BetterCrypto / Applied-Crypto-HardeningLinks
Best Current Practices regarding secure online communication and configuration of services using cryptography.
☆702Updated 3 years ago
Alternatives and similar repositories for Applied-Crypto-Hardening
Users that are interested in Applied-Crypto-Hardening are comparing it to the libraries listed below
Sorting:
- ☆307Updated 2 years ago
- Ciplerli.st - strong ciphers for NGINX, Apache and Lighttpd☆312Updated 5 years ago
- duraconf - A collection of hardened configuration files for SSL/TLS services☆976Updated 3 years ago
- Configuration to use gpg smartcards for ssh authentication☆159Updated 8 years ago
- Current development of SSLyze now takes place on a separate repository☆647Updated 10 years ago
- A system for ensuring & authenticating STARTTLS encryption between mail servers☆367Updated 5 years ago
- An observatory for TLS configurations, X509 certificates, and more.☆541Updated 3 months ago
- SSH configuration analysis☆74Updated 2 years ago
- Simple PHP script which decodes an SSL connection and displays the information.☆446Updated 5 years ago
- duraconf - A collection of hardened configuration files for SSL/TLS services☆55Updated 10 years ago
- Certification Authority Trust Tracker☆127Updated 8 years ago
- opmsg message encryption☆758Updated 2 years ago
- ROCA: Infineon RSA key vulnerability☆490Updated 2 years ago
- Suite of installers for the LetsEncrypt official client on every major *nix OS (Debian, Amazon Linux, CentOS, RedHat, Ubuntu, FreeBSD)☆79Updated 7 years ago
- Pond☆917Updated 4 years ago
- Yubico Universal 2nd Factor (U2F) Host C Library☆323Updated 5 years ago
- Simple PKCS11 provider for TPM chips☆258Updated 4 months ago
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆349Updated 3 years ago
- HTTP Public Key Pinning (HPKP) pin generation tools☆71Updated 6 years ago
- WikiMo documentation (mainly the security space, but everyone's welcome to use this)☆67Updated last year
- Refresh your GnuPG keyring without disclosing your whole contact list to the world☆230Updated 2 years ago
- secure parasitic rdate replacement☆370Updated 8 years ago
- The code of our Internet simulator☆416Updated 7 years ago
- A tool to fingerprint SSL/TLS servers☆265Updated 4 years ago
- List of DNS violations by implementations, software and/or systems☆241Updated 2 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆310Updated 4 years ago
- Check the remaining validity period of a certificate before renewing.☆97Updated 7 years ago
- Hardened kernel generation - Deprecated☆48Updated 8 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 10 years ago
- Dovecot plugin to enable encrypted storage☆70Updated 9 years ago