CLI SSLchecker
Go to file
Kaisa Marysia cb1df859e0 „“ ändern 2022-03-26 08:17:33 +01:00
LICENSE update repo 2021-10-29 18:05:35 +02:00 „“ ändern 2022-03-26 08:17:33 +01:00
screenshot.png update repo 2021-10-29 18:05:35 +02:00
screenshot2.png update repo 2021-10-29 18:05:35 +02:00
sslchecker Version Update 2022-03-26 08:14:22 +01:00
sslchecker.png update repo 2021-10-29 18:05:35 +02:00


sslcheker is wrapper written in bash for openssl and nmap, which checks the ssl certs and used TLS ciphers of a host. This tool checks when a certificate has been valid and when it expires. Also you get the information about the CA, for which domains the SSL certificate is valid and the IP adresse and PTR Record of the host.


Copy this repository

git clone

or download the script file with wget


or with curl

curl -o ./sslchecker

If you want and trust me, you may also download the file into /usr/bin/ so you can run it global

sudo curl -o /usr/bin/sslchecker

and make it executable

sudo chmod +x /usr/bin/sslchecker

In this case you can update the script file by running sslchecker with the -u option.


Usage: sslchecker [options]
  -f    local file
  -h    remote host
  -p    custome port
  -c    list ciphers
  -u    update sslchecker
  -v    show version
  --help show this help page

SSL Certificates

The local file option give you an overview about certificate file. Just use sslchecker -f [/path/to/file] With the -h [host] option you can check the ssl certificate of a remote host, like

If your application runs on another port number, you may set the port with the -p [port] option.

sslchecker -h -p 8443

TLS Ciphers

To get a list of used ciphers of the use the -c [host] option.


The update option -u will download the script file from github into /usr/bin/. If you don't drop the script file into this path, the update option will. You need root priviliges for this.