tls-what-can-go-wrong

TLS weaknesses

An extensive collection of security vulnerabilities and attack vectors in the Transport Layer Security (TLS) protocol.

TLS - what can go wrong?

GitHub

100 stars
13 watching
12 forks
last commit: almost 6 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
refraction-networking/utls Provides low-level access to the ClientHello message for mimicry purposes in TLS handshakes. 1,709
leonardonve/sslstrip2 A tool to bypass HSTS protection by modifying HTTPS connections to HTTP with hostname information 312
haskell-tls/hs-tls A Haskell implementation of the Transport Layer Security protocol for secure communication between servers and clients. 403
tls-attacker/tls-attacker-burpextension An extension to Burp Suite for evaluating TLS Server configurations. 35
sfackler/rust-native-tls An abstraction over platform-specific TLS implementations for secure network communication 479
usscltd/dorks Automates searching for vulnerabilities in databases and websites using predefined query patterns 199
ghostlulzhacks/waybacksqliscanner Scans URLs from the wayback machine and tests GET parameters for SQL injection vulnerabilities. 185
greggles/cracking-drupal Markdown-formatted documentation on Drupal Security vulnerabilities and mitigations 55
bifurcation/mint A TLS 1.3 stack with minimal code and priority on testing for a learning effort. 225
hasecuritysolutions/vulnwhisperer Automates vulnerability scan data aggregation and reporting for various security tools 1,356
vernamlab/medusa Automated attack synthesis tool for discovering vulnerabilities in CPU architecture and cryptographic protocols 18
quillhash/nft-attack-vectors A collection of known vulnerabilities and attack vectors in the NFT market. 256
leebrotherston/tls-fingerprinting A set of tools for detecting and analyzing TLS fingerprints from network traffic. 377
klutzy/suruga Implementation of a subset of the TLS 1.2 protocol in Rust 125
z1r00/iot_vul This project provides a collection of security vulnerabilities discovered in various IoT devices from brands such as Dlink and Tenda. 21