Files
PentestPilot/bin/web/tls_scan.sh
PentestPilot Bot 461c14d676 feat: bootstrap PentestPilot toolkit, docs, and orchestrators
Initial commit of PentestPilot — AI‑assisted pentest recon and orchestration toolkit.\n\nHighlights:\n- Resumeable pipelines (full_pipeline) with manifest state and elapsed timings\n- Rich dashboard (colors, severity bars, durations, compact/json modes)\n- Web helpers: httpx→nuclei auto, tech routing + quick scanners\n- Agents: multi‑task orchestrator (web/full/ad/notes/post) with resume\n- AD/SMB, password utils, shells, transfer, privesc, tunnels\n- QoL scripts: proxy toggle, cleanup, tmux init, URL extractor\n- Docs: README (Quick Start + Docs Index), HOWTO (deep guide), TOOLKIT (catalog with examples)\n\nStructure:\n- bin/automation: pipelines, dashboard, manifest, resume, tech_actions\n- bin/web: routing, scanners, helpers\n- bin/ai: orchestrators + robust AI utils\n- bin/ad, bin/passwords, bin/shells, bin/transfer, bin/privesc, bin/misc, bin/dns, bin/scan, bin/windows, bin/hashes\n- HOWTO.md and TOOLKIT.md cross‑linked with examples\n\nUse:\n- settarget <target>; agent full <domain|hosts.txt>; dashboard --compact\n- See HOWTO.md for setup, semantics, and examples.
2025-10-08 16:00:22 +02:00

17 lines
562 B
Bash
Executable File

#!/usr/bin/env bash
set -euo pipefail
hostport=${1:-}
[[ -z "$hostport" ]] && { echo "Usage: $(basename "$0") <host:443>" >&2; exit 1; }
host=${hostport%:*}
port=${hostport#*:}
echo "[+] Certificate chain summary"
echo | openssl s_client -servername "$host" -connect "$host:$port" -showcerts 2>/dev/null | openssl x509 -noout -subject -issuer -dates || true
for v in tls1_2 tls1_3; do
echo "[+] Testing protocol: $v"
echo | openssl s_client -servername "$host" -connect "$host:$port" -$v 2>/dev/null | grep -i 'Protocol\|Cipher' | head -n 2 || true
done