A command line tool that checks if hosts have valid SSL certificates for port 443.
Project description
# SSL-Sniffer SSL Sniffer is a command line tool that checks if hosts have valid SSL certificates for port 443. It is a Python tool that can be installed using pip.
## Installation
To install SSL Sniffer, you can run the following command:
pip install ssl_sniffer
## Usage
To use SSL Sniffer, you can run the following command:
ssl_sniffer [hosts]
The hosts argument is a list of hosts that you want to check. For example, to check the hosts www.example.com, www.google.com, and www.yahoo.com, you would run the following command:
ssl_sniffer www.example.com www.google.com www.yahoo.com
Output SSL Sniffer will print a message for each host that it checks. If the host has a valid SSL certificate, the message will say “The host <host> has a valid SSL certificate for port 443.”. If the host does not have a valid SSL certificate, the message will say “The host <host> does not have a valid SSL certificate for port 443.”.
Author SSL Sniffer was created by @thatonesecguy.
License SSL Sniffer is licensed under the MIT License.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file ssl_sniffer-0.1.0.tar.gz.
File metadata
- Download URL: ssl_sniffer-0.1.0.tar.gz
- Upload date:
- Size: 2.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.11.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
d4211ce9ab795152c6cb43bf56d0e235d28f655a24108db19f40bb968b035f4c
|
|
| MD5 |
1ca442ca4a742d54f59434c8d86e25d4
|
|
| BLAKE2b-256 |
cf9bcb37c1075c8e83fb0c5ccf9726915db08ad2512741e023fe822d00b97b15
|