Checksum.ai
Engineering teams shipping with AI have a new bottleneck: validation. Code output has accelerated. Quality hasn't. Checksum closes the gap.
Checksum is a continuous quality platform with a suite of AI agents that handle testing end-to-end, at every stage of the development lifecycle. Where most tools wait for a human to trigger them, Checksum runs autonomously in the background, generating tests, executing them, and repairing failures without manual intervention. Seventy percent of test failures are resolved automatically through real-time auto-recovery.
The platform covers every layer: end-to-end UI flows via Playwright, API endpoint chains, and targeted CI tests scoped to exactly what changed in a PR. All tests land as real code in your repository and are delivered as standard Playwright, owned by your team.
Checksum is fine-tuned on 1.5+ million test runs and integrates natively with Cursor, Claude Code, and 100+ AI coding agents. Type /checksum and your coding agent's output gets tested before it ever reaches review. Generation and healing happen on Checksum's cloud infrastructure which means no LLM tokens consumed, no local resources required.
The result: test suites that stay green as the product evolves, fewer regressions reaching production, and release confidence that scales alongside AI output.
Learn more
JAMS
JAMS serves as a comprehensive solution for workload automation and job scheduling, overseeing and managing workflows critical to business operations. This enterprise-grade software specializes in automating IT tasks, accommodating everything from basic batch jobs to intricate cross-platform workflows and scripts. JAMS seamlessly integrates with various enterprise technologies, enabling efficient, unattended job execution by allocating resources to execute jobs in a specific order, set time, or in response to specific triggers. With its centralized console, JAMS allows users to define, manage, and monitor essential batch processes effectively. Whether you’re executing straightforward command lines or orchestrating complex multi-step tasks that utilize ERPs, databases, and business intelligence tools, JAMS is designed to streamline your organization’s scheduling needs. Additionally, the software simplifies the transition of tasks from platforms like Windows Task Scheduler, SQL Agent, or Cron through built-in conversion tools, ensuring that jobs continue to run smoothly without requiring substantial effort during migration. Overall, JAMS empowers businesses to optimize their job scheduling processes efficiently and effectively.
Learn more
LibFuzzer
LibFuzzer serves as an in-process, coverage-guided engine for evolutionary fuzzing. By being linked directly with the library under examination, it injects fuzzed inputs through a designated entry point, or target function, allowing it to monitor the code paths that are executed while creating variations of the input data to enhance code coverage. The coverage data is obtained through LLVM’s SanitizerCoverage instrumentation, ensuring that users have detailed insights into the testing process. Notably, LibFuzzer continues to receive support, with critical bugs addressed as they arise. To begin utilizing LibFuzzer with a library, one must first create a fuzz target—this function receives a byte array and interacts with the API being tested in a meaningful way. Importantly, this fuzz target operates independently of LibFuzzer, which facilitates its use alongside other fuzzing tools such as AFL or Radamsa, thereby providing versatility in testing strategies. Furthermore, the ability to leverage multiple fuzzing engines can lead to more robust testing outcomes and clearer insights into the library's vulnerabilities.
Learn more
Awesome Fuzzing
Awesome Fuzzing serves as a comprehensive compilation of resources for those interested in the field of fuzzing, encompassing an array of materials such as books, both free and paid courses, videos, tools, tutorials, and vulnerable applications ideal for hands-on practice to enhance one's understanding of fuzzing and the early stages of exploit development, including root cause analysis. It features instructional videos focused on fuzzing methodologies, essential tools, and recommended practices, alongside conference presentations, tutorials, and blogs dedicated to the subject. Additionally, it includes software tools that facilitate fuzzing of applications, particularly those utilizing network protocols like HTTP, SSH, and SMTP. Users are encouraged to search for and select exploits linked to downloadable applications, where they can then recreate the exploits with their preferred fuzzer. The resource also encompasses a range of tests tailored for fuzzing engines, highlighting various well-known vulnerabilities and providing a corpus of diverse file formats to enable fuzzing across multiple targets found in the existing fuzzing literature. Ultimately, this collection aims to empower learners with the necessary knowledge and skills to effectively engage with fuzzing techniques and develop their expertise in security testing.
Learn more