Quicklinks: Home Contact


G-SEC™ regularly publishes advisories about vulnerabilities that we discovered during our research. G-SEC™ tries to follow responsible disclosure guidelines whenever possible.

More information »


These Proof of Concept files are related to the TLS renegotiation vulnerability. All information related to these files and the vulnerability can be found in out whitepaper entitled "TLS and SSLv3 vulnerabilities explained"

POC files

  • Injecting responses into SSLv3/TLS streams : ssl-trace-poc.c
  • Downgrading HTTPS to HTTP to perform active Man-in-the-middle attacks: ssl-302-inp.c
  • Whitepaper "TLS and SSLv3 vulnerabilities explained"

    Note: All trademarks mentioned herein belong to their respective owners.