https://github.com/hannob/tlshelpers
A collection of scripts that help handling X.509 certificate and TLS issues
https://github.com/hannob/tlshelpers
Last synced: 15 days ago
JSON representation
A collection of scripts that help handling X.509 certificate and TLS issues
- Host: GitHub
- URL: https://github.com/hannob/tlshelpers
- Owner: hannob
- License: 0bsd
- Created: 2017-07-20T12:34:32.000Z (almost 8 years ago)
- Default Branch: main
- Last Pushed: 2025-02-15T08:31:58.000Z (2 months ago)
- Last Synced: 2025-03-29T08:07:20.151Z (22 days ago)
- Language: Shell
- Homepage:
- Size: 28.3 KB
- Stars: 127
- Watchers: 8
- Forks: 26
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-security-collection - **89**星
README
tlshelpers
==========A collection of scripts that help handling X.509 certificate and TLS issues
matchcertkey
------------Check whether a private key belongs to a certificate.
It will check three things:
* Internal consistency of private key.
* Does SPKI SHA256 hash match?
* Can a test signature be verified?Many existing tools and guides only check whether the public key part of the private key
matches and don't really check the private key.fakekey
-------Creates a private key for an existing certificate that looks like a real key if not
checked properly.Requires the [der2ascii/ascii2der](https://github.com/google/der-ascii) tools by David
Benjamin.ocspverify
----------Checks OCSP status of certificates with a single command.
It will automatically extract the issuer certificate and OCSP url via AIA.
getsubdomain
------------Gets all subdomains to a domain by querying the database of the [crt.sh](https://crt.sh)
Certificate Transparency search engine.examples
--------The [examples](examples/) subdirectory contains an existing certificate (from symantec)
and a corresponding fake private key.