All Projects → drwetter → Testssl.sh

drwetter / Testssl.sh

Licence: gpl-2.0
Testing TLS/SSL encryption anywhere on any port

Programming Languages

shell
77523 projects
HTML
75241 projects
perl
6916 projects

Projects that are alternatives of or similar to Testssl.sh

docker-testssl
http://testssl.sh/ in a tiny docker container
Stars: ✭ 19 (-99.67%)
Mutual labels:  tls, hsts, socket, cipher, crime, rc4, poodle, ocsp, hpkp, caa, bigip, ct, ticketbleed, heartbleed, freak, logjam, drown
tlsassistant
Fully-featured tool that combines state-of-the-art TLS analyzers with a report system that suggests appropriate mitigations and shows the full set of viable attacks.
Stars: ✭ 24 (-99.58%)
Mutual labels:  tls, hsts, robot, crime, rc4, poodle, drown
Tls Channel
A Java library that implements a ByteChannel interface over SSLEngine, enabling easy-to-use (socket-like) TLS for Java applications.
Stars: ✭ 113 (-98.01%)
Mutual labels:  socket, ssl, tls, openssl
Openssl
TLS/SSL and crypto library
Stars: ✭ 17,157 (+202.27%)
Mutual labels:  ssl, tls, openssl
Lua Openssl
Openssl binding for Lua
Stars: ✭ 206 (-96.37%)
Mutual labels:  ssl, openssl, cipher
Sslyze
Fast and powerful SSL/TLS scanning library.
Stars: ✭ 2,623 (-53.79%)
Mutual labels:  ssl, tls, heartbleed
Ssl Checker
Python script that collects SSL/TLS information from hosts
Stars: ✭ 94 (-98.34%)
Mutual labels:  ssl, tls, openssl
Beetlex
high performance dotnet core socket tcp communication components, support TLS, HTTP, HTTPS, WebSocket, RPC, Redis protocols, custom protocols and 1M connections problem solution
Stars: ✭ 802 (-85.87%)
Mutual labels:  socket, ssl, tls
cryptonice
CryptoNice is both a command line tool and library which provides the ability to scan and report on the configuration of SSL/TLS for your internet or internal facing web services. Built using the sslyze API and ssl, http-client and dns libraries, cryptonice collects data on a given domain and performs a series of tests to check TLS configuration…
Stars: ✭ 91 (-98.4%)
Mutual labels:  tls, ssl, hsts
openssl-ca
Shell scripts to manage a private Certificate Authority using OpenSSL
Stars: ✭ 38 (-99.33%)
Mutual labels:  tls, ssl, openssl
httpsbook
《深入浅出HTTPS:从原理到实战》代码示例、勘误、反馈、讨论
Stars: ✭ 77 (-98.64%)
Mutual labels:  tls, ssl, openssl
tls-ca-manage
Multi-level Certificate Authority Management tool, front-end tool to OpenSSL, written in bash shell.
Stars: ✭ 19 (-99.67%)
Mutual labels:  ssl, openssl, ocsp
Tlsfuzzer
SSL and TLS protocol test suite and fuzzer
Stars: ✭ 335 (-94.1%)
Mutual labels:  robot, ssl, tls
Mutual Tls Ssl
🔐 Tutorial of setting up Security for your API with one way authentication with TLS/SSL and mutual mutual authentication for a java based web server and a client with both Spring Boot. Different clients are provided such as Apache HttpClient, OkHttp, Spring RestTemplate, Spring WebFlux WebClient Jetty and Netty, the old and the new JDK HttpClient, the old and the new Jersey Client, Google HttpClient, Unirest, Retrofit, Feign, Methanol, vertx, Scala client Finagle, Featherbed, Dispatch Reboot, AsyncHttpClient, Sttp, Akka, Requests Scala, Http4s Blaze, Kotlin client Fuel, http4k, Kohttp and ktor. Also other server examples are available such as jersey with grizzly. Also gRPC examples are included
Stars: ✭ 163 (-97.13%)
Mutual labels:  ssl, tls, openssl
Snuffy
Snuffy is a simple command line tool to inspect SSL/TLS data.
Stars: ✭ 236 (-95.84%)
Mutual labels:  ssl, tls, openssl
Search Guard Ssl
Elasticsearch SSL for free. Supports native Open SSL.
Stars: ✭ 159 (-97.2%)
Mutual labels:  ssl, tls, openssl
Pyopenssl
A Python wrapper around the OpenSSL library
Stars: ✭ 701 (-87.65%)
Mutual labels:  ssl, tls, openssl
Wolfssl
wolfSSL (formerly CyaSSL) is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. wolfSSL supports up to TLS 1.3!
Stars: ✭ 1,098 (-80.66%)
Mutual labels:  ssl, tls, openssl
jruby-openssl
JRuby's OpenSSL gem
Stars: ✭ 39 (-99.31%)
Mutual labels:  tls, ssl, openssl
openssl-RPM-Builder
Build latest OpenSSL binary
Stars: ✭ 46 (-99.19%)
Mutual labels:  tls, ssl, openssl

Intro

Build Status Gitter License Docker

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.

