Full security audit — SSL/TLS certificates, protocol versions, cipher suites, Google Safe Browsing status, 10+ security headers with deep CSP analysis, exposed sensitive files, server version leakage, and HSTS preload verification.
A full SSL/TLS security audit covering certificates, protocols, and headers.
Subject, issuer, validity dates, days until expiry, key size, signature algorithm, Subject Alternative Names, and self-signed detection.
Tests whether TLS 1.0, 1.1, 1.2, and 1.3 are supported. Flags deprecated versions (1.0/1.1) that create vulnerabilities.
Checks if HTTP properly redirects to HTTPS with a 301 (permanent), not a 302 (temporary). Also verifies the redirect target.
Checks 10 headers and assigns A+ through F grade. Analyzes CSP directives for unsafe-inline, unsafe-eval, and wildcard sources. Evaluates Permissions-Policy across 9 sensitive features (camera, microphone, geolocation, and more). Flags Server and X-Powered-By headers leaking version info.
Checks HSTS presence, max-age, includeSubDomains, and preload directive — then verifies whether your domain is actually on the browser HSTS preload list.
Validates the full certificate chain is present and complete — missing intermediate certificates cause failures in some browsers.
Probes for files that should never be public — .git/config, .env, wp-config.php.bak, .DS_Store, debug.log, and other common leaks that expose credentials or internal paths.
Checks for known vulnerabilities including BEAST, POODLE implications from legacy protocols, weak ciphers, and missing forward secrecy.
The checks SSL plus 7 other categories — email, DNS, performance, SEO, accessibility, privacy, and mobile.
Run