BetterCrypto / Applied-Crypto-Hardening
Best Current Practices regarding secure online communication and configuration of services using cryptography.
☆704Updated 3 years ago
Alternatives and similar repositories for Applied-Crypto-Hardening:
Users that are interested in Applied-Crypto-Hardening are comparing it to the libraries listed below
- ☆307Updated last year
- Ciplerli.st - strong ciphers for NGINX, Apache and Lighttpd☆315Updated 5 years ago
- Configuration to use gpg smartcards for ssh authentication☆158Updated 7 years ago
- duraconf - A collection of hardened configuration files for SSL/TLS services☆975Updated 2 years ago
- A system for ensuring & authenticating STARTTLS encryption between mail servers☆370Updated 4 years ago
- An observatory for TLS configurations, X509 certificates, and more.☆536Updated 7 months ago
- Current development of SSLyze now takes place on a separate repository☆644Updated 9 years ago
- DEPRECATED - A prototype SSH configuration and policy scanner (Blog: https://mozilla.github.io/ssh_scan/)☆789Updated 3 years ago
- Simple PHP script which decodes an SSL connection and displays the information.☆447Updated 5 years ago
- SSH configuration analysis☆75Updated 2 years ago
- ROCA: Infineon RSA key vulnerability☆483Updated last year
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆347Updated 2 years ago
- Usable Privacy Box☆173Updated 10 months ago
- opmsg message encryption☆753Updated last year
- Deployment checklist for securely deploying Docker☆605Updated 8 years ago
- Deduplicating backup program☆1,105Updated 3 years ago
- Memory-hard scheme Argon2☆202Updated 4 years ago
- uber's ssh certificate pam module☆850Updated last year
- O-Saft - OWASP SSL advanced forensic tool☆375Updated 2 weeks ago
- duraconf - A collection of hardened configuration files for SSL/TLS services☆56Updated 10 years ago
- Unofficial forward ports of the last publicly available grsecurity patch☆151Updated 6 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆301Updated 3 years ago
- Pond☆911Updated 3 years ago
- Yubico Universal 2nd Factor (U2F) Host C Library☆324Updated 4 years ago
- A very simple way to find out which SSL ciphersuites are supported by a target.☆1,969Updated 7 months ago
- Certification Authority Trust Tracker☆125Updated 7 years ago
- Refresh your GnuPG keyring without disclosing your whole contact list to the world☆227Updated last year
- Simple PKCS11 provider for TPM chips☆252Updated 8 months ago
- DevSec Examples☆337Updated last week
- Dovecot plugin to enable encrypted storage☆68Updated 9 years ago