Key features

  • Clear output: you can tell easily whether anything is good or bad.
  • Machine readable output (CSV, two JSON formats)
  • No need to install or to configure something. No gems, CPAN, pip or the like.
  • Works out of the box: Linux, OSX/Darwin, FreeBSD, NetBSD, MSYS2/Cygwin, WSL (bash on Windows). Only OpenBSD needs bash.
  • A Dockerfile is provided, there's also an official container build @ dockerhub.
  • Flexibility: You can test any SSL/TLS enabled and STARTTLS service, not only web servers at port 443.
  • Toolbox: Several command line options help you to run your test and configure your output.
  • Reliability: features are tested thoroughly.
  • Privacy: It's only you who sees the result, not a third party.
  • Freedom: It's 100% open source. You can look at the code, see what's going on.
  • The development is open (GitHub) and participation is welcome.

License

This software is free. You can use it under the terms of GPLv2, see LICENSE.

Attribution is important for the future of this project -- also in the internet. Thus if you're offering a scanner based on testssl.sh as a public and/or paid service in the internet you are strongly encouraged to mention to your audience that you're using this program and where to get this program from. That helps us to get bugfixes, other feedback and more contributions.

Compatibility

Testssl.sh is working on every Linux/BSD distribution out of the box. Latest by 2.9dev most of the limitations of disabled features from the openssl client are gone due to bash-socket-based checks. As a result you can also use e.g. LibreSSL or OpenSSL >= 1.1.1 . testssl.sh also works on other unixoid systems out of the box, supposed they have /bin/bash >= version 3.2 and standard tools like sed and awk installed. An implicit (silent) check for binaries is done when you start testssl.sh . System V needs probably to have GNU grep installed. MacOS X and Windows (using MSYS2, Cygwin or WSL) work too.

Update notification here or @ twitter.

Installation

You can download testssl.sh branch 3.1dev just by cloning this git repository:

git clone --depth 1 https://github.com/drwetter/testssl.sh.git

Think of 3.1dev like a rolling release, see below. For the stable version help yourself by downloading the ZIP or tar.gz archive. Just cd to the directory created (=INSTALLDIR) and run it off there.

Docker

Testssl.sh has minimal requirements. As stated you don't have to install or build anything. You can just run it from the pulled/cloned directory. Still if you don't want to pull the GitHub repo to your directory of choice you can pull a container from dockerhub and run it:

docker run --rm -ti  drwetter/testssl.sh <your_cmd_line>

Or if you have cloned this repo you also can just cd to the INSTALLDIR and run

docker build . -t imagefoo && docker run --rm -t imagefoo example.com

For more please consult Dockerfile.md.

Status

We're currently in the development phase, version 3.1dev. 3.1dev will eventually become 3.2. Bigger features are developed in a separate branch before merged into 3.1dev to avoid hiccups or inconsistencies. Albeit we try to keep 3.1dev as solid as possible things will certainly change in 3.1dev. Think of the 3.1dev branch like a rolling release. So if you need stability the 3.0 branch is better for you.

Version 3.0.X receives bugfixes, labeled as 3.0.1, 3.0.2 and so on. This will happen until 3.2 is released.

Support for 2.9.5 has been dropped. Supported is >= 3.0.x only.

Documentation

  • .. it is there for reading. Please do so :-) -- at least before asking questions. See man page in groff, html and markdown format in ~/doc/.
  • https://testssl.sh/ will help to get you started.
  • For the (older) version 2.8 will Hunt provides a longer, good description, including useful background info.

Contributing

Contributions are welcome! See CONTRIBUTING.md for details. Please also have a look at the Coding Convention.

Bug reports

Bug reports are important. It makes this project more robust.

Please file bugs in the issue tracker @ GitHub. Do not forget to provide detailed information, see template for issue, and further details @ https://github.com/drwetter/testssl.sh/wiki/Bug-reporting. Nobody can read your thoughts -- yet. And only agencies your screen ;-)

You can also debug yourself, see here.


External/related projects

Please address questions not specifically to the code of testssl.sh to the respective projects below.

Web frontend

Free to use Web frontend + commercial API

Mass scanner w parallel scans and elastic searching the results

Another ready-to-go docker image is at:

Privacy checker using testssl.sh

Nagios / Icinga Plugins

Brew package

Daemon for batch execution of testssl.sh command files

Daemon for batch processing of testssl.sh JSON result files for sending Slack alerts, reactive copying etc

GitHub Actions

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].