Vulnerability Analysisheartbleedopensslscannerexploitationvulnerability

Heartleech

Heartleech is a scanner that detects systems vulnerable to the Heartbleed OpenSSL bug and can download vulnerable data. It supports bulk downloads, private key retrieval, and various evasion and proxy features.

Description

Heartleech is a specialized tool for identifying and exploiting the Heartbleed vulnerability in OpenSSL. It provides conclusive or inconclusive verdicts on target vulnerability and enables bulk, fast downloading of heartbleed data into large files for offline processing using multiple threads.

Key use cases include scanning networks for vulnerable systems, automatically retrieving private keys without additional steps, and performing attacks with limited IDS evasion. It supports STARTTLS, IPv6, and proxies like Tor or Socks5, making it versatile for penetration testing in diverse environments.

The tool offers extensive connection diagnostic information, aiding in troubleshooting and analysis during security assessments.

How It Works

Heartleech exploits the OpenSSL Heartbleed vulnerability by sending malformed Heartbeat requests to vulnerable TLS servers, triggering buffer over-reads that leak sensitive memory contents. It scans for vulnerability confirmation, then uses multithreading for rapid bulk data extraction, automatically parsing and saving private keys from the leaked data. Features like IDS evasion, STARTTLS negotiation, IPv6 handling, and proxy support (Tor/Socks5) enhance its operational capabilities across protocols and networks.

Installation

bash
sudo apt install heartleech

Flags

-hDisplays help information for heartleech

Examples

Shows the help menu and usage information for the tool
heartleech -h
Scans a single target for Heartbleed vulnerability and provides conclusive/inconclusive verdict
heartleech target.example.com
Scans target using multiple threads for faster bulk data download
heartleech -t 10 target.example.com
Scans target through a Socks5 proxy like Tor for anonymity
heartleech --proxy socks5://127.0.0.1:9050 target.example.com
Scans an IPv6 target for Heartbleed vulnerability
heartleech -6 target-ipv6.example.com
Scans a STARTTLS-enabled service for vulnerability
heartleech --starttls target.example.com:587
Downloads heartbleed data to a file for offline processing
heartleech target.example.com --output dump.bin
Updated 2026-04-16kali.org ↗