ql-https VS mitm6

Compare ql-https vs mitm6 and see what are their differences.

ql-https

HTTPS support for Quicklisp via curl (by rudolfochrist)
Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
ql-https mitm6
6 4
16 1,609
- 4.4%
7.7 0.0
about 2 months ago 2 months ago
Common Lisp Python
MIT License GNU General Public License v3.0 only
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

ql-https

Posts with mentions or reviews of ql-https. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-07-26.
  • It's 2023, so of course I'm learning Common Lisp
    11 projects | news.ycombinator.com | 26 Jul 2023
    Solutions for the lack of https:

    - add in https://github.com/rudolfochrist/ql-https (downloads packages with curl)

    - use another package manager, CLPM: https://www.clpm.dev (or the newest ocicl)

    > CLPM comes as a pre-built binary, supports HTTPS by default, supports installing multiple package versions, supports versioned systems, and more.

    - use mitmproxy: https://hiphish.github.io/blog/2022/03/19/securing-quicklisp...

  • Ocicl – An ASDF system distribution and management tool for Common Lisp
    8 projects | news.ycombinator.com | 17 May 2023
    Other options are:

    - Quicklisp -really slick, libraries in there are curated. (with https support here: https://github.com/rudolfochrist/ql-https and here: https://github.com/snmsts/quicklisp-https.git)

    - for project-local dependencies like virtualenv: https://github.com/fukamachi/qlot

    - a new, more traditional one: https://www.clpm.dev (CLPM comes as a pre-built binary, supports HTTPS by default, supports installing multiple package versions, supports versioned systems, and more)

    For recent Quicklisp upgrades: http://ultralisp.org/

    Ocicl is very new (5 days) and tries a new approach, building "on tools from the world of containers".

  • What do you think the risks/pitfalls of using Common Lisp are in a business?
    1 project | /r/lisp | 11 May 2023
    You can use SSL with QuickLisp via ql-https
  • quicklisp security (or total lack of it)
    6 projects | /r/lisp | 26 Feb 2023
  • Common Lisp Implementations in 2023
    10 projects | news.ycombinator.com | 23 Feb 2023
    LPM's warning is not surprising. It's common for libraries (dare I say open-source ones?), even if they work well. It's part of the stability game, once they are marked 1.0, they are stable. LPM works well (as reported by others).

    QL wants to do it portably, there are easy workarounds, but yeah…

    (just saw https://github.com/rudolfochrist/ql-https)

  • Securing Quicklisp through mitmproxy
    2 projects | /r/Common_Lisp | 19 Mar 2022
    That what I‘m doing: https://github.com/rudolfochrist/ql-https

mitm6

Posts with mentions or reviews of mitm6. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-02-26.
  • quicklisp security (or total lack of it)
    6 projects | /r/lisp | 26 Feb 2023
    I've been learning some common lisp, reading through Practical Common Lisp, and it's really neat. People say the good ideas of lisp got adapted in other languages and sure that's true of garbage collection, lambda's and some others, but I'm seeing plenty incredible stuff I haven't seen elsewhere, the condition system that among other things lets you fix and resume your program on exception, real interactive development, flexible object system, macros way more understandable than in other languages with AST macros as in lisp the AST is simple, an expressive dynamic language at high level of ruby and python while being an order of magnitude faster performance. Quicklisp also is really neat, how many other package managers can load new dependencies without restarting your application? And I was learning it with idea that it's not just of historical or hobby interest but legitimately a good choice I can use for new programming projects today for many tasks, but I just learned something that makes it impossible for me to consider, which is complete lack of security of quicklisp. You go to the website and see sha256 hash and PGP signature for quicklisp download, awesome it seems at the security standard you expect for a package manager. But then the actual quicklisp client does all downloads over http with no verification. What this means in practical terms is basically if you use quicklisp, anyone on your local network can easily hack your computer, by MITM (man-in-the-middle) the traffic and serving you backdoored software when you install packages from quicklisp. mitm6 will MITM windows machines on normal networks, bettercap can MITM linux and os x on most networks. Aside from attackers on your local network there's plenty other scenarios, you can go near office of CL using company and set up a open WIFI access point with same name as company wifi and hack their developers, using quicklisp over something like Tor is extremely dangerous at present as it would let the exit node backdoor the packages you download, and then in less likely but still should be protected against scenarios is just if quicklisp.org or any router between you and it is compromised, you can be hacked.
  • Responder
    2 projects | /r/hacking | 19 Oct 2022
    I'm seeing Responder work less and less often as more time goes by. There was a windows patch in 2016 that should result in Windows systems no longer trying to authenticate to hostnames resolved over LLMNR or NBT-NS. If you don't get any hashes with Responder, next try using mitm6 (https://github.com/dirkjanm/mitm6) or Pretender (https://github.com/RedTeamPentesting/pretender). If fully patched and properly configured, Windows hosts will only send credentials to hosts discovered via DNS, and since DHCPv6 is usually left unconfigured, you can poison DHCPv6 broadcasts to announce yourself as the preferred DNS server and you can get hashes or relay.
  • fox-it/mitm6 - pwning IPv4 via IPv6
    1 project | /r/GithubSecurityTools | 11 Mar 2021
  • best practices to prevent another intrusion
    1 project | /r/sysadmin | 14 Jan 2021

What are some alternatives?

When comparing ql-https and mitm6 you can also consider the following projects:

CSharpRepl - A command line C# REPL with syntax highlighting – explore the language, libraries and nuget packages interactively.

quicklisp-client - Quicklisp client.

tungsten - A Common Lisp toolkit.

pretender - Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.

bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.

quicklisp-https

alive - Common Lisp Extension for VSCode

thirteen-letters - Competitive word scramble in the browser, made for Lisp Game Jam (Spring 2023)

qlot - A project-local library installer for Common Lisp

npt - ANSI Common Lisp implementation