uimaFIT provides Java annotations for describing UIMA components which can be used to directly describe the UIMA components in Java code without the need for traditional UIMA XML descriptors. This greatly simplifies refactoring a component definition (e.g., changing a configuration parameter name). uimaFIT also makes it easy to instantiate UIMA components without using XML descriptor files by providing convenient factory methods. This makes uimaFIT an ideal library for testing UIMA components because the component can be easily instantiated and invoked without requiring a descriptor file to be created first. uimaFIT is very useful in research environments in which programmatic/dynamic instantiation of UIMA pipelines can simplify experimentation. For example, when performing 10-fold cross-validation across a number of experimental conditions, it can be quite laborious to create a different set of descriptor files for each run, or even a script which generates such descriptor files. uimaFIT is type system agnostic and does not depend on (or provide) a specific type system.
PyMuTester is tool to facilitate Mutant Testing (a.k.a Mutant Analysis or Program Mutation) on software systems written in Python. Its main purpose is to assist you in improving your existing unit tests to cover missing checks and “loopholes” in your testing. It works by making small changes (technically known as mutants) to your Python application’s source code and re-running your unit tests over these mutated applications' source code. Since the mutants usually go against the specifications, your unit tests should fail in such tests. If the unit tests still pass, then that is an indication that your unit tests might have missed some checks.
OWASP Zed Attack Proxy (ZAP) is an easy-to-use integrated penetration testing tool for finding vulnerabilities in Web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to an experienced pen tester's toolbox. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.
tadedon is a set of utilities that form a foundation for applications written with one of the many Java frameworks, such as GWT, GIN, Guice, Google App Engine, commons-configuration, and many others. It lets you specify the default configuration of your application and upgrade it automatically on each new release. It can redirect all java.util.logging to slf4j and easily configure logback. It can bind application configuration in a Guice module. It supports @PostConstruct and @PreDestroy annotations (JSR 250) in Guice applications. It lets you annotate your methods with @Transactional annotation. It supports Guice injector stage in your Web application. It lets you test your Guice managed servlets and filters without needing a real servlet container. It lets you use Guice Matchers for matching super class, interface, and type literal annotations. It can inject event bus to your GWT applications with the help of GIN.
Dummy Data Generator is a tool that generates dummy data for populating systems for testing. The data includes names, addresses, email addresses, phone numbers, and social "connections". Names are generated by using US Census data on the most common names. Email addresses are just a random string for the user portion and always use "example.com" for the domain. Currently the only output format is CSV.
Citrus is a test framework written in Java that enables automated integration testing of message-based enterprise SOA applications. The tool can easily simulate surrounding systems across various transports and protocols (e.g. JMS, SOAP WebServices, HTTP, TCP/IP, etc.) in order to perform end-to-end use case testing. Citrus provides strong validation mechanisms for XML message contents and allows you to build complex testing logic such as sending and receiving messages, database validation, automatic retries, variable definitions, dynamic message contents, error simulation, and many more.
MASH is a modular, automated script harness. It allows users to implement simple harnesses that perform work external to a system. The framework will invoke that harness as outlined by an XML script. For example, when using the framework to test a system you could create a script that cleans and loads a database, FTPs some data, submits a login form, and verifies HTTP information. Harnesses can easily be built to do almost anything (many harnesses are provided), not just Web page verification. While harnesses are written in Java, the scripts may be run against any type of system as harnesses are intended to act as clients.