ct-radar_
PricingDocs
search

api.offensive-security.com

Every SSL/TLS certificate ever issued for this name, indexed from public CT logs.

csv export pro
Filters
10 on page · 10 matched
total records
10
active · on this page
1
expired · on this page
9
unique issuers · on this page
3
issuers on this pageGoogle Trust6Let's Encrypt3Unknown Issuer1
domainissuervalidstatus
api.offensive-security.comcrt.sh
Let's Encrypt
Let's EncryptMar 10, 2025→Jun 8, 2025expired 11mo ago
api.offensive-security.comcrt.sh
Google Trust
Google TrustMar 10, 2025→Jun 8, 2025expired 11mo ago
api.offensive-security.comcrt.sh
Google Trust
Google TrustMar 10, 2025→Jun 8, 2025expired 11mo ago
api.offensive-security.comcrt.sh
Let's Encrypt
Let's EncryptJan 10, 2025→Apr 10, 2025expired 1y ago
api.offensive-security.comcrt.sh
Google Trust
Google TrustJan 10, 2025→Apr 10, 2025expired 1y ago
api.offensive-security.comcrt.sh
Google Trust
Google TrustJan 6, 2025→Apr 6, 2025expired 1y ago
api.offensive-security.comcrt.sh
Google Trust
Google TrustJan 6, 2025→Apr 6, 2025expired 1y ago
api.offensive-security.comcrt.sh
Unknown Issuer
Unknown IssuerNov 12, 2024→Feb 10, 2025expired 1y ago
api.offensive-security.comcrt.sh
Let's Encrypt
Let's EncryptFeb 27, 2026→May 28, 2026expires in 22d
api.offensive-security.comcrt.sh
Google Trust
Google TrustJan 9, 2026→Apr 9, 2026expired 26d ago
Pipe results into your recon pipeline
# Python
$ pip install ct-radar
$ ct-radar api.offensive-security.com | httpx -silent
# Go
$ go install github.com/imfht/ct-radar-cli/cli@latest
$ ct-radar api.offensive-security.com | nuclei
Free tier: 100 searches/day · Pro $29/mo for 10,000/day

Related domains under .com

google.comyoutube.comgmail.comdrive.google.comfacebook.cominstagram.comwhatsapp.commessenger.comapple.comicloud.comitunes.apple.commicrosoft.com

About certificate history for api.offensive-security.com

This page lists every X.509 (SSL/TLS) certificate ever issued for api.offensive-security.com and its subdomains, as recorded in public Certificate Transparency (CT) logs. CT logs are an immutable, append-only record of every certificate issued by participating Certificate Authorities (CAs), as required by the major browsers since 2018.

Subdomain enumeration via CT logs is one of the highest-signal techniques in reconnaissance — every time a TLS certificate is issued, all Subject Alternative Names (SANs) on that certificate become public. Internal and forgotten subdomains regularly show up here days after they're set up.

To monitor api.offensive-security.com for newly-issued certificates in real-time (useful for detecting unauthorized issuance, phishing variants, or shadow IT) add it to your watchlist (Pro plan).