your proposal writers, sales teams, and subject experts. And don’t worry, it’s so easy to use they will use it. We would love the opportunity to help you quantify the impact your business can expect from investing in Expedience Software. Click here to request a Return on Investment (ROI) calculation. In this 15-minute session, we will ask 20 simple questions to assess and grade your current proposal quality and scalability. Manual proposal processes are likely costing you far more than you realize. These models waste time and kill the productivity of proposal writers, sales team members, senior staff, and subject experts.
Fast comparer for database data in the key predefined tables
I have to fast compare the key data between two databases. As input I have a XML file with list of tables to compare. Program connects to both databases, reads the list of tables, compares data in records with the same primary key and finally produces report: records missing in the databases and records with differences.
**NOTE**: The WALA project is now hosted at https://github.com/wala/WALA; the latest source code and updates are available there. The code here on Sourceforge is highly out of date and unsupported.
The T. J. Watson Libraries for Analysis (WALA) provide program analysis capabilities for Java bytecode and related languages. The WALA libraries constitute an open-source release of parts of IBM Research's DOMO analysis infrastructure.
Cobertura is a free Java tool that calculates the percentage of code accessed by tests. It can be used to identify which parts of your Java program are lacking test coverage. It is based on jcoverage.
Fill your database with test data, move in and be happy.
DataRoller is a small program that will insert rows into your database based on a file describing your tables and columns.
Script files describe how each table relates to other tables, how DataRoller should geneate foreign keys, and how each column should look. DataRoller executes your script file, generating insert statements and filling your database with data.
Captain Compliance - Data Privacy and Compliance Software
Privacy Compliance Software - Avoid Fines and Prevent Lawsuits
Captain Compliance handles your data privacy requirements so you can be privacy compliant. No more compliance stress, stop stressing over regulatory risks – just privacy protection managed by experts.
Our user-friendly platform backed by privacy professionals simplifies the process of navigating regulations, giving your customers transparent choices, and building essential trust for your organization.
Yasca is an open source program which looks for security vulnerabilities, code-quality, performance, and conformance to best practices in program source code, integrating with other open-source tools as needed.
Yasca has been migrated to Github, and is available at http://scovetta.github.com/yasca and http://github.com/scovetta/yasca.
jMINT is a integration fault injection tool which identifies data exchanges across classes and inject faults along those path. It is primarily based on the idea of program analysis and code mutation. The cross boundary data exchanges are identified by performing data flow analysis using java byte code analysis and transformation framework-soot. Mutant injection is also done via the soot framework. jMINT tool can be used to measure the effectiveness of integration test suites.
Java Cobol Lexer take a cobol source program and return it as a list of lexical tokens.
Library takes source code in fixed, free and mixed formats. It recognizes standard Cobol 85.
In early stages of software process implantation, is hard to measure the company performance. So, this project aims to help this difficult by providing a measurement process tool for software factories continuos improvement program.
ArchMapper is a Tool for mapping architecture descriptions of a program to a Java implementation. It offers two main functions: Generating Java source code stubs from an architecture and checking a Java implementation for conformance with an architecture
For marketing agencies and media organizations requiring a solution to get consumer insights
Need easy access to consumer insights? Our intuitive platform is the answer. Get the ultra-reliable research that brands and agencies need to stay ahead of changing consumer behavior.
JTombstone is a program for finding dead code in your Java programs. It reports on dead code at the method level, by processing Java class files. No source code is needed to use it. JTombstone is a Java program and requires JDK 1.4 or later.
Lachesis is a Software Complexity Measurement program for object-oriented source code. Includes Halstead Complexity Measures, McCabes Cyclomatic Complexity and Maintainability Index.
bddshell is a command line program for deductive database-based analysis. Its primary focus is software vulnerability detection. It acts as a front-end to a number of other programs, such as bddbddb and joeq.
This is a software to track bug based on Java program. You can use flexible query criteria to do CR (Change Request) tracking Demo is here http://dev.daybreaksoft.com:8080/bugfreej/Logon.jsp
Kammerjäger is a debugging tool with integrated correctness proving.
...In our C like programming language named "SimPL" you can easily and simply annotate your code with preconditions and assertions (also with forall and exists expressions). We then use Microsofts Z3 theorem prover to prove if the behaviour of your program matches what you expected.
The easy to use GUI with an integrated Interpreter and Debugger (with a Stackview and HotCodeReplacement) makes it even easier to write your code and find errors.
This project has been developed during a University project called PSE ("Praxis der Softwareentwicklung" / "practical experience in software developement") at the Karlsruhe Institute of Technology (KIT) by Andreas Eberle, Nicolas Loza, Olga Plisovskaya, Andreas Waidler and Michael Zangl.
...