From the command line (Linux/macOS):
openssl s_client -connect example.com:443 </dev/null 2>/dev/null \ | openssl x509 -outform PEM
This prints the leaf certificate for any HTTPS host. Paste the full -----BEGIN CERTIFICATE----- … -----END CERTIFICATE----- block above.
Get the full chain (leaf + intermediates):
openssl s_client -showcerts -connect example.com:443 </dev/null 2>/dev/null \ | sed -n '/-----BEGIN CERTIFICATE-----/,/-----END CERTIFICATE-----/p'
From Chrome / Edge:
From Firefox:
Well-known public CA certificates (for quick testing):
curl https://letsencrypt.org/certs/isrgrootx1.pemPaste a PEM certificate or chain to decode X.509 fields, validity, SANs, and key info.