Fast and powerful SSL/TLS server scanning library for Python 2.7 and 3.4+. SSLyze is a Python library and a CLI tool that can analyze the SSL configuration of a server by connecting to it. It is designed to be fast and comprehensive, and should help organizations and testers identify mis-configurations affecting their SSL/TLS servers.
ssl scans ssllabs library tls security tls13The wolfSSL embedded SSL library (formerly CyaSSL) is a lightweight SSL/TLS library written in ANSI C and targeted for embedded, RTOS, and resource-constrained environments - primarily because of its small size, speed, and feature set. It is commonly used in standard operating environments as well because of its royalty-free pricing and excellent cross platform support.
ssl tls cryptography embedded security cipher-suites openssl openssl-library openssl-alternvative tls13 dtls sgx-enclave tls-library trusted-execution https docker decryption iot-securityFuzzer and test suite for TLS (SSLv2, SSLv3, v1.0, v1.1, v1.2, v1.3) implementations. Early alpha version - thus no API stability guarantees.
tlslite-ng tls ssl security-audit security-vulnerability test-framework test-automation testing-tools test-suite tlslite protocol-verifier protocol-tester automation rfc-compliance standard-conformity standards robot drown tls13 tls12ssldump is an SSLv3/TLS network protocol analyzer. It identifies TCP connections on the chosen network interface and attempts to interpret them as SSLv3/TLS traffic. When it identifies SSLv3/TLS traffic, it decodes the records and displays them in a textual form to stdout. If provided with the appropriate keying material, it will also decrypt the connections and display the application data traffic. Because it's a mess. The software maintenance process for old free (unmaintained) software like ssldump is a complete chaotic process. I do this to ease my pain and this could help other too (but this is just a collateral damage).
sslv3 tls-traffic tls13 tls ssldumptlslite-ng is an open source python library that implements SSL and TLS cryptographic protocols. It can be used either as a standalone wrapper around python socket interface or as a backend for multiple other libraries. tlslite-ng is pure python, however it can use other libraries for faster crypto operations. tlslite-ng integrates with several stdlib neworking libraries. API documentation is available in the docs/_build/html directory of the PyPI package or can be automatically generated using make docs with Sphinx installed.
ssl tls security-protocol https https-client tls12 tls13The Illustrated TLS 1.3 Connection: Every byte explained
tls tls13 gcm curve25519 x25519 sslThis is a soup-to-nuts implementation of TLS 1.3 created by staring at documents for hours until code came out. The single goal was to establish a valid TLS session by any means possible and trick servers into talking to me. This code is crude and lumpy and ugly. This is intentional and should serve as a warning to others: this code is not usable for real work. In particular the crypto code is slow and full of timing side-channels. Any attempts to clean things up will be viewed as an attempt to trick someone else into using this code and will be rejected.
tls13 toy netsec cleanroomSwiftTLS is a Swift-only implementation of TLS 1.3 (draft 28) and 1.2 that hopes to avoid common classes of vulnerabilities that have traditionally plagued C-based implementations like buffer overflows or generally arbitrary memory accesses. It is written entirely in Swift and has no external dependencies, i.e. all public key crypto, symmetric crypto and hash functions are included. SwiftTLS is licensed under the MIT License.
tls13nghq is a HTTP framing layer built on top of ngtcp2 and aims to provide support for the HTTP/QUIC mapping for running HTTP over IETF QUIC. The public API is documented here. In addition, the library's public header file nghq.h has comment blocks for every function and callback listed above it which also serve as documentation.
nghttp2 ngtcp2 quic tls13This is a framework for building negative tests and fuzzers for TLS 1.3 implementations. The idea is to split the TLS handshake and application data exchange to simple steps which can be easily configured and re-used in various TLS clients and servers. These basic blocks allow to control and test each step in a TLS 1.3 connection.
tls fuzzing handshake fuzzer tls13This layer provides both Yocto and OpenEmbedded recipes for wolfSSL products and examples, as well as bbappend files for configuring common open source packages and projects with support for wolfSSL. The wolfSSL library recipe is also included in the openembedded meta-networking layer, located here.
tls ssh mqtt security cryptography yocto bitbake tpm2 openembedded poky wolfssl tls13 yocto-project bblayers wolfssh wolfmqtt wolftpmwolfSSL is supported in Nginx. There are minor changes to the Nginx code base and recompilation is required. First you will need Nginx source package and wolfSSL source code.
nginx security gplv3 wolfssl tls13 wolfssl-nginx nginx-source wolfssl-support secure-webserver http-tls13
We have large collection of open source products. Follow the tags from
Tag Cloud >>
Open source products are scattered around the web. Please provide information
about the open source projects you own / you use.
Add Projects.