skills/mukul975/anthropic-cybersecurity-skills/analyzing-tls-certificate-transparency-logs

analyzing-tls-certificate-transparency-logs

SKILL.md

Analyzing TLS Certificate Transparency Logs

Instructions

Query crt.sh Certificate Transparency database to find certificates issued for domains similar to your organization's brand, detecting phishing infrastructure.

from pycrtsh import Crtsh

c = Crtsh()
# Search for certificates matching a domain
certs = c.search("example.com")
for cert in certs:
    print(cert["id"], cert["name_value"])

# Get full certificate details
details = c.get(certs[0]["id"], type="id")

Key analysis steps:

  1. Query crt.sh for all certificates matching your domain pattern
  2. Identify certificates with typosquatting variations (Levenshtein distance)
  3. Flag certificates from unexpected CAs
  4. Monitor for wildcard certificates on suspicious subdomains
  5. Cross-reference with known phishing infrastructure

Examples

from pycrtsh import Crtsh
c = Crtsh()
certs = c.search("%.example.com")
for cert in certs:
    print(f"Issuer: {cert.get('issuer_name')}, Domain: {cert.get('name_value')}")
Weekly Installs
11
GitHub Stars
2.4K
First Seen
3 days ago
Installed on
opencode11
gemini-cli11
github-copilot11
codex11
amp11
cline11