A secure connection between client and server using the TLS1.2 protocol.
-
Updated
Apr 15, 2023 - C
Handshake is a decentralized, permissionless naming protocol where every peer is validating and in charge of managing the root DNS naming zone with the goal of creating an alternative to existing Certificate Authorities and naming systems. Names on the internet (top level domains, social networking handles, etc.) ultimately rely upon centralized actors with full control over a system which are relied upon to be honest, as they are vulnerable to hacking, censorship, and corruption. Handshake aims to experiment with new ways the internet can be more secure, resilient, and socially useful with a peer-to-peer system validated by the network’s participants.
A secure connection between client and server using the TLS1.2 protocol.
Sample implementation of SCTP (RFC4960) Handshake using C socket Programming
A simple vault for storing cookie secrets that can be used while generating and verifying a cookie during the DTLS handshake procedure (HelloVerifyRequest, RFC6347) (https://tools.ietf.org/html/rfc6347#section-4.2)
WifiPhisher implementation on ESP32
Get handshake and crack wpa/wpa2 security wifi passwords
A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.
Released 2018