testssl.sh (drwetter/testssl.sh) is an open-source BASH script for deep TLS testing since 2014. Covers cipher suites, vulnerabilities (Heartbleed, BEAST, CRIME, POODLE), HSTS, HPKP. Downsides: CLI-only, needs Linux + bash 4, no web UI. Point-and-click alternatives: Enterno.io SSL, SSL Labs, Hardenize, ImmuniWeb Community.
Below: competitor overview, feature-by-feature comparison, when Enterno.io wins, FAQ.
testssl.sh built by Dirk Wetter in 2014. Open-source (GitHub drwetter/testssl.sh). Bash script using openssl + curl for deep probes. Covers ≈40 vulnerability checks. Free, CLI-only.
| Feature | Enterno.io | Competitor |
|---|---|---|
| Web UI | ✅ | ❌ CLI only |
| Vulnerability tests (Heartbleed, BEAST, CRIME) | ⚠️ partial | ✅ comprehensive |
| Cipher suite enumeration | ✅ | ✅ |
| HSTS check | ✅ | ✅ |
| Self-hostable | ❌ | ✅ |
| Scriptable for CI/CD | ⚠️ API Pro | ✅ bash |
| Rate limit | 30/min free | your machine |
| Mass-domain scan | ✅ Pro | ✅ bash loop |
SSL/TLS is the encryption protocol that protects data between the browser and server. Our tool analyzes the certificate, chain of trust, TLS version, and knownvulnerabilities.
Issuer, validity period, signature algorithm, covered domains (SAN), and validation type (DV/OV/EV).
Full chain verification: from leaf certificate through intermediates to root CA.
Protocol version (TLS 1.2/1.3), cipher suites, Perfect Forward Secrecy (PFS) support.
Set up a monitor — get Telegram and email alerts 30/14/7 days before expiration.
SSL certificate monitoring
TLS config audit
HTTPS as ranking factor
customer trust
www and subdomains.Strict-Transport-Security header forces browsers to always use HTTPS.SSL certificate monitoring, check history and alerts 30 days before expiry.
Sign up freegit clone https://github.com/drwetter/testssl.sh && cd testssl.sh && ./testssl.sh example.com
Enterno.io covers common vulnerabilities + cipher + cert chain. testssl.sh goes deeper (POODLE, BEAST, CRIME detection plus historical CVE checks). For PCI-DSS audits we recommend testssl.sh.
Yes. <code>./testssl.sh --jsonfile report.json --severity HIGH example.com</code>. Then parse JSON into PR comments.
For 95% of tasks — no. For audit-grade (PCI DSS, security consulting) — testssl.sh complements.