Testing TLS/SSL encryption anywhere on any port. https://testssl.sh/
Go to file
Dirk Wetter 10aef1ad93 - this is devel, signature @ production release only 2014-09-25 16:23:41 +02:00
openssl-bins Update Readme.md 2014-07-18 22:48:46 +02:00
CHANGELOG.txt 2014-07-16 19:06:26 +02:00
LICENSE Initial commit 2014-07-01 13:55:26 +02:00
Readme.md Update Readme.md 2014-09-01 10:22:48 +02:00
bash-heartbleed.changelog.txt - first try to commit here 2014-07-01 16:28:16 +02:00
bash-heartbleed.sh - first try to commit here 2014-07-01 16:28:16 +02:00
ccs-injection.sh - first try to commit here 2014-07-01 16:28:16 +02:00
mapping-rfc.txt - fortezza added 2014-08-29 15:10:39 +02:00
openssl-rfc.mappping.html - update for 0x9? 2014-08-29 15:06:05 +02:00
testssl.sh - only numbers for hsts (thx to Olivier) 2014-09-24 11:17:28 +02:00

Readme.md

Intro

testssl.sh is a free Unix command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws. It's designed to provide clear output for a "is this good or bad" decision.

It is working on every Linux distribution which has OpenSSL, /bin/bash and standard tools like GNU sed and awk installed.

On github (here) you will find development versions of the software -- with new features and maybe some bugs. For the stable version and a more thorough description of the software please see http://testssl.sh/ .

Contributions, feedback, also bug reports are welcome.