Le PAD pour proposer une amรฉlioration ร cette page : https://pad.zenk-security.com/p/merci
๐ sslscan - tests SSL/TLS enabled services to discover supported cipher suites. https://github.com/rbsec/sslscan
๐ testssl.sh - testing TLS/SSL encryption anywhere on any port.https://github.com/drwetter/testssl.sh
๐ cipherscan - a very simple way to find out which SSL ciphersuites are supported by a target. https://github.com/mozilla/cipherscan
๐ spiped - is a utility for creating symmetrically encrypted and authenticated pipes between socket addresses. http://www.tarsnap.com/spiped.html
๐ Certbot - is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server. https://github.com/certbot/certbot
๐ mkcert - simple zero-config tool to make locally trusted development certificates with any names you'd like. https://github.com/FiloSottile/mkcert
๐ certstrap - tools to bootstrap CAs, certificate requests, and signed certificates. https://github.com/square/certstrap
๐ sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues https://github.com/portcullislabs/sslxray
๐ A tool for exploiting Moxie Marlinspike's SSL โstrippingโ attack. https://github.com/moxie0/sslstrip
๐ Fast and powerful SSL/TLS server scanning library. https://github.com/nabla-c0d3/sslyze
๐ Auto Scanning to SSL Vulnerability https://github.com/hahwul/a2sv
๐ Automate scans using Qualys SSL Labs https://github.com/ozzi-/consoleSSLlabs
๐ SSL Scanner in Ruby https://github.com/DataDaoDe/ssl_scan
๐ http://certdb.com/ - SSL/TLS data provider service. Collect the data about digital certificates - issuers, organisation, whois, expiration dates, etcโฆ Plus, has handy filters for convenience.
๐ https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html - Strong SSL Security on nginx https://weakdh.org/ - Weak Diffie-Hellman and the Logjam Attack
๐ https://letsencrypt.org/ - Letโs Encrypt is a new Certificate Authority: Itโs free, automated, and open.
๐ https://filippo.io/Heartbleed/ - A checker (site and tool) for CVE-2014-0160 (Heartbleed).
๐ TLSEraser TLSEraser allows you to eavesdrop on TCP connections secured by TLS. It creates a new virtual interface with the clear text, which you can read easily using libpcap, i. e. with tcpdump or wireshark. https://github.com/AdrianVollmer/tlseraser
Outils en ligne pour un scan SSL
๐ tests SSL/TLS - https://www.sslshopper.com/ssl-checker.htm
๐ tests SSL/TLS - https://www.ssllabs.com/ssltest/analyze.html