<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Miltonsmith</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Miltonsmith"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Miltonsmith"/>
		<updated>2026-04-29T15:26:23Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=242118</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=242118"/>
				<updated>2018-07-26T17:21:47Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL API Project and Tools==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/deepvioletapi @DeepVioletAPI]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://www.securitycurmudgeon.com/ blog] [https://twitter.com/spoofzu/ twitter] [mailto:milton.smith@owasp.org email] &lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [24 Jul 2018] SecurityOnline.info: OWASP DeepViolet TLS/SSL API&lt;br /&gt;
* [Jun 8, 2018] DV at [https://www.blackhat.com/us-18/arsenal/schedule/index.html#deepviolet-ssltls-scanning-api-38-tools-10724 Blackhat 2018 USA]&lt;br /&gt;
* [Jun 8, 2018] Significant updates to DV and DeepVioletTools code&lt;br /&gt;
* [27 September 2017] [https://www.elementarydigital.co.uk/the-best-ssl-troubleshooting-tools-to-test-out/ Elementary: The Best SSL Troubleshooting Tools to Test Out]&lt;br /&gt;
* [1 June 2017] ZAP's HttpsInfo addon leveraging DeepViolet has been released (v9) [http://bit.ly/2r6mmBj More]&lt;br /&gt;
* [25 May 2017] DeepViolet Beta 5.0.2 available for download, See [https://github.com/spoofzu/DeepViolet/releases/tag/5.0.2 release notes] for detail.&lt;br /&gt;
* [10 November 2016] SlideShare, [http://www.slideshare.net/MiltonSmith6/owasp-deepviolet-tlsssl-java-api-and-tools BlackHat 2016 EU Slide Deck]&lt;br /&gt;
* [22 October 2016] Peerlyst, [https://www.peerlyst.com/posts/ssl-tls-session-introspection-deepviolet-cyberpunk SSL TLS Session Introspection: DeepViolet]&lt;br /&gt;
* [2 September 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [22 April 2016] Oracle Blogs, [https://blogs.oracle.com/java-platform-group/entry/javaone_2016_call_for_proposals JavaOne 2016 Call for Proposals]&lt;br /&gt;
* [6 April 2016] Sans Institute, [https://www.sans.org/reading-room/whitepapers/auditing/defending-weaponization-trust-defense-in-depth-assessment-tls-37145 Defending Against the Weaponization of Trust: Defense in Depth Assessment of TLS]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=241228</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=241228"/>
				<updated>2018-06-08T21:40:06Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: Clean up page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL API Project and Tools==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/deepvioletapi @DeepVioletAPI]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://www.securitycurmudgeon.com/ blog] [https://twitter.com/spoofzu/ twitter] [mailto:milton.smith@owasp.org email] &lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [Jun 8, 2018] DV at [https://www.blackhat.com/us-18/arsenal/schedule/index.html#deepviolet-ssltls-scanning-api-38-tools-10724 Blackhat 2018 USA]&lt;br /&gt;
* [Jun 8, 2018] Significant updates to DV and DeepVioletTools code&lt;br /&gt;
* [27 September 2017] [https://www.elementarydigital.co.uk/the-best-ssl-troubleshooting-tools-to-test-out/ Elementary: The Best SSL Troubleshooting Tools to Test Out]&lt;br /&gt;
* [1 June 2017] ZAP's HttpsInfo addon leveraging DeepViolet has been released (v9) [http://bit.ly/2r6mmBj More]&lt;br /&gt;
* [25 May 2017] DeepViolet Beta 5.0.2 available for download, See [https://github.com/spoofzu/DeepViolet/releases/tag/5.0.2 release notes] for detail.&lt;br /&gt;
* [10 November 2016] SlideShare, [http://www.slideshare.net/MiltonSmith6/owasp-deepviolet-tlsssl-java-api-and-tools BlackHat 2016 EU Slide Deck]&lt;br /&gt;
* [22 October 2016] Peerlyst, [https://www.peerlyst.com/posts/ssl-tls-session-introspection-deepviolet-cyberpunk SSL TLS Session Introspection: DeepViolet]&lt;br /&gt;
* [2 September 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [22 April 2016] Oracle Blogs, [https://blogs.oracle.com/java-platform-group/entry/javaone_2016_call_for_proposals JavaOne 2016 Call for Proposals]&lt;br /&gt;
* [6 April 2016] Sans Institute, [https://www.sans.org/reading-room/whitepapers/auditing/defending-weaponization-trust-defense-in-depth-assessment-tls-37145 Defending Against the Weaponization of Trust: Defense in Depth Assessment of TLS]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=241227</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=241227"/>
				<updated>2018-06-08T21:38:50Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: Added recent news&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL API Project and Tools==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/deepvioletapi @DeepVioletAPI]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://www.securitycurmudgeon.com/ blog] [https://twitter.com/spoofzu/ twitter] [mailto:milton.smith@owasp.org email] &lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [Jun 8, 2018] DV at [https://www.blackhat.com/us-18/arsenal/schedule/index.html#deepviolet-ssltls-scanning-api-38-tools-10724 Blackhat 2018 USA]&lt;br /&gt;
* [Jun 8, 2018] Significant updates to DV and DeepVioletTools code&lt;br /&gt;
* [27 September 2017] [https://www.elementarydigital.co.uk/the-best-ssl-troubleshooting-tools-to-test-out/ Elementary: The Best SSL Troubleshooting Tools to Test Out]&lt;br /&gt;
* [1 June 2017] ZAP's HttpsInfo addon leveraging DeepViolet has been released (v9) [http://bit.ly/2r6mmBj More]&lt;br /&gt;
* [25 May 2017] DeepViolet Beta 5.0.2 available for download, See [https://github.com/spoofzu/DeepViolet/releases/tag/5.0.2 release notes] for detail.&lt;br /&gt;
* [10 November 2016] SlideShare, [http://www.slideshare.net/MiltonSmith6/owasp-deepviolet-tlsssl-java-api-and-tools BlackHat 2016 EU Slide Deck]&lt;br /&gt;
* [22 October 2016] Peerlyst, [https://www.peerlyst.com/posts/ssl-tls-session-introspection-deepviolet-cyberpunk SSL TLS Session Introspection: DeepViolet]&lt;br /&gt;
* [2 September 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [22 April 2016] Oracle Blogs, [https://blogs.oracle.com/java-platform-group/entry/javaone_2016_call_for_proposals JavaOne 2016 Call for Proposals]&lt;br /&gt;
* [6 April 2016] Sans Institute, [https://www.sans.org/reading-room/whitepapers/auditing/defending-weaponization-trust-defense-in-depth-assessment-tls-37145 Defending Against the Weaponization of Trust: Defense in Depth Assessment of TLS]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=238928</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=238928"/>
