BuildMonkey is an automated build, integration, and test platform for large-scale software development, particularly for distributed teams. It lets you manage multiple projects at once on different platforms and with different build technologies (Ant, make, gmake, etc.) and monitor SCM repositories to know what changed, when, and by whom. Build results are known immediately through email notification, and complete build logs are available via a central build dashboard. BuildMonkey integrates with the BuildMonkey EVT test suite to know the status of your host and network infrastructure at all times. Successful builds can be tagged in the SCM repository so they can be recreated.
Burp intruder is a tool that facilitates automated attacks against Web-enabled applications. It is highly configurable and can test for common Web application vulnerabilities such as SQL injection, cross-site scripting, buffer overflows, and directory traversal as well as performing brute force attacks against authentication schemes, enumeration, parameter manipulation, trawling for hidden content and functionality, session token sequencing and session hijacking, data mining, concurrency attacks, and application-layer denial-of-service attacks.
CMake is a cross-platform, open-source build system. It is used to control the software compilation process using simple platform and compiler independent configuration files. It generates native makefiles and workspaces that can be used in the compiler environment of your choice. CMake is quite sophisticated: it is possible to support complex environments requiring system configuration, pre-processor generation, and code generation.
CTA++ is a tool for unit testing C++ classes, libraries, and subsystems. It is easy to use and provides very powerful features, helping the tester to build the testing environments and running the tests on C++ code. The testing process becomes efficient, visible, and organized, as required in a professional testing environment.
DUMA (Detect Unintended Memory Access) stops your program on the exact instruction that overruns (or underruns) a malloc() memory buffer. GDB will then display the source-code line that causes the bug. It works by using the virtual-memory hardware to create a red-zone at the border of each buffer: touch that, and your program stops. It can catch formerly impossible-to-catch overrun bugs. DUMA is a fork of Bruce Perens' Electric Fence library.
Feed4JUnit makes it easy to write parameterized tests for the JUnit framework and feed them with predefined or randomly generated test data: test case data can be read from Excel or CSV files, databases, or custom data sources, and equivalence class tests can be defined easily. Setup is based on Java annotations and is easy to learn, apply, and maintain. Annotations defined in the "Bean Validation" JSR 303, Java 7, and Benerator are automatically recognized and generated smoke test data will match the constraints. By connecting to Benerator, you can configure generation of complex valid and invalid data sets.