Cert Spotter is a Certificate Transparency log monitor from SSLMate that alerts you when an SSL/TLS certificate is issued for one of your domains. Cert Spotter is easier to use than other open source CT monitors, since it does not require a database. It's also more robust, since it uses a special certificate parser that ensures it won't miss certificates. Cert Spotter is also available as a hosted service by SSLMate that requires zero setup and provides an easy web dashboard to centrally manage your certificates. You can use Cert Spotter to detect: - Certificates issued to attackers who have compromised your DNS and are redirecting your visitors to their malicious site. - Certificates issued to attackers who have taken over an abandoned sub-domain in order to serve malware under your name. - Certificates issued to attackers who have compromised a certificate authority and want to impersonate your site. - Certificates issued in violation of your corporate policy or outside of your centralized certificate procurement process. Quickstart: Cert Spotter requires Go version 1.19 or higher. Install th
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
The OWASP AppSec Europe '16 Conference is a leading gathering in web application security, featuring keynote speakers and in-depth trainings in application security topics.
A Python script to check system compliance against CIS Benchmarks with customizable options.
A collection of CTF source files and write-ups that anyone can contribute to.
A comprehensive IT infrastructure automation platform for managing hybrid infrastructure through configuration, patch, and security management.
Kubernetes security platform with industry standard open source utilities for securing Kubernetes clusters and apps.
Syntax highlighting for Smali (Dalvik) Assembly language in Vim.
A system for reserving classrooms at the University of Pisa.
Personal website of Collin R. Mulliner with a focus on security research and mobile platforms.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.