Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Mitmproxy | 30,578 | 423 | 43 | 14 hours ago | 53 | June 28, 2022 | 261 | mit | Python | |
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers. | ||||||||||
Nginxconfig.io | 25,374 | 17 days ago | 40 | mit | JavaScript | |||||
⚙️ NGINX config generator on steroids 💉 | ||||||||||
Nginx Admins Handbook | 12,393 | a year ago | 1 | mit | Shell | |||||
How to improve NGINX performance, security, and other important things. | ||||||||||
Sslyze | 2,904 | 15 | 9 | 12 hours ago | 60 | May 14, 2022 | 23 | agpl-3.0 | Python | |
Fast and powerful SSL/TLS scanning library. | ||||||||||
Nogotofail | 2,681 | 2 years ago | 32 | apache-2.0 | Python | |||||
An on-path blackbox network traffic security testing tool | ||||||||||
Badssl.com | 2,423 | 5 months ago | 193 | apache-2.0 | HTML | |||||
:lock: Memorable site for testing clients against bad SSL configs. | ||||||||||
Ssl Kill Switch2 | 2,083 | 2 years ago | 11 | other | Objective-C | |||||
Blackbox tool to disable SSL certificate validation - including certificate pinning - within iOS and macOS applications. | ||||||||||
Curl Impersonate | 1,978 | a month ago | 30 | mit | Python | |||||
curl-impersonate: A special build of curl that can impersonate Chrome & Firefox | ||||||||||
Sites Using Cloudflare | 1,922 | 6 years ago | 6 | |||||||
:broken_heart: Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement. | ||||||||||
Wolfssl | 1,869 | a day ago | 7 | January 01, 1900 | 87 | gpl-2.0 | C | |||
The wolfSSL library is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. wolfSSL supports up to TLS 1.3! |
SSLyze is a fast and powerful SSL/TLS scanning tool and Python library.
SSLyze can analyze the SSL/TLS configuration of a server by connecting to it, in order to ensure that it uses strong encryption settings (certificate, cipher suites, elliptic curves, etc.), and that it is not vulnerable to known TLS attacks (Heartbleed, ROBOT, OpenSSL CCS injection, etc.).
On Windows, Linux (x86 or x64) and macOS, SSLyze can be installed directly via pip:
$ pip install --upgrade pip setuptools wheel
$ pip install --upgrade sslyze
$ python -m sslyze www.yahoo.com www.google.com "[2607:f8b0:400a:807::2004]:443"
It can also be used via Docker:
$ docker run --rm -it nablac0d3/sslyze:5.0.0 www.google.com
Lastly, a pre-compiled Windows executable can be downloaded from the Releases page.
Documentation for SSLyze's Python API is available here.
By default, SSLyze will check the server's scan results against Mozilla's recommended "intermediate" TLS configuration, and will return a non-zero exit code if the server is not compliant.
$ python -m sslyze mozilla.com
Checking results against Mozilla's "intermediate" configuration. See https://ssl-config.mozilla.org/ for more details.
mozilla.com:443: OK - Compliant.
The Mozilla configuration to check against can be configured via --mozilla_config={old, intermediate, modern}
:
$ python -m sslyze --mozilla_config=modern mozilla.com
Checking results against Mozilla's "modern" configuration. See https://ssl-config.mozilla.org/ for more details.
mozilla.com:443: FAILED - Not compliant.
* certificate_types: Deployed certificate types are {'rsa'}, should have at least one of {'ecdsa'}.
* certificate_signatures: Deployed certificate signatures are {'sha256WithRSAEncryption'}, should have at least one of {'ecdsa-with-SHA512', 'ecdsa-with-SHA256', 'ecdsa-with-SHA384'}.
* tls_versions: TLS versions {'TLSv1.2'} are supported, but should be rejected.
* ciphers: Cipher suites {'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384', 'TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256', 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256'} are supported, but should be rejected.
This can be used to easily run an SSLyze scan as a CI/CD step.
To setup a development environment:
$ pip install --upgrade pip setuptools wheel
$ pip install -e .
$ pip install -r dev-requirements.txt
The tests can then be run using:
$ invoke test
Copyright (c) 2023 Alban Diquet
SSLyze is made available under the terms of the GNU Affero General Public License (AGPL). See LICENSE.txt for details and exceptions.