SHA1 signature algorithm is considered to be insecure these days because of its vulnerability towards collision attacks. Attackers can exploit this to generate another certificate with same digital signature, allowing them to disguise and pretend themselves as official authority and affect the actual services.
So replaced the SHA1 algorithm with SHA512 in sublist3r.py file at line no 555 to strengthen the security aspects of the digital certificate verification purpose.
SHA1 signature algorithm is considered to be insecure these days because of its vulnerability towards collision attacks. Attackers can exploit this to generate another certificate with same digital signature, allowing them to disguise and pretend themselves as official authority and affect the actual services. So replaced the SHA1 algorithm with SHA512 in sublist3r.py file at line no 555 to strengthen the security aspects of the digital certificate verification purpose.