Key | Value |
---|---|
FileName | usr/share/man/man1/testssl.1.gz |
FileSize | 18461 |
MD5 | 14C07C7BE4CE5A140575668AB3B0EBA5 |
SHA-1 | 4121B3EE9695E61ECE3FCC6172FE8EFA656C9D35 |
SHA-256 | E3414393CB38DFFD023B1D8EBC0B53C081818113005296D76CBADCFE7686A70C |
SSDEEP | 384:znsn/zsXNhLv6k6LLIlcGiXtRthPMr9lE7h7QFxNruleV:znsnQbv6tfj5dRth0r9G7h7Q3NJV |
TLSH | T14582D1CB49A5B503F3B4B098F8C7D4A0B518E42384ED457C8756E7F644E3AA8D1CB789 |
tar:gname | root |
tar:uname | root |
hashlookup:parent-total | 2 |
hashlookup:trust | 60 |
The searched file hash is included in 2 parent files which include package known and seen by metalookup. A sample is included below:
Key | Value |
---|---|
FileName | http://archlinux.mirror.root.lu//pool//community//testssl.sh-3.0.2-1-any.pkg.tar.zst |
MD5 | EC4C099FF095A47E7C077EF62D8BF016 |
SHA-1 | 51EE9F71DB9B0B4E62BC3E757F67F60CF3BFCA62 |
SHA-256 | 03C233950743C60DECBA2D721B5BACB072CA19E48414DA8D275A239D4A6FCFCF |
SSDEEP | 12288:f57aSG6kuJBjoSAjD0z8NiyCsGm+NSw+NtbH4+tfq9MziaAvp1ARG:hfnkuASADxNiyC3mouLtEMziaAryG |
TLSH | T1FEE4236A80E8511B0173003FBF8A5E1C9AB29C5FAE81E90E575D70C8C6B353B5AD47E5 |
Key | Value |
---|---|
FileSize | 653040 |
MD5 | C66827A6489C7A2A15821436A17B70B1 |
PackageDescription | Command line tool to check TLS/SSL ciphers, protocols and cryptographic flaws testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more. . Key features . * Clear output: you can tell easily whether anything is good or bad . * Ease of installation: It works for Linux, Darwin, FreeBSD and MSYS2/Cygwin out of the box: no need to install or configure something, no gems, CPAN, pip or the like. . * Flexibility: You can test any SSL/TLS enabled and STARTTLS service, not only webservers at port 443 . * Toolbox: Several command line options help you to run YOUR test and configure YOUR output . * Reliability: features are tested thoroughly . * Verbosity: If a particular check cannot be performed because of a missing capability on your client side, you'll get a warning . * Privacy: It's only you who sees the result, not a third party . * Freedom: It's 100% open source. You can look at the code, see what's going on and you can change it. Heck, even the development is open (github) |
PackageMaintainer | Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
PackageName | testssl.sh |
PackageSection | utils |
PackageVersion | 3.0.2+dfsg1-3 |
SHA-1 | FC4D58B0C1A2A57312703ACFFC0F7EE09BB16CC5 |
SHA-256 | 78FEA0E197EAC264EC18FDE2BB97E1928D90310B0C9D6E63C144CE7601A59471 |