Le PAD pour proposer une amélioration à cette page : https://pad.zenk-security.com/p/merci
🛠 sslscan - tests SSL/TLS enabled services to discover supported cipher suites. https://github.com/rbsec/sslscan
🛠 testssl.sh - testing TLS/SSL encryption anywhere on any port.https://github.com/drwetter/testssl.sh
🛠 cipherscan - a very simple way to find out which SSL ciphersuites are supported by a target. https://github.com/mozilla/cipherscan
🛠 spiped - is a utility for creating symmetrically encrypted and authenticated pipes between socket addresses. http://www.tarsnap.com/spiped.html
🛠 Certbot - is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server. https://github.com/certbot/certbot
🛠 mkcert - simple zero-config tool to make locally trusted development certificates with any names you'd like. https://github.com/FiloSottile/mkcert
🛠 certstrap - tools to bootstrap CAs, certificate requests, and signed certificates. https://github.com/square/certstrap
🛠 sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues https://github.com/portcullislabs/sslxray
🛠 A tool for exploiting Moxie Marlinspike's SSL “stripping” attack. https://github.com/moxie0/sslstrip
🛠 Fast and powerful SSL/TLS server scanning library. https://github.com/nabla-c0d3/sslyze
🛠 Auto Scanning to SSL Vulnerability https://github.com/hahwul/a2sv
🛠 Automate scans using Qualys SSL Labs https://github.com/ozzi-/consoleSSLlabs
🛠 SSL Scanner in Ruby https://github.com/DataDaoDe/ssl_scan
🛠 http://certdb.com/ - SSL/TLS data provider service. Collect the data about digital certificates - issuers, organisation, whois, expiration dates, etc… Plus, has handy filters for convenience.
🛠 https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html - Strong SSL Security on nginx https://weakdh.org/ - Weak Diffie-Hellman and the Logjam Attack
🛠 https://letsencrypt.org/ - Let’s Encrypt is a new Certificate Authority: It’s free, automated, and open.
🛠 https://filippo.io/Heartbleed/ - A checker (site and tool) for CVE-2014-0160 (Heartbleed).
🛠 TLSEraser TLSEraser allows you to eavesdrop on TCP connections secured by TLS. It creates a new virtual interface with the clear text, which you can read easily using libpcap, i. e. with tcpdump or wireshark. https://github.com/AdrianVollmer/tlseraser