You're Invited:Meet the Socket Team at BlackHat and DEF CON in Las Vegas, Aug 7-8.RSVP
Socket
Socket
Sign inDemoInstall

ssl-sniffer

Package Overview
Dependencies
Maintainers
1
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

ssl-sniffer

A command line tool that checks if hosts have valid SSL certificates for port 443.


Maintainers
1

Readme

SSL-Sniffer

SSL Sniffer is a command line tool that checks if hosts have valid SSL certificates for port 443. It is a Python tool that can be installed using pip.

Installation

To install SSL Sniffer, you can run the following command:

pip install ssl_sniffer

Usage

To use SSL Sniffer, you can run the following command:

ssl_sniffer [hosts]

The hosts argument is a list of hosts that you want to check. For example, to check the hosts www.example.com, www.google.com, and www.yahoo.com, you would run the following command:

ssl_sniffer www.example.com www.google.com www.yahoo.com

Output SSL Sniffer will print a message for each host that it checks. If the host has a valid SSL certificate, the message will say "The host has a valid SSL certificate for port 443.". If the host does not have a valid SSL certificate, the message will say "The host does not have a valid SSL certificate for port 443.".

Author SSL Sniffer was created by @thatonesecguy.

License SSL Sniffer is licensed under the MIT License.

FAQs


Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc