1. Shadowsocks. https://shadowsocks.org/
2. TLS-Attacker. https://github.com/tls-attacker/TLS-Attacker
3. TLS-Scanner. https://github.com/tls-attacker/TLS-Scanner
4. Albertini, A., Duong, T., Gueron, S., Kölbl, S., Luykx, A., Schmieg, S.: How to abuse and fix authenticated encryption without key commitment. In: Butler, K.R.B., Thomas, K. (eds.) USENIX Security 2022: 31st USENIX Security Symposium, Boston, MA, USA, 10–12 August 2022, pp. 3291–3308. USENIX Association (2022)
5. Arfaoui, G., Bultel, X., Fouque, P.A., Nedelcu, A., Onete, C.: The privacy of the TLS 1.3 protocol. Proc. Priv. Enhanc. Technol. 2019(4), 190–210 (2019). https://doi.org/10.2478/popets-2019-0065