awesome-tls-security VS sslyze

Compare awesome-tls-security vs sslyze and see what are their differences.

awesome-tls-security

A collection of (not-so, yet) awesome resources related to TLS, PKI and related stuff (by edelahozuah)

sslyze

Current development of SSLyze now takes place on a separate repository (by iSECPartners)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
awesome-tls-security sslyze
1 2
38 649
- -0.2%
10.0 10.0
over 1 year ago over 8 years ago
TeX Python
- GNU General Public License v3.0 only
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

awesome-tls-security

Posts with mentions or reviews of awesome-tls-security. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-01-09.
  • Mutual SSL/client authentication does not work for Ubuntu clients
    3 projects | /r/nginx | 9 Jan 2023
    Alternatively / if above fails to succeed, you can scan your (current) supported list of algorithm with different tools / links: For browser side you might connect to e.g. either https://browserleaks.com/ssl or https://clienttest.ssllabs.com:8443/ssltest/viewMyClient.html in order to see the list of supported algorithms. Do that with both your Windows as well with the browsers on Ubuntu. For server side you need to scan your server. If if is available from internet you might use https://www.ssllabs.com/ssltest/ But there are also different tools to scan internal servers, e.g. https://github.com/iSECPartners/sslyze On https://github.com/edelahozuah/awesome-tls-security you'll find an even more complete list of tools.

sslyze

Posts with mentions or reviews of sslyze. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-04-10.
  • Activated ACM but no CIRA link
    2 projects | /r/MeshCentral | 10 Apr 2023
    for a slightly easier tool instead of using openssl https://github.com/nabla-c0d3/sslyze
  • Mutual SSL/client authentication does not work for Ubuntu clients
    3 projects | /r/nginx | 9 Jan 2023
    Alternatively / if above fails to succeed, you can scan your (current) supported list of algorithm with different tools / links: For browser side you might connect to e.g. either https://browserleaks.com/ssl or https://clienttest.ssllabs.com:8443/ssltest/viewMyClient.html in order to see the list of supported algorithms. Do that with both your Windows as well with the browsers on Ubuntu. For server side you need to scan your server. If if is available from internet you might use https://www.ssllabs.com/ssltest/ But there are also different tools to scan internal servers, e.g. https://github.com/iSECPartners/sslyze On https://github.com/edelahozuah/awesome-tls-security you'll find an even more complete list of tools.

What are some alternatives?

When comparing awesome-tls-security and sslyze you can also consider the following projects:

server-side-tls - Server side TLS Tools

MeshCentral - A complete web-based remote monitoring and management web site. Once setup you can install agents and perform remote desktop session to devices on the local network or over the Internet.

stecCA - An easy to deploy Certificate Authority / Public Key Infrastructure using CFSSL, Lemur and Docker magic!

wolfssl - The wolfSSL library is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. wolfSSL supports up to TLS 1.3!

badssl.com - :lock: Memorable site for testing clients against bad SSL configs.

certify - Professional ACME Client for Windows. Certificate Management UI, powered by Let's Encrypt and compatible with all ACME v2 CAs. Download from certifytheweb.com

curl-impersonate - curl-impersonate: A special build of curl that can impersonate Chrome & Firefox