TLS - what can go wrong?
☆108Jan 14, 2026Updated 2 months ago
Alternatives and similar repositories for tls-what-can-go-wrong
Users that are interested in tls-what-can-go-wrong are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Continuously monitor and record the content of the major platforms' root certificate stores.☆139Jan 25, 2026Updated last month
- A simple zsh completion file for borgbackup☆11Nov 16, 2017Updated 8 years ago
- Random tools to perform Certificate Transparency-related stuff. Unmaintained and maybe broken☆27Feb 19, 2018Updated 8 years ago
- Simple TPM utils in Python for generating random numbers & RSA keys☆20Jan 15, 2017Updated 9 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 3 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Oct 19, 2022Updated 3 years ago
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆51Feb 15, 2018Updated 8 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Jun 5, 2019Updated 6 years ago
- An RFC5297-compliant C implementation of AES-SIV☆20Oct 15, 2020Updated 5 years ago
- A Thunderbird Extension for Mixminion☆11Oct 17, 2011Updated 14 years ago
- ios逆向工程学习记录☆19Aug 7, 2017Updated 8 years ago
- A tiny C cryptographic library to encrypt sessions, authenticate messages, sign, hash, etc. based only on SHA-3 and Curve25519☆70Jun 1, 2021Updated 4 years ago
- Python tool for kidnapping Chrome cookies from a MacOS target☆22Oct 5, 2022Updated 3 years ago
- POSIX-overlay filesystem☆15Dec 17, 2017Updated 8 years ago
- OpenSSL library interposer to make existing binary software use more secure TLS protocol variants☆38Jun 30, 2015Updated 10 years ago
- Certificate transparency SCT verification library in rust☆55Nov 24, 2025Updated 3 months ago
- A Benchmark for Container Orchestration Systems☆18Oct 2, 2017Updated 8 years ago
- unlock cryptdisk remotely☆12Sep 4, 2018Updated 7 years ago
- Generation of mutant programs☆20Oct 31, 2018Updated 7 years ago
- A place to discuss Private Measurement☆15Aug 8, 2023Updated 2 years ago
- Fault code reader☆11Oct 31, 2016Updated 9 years ago
- Elliptic curves Rust reference implementation☆16Mar 10, 2024Updated 2 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- BLST-Verification☆23Jan 22, 2026Updated 2 months ago
- ☆10May 3, 2023Updated 2 years ago
- Unit tests for the kernel virtual machine (KVM)☆13Jan 20, 2021Updated 5 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- mixminion is the main implementation of the Type III ("Mixminion") remailer protocol.☆64Jul 17, 2012Updated 13 years ago
- SSL and TLS protocol test suite and fuzzer☆617Updated this week
- Tools to work with the pwnedkeys.com API☆10Dec 20, 2018Updated 7 years ago
- Proposals for the Anti-Fraud Community Group.☆26Oct 28, 2022Updated 3 years ago
- Implementation of cryptographic program obfuscation☆42Feb 8, 2018Updated 8 years ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆18Apr 19, 2016Updated 9 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆31Aug 5, 2024Updated last year
- r2-based tool to decrypt iOS applications☆38Sep 9, 2016Updated 9 years ago
- ☆12Jun 20, 2016Updated 9 years ago
- GnuPG based Pseudonym Server☆15Dec 29, 2017Updated 8 years ago
- Domain Top Level Checker☆11Jan 3, 2016Updated 10 years ago