[ { "id": 31661477, "name": "FreakVulnChecker", "full_name": "felmoltor\/FreakVulnChecker", "owner": { "login": "felmoltor", "id": 846513, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/846513?v=4", "html_url": "https:\/\/github.com\/felmoltor", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/felmoltor\/FreakVulnChecker", "description": "This script check if your list of server is accepting Export cipher suites and could be vulnerable to CVE-2015-0204", "fork": false, "created_at": "2015-03-04T14:35:54Z", "updated_at": "2024-04-24T12:18:20Z", "pushed_at": "2015-03-04T14:47:02Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 31731578, "name": "Freak-Scanner", "full_name": "scottjpack\/Freak-Scanner", "owner": { "login": "scottjpack", "id": 2293674, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2293674?v=4", "html_url": "https:\/\/github.com\/scottjpack", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/scottjpack\/Freak-Scanner", "description": "Multithreaded FREAK scanner, used to detect SSL EXP Ciphers, vulnerable to CVE-2015-0204", "fork": false, "created_at": "2015-03-05T19:21:50Z", "updated_at": "2022-12-20T13:00:44Z", "pushed_at": "2015-03-05T19:23:23Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 31762660, "name": "FREAK-Attack-CVE-2015-0204-Testing-Script", "full_name": "AbhishekGhosh\/FREAK-Attack-CVE-2015-0204-Testing-Script", "owner": { "login": "AbhishekGhosh", "id": 879054, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/879054?v=4", "html_url": "https:\/\/github.com\/AbhishekGhosh", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AbhishekGhosh\/FREAK-Attack-CVE-2015-0204-Testing-Script", "description": "Basic BASH Script to Automate OpenSSL based testing for FREAK Attack (CVE-2015-0204) as advised by Akamai.", "fork": false, "created_at": "2015-03-06T09:40:54Z", "updated_at": "2024-05-26T02:34:46Z", "pushed_at": "2015-03-06T10:00:25Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "abhishekghosh", "freak-attack", "shell" ], "visibility": "public", "forks": 6, "watchers": 5, "score": 0, "subscribers_count": 2 }, { "id": 32724854, "name": "patch-openssl-CVE-2014-0291_CVE-2015-0204", "full_name": "niccoX\/patch-openssl-CVE-2014-0291_CVE-2015-0204", "owner": { "login": "niccoX", "id": 10669660, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10669660?v=4", "html_url": "https:\/\/github.com\/niccoX", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/niccoX\/patch-openssl-CVE-2014-0291_CVE-2015-0204", "description": null, "fork": false, "created_at": "2015-03-23T10:18:08Z", "updated_at": "2018-08-10T09:10:45Z", "pushed_at": "2015-03-23T13:04:01Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 325974459, "name": "A2SV--SSL-VUL-Scan", "full_name": "anthophilee\/A2SV--SSL-VUL-Scan", "owner": { "login": "anthophilee", "id": 75995332, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75995332?v=4", "html_url": "https:\/\/github.com\/anthophilee", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/anthophilee\/A2SV--SSL-VUL-Scan", "description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device", "fork": false, "created_at": "2021-01-01T12:26:08Z", "updated_at": "2025-01-04T11:54:28Z", "pushed_at": "2021-01-01T12:26:10Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 } ]