Built for speed and collaboration, Knak streamlines campaign production with modular templates, real-time editing, simple collaboration, and seamless integrations with leading MAPs like Adobe Marketo Engage, Salesforce Marketing Cloud, Oracle Eloqua, and more. Whether you're supporting global teams or launching fast-turn campaigns, Knak helps you go from brief to build in minutes—not weeks. Say goodbye to bottlenecks and hello to marketing agility.
TestMax is integrated Software Testing framework which can be used to test distributed system by developing rapid test cases using XML configuration in front and backend that talks to each other within the test framework. This tool can be used for Database, webservice, API, Junit, TestNg and Frontend including performance test.
The main advantage of this TestMax architecture is separating test data configuration from test case run time environment. It reduces the maintenance of test cases...
"Yet Another Do-It-Yourself (Test) Automation Framework" specification. Use or modify one of the existing software implementations (hosted/referenced here), or implement the framework yourself. Download and read the spec for more details.
Tester2 is simple test framework for functional testing of server applications (j2ee: jms, ejb, tibco, oracle, file, custom). Its tests are command driven, does not need any knowledge of programming.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.