				<updated>2018-03-26T05:06:40Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: Updated news&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL API Project and Tools==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/deepvioletapi @DeepVioletAPI]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://www.securitycurmudgeon.com/ blog] [https://twitter.com/spoofzu/ twitter] [mailto:milton.smith@owasp.org email] &lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [27 September 2017] [https://www.elementarydigital.co.uk/the-best-ssl-troubleshooting-tools-to-test-out/ Elementary: The Best SSL Troubleshooting Tools to Test Out]&lt;br /&gt;
* [1 June 2017] ZAP's HttpsInfo addon leveraging DeepViolet has been released (v9) [http://bit.ly/2r6mmBj More]&lt;br /&gt;
* [25 May 2017] DeepViolet Beta 5.0.2 available for download, See [https://github.com/spoofzu/DeepViolet/releases/tag/5.0.2 release notes] for detail.&lt;br /&gt;
* [10 November 2016] SlideShare, [http://www.slideshare.net/MiltonSmith6/owasp-deepviolet-tlsssl-java-api-and-tools BlackHat 2016 EU Slide Deck]&lt;br /&gt;
* [22 October 2016] Peerlyst, [https://www.peerlyst.com/posts/ssl-tls-session-introspection-deepviolet-cyberpunk SSL TLS Session Introspection: DeepViolet]&lt;br /&gt;
* [2 September 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [22 April 2016] Oracle Blogs, [https://blogs.oracle.com/java-platform-group/entry/javaone_2016_call_for_proposals JavaOne 2016 Call for Proposals]&lt;br /&gt;
* [6 April 2016] Sans Institute, [https://www.sans.org/reading-room/whitepapers/auditing/defending-weaponization-trust-defense-in-depth-assessment-tls-37145 Defending Against the Weaponization of Trust: Defense in Depth Assessment of TLS]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Milton_Smith_2017_Bio_%26_Why_Me%3F&amp;diff=233436</id>
		<title>Milton Smith 2017 Bio &amp; Why Me?</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Milton_Smith_2017_Bio_%26_Why_Me%3F&amp;diff=233436"/>
				<updated>2017-09-18T20:35:55Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: Update bio&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Why Me?:'''&lt;br /&gt;
OWASP is uniquely qualified to influence the industry while providing technical resources to defend against the next generation of Internet threats.  As a security principal at Oracle, and previous security leader of the Java platform, I’m no stranger to big challenges.  I'm interested to be elected to the board and help OWASP increase it's relevancy throughout the world.  Also importantly, to assist OWASP work through it's growing pains as an evolving organization.&lt;br /&gt;
&lt;br /&gt;
'''About Milton:'''&lt;br /&gt;
Milton Smith (California, USA) leads product security for the NetSuite division at Oracle.  Previously Milton was security leader for the Java platform engineering group at Oracle.  Outside the company, Milton is the project leader for two OWASP projects.  Milton is solo leader/developer on [https://www.owasp.org/index.php/OWASP_DeepViolet_TLS/SSL_Scanner OWASP DeepViolet TLS/SSL scanning API].  DeepViolet is important since it provides the TLS/SSL scanning capabilities for the [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Flagship project ZAP].  Milton also a co-leader on the [https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project].  During collaboration on the web application security book project, [http://a.co/4dgnhRO Iron-Clad Java: Building Secure Web Applications] many powerful ideas around software logging were discussed that could not be covered in print.  To explore these ideas further, [https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project] was born.  Previous employers include companies like Yahoo and SuccessFactors.  For more information visit, [https://www.securitycurmudgeon.com/about securitycurmudgeon.com/about].&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Miltonsmith&amp;diff=232748</id>
		<title>User:Miltonsmith</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Miltonsmith&amp;diff=232748"/>
				<updated>2017-08-30T03:54:30Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: Update bio&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Milton Smith (California, USA) leads product security for the NetSuite division at Oracle.  Previously Milton was security leader for the Java platform engineering group.  Outside the company, Milton is the project leader for both the [https://www.owasp.org/index.php/OWASP_DeepViolet_TLS/SSL_Scanner OWASP DeepViolet TLS/SSL scanning API] and [https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging] Projects.  Previous employers include companies like Yahoo and SuccessFactors.  For more information visit, [https://www.securitycurmudgeon.com/about securitycurmudgeon.com/about].&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Milton_Smith_2017_Bio_%26_Why_Me%3F&amp;diff=232747</id>
		<title>Milton Smith 2017 Bio &amp; Why Me?</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Milton_Smith_2017_Bio_%26_Why_Me%3F&amp;diff=232747"/>
				<updated>2017-08-30T03:52:51Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: Update bio&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Why Me?:'''&lt;br /&gt;
OWASP is uniquely qualified to influence the industry while providing technical resources to defend against the next generation of Internet threats.  As a security principal at Oracle, and previous security leader of the Java platform, I’m no stranger to big challenges.  I'm interested to be elected to the board and help OWASP increase it's relevancy throughout the world.  Also importantly, to assist OWASP work through it's growing pains as an evolving organization.&lt;br /&gt;
&lt;br /&gt;
'''About Milton:'''&lt;br /&gt;
Milton Smith (California, USA) leads product security for the NetSuite division at Oracle.  Previously Milton was security leader for the Java platform engineering group.  Outside the company, Milton is the project leader for both the [https://www.owasp.org/index.php/OWASP_DeepViolet_TLS/SSL_Scanner OWASP DeepViolet TLS/SSL scanning API] and [https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging] Projects.  Previous employers include companies like Yahoo and SuccessFactors.  For more information visit, [https://www.securitycurmudgeon.com/about securitycurmudgeon.com/about].&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Milton_Smith_2017_Bio_%26_Why_Me%3F&amp;diff=232746</id>
		<title>Milton Smith 2017 Bio &amp; Why Me?</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Milton_Smith_2017_Bio_%26_Why_Me%3F&amp;diff=232746"/>
				<updated>2017-08-30T03:52:20Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: Update bio&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Why Me?:'''&lt;br /&gt;
OWASP is uniquely qualified to influence the industry while providing technical resources to defend against the next generation of Internet threats.  As a security principal at Oracle, and previous security leader of the Java platform, I’m no stranger to big challenges.  I'm interested to be elected to the OWASP board and help OWASP increase it's relevancy throughout the world.  Also importantly, to assist OWASP work through it's growing pains as an evolving organization.&lt;br /&gt;
