TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a software library for more advanced tools.
☆864Feb 12, 2026Updated last month
Alternatives and similar repositories for TLS-Attacker
Users that are interested in TLS-Attacker are comparing it to the libraries listed below
Sorting:
- SSL and TLS protocol test suite and fuzzer☆617Updated this week
- The TLS-Scanner Module from TLS-Attacker☆282Feb 12, 2026Updated last month
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆491Oct 3, 2024Updated last year
- Protocol state machine learner and fuzzer for DTLS servers and clients☆42Updated this week
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Apr 10, 2017Updated 8 years ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆194Mar 10, 2019Updated 7 years ago
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆120Apr 26, 2021Updated 4 years ago
- New TLS Padding Oracles☆125May 14, 2023Updated 2 years ago
- Project Wycheproof tests crypto libraries against known attacks.☆3,002Updated this week
- Frankencert - Adversarial Testing of Certificate Validation in SSL/TLS Implementations☆183Jun 6, 2023Updated 2 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- A tool to fingerprint SSL/TLS servers☆264Nov 13, 2021Updated 4 years ago
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- X.509 certificate linter☆159Feb 13, 2020Updated 6 years ago
- How to backdoor Diffie-Hellman☆613Aug 20, 2016Updated 9 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- A reversible DER and BER pretty-printer.☆249Oct 28, 2025Updated 4 months ago
- ☆171Mar 15, 2021Updated 5 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- TLS Fingerprinting☆399Oct 20, 2020Updated 5 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,118Dec 2, 2021Updated 4 years ago
- Detection script for the ROBOT vulnerability☆269Jul 22, 2022Updated 3 years ago
- Timing Attack on TLS' ECDSA signature☆47Sep 8, 2015Updated 10 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- CAs that are in the graph of trust☆13Oct 22, 2019Updated 6 years ago
- Protocol Learning and Stateful Fuzzing☆355Jun 7, 2022Updated 3 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Fast and powerful SSL/TLS scanning library.☆3,738Dec 30, 2025Updated 2 months ago
- SSL/TLS layers for scapy the interactive packet manipulation tool☆429Sep 21, 2021Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- SIDH C reference implementation☆13Jan 25, 2017Updated 9 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆2,103Jan 3, 2026Updated 2 months ago
- TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.☆1,656May 25, 2024Updated last year
- Nail in the JKS coffin - Cracking passwords of private key entries in a JKS file☆188Sep 21, 2020Updated 5 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,173May 26, 2023Updated 2 years ago