Skip to the content.

TLSleuth 1.0.0 is here — a lightweight, script-friendly PowerShell module for peeking under the hood of TLS endpoints. It’s built for operators and scripters who want fast, reliable insights without hauling in a full-blown scanner.

TL;DR highlights


Why TLSleuth?

You already have great scanners (OpenSSL, testssl.sh, sslscan, sslyze). TLSleuth fills the gap when you just need to:

It returns native PowerShell objects that are easy to filter, sort, and export.


Install

Install-Module TLSleuth -Scope CurrentUser
Import-Module TLSleuth

PowerShell 7+ recommended. Windows PowerShell 5.1 works with reduced cipher detail.


Quick Start

# Fetch cert + handshake details
Get-TLSleuthCertificate -Hostname example.com

# Constrain protocol to TLS 1.2
Get-TLSleuthCertificate -Hostname example.com -TlsProtocols Tls12

# Include local chain build + revocation checks
Get-TLSleuthCertificate -Hostname example.com -IncludeChain -CheckRevocation

# Pipeline support
'github.com','microsoft.com' |
  Get-TLSleuthCertificate -IncludeChain |
  Select Host,Protocol,CipherSuite,@{n='PrimaryDNS';e={$_.Certificate.PrimaryDnsName}},IsTrusted

# Verbose tracing (timings per helper)
Get-TLSleuthCertificate -Hostname example.com -Verbose

If you connect by IP but need proper SNI, pass -ServerName example.com.


Limitations (by design)

When you need deep probing (cipher enumeration, ALPN/H2, session resumption, CVE checks), use:


Quality & Tests


Roadmap


If TLSleuth helps you ship or debug faster, a ⭐ on GitHub and a note about your use case would mean a lot. Happy sleuthing! 🕵️‍♂️🔐