&lt;br /&gt;
'''About Milton:'''&lt;br /&gt;
Milton Smith (California, USA) leads product security for the NetSuite division at Oracle.  Previously Milton was security leader for the Java platform engineering group.  Outside the company, Milton is the project leader for both the [https://www.owasp.org/index.php/OWASP_DeepViolet_TLS/SSL_Scanner OWASP DeepViolet TLS/SSL scanning API] and [https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging] Projects.  Previous employers include companies like Yahoo and SuccessFactors.  For more information visit, [https://www.securitycurmudgeon.com/about securitycurmudgeon.com/about].&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Milton_Smith_2017_Bio_%26_Why_Me%3F&amp;diff=232171</id>
		<title>Milton Smith 2017 Bio &amp; Why Me?</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Milton_Smith_2017_Bio_%26_Why_Me%3F&amp;diff=232171"/>
				<updated>2017-08-10T22:01:39Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: Added links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Milton Smith&lt;br /&gt;
&lt;br /&gt;
'''About Milton:'''&lt;br /&gt;
Milton Smith (California, USA) leads product security for the NetSuite division at Oracle.  Previously Milton was security leader for the Java platform engineering group.  Outside the company, Milton is the project leader for both the [https://www.owasp.org/index.php/OWASP_DeepViolet_TLS/SSL_Scanner OWASP DeepViolet TLS/SSL scanning API] and [https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging] Projects.  Previous employers include companies like Yahoo and SuccessFactors.  For more information visit, [https://www.securitycurmudgeon.com/ securitycurmudgeon.com] or follow Milton on Twitter([https://twitter.com/spoofzu @spoofzu]).&lt;br /&gt;
&lt;br /&gt;
'''Why Me?:'''&lt;br /&gt;
Today strong product security claims are less frequently accepted at face value. When product security incidents occur, businesses and governments provide excuses like: “hackers are becoming more sophisticated”, “security is too difficult a problem to solve”, or “everyone has bugs.” However, as the number and severity of security incidents continues to rise, public patience for trite excuses grows weary. The public is increasingly demanding more accountability from business leaders and governments around product security. As leaders transition from an era of plausible deniability to one of accountability, OWASP is uniquely qualified to influence the industry while providing technical resources to defend against the next generation of Internet threats.&lt;br /&gt;
&lt;br /&gt;
As a security principal at Oracle, and previous security leader of the Java platform, I’m no stranger to big challenges.  I'm interested to be elected to the OWASP board and help OWASP increase it's relevancy throughout the world.  My [https://www.securitycurmudgeon.com/about blog About] page describes specific industry contributions, contribution to OWASP events, etc.&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Milton_Smith_2017_Bio_%26_Why_Me%3F&amp;diff=232170</id>
		<title>Milton Smith 2017 Bio &amp; Why Me?</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Milton_Smith_2017_Bio_%26_Why_Me%3F&amp;diff=232170"/>
				<updated>2017-08-10T21:39:22Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: update&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Milton Smith&lt;br /&gt;
&lt;br /&gt;
'''About Milton:'''&lt;br /&gt;
Milton Smith (California, USA) leads product security for the NetSuite division at Oracle.  Previously Milton was security leader for the Java platform engineering group.  Outside the company, Milton is the project leader for both the OWASP DeepViolet TLS/SSL scanning API and OWASP Security Logging Projects.  Previous employers include companies like Yahoo and SuccessFactors.  For more information visit, securitycurmudgeon.com or follow Milton on Twitter(@spoofzu).&lt;br /&gt;
&lt;br /&gt;
'''Why Me?:'''&lt;br /&gt;
Today strong product security claims are less frequently accepted at face value. When product security incidents occur, businesses and governments provide excuses like: “hackers are becoming more sophisticated”, “security is too difficult a problem to solve”, or “everyone has bugs.” However, as the number and severity of security incidents continues to rise, public patience for trite excuses grows weary. The public is increasingly demanding more accountability from business leaders and governments around product security. As leaders transition from an era of plausible deniability to one of accountability, OWASP is uniquely qualified to influence the industry while providing technical resources to defend against the next generation of Internet threats.&lt;br /&gt;
&lt;br /&gt;
As a security principal at Oracle, and previous security leader of the Java platform, I’m no stranger to big challenges.  I'm interested to be elected to the OWASP board and help OWASP increase it's relevancy throughout the world.&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Milton_Smith_2017_Bio_%26_Why_Me%3F&amp;diff=232133</id>
		<title>Milton Smith 2017 Bio &amp; Why Me?</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Milton_Smith_2017_Bio_%26_Why_Me%3F&amp;diff=232133"/>
				<updated>2017-08-09T18:35:31Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: Update bio&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Milton Smith&lt;br /&gt;
&lt;br /&gt;
'''About Milton:'''&lt;br /&gt;
Milton Smith (California, USA) leads product security for the NetSuite division at Oracle.  Previously Milton was security leader for the Java platform engineering group.  Outside the company, Milton is the project leader for both the OWASP DeepViolet TLS/SSL scanning API and OWASP Security Logging Projects.  Previous employers include companies like Yahoo and SuccessFactors.  For more information visit, securitycurmudgeon.com or follow Milton on Twitter(@spoofzu).&lt;br /&gt;
&lt;br /&gt;
'''Why Me?:'''&lt;br /&gt;
Today strong product security claims are less frequently accepted at face value. When product security incidents occur, businesses and governments provide excuses like: “hackers are becoming more sophisticated”, “security is too difficult a problem to solve”, or “everyone has bugs.” However, as the number and severity of security incidents continues to rise, public patience for trite excuses grows weary. The public is increasingly demanding more accountability from business leaders and governments around product security. As leaders transition from an era of plausible deniability to accountability, they search for solutions and broaden their investments. OWASP is uniquely qualified to provide the guidance and resources to defend against the next generation of Internet threats.&lt;br /&gt;
&lt;br /&gt;
As a security principal at Oracle, and previous security leader of the Java platform, I’m no stranger to big challenges. I'm interested to be elected to the OWASP board and help OWASP increase it's relevancy throughout the world.&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=230467</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=230467"/>
				<updated>2017-06-07T16:58:04Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL API Project and Tools==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/deepvioletapi @DeepVioletAPI]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[https://www.securitycurmudgeon.com/ blog ] [https://twitter.com/spoofzu/ twitter] [mailto:milton.smith@owasp.org email] &lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [1 June 2017] ZAP's HttpsInfo addon leveraging DeepViolet has been released (v9) [http://bit.ly/2r6mmBj More]&lt;br /&gt;
* [25 May 2017] DeepViolet Beta 5.0.2 available for download, See [https://github.com/spoofzu/DeepViolet/releases/tag/5.0.2 release notes] for detail.&lt;br /&gt;
* [10 November 2016] SlideShare, [http://www.slideshare.net/MiltonSmith6/owasp-deepviolet-tlsssl-java-api-and-tools BlackHat 2016 EU Slide Deck]&lt;br /&gt;
* [22 October 2016] Peerlyst, [https://www.peerlyst.com/posts/ssl-tls-session-introspection-deepviolet-cyberpunk SSL TLS Session Introspection: DeepViolet]&lt;br /&gt;
* [2 September 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [22 April 2016] Oracle Blogs, [https://blogs.oracle.com/java-platform-group/entry/javaone_2016_call_for_proposals JavaOne 2016 Call for Proposals]&lt;br /&gt;
* [6 April 2016] Sans Institute, [https://www.sans.org/reading-room/whitepapers/auditing/defending-weaponization-trust-defense-in-depth-assessment-tls-37145 Defending Against the Weaponization of Trust: Defense in Depth Assessment of TLS]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=230048</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=230048"/>
				<updated>2017-05-26T04:35:48Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL API Project and Tools==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/deepvioletapi @DeepVioletAPI]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[https://www.securitycurmudgeon.com/ blog ] [https://twitter.com/spoofzu/ twitter] [mailto:milton.smith@owasp.org email] &lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [25 May 2017] DeepViolet Beta 5.0.2 available for download, See [https://github.com/spoofzu/DeepViolet/releases/tag/5.0.2 release notes] for detail.&lt;br /&gt;
* [10 November 2016] SlideShare, [http://www.slideshare.net/MiltonSmith6/owasp-deepviolet-tlsssl-java-api-and-tools BlackHat 2016 EU Slide Deck]&lt;br /&gt;
* [22 October 2016] Peerlyst, [https://www.peerlyst.com/posts/ssl-tls-session-introspection-deepviolet-cyberpunk SSL TLS Session Introspection: DeepViolet]&lt;br /&gt;
* [2 September 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [22 April 2016] Oracle Blogs, [https://blogs.oracle.com/java-platform-group/entry/javaone_2016_call_for_proposals JavaOne 2016 Call for Proposals]&lt;br /&gt;
* [6 April 2016] Sans Institute, [https://www.sans.org/reading-room/whitepapers/auditing/defending-weaponization-trust-defense-in-depth-assessment-tls-37145 Defending Against the Weaponization of Trust: Defense in Depth Assessment of TLS]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=223336</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=223336"/>
				<updated>2016-11-10T18:57:20Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL API Project and Tools==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/deepvioletapi @DeepVioletAPI]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[https://www.securitycurmudgeon.com/ blog ] [https://twitter.com/spoofzu/ twitter] [mailto:milton.smith@owasp.org email] &lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [10 November 2016] SlideShare, [http://www.slideshare.net/MiltonSmith6/owasp-deepviolet-tlsssl-java-api-and-tools BlackHat 2016 EU Slide Deck]&lt;br /&gt;
* [22 October 2016] Peerlyst, [https://www.peerlyst.com/posts/ssl-tls-session-introspection-deepviolet-cyberpunk SSL TLS Session Introspection: DeepViolet]&lt;br /&gt;
* [2 September 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [22 April 2016] Oracle Blogs, [https://blogs.oracle.com/java-platform-group/entry/javaone_2016_call_for_proposals JavaOne 2016 Call for Proposals]&lt;br /&gt;
* [6 April 2016] Sans Institute, [https://www.sans.org/reading-room/whitepapers/auditing/defending-weaponization-trust-defense-in-depth-assessment-tls-37145 Defending Against the Weaponization of Trust: Defense in Depth Assessment of TLS]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Dvui.jpg&amp;diff=223327</id>
		<title>File:Dvui.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Dvui.jpg&amp;diff=223327"/>
				<updated>2016-11-10T15:21:44Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: Photo of desktop application reference case for DeepViolet API project.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Photo of desktop application reference case for DeepViolet API project.&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Dvcmd.png&amp;diff=223326</id>
		<title>File:Dvcmd.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Dvcmd.png&amp;diff=223326"/>
				<updated>2016-11-10T15:18:58Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: Photo of the command line options for DeepViolet API project command line reference case.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Photo of the command line options for DeepViolet API project command line reference case.&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=223071</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=223071"/>
				<updated>2016-11-04T23:46:36Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: Update news and events&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL API Project and Tools==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/deepvioletapi @DeepVioletAPI]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[https://www.securitycurmudgeon.com/ blog ] [https://twitter.com/spoofzu/ twitter] [mailto:milton.smith@owasp.org email] &lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [22 October 2016] Peerlyst, [https://www.peerlyst.com/posts/ssl-tls-session-introspection-deepviolet-cyberpunk SSL TLS Session Introspection: DeepViolet]&lt;br /&gt;
* [2 September 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [22 April 2016] Oracle Blogs, [https://blogs.oracle.com/java-platform-group/entry/javaone_2016_call_for_proposals JavaOne 2016 Call for Proposals]&lt;br /&gt;
* [6 April 2016] Sans Institute, [https://www.sans.org/reading-room/whitepapers/auditing/defending-weaponization-trust-defense-in-depth-assessment-tls-37145 Defending Against the Weaponization of Trust: Defense in Depth Assessment of TLS]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=222479</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=222479"/>
				<updated>2016-10-18T19:55:48Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* Project Leader(s) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL API Project and Tools==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/deepvioletapi @DeepVioletAPI]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [https://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [2 Sep 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221306</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221306"/>
				<updated>2016-09-14T17:11:05Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* OWASP DeepViolet TLS/SSL API Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL API Project and Tools==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/deepvioletapi @DeepVioletAPI]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [2 Sep 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221305</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221305"/>
				<updated>2016-09-14T17:10:23Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* OWASP DeepViolet TLS/SSL Scanning API Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL API Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/deepvioletapi @DeepVioletAPI]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [2 Sep 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221281</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221281"/>
				<updated>2016-09-13T02:10:46Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanning API Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/deepvioletapi @DeepVioletAPI]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [2 Sep 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Roadmap=&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221280</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221280"/>
				<updated>2016-09-13T02:08:33Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanning API Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/deepvioletapi @DeepVioletAPI]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [2 Sep 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221279</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221279"/>
				<updated>2016-09-12T22:52:50Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanning API Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
Twitter: [https://twitter.com/deepvioletapi @DeepVioletAPI]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [2 Sep 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
Code is not the only way to contribute but code contributors are found on [https://github.com/spoofzu/DeepViolet/network/members GitHub Members].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221278</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221278"/>
				<updated>2016-09-12T22:51:05Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanning API Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/deepvioletapi Twitter: @DeepVioletAPI]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [2 Sep 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
Code is not the only way to contribute but code contributors are found on [https://github.com/spoofzu/DeepViolet/network/members GitHub Members].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221221</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221221"/>
				<updated>2016-09-10T18:05:00Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanning API Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [2 Sep 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
Code is not the only way to contribute but code contributors are found on [https://github.com/spoofzu/DeepViolet/network/members GitHub Members].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221181</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221181"/>
				<updated>2016-09-09T18:44:15Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [2 Sep 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
Code is not the only way to contribute but code contributors are found on [https://github.com/spoofzu/DeepViolet/network/members GitHub Members].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221003</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221003"/>
				<updated>2016-09-02T21:42:02Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/Source Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [2 Sep 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
Code is not the only way to contribute but code contributors are found on [https://github.com/spoofzu/DeepViolet/network/members GitHub Members].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221002</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221002"/>
				<updated>2016-09-02T21:40:19Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/Source Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
* [2 Sep 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
Code is not the only way to contribute but code contributors are found on [https://github.com/spoofzu/DeepViolet/network/members GitHub Members].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221001</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221001"/>
				<updated>2016-09-02T21:37:37Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/Source Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
Code is not the only way to contribute but code contributors are found on [https://github.com/spoofzu/DeepViolet/network/members GitHub Members].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221000</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=221000"/>
				<updated>2016-09-02T21:36:17Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/Source Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
Inform a Project Leader how you wish to contribute, your level of intended commitment, and how what you want to do aligns with project goals and milestones. There are many different ways you can contribute to an OWASP Project and communication with the leads is key.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Additional FAQ's can be found on the projects [https://github.com/spoofzu/DeepViolet/wiki/Frequently-Asked-Questions GitHub FAQ area].''&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
Code is not the only way to contribute but code contributors are found on [https://github.com/spoofzu/DeepViolet/network/members GitHub Members].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''For information about contributing see DeepViolet's [https://github.com/spoofzu/DeepViolet/wiki/Contributing Contributing page] on GitHub.''&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220999</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220999"/>
				<updated>2016-09-02T20:37:00Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* Roadmap */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/Source Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
Inform a Project Leader how you wish to contribute, your level of intended commitment, and how what you want to do aligns with project goals and milestones. There are many different ways you can contribute to an OWASP Project and communication with the leads is key.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Additional FAQ's can be found on the projects [https://github.com/spoofzu/DeepViolet/wiki/Frequently-Asked-Questions GitHub FAQ area].''&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
Code is not the only way to contribute but code contributors are found on [https://github.com/spoofzu/DeepViolet/network/members GitHub Members].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
''See GitHub for further details.''&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220998</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220998"/>
				<updated>2016-09-02T20:34:51Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* Acknowledgements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/Source Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
Inform a Project Leader how you wish to contribute, your level of intended commitment, and how what you want to do aligns with project goals and milestones. There are many different ways you can contribute to an OWASP Project and communication with the leads is key.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Additional FAQ's can be found on the projects [https://github.com/spoofzu/DeepViolet/wiki/Frequently-Asked-Questions GitHub FAQ area].''&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
Code is not the only way to contribute but code contributors are found on [https://github.com/spoofzu/DeepViolet/network/members GitHub Members].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220997</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220997"/>
				<updated>2016-09-02T20:34:16Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* FAQs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/Source Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
Inform a Project Leader how you wish to contribute, your level of intended commitment, and how what you want to do aligns with project goals and milestones. There are many different ways you can contribute to an OWASP Project and communication with the leads is key.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Additional FAQ's can be found on the projects [https://github.com/spoofzu/DeepViolet/wiki/Frequently-Asked-Questions GitHub FAQ area].''&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
Code is not the only way to contribute but code contributions are found on [https://github.com/spoofzu/DeepViolet/network/members GitHub Members].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220996</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220996"/>
				<updated>2016-09-02T20:33:54Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* FAQs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/Source Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
Inform a Project Leader how you wish to contribute, your level of intended commitment, and how what you want to do aligns with project goals and milestones. There are many different ways you can contribute to an OWASP Project and communication with the leads is key.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.&lt;br /&gt;
&lt;br /&gt;
Additional FAQ's can be found on the projects [https://github.com/spoofzu/DeepViolet/wiki/Frequently-Asked-Questions GitHub FAQ area].&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
Code is not the only way to contribute but code contributions are found on [https://github.com/spoofzu/DeepViolet/network/members GitHub Members].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220995</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220995"/>
				<updated>2016-09-02T20:32:45Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* How can I participate in your project? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/Source Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
Inform a Project Leader how you wish to contribute, your level of intended commitment, and how what you want to do aligns with project goals and milestones. There are many different ways you can contribute to an OWASP Project and communication with the leads is key.&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
Code is not the only way to contribute but code contributions are found on [https://github.com/spoofzu/DeepViolet/network/members GitHub Members].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220994</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220994"/>
				<updated>2016-09-02T20:29:01Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* Acknowledgements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/Source Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
Code is not the only way to contribute but code contributions are found on [https://github.com/spoofzu/DeepViolet/network/members GitHub Members].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220993</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220993"/>
				<updated>2016-09-02T19:29:25Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/Source Code] | [https://github.com/spoofzu/DeepViolet/releases Binaries] | [https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
None yet.  Fame, fortune, and security glory is within your grasp.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220992</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220992"/>
				<updated>2016-09-02T19:27:28Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/releases Release Binaries]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
None yet.  Fame, fortune, and security glory is within your grasp.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220919</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220919"/>
				<updated>2016-09-01T04:02:42Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/releases Release Binaries]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5)]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/6 Unscheduled Features]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
None yet.  Fame, fortune, and security glory is within your grasp.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220918</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220918"/>
				<updated>2016-09-01T04:02:24Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://spoofzu.github.io/DeepViolet/ API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/releases Release Binaries]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5 Road Map(Beta 5]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/6 Unscheduled Features]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
None yet.  Fame, fortune, and security glory is within your grasp.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220917</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220917"/>
				<updated>2016-09-01T04:00:31Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://spoofzu.github.io/DeepViolet/, API JavaDocs]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/releases Release Binaries]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5, Road Map]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
None yet.  Fame, fortune, and security glory is within your grasp.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220916</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220916"/>
				<updated>2016-09-01T03:59:22Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/releases Release Binaries]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues/5, Road Map]&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
None yet.  Fame, fortune, and security glory is within your grasp.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220906</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220906"/>
				<updated>2016-08-31T18:57:37Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* OWASP DeepViolet TLS/SSL Scanner Code Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/releases Release Binaries]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[https://github.com/SamanthaGroves Slide Presentation tbd]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Video tbd]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
None yet.  Fame, fortune, and security glory is within your grasp.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220905</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220905"/>
				<updated>2016-08-31T18:50:55Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* How is DeepViolet Helpful? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning library/tool written in Java.  Use DeepViolet from the command line in your own *nix or Windows scripts. Alternatively, use the graphical user interface to scan HTTPS web servers from your desktop or include the DeepViolet API to include TLS/SSL scanning in your applications. Check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, DeepViolet was written as an educational tool.  A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/releases Release Binaries]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[https://github.com/SamanthaGroves Slide Presentation tbd]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Video tbd]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
None yet.  Fame, fortune, and security glory is within your grasp.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220904</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220904"/>
				<updated>2016-08-31T18:47:43Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* How is DeepViolet Helpful? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning library/tool written in Java.  Use DeepViolet from the command line in your own *nix or Windows scripts. Alternatively, use the graphical user interface to scan HTTPS web servers from your desktop or include the DeepViolet API to include TLS/SSL scanning in your applications. Check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/, OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, I wrote DeepViolet was written as an educational tool.  A tool to TLS/SSL protocols better and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL knowledge and provide other scanning projects with a Java solution with friendly licensing - DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/releases Release Binaries]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[https://github.com/SamanthaGroves Slide Presentation tbd]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Video tbd]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
None yet.  Fame, fortune, and security glory is within your grasp.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220903</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220903"/>
				<updated>2016-08-31T18:46:52Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning library/tool written in Java.  Use DeepViolet from the command line in your own *nix or Windows scripts. Alternatively, use the graphical user interface to scan HTTPS web servers from your desktop or include the DeepViolet API to include TLS/SSL scanning in your applications. Check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/,OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, I wrote DeepViolet was written as an educational tool.  A tool to TLS/SSL protocols better and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL knowledge and provide other scanning projects with a Java solution with friendly licensing - DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/releases Release Binaries]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[https://github.com/SamanthaGroves Slide Presentation tbd]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Video tbd]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
None yet.  Fame, fortune, and security glory is within your grasp.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220902</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220902"/>
				<updated>2016-08-31T18:45:33Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: /* Requirements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning library/tool written in Java.  Use DeepViolet from the command line in your own *nix or Windows scripts. Alternatively, use the graphical user interface to scan HTTPS web servers from your desktop or include the DeepViolet API to include TLS/SSL scanning in your applications. Check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/,OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, I wrote DeepViolet was written as an educational tool.  A tool to TLS/SSL protocols better and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL knowledge and provide other scanning projects with a Java solution with friendly licensing - DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/releases Release Binaries]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[https://github.com/SamanthaGroves Slide Presentation tbd]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Video tbd]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+  &lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
None yet.  Fame, fortune, and security glory is within your grasp.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220901</id>
		<title>OWASP DeepViolet TLS/SSL Scanner</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DeepViolet_TLS/SSL_Scanner&amp;diff=220901"/>
				<updated>2016-08-31T18:45:05Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: Change home page.  Include the DV why story.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DeepViolet TLS/SSL Scanner Code Project==&lt;br /&gt;
&lt;br /&gt;
