There are 3 repositories under ocsp topic.
Testing TLS/SSL encryption anywhere on any port
The 'jsrsasign' (RSA-Sign JavaScript Library) is an opensource free cryptography library supporting RSA/RSAPSS/ECDSA/DSA signing/validation, ASN.1, PKCS#1/5/8 private/public key, X.509 certificate, CRL, OCSP, CMS SignedData, TimeStamp, CAdES and JSON Web Signature/Token in pure JavaScript.
PKI.js is a pure JavaScript library implementing the formats that are used in PKI applications (signing, encryption, certificate requests, OCSP and TSP requests/responses). It is built on WebCrypto (Web Cryptography API) and requires no plug-ins.
Python ASN.1 library with a focus on performance and a pythonic API
Sockets with pure VB6 impl of TLS encryption
Django app providing a Certificate Authority
wolfSSL JSSE provider and JNI wrapper for SSL/TLS, supporting up to TLS 1.3!
NodePKI is a simple NodeJS based PKI manager for small corporate environments.
Multi-level Certificate Authority Management tool, front-end tool to OpenSSL, written in bash shell.
OCSP-Checker provides an automated means to check the OCSP revocation status for a x509 digital certificate.
Privacy-Preserving Noise Machine for Apple Developer ID OCSP
Certgrinder is a client/server system for getting LetsEncrypt certificates for your infrastructure. ACME challenges are handled by the Certgrinder server, making it possible to get certificates in highly isolated environments, since only an SSH connection to the Certgrinder server is needed.
OCSP responder written in Go meant to be used with easy-rsa
A tool that primes the OCSP cache of nginx for certificates managed by Certbot, in order to make OCSP stapling work reliably.
SMTP DANE testing tool
http://testssl.sh/ in a tiny docker container
A .NET facility to create an OCSP Responder. Written in C# under netstandard it has support for .NET Full and .NET Core
Certificate Revocation check support for caddy
OCSP Server for Google Cloud Certificate Service
Obtain the (revocation) status of an X.509 certificate.
a caching ocsp proxy. It accepts ocsp requests from any client, e.g. an ssl-webserver, and forwards the request to the corresponding ocsp responders or returns the ocsp response from cache. Can be used to mitigate unreliable ocsp responders that are, as required by murphy's law, always down when needed.
Ansible based hooks for dehydrated to enable ACME certificate automation for F5 BIG-IP systems
A simple OCSP responder built with ASP.NET Core.
freeRADIUS setup to authenticate Azure AD Joined Devices with EAP-TLS