<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>tls</title>
    <link rel="self" type="application/atom+xml" href="https://links.biapy.com/guest/tags/533/feed"/>
    <updated>2026-04-21T18:10:20+00:00</updated>
    <id>https://links.biapy.com/guest/tags/533/feed</id>
            <entry>
            <id>https://links.biapy.com/links/11681</id>
            <title type="text"><![CDATA[CertRadar]]></title>
            <link rel="alternate" href="https://certradar.net/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11681"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SSL/TLS Security Tools.
Free tools for SSL/TLS transparency, configuration analysis, and security monitoring.

Related contents:

- [CertRadar - Espionnez l&amp;#039;infra cachée de vos concurrents (légalement) @ Korben :fr:](https://korben.info/certradar-espionnage-certificats-ssl.html).]]>
            </summary>
            <updated>2026-02-02T09:01:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11641</id>
            <title type="text"><![CDATA[CT Log Explorer]]></title>
            <link rel="alternate" href="https://certs.swerdlow.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11641"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Exploration into public Certificate Transparency Logs.

Real-time Certificate Transparency log explorer. Watch newly issued TLS certificates appear as they&amp;#039;re published to public CT logs.
CertTrack monitors Certificate Transparency logs in real-time, showing you newly issued TLS certificates as they appear. You can watch the stream of certificates, filter by domain, and explore the details of each certificate.

- [CT Log Explorer @ GitHub](https://github.com/theswerd/certtrack).

Related contents:

- [Erreur 403 | #61 :fr:](https://newsletter.erreur403.fr/p/erreur-403-61).]]>
            </summary>
            <updated>2026-01-29T11:51:49+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11358</id>
            <title type="text"><![CDATA[CertMate]]></title>
            <link rel="alternate" href="https://www.certmate.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11358"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Secure Your Infrastructure with CertMate.  SSL Certificate Management System (API + UI).

A powerful SSL certificate management system designed for modern infrastructure. Built with multi-DNS provider support, Docker containerization, and comprehensive REST API. 

- [CertMate @ GitHub](https://github.com/fabriziosalmi/certmate).]]>
            </summary>
            <updated>2026-01-05T07:32:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11261</id>
            <title type="text"><![CDATA[acme2certifier]]></title>
            <link rel="alternate" href="https://github.com/grindsa/acme2certifier" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11261"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[ACME Proxy enhancing your existing Certificate Authority Infrastructure.

acme2certifier is a development project aimed at creating an ACME protocol proxy. Its primary goal is to enable ACME services for CA servers that do not natively support this protocol.

Related contents:

- [Déploiement et usage de acme2certifier sous Kubernetes avec une PKI Microsoft @ MyPrivateL@B :fr:](https://www.myprivatelab.tech/acme2certifier).]]>
            </summary>
            <updated>2025-12-16T15:55:28+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10593</id>
            <title type="text"><![CDATA[InterceptSuite]]></title>
            <link rel="alternate" href="https://interceptsuite.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10593"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[MITM Proxy for Thick Client &amp;amp; non-HTTP Protocol.

 A TLS MITM proxy for TCP/TLS/UDP traffic, with support for TLS upgrades like STARTTLS, PostgreSQL, and more. 

Non-HTTP proxy that supports TCP to TLS upgrade protocols like STARTTLS and custom protocols.
Perfect for thick client intercept and database protocol analysis.

- [InterceptSuite @ GitHub](https://github.com/InterceptSuite/InterceptSuite).]]>
            </summary>
            <updated>2025-10-10T05:46:39+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10522</id>
            <title type="text"><![CDATA[Fox&amp;#039;s High Speed TLS Signature Filtering]]></title>
            <link rel="alternate" href="https://github.com/FoxMoss/fox-xdp/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10522"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[High speed TLS signature filtering.

Instead of taking the full JA4 hash to fingerprint traffic which is slow to calculate and is hard to implement in a BPF filter, I take a Jenkins hash of the sorted supported ciphers in any given TLS request. To similar effect as JA4, keeping fingerprinting usefulness. Switching to a non-cryptographic hashing algorithm is okay here because any given attacker with enough skill could replicate the ciphers of another client, so any hash reversing would be useless or at best force the attacker to implement a different amount of hashes.

Related contents:

- [How I Block All 26 Million Of Your Curl Requests @ Fox Ellison-Taylor&amp;#039;s Blog](https://foxmoss.com/blog/packet-filtering/).]]>
            </summary>
            <updated>2025-10-06T05:30:22+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10452</id>
            <title type="text"><![CDATA[win-acme]]></title>
            <link rel="alternate" href="https://www.win-acme.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10452"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This is a ACMEv2 client for Windows that aims to be very simple to start with, but powerful enough to grow into almost every scenario.

- [win-acme @ GitHub](https://github.com/win-acme/win-acme).]]>
            </summary>
            <updated>2025-09-29T15:04:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10418</id>
            <title type="text"><![CDATA[Cert Warden]]></title>
            <link rel="alternate" href="https://www.certwarden.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10418"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Centralized ACME Certificate Management.
Your entire PKI at your fingertips.

