OpenSSL CVE-2014-0160 Heartbleed vulnerability test
The developer of this repository has not created any items for sale yet. Need a bug fixed? Help with integration? A different license? Create a request here:
WARNING: No guarantees are made about the accuracy of results, and you should verify them independently by checking your OpenSSL build.
Pull requests welcome.
$ heartbleeder example.com INSECURE - example.com:443 has the heartbeat extension enabled and is vulnerable
Multiple hosts may be monitored by setting
-hostfileflag to a file with newline separated addresses. A web dashboard is available at
Postgres uses OpenSSL in a slightly different way. To test whether a Postgres server is vulnerable, run the following (defaults to port 5432):
$ heartbleeder -pg example.com SECURE - example:5432 does not have the heartbeat extension enabled
Binaries are available from gobuild.io.
Build from source by running
go get -u github.com/titanous/heartbleeder, which will put the code in
$GOPATH/src/github.com/titanous/heartbleederand a binary at
Requires Go version >= 1.2. On Ubuntu godeb is an easy way of getting the latest version of Go.
The TLS implementation was borrowed from the Go standard library.