CLI SSLchecker
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
Elektroll 6279a4670c '' ändern 3 months ago
LICENSE update repo 3 months ago '' ändern 3 months ago
screenshot.png update repo 3 months ago
screenshot2.png update repo 3 months ago
sslchecker update repo 3 months ago
sslchecker.png update repo 3 months ago


sslcheker is wrapper written in bash for openssl and nmap, which checks the ssl certs and used TLS ciphers of a host. This tool checks when a certificate has been valid and when it expires. Also you get the information about the CA, for which domains the SSL certificate is valid and the IP adresse and PTR Record of the host.


Copy this repository

git clone

or download the script file with wget


or with curl

curl -o ./sslchecker

If you want and trust me, you may also download the file into /usr/bin/ so you can run it global

sudo curl -o /usr/bin/sslchecker``` and make it executable ```sudo chmod +x /usr/bin/sslchecker

In this case you can update the script file by running sslchecker with the -u option.


Usage: sslchecker [options]
  -f    local file
  -h    remote host
  -p    custome port
  -c    list ciphers
  -u    update sslchecker
  -v    show version
  --help show this help page

SSL Certificates

The local file option give you an overview about certificate file. Just use sslchecker -f [/path/to/file] With the -h [host] option you can check the ssl certificate of a remote host, like

If your application runs on another port number, you may set the port with the -p [port] option.

sslchecker -h -p 8443

TLS Ciphers

To get a list of used ciphers of the use the -c [host] option.


The update option -u will download the script file from github into /usr/bin/. If you don't drop the script file into this path, the update option will. You need root priviliges for this.