TYPO3 CMS is a Web Content Management System which features automatic creation of navigational menus, headlines, and other dynamic graphical elements, automatic conversion and scaling of images, the ability to present different templates based on variables such as client browser or country code, support for multiple templates on a site, and a built-in password-protection option. Pages can be timed to be shown on a certain date, be hidden on a certain date or just temporarily hidden. TYPO3 supports search in SQL-databases and redesigning of a website at once is just a matter of creating a single new template.
123 Live Help is a Web-based support software for businesses. It shows visitors to your Web site that a live agent is just a click away and enables operators to chat in real time with them. There are text and video chat options. It is secure, fast, flexible, customizable, and cost-effective. There is a full-featured administrative panel for operators and administrators, allowing them to automatically detect customers' details, track their footprints, transfer chats, follow the visitor's Web browsing, check spelling, get canned messages, and more. Administrators also can monitor all chat sessions and get statistics on the traffic sources of visitors and performance of operators.
Anuko Time Tracker is a simple, easy to use, Web-based time tracking system. It allows you to track the time which employees, colleagues, or teammates spend working on projects and tasks. It needs a Web server such as Apache, IIS, etc. to run on, and a database to keep the data in, such as MySQL. Free hosting of this service is also available.
OWASP Zed Attack Proxy (ZAP) is an easy-to-use integrated penetration testing tool for finding vulnerabilities in Web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing as well as being a useful addition to an experienced pen tester's toolbox. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.