stfbk / tlsassistantLinks
An open-source modular framework capable of identifying a wide range of TLS vulnerabilities and assessing compliance with multiple guidelines. Its actionable report can assist the user in correctly and easily fixing their configurations.
☆48Updated last month
Alternatives and similar repositories for tlsassistant
Users that are interested in tlsassistant are comparing it to the libraries listed below
Sorting:
- Application and Service Fingerprinting☆133Updated 2 years ago
- ☆23Updated 3 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- ☆78Updated 3 years ago
- A collection of my Semgrep rules☆49Updated 2 years ago
- Reconnaissance tool for GitLab and GitHub organizations☆49Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- ☆90Updated 3 years ago
- A list of queries and actions that I repeat over and over again☆64Updated 4 years ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆35Updated 2 weeks ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆180Updated 4 months ago
- a tool to enumerate the resource records of a DNS zone using its DNSSEC NSEC or NSEC3 chain☆204Updated 2 years ago
- The TLS-Scanner Module from TLS-Attacker☆278Updated last week
- OAuth 2.0 Dynamic Security Scanner☆33Updated 4 years ago
- SNIcat☆127Updated 4 years ago
- Stratosphere uses password generation algorithms to discover publicly accessible cloud storage buckets.☆29Updated 4 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- Dependency Combobulator☆93Updated last year
- A tool to evaluate Content Security Policies.☆72Updated 5 years ago
- Open a DNS server that knows no records but records every request. Used for DNS exfiltration.☆68Updated 3 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- Identify IP addresses owned by public cloud providers☆125Updated last year
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- AWS Security Checks☆40Updated 7 years ago
- Evenly distributes scanner load across targets☆92Updated 4 months ago
- NSE script which leverages the Censys Search API for passive data collection☆60Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago