http://open-source-security-software.net/project/Android-SSL-TrustKiller/releases.atomRecent releases for Android-SSL-TrustKiller2025-07-16T16:10:11.997376+00:00python-feedgenAndroid-SSL-TrustKiller v1Android-SSL-TrustKiller v12013-12-14T18:09:04+00:00Initial release.
2013-12-14T18:09:04+00:00Android-SSL-TrustKiller v1.3.1Android-SSL-TrustKiller v1.3.12014-05-20T14:54:01+00:00Now builds against NSRL RDS 2.44m.
2014-05-20T14:54:01+00:00Android-SSL-TrustKiller 1.4Android-SSL-TrustKiller 1.42014-06-22T05:24:59+00:00The build process has been pretty thoroughly overhauled. nsrlsvr will no longer try to grab a copy of the RDS with each compile. This seemed like a good idea but turned out not to be, since it meant nsrlsvr versions had to be released quickly after each new NSRL RDS release. Two new tools have been added, nsrlupdate and nsrlappend, which will help users keep current: to update to the latest NSRL RDS, just download the zipfile and run "nsrlupdate /path/to/rds".
2014-06-22T05:24:59+00:00Android-SSL-TrustKiller 1.6RC1Android-SSL-TrustKiller 1.6RC12015-04-01T21:38:54+00:00The changes I tried to make in 1.5 turned out to be something of a disaster, so I radically simplified the code and took it back to basics. Along the way, I updated it to work with the new C++14 standard. In this release CPU utilization is down (_way_ down, in some cases) and the codebase has been simplified, clarified, and better documented.
Some features were removed due to nobody using them -- and when I say "nobody", I mean _nobody_. Reviewing the last year of logs on the public server at nsrllookup.com found that I was the only one using these features.
Removed in 1.6:
- Can no longer query the server to get load information or number of hashes in the DB
- Protocol 1.0 is no longer supported; must use 2.0 (not a problem, as everyone does)
- Can no longer start as a normal process -- must start as a daemon
- No longer supports shutting down after a user-defined period of inactivity
2015-04-01T21:38:54+00:00Android-SSL-TrustKiller 1.6RC2Android-SSL-TrustKiller 1.6RC22015-08-20T02:15:07+00:00Some non-C++14 code snuck in by accident. (I swear, I thought Concepts Lite had been accepted by the Committee.) This led to it compiling on some systems and not on others, depending entirely on whether the compiler supported using 'auto' for function parameters.
2015-08-20T02:15:07+00:00Android-SSL-TrustKiller 1.6Android-SSL-TrustKiller 1.62015-10-06T04:34:52+00:001.6 is finally ready for production use. There was an annoying bug which was causing the -RCs to leak file handles, but that bug was finally found and killed. Enjoy the code, guys!
2015-10-06T04:34:52+00:00Android-SSL-TrustKiller 1.6.1Android-SSL-TrustKiller 1.6.12016-10-29T22:16:37+00:00This completes the switchover to CMake. Further, program options are now parsed using Boost::Program_Options. Feature requests #12 , #11 are now implemented, and --dry-run provides most of what was asked for in #9 .
Further, a pre-built binary for Fedora 24 (x86_64 only) is now available.
2016-10-29T22:16:37+00:00