TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a software library for more advanced tools.
☆864Feb 12, 2026Updated 2 weeks ago
Alternatives and similar repositories for TLS-Attacker
Users that are interested in TLS-Attacker are comparing it to the libraries listed below
Sorting:
- SSL and TLS protocol test suite and fuzzer☆614Updated this week
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆491Oct 3, 2024Updated last year
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Apr 10, 2017Updated 8 years ago
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆194Mar 10, 2019Updated 6 years ago
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆120Apr 26, 2021Updated 4 years ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- How to backdoor Diffie-Hellman☆613Aug 20, 2016Updated 9 years ago
- Project Wycheproof tests crypto libraries against known attacks.☆2,993Updated this week
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- New TLS Padding Oracles☆125May 14, 2023Updated 2 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,118Dec 2, 2021Updated 4 years ago
- Frankencert - Adversarial Testing of Certificate Validation in SSL/TLS Implementations☆183Jun 6, 2023Updated 2 years ago
- X.509 certificate linter☆159Feb 13, 2020Updated 6 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Protocol Learning and Stateful Fuzzing☆355Jun 7, 2022Updated 3 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- ☆171Mar 15, 2021Updated 4 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Feb 12, 2021Updated 5 years ago
- A tool to fingerprint SSL/TLS servers☆264Nov 13, 2021Updated 4 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆2,098Jan 3, 2026Updated last month
- Platform Security Assessment Framework☆3,187Feb 24, 2026Updated last week
- TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.☆1,656May 25, 2024Updated last year
- Nail in the JKS coffin - Cracking passwords of private key entries in a JKS file☆189Sep 21, 2020Updated 5 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- TLS Fingerprinting☆397Oct 20, 2020Updated 5 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,167May 26, 2023Updated 2 years ago
- Detection script for the ROBOT vulnerability☆270Jul 22, 2022Updated 3 years ago
- Encrypted exploit delivery for the masses☆270Sep 25, 2019Updated 6 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- The iOS Security Testing Framework☆1,382Oct 25, 2020Updated 5 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- Repository of various public white-box cryptographic implementations and their practical attacks.☆672Apr 10, 2024Updated last year
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287May 24, 2016Updated 9 years ago