DeepViolet is a TLS/SSL scanning library/tool written in Java.  Use DeepViolet from the command line in your own *nix or Windows scripts. Alternatively, use the graphical user interface to scan HTTPS web servers from your desktop or include the DeepViolet API to include TLS/SSL scanning in your applications. Check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and more.&lt;br /&gt;
&lt;br /&gt;
==How is DeepViolet Helpful?==&lt;br /&gt;
&lt;br /&gt;
Already great tools exist today for TLS/SSL scanning like, [https://www.ssllabs.com/ssltest/index.html, Qualys Labs], [https://observatory.mozilla.org/, Mozilla Observatory], [https://www.openssl.org/,OpenSSL].  Why do I care about DeepViolet?  A valid question and one I asked myself.  Originally, I wrote DeepViolet was written as an educational tool.  A tool to TLS/SSL protocols better and some of the issues around recent attack trends better.  The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools.  However,  it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs.  What better way to learn TLS/SSL knowledge and provide other scanning projects with a Java solution with friendly licensing - DeepViolet project was born.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Start ==&lt;br /&gt;
&lt;br /&gt;
See project [https://github.com/spoofzu/DeepViolet GitHub home page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/releases Release Binaries]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/spoofzu/DeepViolet/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[https://github.com/SamanthaGroves Slide Presentation tbd]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Video tbd]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
&lt;br /&gt;
Java SE 8+&lt;br /&gt;
Tested on OS X and Windows&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Leader(s) ==&lt;br /&gt;
&lt;br /&gt;
Milton Smith&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP Zed Attack Proxy Project]  &lt;br /&gt;
 &lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Security_Logging_Project OWASP Security Logging Project]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
Following are various frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Many Thanks==&lt;br /&gt;
&lt;br /&gt;
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://pornin@bolet.org/ email]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
&lt;br /&gt;
None yet.  Fame, fortune, and security glory is within your grasp.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&lt;br /&gt;
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  Project roadmap is tracked as GitHub project issues and labeled accordingly.  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Code Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Build Management===&lt;br /&gt;
Are you a GitHub ninja?  Into build management, setting up GitHub badges, Travis CI, etc.  Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
We are open to any thoughts you have to improve DeepViolet.  When you propose your idea be sure to include how you can help.  Ideas are great but execution is king.   Please send your comments or ideas to the project leader(s) or post it as a [https://github.com/spoofzu/DeepViolet/issues project issue].&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name = DeepViolet &lt;br /&gt;
| project_description = TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.&lt;br /&gt;
| project_license = [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License 2.0]&lt;br /&gt;
| leader_name1 = Milton Smith&lt;br /&gt;
| leader_email1 = milton.smith@owasp.org&lt;br /&gt;
| leader_username1 = [https://www.owasp.org/index.php/User:Miltonsmith Miltonsmith]&lt;br /&gt;
| mailing_list_name =[https://lists.owasp.org/mailman/listinfo/deepviolet https://lists.owasp.org/mailman/listinfo/deepviolet] &lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Milton_Smith_2016_Bio_%26_Why_Me%3F&amp;diff=220868</id>
		<title>Milton Smith 2016 Bio &amp; Why Me?</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Milton_Smith_2016_Bio_%26_Why_Me%3F&amp;diff=220868"/>
				<updated>2016-08-30T19:29:18Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: change to bio&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''About Milton:'''&lt;br /&gt;
&lt;br /&gt;
Milton Smith (California) is an application security security principal at Oracle working strategically to improve application security.  Milton is also a project leader for both the OWASP Security Logging Project and the DeepViolet for SSL/TLS scanner project.  Prior to Oracle, Milton lead security for Yahoo's User Data Analytics property.  For more information visit, securitycurmudgeon.com or follow Milton on Twitter(@spoofzu).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Why I would like to be elected to the Global OWASP Foundation Board of Directors'''&lt;br /&gt;
&lt;br /&gt;
Many organizations throughout industry struggle with security. In fact, hardly a day passes without news of serious exploitation. Many outside our industry feel security is hopeless no matter how much investment is applied. As application security professionals we know this is not true. Security can be so much better than it is today! We don’t fail because we fall short on ideas for positive improvement. We fall short on resources and implementation. Many industries don’t invest in application security to a level commensurate with their risk and exposure. The auto industry does not get to decide if cars will include seat belts or air bags. Business owners don’t get to decide if buildings will include fire alarms and sprinkler systems. We don’t leave these decisions to organization executives. Application security must be treated similarly. It’s my strong desire to influence industry in ways encouraging more positive security outcomes for organizations and security practitioners.&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Session_Management_Cheat_Sheet&amp;diff=220794</id>
		<title>Talk:Session Management Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Session_Management_Cheat_Sheet&amp;diff=220794"/>
				<updated>2016-08-27T15:57:19Z</updated>
		
		<summary type="html">&lt;p&gt;Miltonsmith: Session ID Name Fingerprinting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm in the process of reviewing and working on some session management and came across your cheat sheet.  I think you should consider dropping the section, &amp;quot;Session ID Name Fingerprinting&amp;quot;.  My reason, is that I don't believe it's very practical advice for most people.  The session identifiers like, &amp;quot;JSESSIONID&amp;quot; are dictated by industry standards and driven by implementation.  Perhaps you have another point your trying to make but I missed it.  By the way, I like your session management cheat sheet and consider it a valuable resource for all developers.&lt;/div&gt;</summary>
		<author><name>Miltonsmith</name></author>	</entry>

	</feed>