 Cert Warden is a centralized ACME Client. It provides an API for certificate consumers to fetch their individual keys and certs with API keys. 

- [Cert Warden @ GitHub](https://github.com/gregtwallace/certwarden).]]>
            </summary>
            <updated>2025-09-26T13:13:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10307</id>
            <title type="text"><![CDATA[mkcert Web UI]]></title>
            <link rel="alternate" href="https://github.com/jeffcaldwellca/mkcertWeb" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10307"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Web based user interface for mkcert CLI internal CA .

A secure, modern web interface for managing SSL certificates using the mkcert CLI tool. Generate, download, and manage local development certificates with enterprise-grade security and an intuitive web interface.]]>
            </summary>
            <updated>2025-09-19T12:24:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/360</id>
            <title type="text"><![CDATA[phpseclib]]></title>
            <link rel="alternate" href="https://phpseclib.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/360"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[PHP Secure Communications Library.

Pure-PHP implementations of SSH, SFTP, RSA / DSA / Elliptic Curves, AES / ChaCha20 / etc, X.509

- [phpseclib @ GitHub](https://github.com/phpseclib/phpseclib).]]>
            </summary>
            <updated>2026-02-11T07:14:30+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/370</id>
            <title type="text"><![CDATA[Kuvasz Uptime]]></title>
            <link rel="alternate" href="https://kuvasz-uptime.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/370"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Kuvasz (pronounce as [ˈkuvɒs]) is an open-source uptime and SSL monitoring service, built in Kotlin.

Kuvasz [ˈkuvɒs], an open-source, self-hosted uptime &amp;amp; SSL monitoring service, designed to help you keep track of your websites and services. It provides a modern, user-friendly interface, a powerful REST API, and supports multiple notification channels like email, Slack, Telegram, and PagerDuty.

- [Kuvasz Uptime @ GitHub](https://github.com/kuvasz-uptime/kuvasz).]]>
            </summary>
            <updated>2026-02-11T07:14:39+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/451</id>
            <title type="text"><![CDATA[CertMate]]></title>
            <link rel="alternate" href="https://github.com/fabriziosalmi/certmate" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/451"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SSL Certificate Management System (API + UI).

CertMate is a powerful SSL certificate management system designed for modern infrastructure. Built with multi-DNS provider support, Docker containerization, and comprehensive REST API, it&amp;#039;s the perfect solution for managing certificates across multiple datacenters and cloud environments.]]>
            </summary>
            <updated>2025-08-28T17:13:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/515</id>
            <title type="text"><![CDATA[VaulTLS]]></title>
            <link rel="alternate" href="https://github.com/7ritn/VaulTLS" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/515"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Selfhostable web app to make managing mTLS certificates a breeze.

VaulTLS is a modern solution for managing mTLS (mutual TLS) certificates with ease. It provides a centralized platform for generating, managing, and distributing client TLS certificates for your home lab.

The main reason why I developed VaulTLS was that I didn&amp;#039;t like messing with shell scripts and OpenSSL. I also did not have an overview about the expiration of individual certificates.]]>
            </summary>
            <updated>2025-08-28T17:23:56+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1074</id>
            <title type="text"><![CDATA[SSLyze]]></title>
            <link rel="alternate" href="https://github.com/nabla-c0d3/sslyze" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1074"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SSLyze is a fast and powerful SSL/TLS scanning tool and Python library.

SSLyze can analyze the SSL/TLS configuration of a server by connecting to it, in order to ensure that it uses strong encryption settings (certificate, cipher suites, elliptic curves, etc.), and that it is not vulnerable to known TLS attacks (Heartbleed, ROBOT, OpenSSL CCS injection, etc.).]]>
            </summary>
            <updated>2025-08-28T18:55:45+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1154</id>
            <title type="text"><![CDATA[CA certificates extracted from Mozilla  @ curl]]></title>
            <link rel="alternate" href="https://curl.se/docs/caextract.html" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1154"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Mozilla CA certificate store in PEM format (around 200KB uncompressed): 

Related contents:

- [How to properly set up WAMP stack with multiple PHP versions in parallel @ Andrej Rypo&amp;#039;s dev.to](https://dev.to/dakujem/how-to-properly-set-up-wamp-stack-with-multiple-php-versions-in-parallel-32hn).]]>
            </summary>
            <updated>2025-08-28T19:08:50+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1381</id>
            <title type="text"><![CDATA[SSLTrack]]></title>
            <link rel="alternate" href="https://github.com/zimbres/SSLTrack" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1381"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[SSL certificate expiry monitoring.

Ensure the continued security and reliability of your website by staying vigilant about SSL certificate expiration.]]>
            </summary>
            <updated>2025-08-28T19:47:13+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3542</id>
            <title type="text"><![CDATA[eCapture]]></title>
            <link rel="alternate" href="https://ecapture.cc/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3542"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64. 

