Testing TLS/SSL encryption anywhere on any port. https://testssl.sh/
Go to file
2014-09-01 10:21:31 +02:00
openssl-bins Update Readme.md 2014-07-18 22:48:46 +02:00
bash-heartbleed.changelog.txt - first try to commit here 2014-07-01 16:28:16 +02:00
bash-heartbleed.sh - first try to commit here 2014-07-01 16:28:16 +02:00
ccs-injection.sh - first try to commit here 2014-07-01 16:28:16 +02:00
CHANGELOG.txt 2014-07-16 19:06:26 +02:00
LICENSE Initial commit 2014-07-01 13:55:26 +02:00
mapping-rfc.txt - fortezza added 2014-08-29 15:10:39 +02:00
openssl-rfc.mappping.html - update for 0x9? 2014-08-29 15:06:05 +02:00
Readme.md Update Readme.md 2014-09-01 10:21:31 +02:00
testssl.sh * added ocsp stapling in server defaults test 2014-08-29 14:57:20 +02:00
testssl.sh.asc * added ocsp stapling in server defaults test 2014-08-29 15:01:00 +02:00

Intro

testssl.sh is a free Unix command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws. It's designed to provide clear output for a "is this good or bad" decision.

It is working on every Linux distribution which has OpenSSL, /bin/bash and standard tools like GNU sed and awk installed.

On github (here) you will find development versions of the software -- with new features and maybe some bugs. The stable version and a more thorough description please see http://testssl.sh/

I am happy for any help.