Python Other
Switch branches/tags
Nothing to show
Clone or download
Latest commit 4a876d5 Aug 7, 2018
Failed to load latest commit information.
module removed python bytecode files Aug 6, 2018
.gitignore Update exclusions Aug 6, 2018
Dockerfile add example Oct 10, 2017
LICENSE Change normal txt file permission Aug 28, 2017 Update Jul 6, 2018 fixed #32 - Termux bug Aug 7, 2018 v1.4 Aug 12, 2016
requirements.txt Add requirements.txt Aug 28, 2017
version v1.6 Aug 30, 2017

MIT License

1. A2SV?

Auto Scanning to SSL Vulnerability.
HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc

A. Support Vulnerability

[CVE-2007-1858] Anonymous Cipher
[CVE-2012-4929] CRIME(SPDY)
[CVE-2014-0160] CCS Injection
[CVE-2014-0224] HeartBleed
[CVE-2014-3566] SSLv3 POODLE
[CVE-2015-0204] FREAK Attack
[CVE-2015-4000] LOGJAM Attack
[CVE-2016-0800] SSLv2 DROWN

B. Dev Plan

[PLAN] SSL Information Analysis

2. How to Install?

A. Download(clone) & Unpack A2SV

git clone
cd a2sv

B. Install Python Package / OpenSSL

pip install argparse
pip install netaddr

apt-get install openssl

C. Run A2SV

python -h

3. How to Use?

usage: a2sv [-h] [-t TARGET] [-tf TARGETFILE] [-p PORT] [-m MODULE]
            [-d DISPLAY] [-u] [-v]

optional arguments:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        Target URL and IP Address
                         > e.g -t
  -tf TARGETFILE, --targetfile TARGETFILE
                        Target file(list) URL and IP Address
                         > e.g -tf ./target.list
  -p PORT, --port PORT  Custom Port / Default: 443
                         > e.g -p 8080
  -m MODULE, --module MODULE
                        Check SSL Vuln with one module
                        [anonymous]: Anonymous Cipher
                        [crime]: Crime(SPDY)
                        [heart]: HeartBleed
                        [ccs]: CCS Injection
                        [poodle]: SSLv3 POODLE
                        [freak]: OpenSSL FREAK
                        [logjam]: OpenSSL LOGJAM
                        [drown]: SSLv2 DROWN
  -d DISPLAY, --display DISPLAY
                        Display output
                        [Y,y] Show output
                        [N,n] Hide output
  -o OUT, --out OUT     Result write to file
                         > e.g -o /home/yourdir/result.txt
  -u, --update          Update A2SV (GIT)
  -v, --version         Show Version

[Scan SSL Vulnerability]

python -t
python -t -m heartbleed
python -t -d n
python -t -p 8111
python -tf target_list.txt

[Update A2SV]

python -u
python --update

4. Support

Submit New Issue(github)

5. Screen shot

6. Code Reference Site

poodle :
heartbleed :
ccs injection :
freak :

7. Donate