TLSpider π·οΈ
TLSpider is a tool written in Go for extracting Subject Alternative Names (SANs) found in SSL Certificates directly from HTTPS websites. It provides automation for gathering DNS names (subdomains) and virtual servers from SSL certificates.
Features β¨
- π Extracts SANs from SSL certificates of HTTPS websites.
- π Supports output in CSV or JSON formats for easy integration with other tools.
- π Filters out domain names that don't match the specified domain.
- π Integrates with CRT.SH to extract additional subdomains from the same entity's certificates.
- π Works with both publicly trusted certificates and self-signed certificates.
- π Allows specifying multiple ports.
- π Filters can be defined using a file.
- π Silent mode for suppressing error output.
Installation π οΈ
To install TLSpider, you can use the go install
command:
go install github.com/SecWithMoh/tlspider@latest
Usage π
Usage of tlspider:
-output string
Output format: csv or json (default "json")
-filter string
File with list of domains for filtering
-crtsh
Integrate with CRT.SH to extract more subdomains
-raw
Output only the extracted domains (hosts)
-port string
Ports to scan (comma-separated, default "443")
-silent
Run in silent mode
-v, -verbose
Run in verbose mode
Examples
tlspider -u example.com -output json
tlspider -hosts hosts.txt -output csv
Pipe Hosts from Stdin and Sort Unique Results
echo "example.com" | tlspider -output csv | sort -u
Silent Mode
tlspider -u example.com -silent
Verbose Mode
tlspider -u example.com -v
Specifying Ports
tlspider -u example.com -port 443,8443
License π
This project is licensed under the GNU General Public License v3.0 (GPL-3.0). See the LICENSE file for more details.
Contributing π€
Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.
Support π¬
If you have any questions or need support, please open an issue.
Follow me on Twitter: @secwithmoh π¦