iSECPartners / tlspretense
A test framework for testing SSL/TLS client certificate validation.
☆95Updated 3 years ago
Alternatives and similar repositories for tlspretense:
Users that are interested in tlspretense are comparing it to the libraries listed below
- iSEC Partners' research publications☆76Updated 8 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- Does your library check TLS certificates properly?☆78Updated last year
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆11Updated 8 years ago
- lte security☆41Updated 9 years ago
- free crypto audit☆31Updated 7 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 5 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆94Updated 9 years ago
- Bash integer overflow in braces☆11Updated 9 years ago
- ☆17Updated 7 years ago
- Simple application for playing with elliptic curves☆43Updated 2 years ago
- ☆30Updated 9 years ago
- Stochastic Traffic Factoring Utility☆15Updated 8 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆50Updated 9 years ago
- Websocket based egress tester☆20Updated 8 years ago
- ☆15Updated 8 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆117Updated 7 years ago
- ☆18Updated 8 years ago
- ☆45Updated 7 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 4 years ago
- A Docker container that exposes tlspretense on a port.☆20Updated last year
- ☆27Updated 7 years ago
- Password manager for USB Armory☆37Updated 9 years ago
- GrSecurity and PaX Patches Before End of Public Release☆63Updated 6 years ago
- A TE executable format loader for IDA☆28Updated 9 years ago
- CAs that are in the graph of trust☆13Updated 5 years ago
- ☆198Updated 9 years ago
- Network Defender Toolkit☆18Updated 11 years ago