BetterCrypto / Applied-Crypto-HardeningLinks
Best Current Practices regarding secure online communication and configuration of services using cryptography.
☆704Updated 3 years ago
Alternatives and similar repositories for Applied-Crypto-Hardening
Users that are interested in Applied-Crypto-Hardening are comparing it to the libraries listed below
Sorting:
- ☆306Updated 2 years ago
- duraconf - A collection of hardened configuration files for SSL/TLS services☆975Updated 3 years ago
- Ciplerli.st - strong ciphers for NGINX, Apache and Lighttpd☆313Updated 5 years ago
- Current development of SSLyze now takes place on a separate repository☆643Updated 9 years ago
- An observatory for TLS configurations, X509 certificates, and more.☆539Updated 2 weeks ago
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆348Updated 2 years ago
- Configuration to use gpg smartcards for ssh authentication☆158Updated 7 years ago
- Simple PHP script which decodes an SSL connection and displays the information.☆447Updated 5 years ago
- Certification Authority Trust Tracker☆126Updated 7 years ago
- O-Saft - OWASP SSL advanced forensic tool☆379Updated last month
- A system for ensuring & authenticating STARTTLS encryption between mail servers☆370Updated 5 years ago
- Suite of installers for the LetsEncrypt official client on every major *nix OS (Debian, Amazon Linux, CentOS, RedHat, Ubuntu, FreeBSD)☆79Updated 6 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 9 years ago
- Evomalware is a simple BASH script do detect malwares/virus/backdoor/... especially for PHP files.☆87Updated 9 years ago
- DEPRECATED - A prototype SSH configuration and policy scanner (Blog: https://mozilla.github.io/ssh_scan/)☆788Updated 3 years ago
- duraconf - A collection of hardened configuration files for SSL/TLS services☆56Updated 10 years ago
- Guide to using a remote Debian server for security and privacy services☆448Updated 5 years ago
- Refresh your GnuPG keyring without disclosing your whole contact list to the world☆229Updated 2 years ago
- List of DNS violations by implementations, software and/or systems☆241Updated 2 years ago
- SSH configuration analysis☆74Updated 2 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆303Updated 3 years ago
- opmsg message encryption☆753Updated 2 years ago
- Memory-hard scheme Argon2☆204Updated 4 years ago
- Freely available cryptographic iconography☆66Updated 8 years ago
- A very simple way to find out which SSL ciphersuites are supported by a target.☆1,979Updated 10 months ago
- HTTP Public Key Pinning (HPKP) pin generation tools☆71Updated 5 years ago
- ACME Specification☆1,131Updated last year
- Pond☆911Updated 3 years ago
- Server side TLS Tools☆1,126Updated 4 months ago
- Quantum Insert detector/recorder☆307Updated 5 years ago