For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
Learn More
DialedIn: Cloud Contact Center Software
Cloud Based Contact Center Software that Drives Success
DialedIn is a modern call center software designed to transform customer interactions and streamline your operations, helping teams achieve more daily. By automating and optimizing key workflows across inbound, outbound, and blended environments, DialedIn helps you boost agent productivity and deliver better outcomes across every call.
jMINT is a integration fault injection tool which identifies data exchanges across classes and inject faults along those path. It is primarily based on the idea of program analysis and code mutation. The cross boundary data exchanges are identified by performing data flow analysis usingjava byte code analysis and transformation framework-soot. Mutant injection is also done via the soot framework. jMINT tool can be used to measure the effectiveness of integration test suites.
XJML 1.0 is a platform for Verification and Validation of Java classes
XJML 1.0 actually can reads one Java class and its contract (written in XML) and then executes the next verification techniques:
1. Runtime Assertion Checking (RAC). Using JML4c and JML4rt tools.
2. Extended Static Checking (ESC). Using ESC/Java2.
3. Full Static Program Verification (FSPV). Using the Why platform (tested with Why 2.30 and Why3 0.71)