No openssl binary needed
No openssl binary needed — inspect certificates directly in the browser on any OS.
500+ fast, free tools. Most run in your browser only; Image & PDF tools upload files to the backend when you run them.
Decode PEM or DER (base64) X.509 certificates to extract subject, issuer, SANs, validity, key info, and fingerprints.
X.509 certificates underpin TLS/SSL, code signing, and identity verification across the internet. Reading their contents normally requires openssl commands or desktop tools. This inspector lets you paste any PEM certificate or a raw base64 DER block and instantly see a structured breakdown: Subject (CN, O, C), Issuer, validity window with a days-remaining countdown, Subject Alternative Names (SANs) listing every covered domain and IP, public key type and size, signature algorithm, serial number, and both SHA-1 and SHA-256 fingerprints. Certificates expiring within 30 days trigger a colored warning banner. Output is exportable as JSON. All parsing uses node-forge in-browser — no certificate data leaves your device.
No openssl binary needed — inspect certificates directly in the browser on any OS.
Expiry countdown highlights certificates expiring within 30 days with a colored warning banner.
Shows SANs in full, critical for checking wildcard coverage and multi-domain certificates.
JSON export enables pasting certificate metadata into reports or scripts without reformatting.
Completely offline-capable — certificate data never leaves your browser.
No openssl binary needed — inspect certificates directly in any modern browser on Windows, macOS, Linux, ChromeOS, or mobile.
Input: -----BEGIN CERTIFICATE----- MIIFazCCBFOgAwIBAgISA... -----END CERTIFICATE-----
Output: Subject CN: utilitykit.tools Issuer: R3 (Let's Encrypt) SANs: utilitykit.tools, www.utilitykit.tools Valid: 2026-04-01 → 2026-06-30 (53 days remaining) Key: ECDSA P-256 Sig: ECDSA with SHA-256 SHA-256: AB:CD:...
Input: (PEM block of a *.example.com certificate)
Output: SANs: *.example.com Warning: example.com itself is not covered. Wildcard does not match the apex domain — you may need a separate cert or add example.com as an explicit SAN.
Input: (PEM block expiring in 12 days)
Output: Validity: 2025-12-01 → 2026-05-20 (12 days remaining) — orange banner displayed. Action: schedule renewal; consider automating via ACME/cert-manager if not already.
Input: Click Copy as JSON after inspecting any certificate.
Output: {"subject":{"CN":"api.example.com","O":"Example Inc"},"issuer":{"CN":"R3"},"sans":["api.example.com"],"validFrom":"2026-04-01T00:00:00Z","validTo":"2026-06-30T23:59:59Z","daysRemaining":53,"keyAlgorithm":"ECDSA P-256","sigAlgorithm":"ecdsa-with-SHA256","sha256":"AB:CD:..."}