RedHatProductSecurity / CVE-HOWTOLinks
CVE assignment documentation
☆75Updated 8 years ago
Alternatives and similar repositories for CVE-HOWTO
Users that are interested in CVE-HOWTO are comparing it to the libraries listed below
Sorting:
- passe-partout is a tool to extract SSL private keys from process memory written by Nicolas Collignon and Jean-Baptiste Aviat (passe-parto…☆63Updated 7 years ago
- Does your library check TLS certificates properly?☆79Updated 2 years ago
- Web of trust grapher☆38Updated 4 months ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Updated 9 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Updated 4 years ago
- ssltrace hooks an application's SSL libraries to record keying data of all SSL connections☆95Updated 10 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago
- retrace is a versatile security vulnerability / bug discovery tool through monitoring and modifying the behavior of compiled binaries on …☆61Updated 3 years ago
- WikiMo documentation (mainly the security space, but everyone's welcome to use this)☆67Updated last year
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- setroubleshootd xSports☆93Updated 8 years ago
- Recon system hardening scanner☆47Updated 9 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆50Updated 5 years ago
- Passive SSL client fingerprinting using handshake analysis.☆111Updated 8 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- ☆102Updated 4 months ago
- Frankencert - Adversarial Testing of Certificate Validation in SSL/TLS Implementations☆180Updated 2 years ago
- Fuzzing things with afl and python-afl☆59Updated 9 years ago
- CAs that are in the graph of trust☆13Updated 5 years ago
- PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure☆63Updated 10 years ago
- ☆198Updated 9 years ago
- Hardened kernel generation - Deprecated☆48Updated 8 years ago
- CVE-2015-3152 PoC☆43Updated 10 years ago
- Private keys that have become public ...☆183Updated last month
- GrSecurity and PaX Patches Before End of Public Release☆65Updated 7 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆120Updated 8 years ago
- Blockfinder enumerates network information for countries☆130Updated 2 years ago
- ☆56Updated 8 years ago
- Tagging and annotation framework for scan data☆102Updated 7 years ago