TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a software library for more advanced tools.
☆871Feb 12, 2026Updated 2 months ago
Alternatives and similar repositories for TLS-Attacker
Users that are interested in TLS-Attacker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SSL and TLS protocol test suite and fuzzer☆618Mar 30, 2026Updated last month
- The TLS-Scanner Module from TLS-Attacker☆280Updated this week
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆492Oct 3, 2024Updated last year
- Protocol state machine learner and fuzzer for DTLS servers and clients☆42Apr 7, 2026Updated 3 weeks ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆120Apr 10, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆194Mar 10, 2019Updated 7 years ago
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆120Apr 26, 2021Updated 5 years ago
- New TLS Padding Oracles☆125May 14, 2023Updated 2 years ago
- Project Wycheproof tests crypto libraries against known attacks.☆3,029Apr 21, 2026Updated last week
- Frankencert - Adversarial Testing of Certificate Validation in SSL/TLS Implementations☆183Jun 6, 2023Updated 2 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 8 years ago
- A tool to fingerprint SSL/TLS servers☆266Nov 13, 2021Updated 4 years ago
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- X.509 certificate linter☆159Feb 13, 2020Updated 6 years ago
- How to backdoor Diffie-Hellman☆615Aug 20, 2016Updated 9 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,021Sep 11, 2017Updated 8 years ago
- A reversible DER and BER pretty-printer.☆252Oct 28, 2025Updated 6 months ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- ☆171Mar 15, 2021Updated 5 years ago
- TLS Fingerprinting☆399Oct 20, 2020Updated 5 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,128Dec 2, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Experimental High Assurance Cryptographic Library☆21Feb 1, 2016Updated 10 years ago
- CAs that are in the graph of trust☆13Oct 22, 2019Updated 6 years ago
- Protocol Learning and Stateful Fuzzing☆355Jun 7, 2022Updated 3 years ago
- Detection script for the ROBOT vulnerability☆269Jul 22, 2022Updated 3 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆823Nov 3, 2017Updated 8 years ago
- SSL/TLS layers for scapy the interactive packet manipulation tool☆429Sep 21, 2021Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Fast and powerful SSL/TLS scanning library.☆3,753Mar 29, 2026Updated last month
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Nail in the JKS coffin - Cracking passwords of private key entries in a JKS file☆189Sep 21, 2020Updated 5 years ago
- TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.☆1,657May 25, 2024Updated last year
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 10 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆2,104Jan 3, 2026Updated 3 months ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Feb 12, 2021Updated 5 years ago
- Timing Attack on TLS' ECDSA signature☆46Sep 8, 2015Updated 10 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,173May 26, 2023Updated 2 years ago