Vulnerability scanner

MassBleed SSL Vulnerability Scanner

Written by Mubassir patel

MassBleed SSL Vulnerability Scanner

alt tag


sh [CIDR|IP] [single|port|subnet] [port] [proxy]


This script has four main functions with the ability to proxy all connections:

  • To mass scan any CIDR range for OpenSSL vulnerabilities via port 443/tcp (https) (example: sh
  • To scan any CIDR range for OpenSSL vulnerabilities via any custom port specified (example: sh port 8443)
  • To individual scan every port (1-10000) on a single system for vulnerable versions of OpenSSL (example: sh single)
  • To scan every open port on every host in a single class C subnet for OpenSSL vulnerabilities (example: sh 192.168.0. subnet)


A proxy option has been added to scan via proxychains. You’ll need to configure /etc/proxychains.conf for this to work.


  • (example: ./massbleed 0 0 proxy)
  • (example: ./massbleed port 8443 proxy)
  • (example: ./massbleed single 0 proxy)
  • (example: ./massbleed 192.168.0. subnet 0 proxy)


  1. OpenSSL HeartBleed Vulnerability (CVE-2014-0160)
  2. OpenSSL CCS (MITM) Vulnerability (CVE-2014-0224)
  3. Poodle SSLv3 Vulnerability (CVE-2014-3566)
  4. WinShock SChannel Vulnerability (MS14-066)
  5. DROWN Attack (CVE-2016-0800)


  • Is the heartbleed POC present?
  • Is the openssl CCS script present?
  • Is the winshock script present?
  • Is unicornscan installed?
  • Is nmap installed?
  • Is sslscan installed?

About the author

Mubassir patel

Mubassir is a founder and developer of this site. He is a computer science engineer. He has a very deep interest in ethical hacking, penetration testing, website development and including all technology topic.

Leave a Comment