||3 months ago|
|LICENSE||8 months ago|
|README.md||3 months ago|
|screenshot.png||8 months ago|
|screenshot2.png||8 months ago|
|sslchecker||3 months ago|
|sslchecker.png||8 months ago|
sslcheker is wrapper written in bash for openssl and nmap, which checks the ssl certs and used TLS ciphers of a host. This tool checks when a certificate has been valid and when it expires. Also you get the information about the CA, for which domains the SSL certificate is valid and the IP adresse and PTR Record of the host.
Copy this repository
git clone https://git.elektrollart.org/Elektroll/sslchecker
or download the script file with wget
or with curl
curl https://git.elektrollart.org/Elektroll/sslchecker/raw/branch/master/sslchecker -o ./sslchecker
If you want and trust me, you may also download the file into
/usr/bin/ so you can run it global
sudo curl https://git.elektrollart.org/Elektroll/sslchecker/raw/branch/master/sslchecker -o /usr/bin/sslchecker
and make it executable
sudo chmod +x /usr/bin/sslchecker
In this case you can update the script file by running
sslchecker with the
Usage: sslchecker [options] Options: -f local file -h remote host -p custome port -c list ciphers -u update sslchecker -v show version --help show this help page
The local file option give you an overview about certificate file. Just use
sslchecker -f [/path/to/file]
-h [host] option you can check the ssl certificate of a remote host, like github.com.
If your application runs on another port number, you may set the port with the
-p [port] option.
sslchecker -h github.com -p 8443
To get a list of used ciphers of the use the
-c [host] option.
The update option
-u will download the script file from github into
/usr/bin/. If you don't drop the script file into this path, the update option will. You need root priviliges for this.