Client for SSLMate's Certificate Transparency Search APIv1.
❯ ./sslmate.py --help
INFO: Showing help with the command 'sslmate.py -- --help'.
NAME
sslmate.py - Query SSLMate's Certificate Transparency Search APIv1.
SYNOPSIS
sslmate.py DOMAIN <flags>
DESCRIPTION
Query SSLMate's Certificate Transparency Search APIv1.
POSITIONAL ARGUMENTS
DOMAIN
Type: str
Domain to search for.
FLAGS
--include-subdomains=INCLUDE_SUBDOMAINS
Type: bool
Default: False
Also search sub-domains
-d, --dns-names=DNS_NAMES
Type: bool
Default: False
Show DNS names
--issuer=ISSUER
Type: bool
Default: False
Show issuer
-r, --revocation=REVOCATION
Type: bool
Default: False
Show revocation info
-p, --problem-reporting=PROBLEM_REPORTING
Type: bool
Default: False
Show problem reporting instructions
-c, --cert-der=CERT_DER
Type: bool
Default: False
Show certificate data
-a, --after=AFTER
Type: Optional[int | None]
Default: None
issuances discovered after this ID
-t, --timeout=TIMEOUT
Type: int
Default: 10
seconds to wait for each request
NOTES
You can also use flags syntax for POSITIONAL ARGUMENTSThe output will be JSON Lines which can be further
filtered by something like jq:
❯ jq \
--compact-output \
--monochrome-output 'select((.not_after | fromdateiso8601 > now))' domain.jsonl > domain-valid.jsonl…and resolved to an active IP via
projectdiscovery/dnsx:
❯ jq -r '.dns_names[]' ./domain-valid.jsonl | dnsx -silent -no-color -a -resp > domain-dnsx.txtNote: the after value for a subsequent run can be obtained with:
❯ tail -n1 domain.jsonl | jq -r '.id'