- [eCapture @ GitHub](https://github.com/gojue/ecapture).
- [115 - RADIUS/UDP Considered Harmful @ Feisty Duck&amp;#039;s Cryptography &amp;amp; Security Newsletter](https://www.feistyduck.com/newsletter/issue_115_radius_udp_considered_harmful).]]>
            </summary>
            <updated>2025-08-29T01:47:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3690</id>
            <title type="text"><![CDATA[SPIFFE – Secure Production Identity Framework for Everyone]]></title>
            <link rel="alternate" href="https://spiffe.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3690"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Universal identity control plane for distributed systems. SPIFFE and SPIRE provide strongly attested, cryptographic identities to workloads across a wide variety of platforms.

SPIFFE and SPIRE provide a uniform identity control plane across modern and heterogeneous infrastructure. Since software and application architectures have grown substantially, they are spread across virtual machines in public clouds and private data centers. Security models for the organizations that manage them must keep up with these infrastructure technologies. And this is where SPIFFE and SPIRE come in. With SPIFFE/SPIRE, developers and operators can build software using new infrastructure technologies, while allowing security teams to step back from time-consuming security processes.

- [SPIFFE @ GitHub](https://github.com/spiffe).]]>
            </summary>
            <updated>2025-08-29T02:11:23+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4080</id>
            <title type="text"><![CDATA[Ophiuchi]]></title>
            <link rel="alternate" href="https://www.ophiuchi.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4080"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A local https proxy server using docker as backend.

- [Ophiuchi @ GitHub](https://github.com/apilylabs/ophiuchi-desktop).
- [Lundi 01 Juillet 2024 @ RudeOps :fr:](https://join.rudeops.com/emails/webview/325165/125656006298436695).]]>
            </summary>
            <updated>2025-08-29T03:17:59+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6131</id>
            <title type="text"><![CDATA[CFSSL: Cloudflare&amp;#039;s PKI and TLS toolkit]]></title>
            <link rel="alternate" href="https://github.com/cloudflare/cfssl" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6131"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[CFSSL is CloudFlare&amp;#039;s PKI/TLS swiss army knife. It is both a command line tool and an HTTP API server for signing, verifying, and bundling TLS certificates. It requires Go 1.16+ to build.]]>
            </summary>
            <updated>2025-08-29T08:58:54+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6233</id>
            <title type="text"><![CDATA[cert-manager]]></title>
            <link rel="alternate" href="https://github.com/cert-manager/cert-manager" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6233"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Automatically provision and manage TLS certificates in Kubernetes.
cert-manager adds certificates and certificate issuers as resource types in Kubernetes clusters, and simplifies the process of obtaining, renewing and using those certificates.
It supports issuing certificates from a variety of sources, including Let&amp;#039;s Encrypt (ACME), HashiCorp Vault, and Venafi TPP / TLS Protect Cloud, as well as local in-cluster issuance.
cert-manager also ensures certificates remain valid and up to date, attempting to renew certificates at an appropriate time before expiry to reduce the risk of outages and remove toil.]]>
            </summary>
            <updated>2025-08-29T09:17:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6469</id>
            <title type="text"><![CDATA[cert-manager]]></title>
            <link rel="alternate" href="https://cert-manager.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6469"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Cloud native certificate management. X.509 certificate management for Kubernetes and OpenShift.

cert-manager creates TLS certificates for workloads in your Kubernetes or OpenShift cluster and renews the certificates before they expire.

- [cert-manager @ GitHub](https://github.com/cert-manager/cert-manager).

Related contents:

- [(Almost) Every infrastructure decision I endorse or regret after 4 years running infrastructure at a startup @ Jack&amp;#039;s home on the web](https://cep.dev/posts/every-infrastructure-decision-i-endorse-or-regret-after-4-years-running-infrastructure-at-a-startup/).
- [Mise en place d&amp;#039;un reverse proxy avec traefik, cert-manager et ovh sur kubernetes @ Wiki-Rotthier](https://wiki.rotthier.fr/Conteneurisation/Kubernetes/Traefik-Cert-Manager-Ovh).]]>
            </summary>
            <updated>2026-01-05T07:33:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/7761</id>
            <title type="text"><![CDATA[Hitch TLS proxy]]></title>
            <link rel="alternate" href="https://hitch-tls.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/7761"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Hitch is a libev-based high performance SSL/TLS proxy by Varnish Software.]]>
            </summary>
            <updated>2025-08-29T13:31:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/8125</id>
            <title type="text"><![CDATA[Let&amp;#039;s Encrypt]]></title>
            <link rel="alternate" href="https://letsencrypt.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/8125"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Let’s Encrypt is a new Certificate Authority:
It’s free, automated, and open.

Related contents:

- [ACME, a brief history of one of the protocols which has changed the Internet Security @ Brocas&amp;#039; Blog](https://blog.brocas.org/2025/12/01/ACME-a-brief-history-of-one-of-the-protocols-which-has-changed-the-Internet-Security/).
- [Nouveauté Let’s Encrypt : Certbot génère enfin des certificats TLS pour vos adresses IP ! @ IT-Connect :fr:](https://www.it-connect.fr/nouveaute-lets-encrypt-certbot-genere-enfin-des-certificats-tls-pour-vos-adresses-ip/).]]>
            </summary>
            <updated>2026-03-17T07:28:23+00:00</updated>
        </entry>
    </feed>
