Testing TLS/SSL encryption anywhere on any port. https://testssl.sh/
Go to file
2014-12-19 17:02:26 +01:00
openssl-bins Update Readme.md 2014-11-24 16:43:11 +01:00
bash-heartbleed.changelog.txt - first try to commit here 2014-07-01 16:28:16 +02:00
bash-heartbleed.sh - increase first read buffer -- otherwise it's how up at hb reply and lead to false positives 2014-11-20 18:55:51 +01:00
ccs-injection.sh better documentation 2014-11-03 21:45:48 +01:00
CHANGELOG.txt 2014-07-16 19:06:26 +02:00
checkcert.sh - for clarification hint to license file 2014-10-07 11:15:05 +02:00
CREDITS.md @oparoz 2014-11-19 13:26:48 +01:00
LICENSE Initial commit 2014-07-01 13:55:26 +02:00
mapping-rfc.txt - stripping of leading 0 in testssl.sh needed to be reflected by this file 2014-11-18 11:04:57 +01:00
openssl-rfc.mappping.html TLS_FALLBACK_SCSV 2014-10-30 21:14:50 +01:00
Readme.md Update Readme.md 2014-12-09 14:25:38 +01:00
testssl.sh - tempfile handling: every function leaves one, if DEBUG is set 2014-12-19 17:02:26 +01:00

Intro

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws. It's designed to provide clear output for a "is this good or bad" decision.

It is working on every Linux distribution, MacOS X and Windows (using MSYS2) which has OpenSSL, /bin/bash and standard tools like GNU sed and awk installed.

On github (here) you will find development versions of the software -- with new features and maybe some bugs. For the stable version and a more thorough description of the software please see http://testssl.sh/ .

Contributions, feedback, also bug reports are welcome.