SSLyze v-0.10 released : Fast and full-featured SSL scanner.

Changelog v-0.10:
+ PluginOpenSSLCipherSuites now displays the size of the handshake’s Diffie-Hellmann parameters
+ SSLyze on Windows is now packaged as a single .exe file
+ PluginCertInfo now displays the server’s full certificate chain instead of its leaf certificate only, in both the console and XML results
+ PluginHSTS now properly detects HSTS headers when receiving HTTP redirections
+ New plugin to check if a server is affected by Chrome’s deprecation of SHA1-signed certificates. See –chrome_sha1
+ Clarified the console output of most plugins and checks
+ Bug fixes for XML output and client certificate support
+ Updated OpenSSL to 1.0.1i
+ Updated Microsoft, Apple and Mozilla trust stores

SSLyze is a Python tool that can analyze the SSL configuration of a server by connecting to it. It is designed to be fast and comprehensive, and should help organizations and testers identify misconfigurations affecting their SSL servers.

– Multi-processed and multi-threaded scanning (it’s fast)
– SSL 2.0/3.0 and TLS 1.0/1.1/1.2 compatibility
– Performance testing: session resumption and TLS tickets support
– Security testing: weak cipher suites, insecure renegotiation, CRIME, Heartbleed and more
– Server certificate validation and revocation checking through OCSP stapling
– Support for StartTLS handshakes on SMTP, XMPP, LDAP, POP, IMAP, RDP and FTP
– Support for client certificates when scanning servers that perform mutual authentication
– XML output to further process the scan results
– And much more !

Installation :
SSLyze requires Python 2.7; the supported platforms are Windows 7 32/64 bits, Linux 32/64 bits and OS X 64 bits.

Download Version :
Windows : MB) 
Linux 32Bit : MB)
Linux 64Bit : MB) 
Mac OSx 64Bit : MB)
Source :