http://open-source-security-software.net/project/Android-SSL-TrustKiller/releases.atom Recent releases for Android-SSL-TrustKiller 2025-07-16T16:10:11.997376+00:00 python-feedgen Android-SSL-TrustKiller v1 Android-SSL-TrustKiller v1 2013-12-14T18:09:04+00:00 Initial release. 2013-12-14T18:09:04+00:00 Android-SSL-TrustKiller v1.3.1 Android-SSL-TrustKiller v1.3.1 2014-05-20T14:54:01+00:00 Now builds against NSRL RDS 2.44m. 2014-05-20T14:54:01+00:00 Android-SSL-TrustKiller 1.4 Android-SSL-TrustKiller 1.4 2014-06-22T05:24:59+00:00 The build process has been pretty thoroughly overhauled. nsrlsvr will no longer try to grab a copy of the RDS with each compile. This seemed like a good idea but turned out not to be, since it meant nsrlsvr versions had to be released quickly after each new NSRL RDS release. Two new tools have been added, nsrlupdate and nsrlappend, which will help users keep current: to update to the latest NSRL RDS, just download the zipfile and run "nsrlupdate /path/to/rds". 2014-06-22T05:24:59+00:00 Android-SSL-TrustKiller 1.6RC1 Android-SSL-TrustKiller 1.6RC1 2015-04-01T21:38:54+00:00 The changes I tried to make in 1.5 turned out to be something of a disaster, so I radically simplified the code and took it back to basics. Along the way, I updated it to work with the new C++14 standard. In this release CPU utilization is down (_way_ down, in some cases) and the codebase has been simplified, clarified, and better documented. Some features were removed due to nobody using them -- and when I say "nobody", I mean _nobody_. Reviewing the last year of logs on the public server at nsrllookup.com found that I was the only one using these features. Removed in 1.6: - Can no longer query the server to get load information or number of hashes in the DB - Protocol 1.0 is no longer supported; must use 2.0 (not a problem, as everyone does) - Can no longer start as a normal process -- must start as a daemon - No longer supports shutting down after a user-defined period of inactivity 2015-04-01T21:38:54+00:00 Android-SSL-TrustKiller 1.6RC2 Android-SSL-TrustKiller 1.6RC2 2015-08-20T02:15:07+00:00 Some non-C++14 code snuck in by accident. (I swear, I thought Concepts Lite had been accepted by the Committee.) This led to it compiling on some systems and not on others, depending entirely on whether the compiler supported using 'auto' for function parameters. 2015-08-20T02:15:07+00:00 Android-SSL-TrustKiller 1.6 Android-SSL-TrustKiller 1.6 2015-10-06T04:34:52+00:00 1.6 is finally ready for production use. There was an annoying bug which was causing the -RCs to leak file handles, but that bug was finally found and killed. Enjoy the code, guys! 2015-10-06T04:34:52+00:00 Android-SSL-TrustKiller 1.6.1 Android-SSL-TrustKiller 1.6.1 2016-10-29T22:16:37+00:00 This completes the switchover to CMake. Further, program options are now parsed using Boost::Program_Options. Feature requests #12 , #11 are now implemented, and --dry-run provides most of what was asked for in #9 . Further, a pre-built binary for Fedora 24 (x86_64 only) is now available. 2016-10-29T22:16:37+00:00