Python App #08

SSL/TLS Analyzer

SSL/TLS Analyzer performs comprehensive domain research by combining WHOIS lookups with RDAP fallback for maximum coverage. Discover registrar details, nameservers, creation and expiration dates, registrant information (when available), and domain status codes. Optionally integrate with VirusTotal (API key) for reputation scoring and malware detection. The tool also generates direct links to additional domain intelligence services.

whoisrdapvirustotalregistrar

Last updated:

Features

  • WHOIS lookup with parsed results
  • RDAP fallback for additional data
  • Registrar identification
  • Nameserver discovery
  • Domain creation/expiration dates
  • Registrant info (when public)
  • Domain status codes
  • Optional VirusTotal API integration
  • Reputation and malware scoring
  • HTML session export

Quick Start

# 1. Extract the zip and enter the folder
cd 08-Domain-Intel

# 2. Install dependencies
python install_requirements.py

# 3. Launch the tool
python ssl_analyzer.py

Download

Tool: SSL/TLS Analyzer
File: 08-Domain-Intel.zip
Python: 3.8+
OS: Windows, macOS, Linux
Dependencies: customtkinter, requests, python-whois

Downloads are free — clicking the link below opens a short ad that helps support Max Intel. Thank you! Wait 15 seconds after clicking to unlock.

Click here for an ad
15
seconds remaining…
✓ Unlocked — thank you!
← All Python OSINT Apps

What Does SSL/TLS Analysis Reveal About Security?

SSL/TLS analysis examines encryption configuration — certificates, cipher suites, protocol versions, and security headers. According to SSL Labs' 2024 SSL Pulse survey, only 40% of websites achieve an A grade, meaning the majority have exploitable misconfigurations. This tool covers checks recommended by OWASP's Transport Layer Security Cheat Sheet.

Certificate and Cipher Analysis

The tool examines X.509 certificates, supported TLS versions (1.0 and 1.1 deprecated per RFC 8996), and cipher suites. NIST SP 800-52 Rev. 2 specifies that servers should prefer AEAD suites like AES-GCM and ChaCha20-Poly1305 and reject RC4, DES, or MD5.

HTTP Security Headers

Beyond TLS, the tool checks HSTS, CSP, X-Content-Type-Options, and X-Frame-Options. According to SecurityHeaders.com (2024), only 22% of top 1M websites implement Content-Security-Policy. Missing headers enable clickjacking, MIME sniffing, and XSS even when TLS is configured.

🔒 SSL/TLS Analyzer — Frequently Asked Questions

What does the SSL analyzer check?

The tool inspects TLS certificates for validity, expiration, issuer chain, subject alternative names (SANs), key strength, and protocol support. It also checks for common misconfigurations and certificate transparency log entries.

Does the SSL/TLS certificate analysis tool require installation?

No. The tool runs entirely in your browser using client-side Python via Pyodide. No installation, API keys, or server-side processing required. Your queries are executed locally for maximum privacy.

What can I do with the SSL/TLS certificate analysis tool?

You can inspect certificate chains, expiry dates, SANs, and issuer details. The tool provides a clean interface with exportable results and cross-links to related Max Intel tools for deeper investigation.