CertLens

Validate Digital Certificates & Keystores

CertLens analyzes certificate chains, keystores, and TLS endpoints to detect trust issues, cryptographic weaknesses, and expiry risks.

Compatible with PEM • CRT • JKS • PKCS#12
🔒 Files are processed locally and never stored
Certificate Chain Validation

Reconstruct and verify full trust chains from root to leaf certificates.

Keystore Analysis

Inspect JKS and PKCS#12 keystores including multiple certificate entries.

TLS Endpoint Inspection

Scan live websites and analyze their TLS certificate chains.

Risk Detection

Identify expired certificates, weak algorithms, and trust issues.

Certificate Inventory

View all analyzed certificates in a structured inventory table.

PDF Reports

Generate downloadable reports for audits and compliance reviews.

📂 Upload Certificates / Keystore

Select certificates or keystore (PEM, JKS, P12):

Keystore password (if JKS/P12):

Required only for JKS / PKCS#12 files.

What You Can Upload

  • ✔ Single certificate (.pem, .crt)
  • ✔ Certificate chain (leaf + intermediate + root)
  • ✔ Java Keystore (.jks)
  • ✔ PKCS#12 bundle (.p12 / .pfx)

What CertLens Will Analyze

  • 🔍 Trust chain validation
  • 🔐 Cryptographic strength (RSA/ECC, signature algorithm)
  • 📅 Expiry risk assessment
  • 🌍 Public vs Private CA detection
  • 📊 Business risk scoring

🌐 Analyze TLS/Website

Connects to a website and retrieves its live TLS certificate chain directly from the server.

CertLens will check:

Target Domain:

Try: google.com github.com cloudflare.com