Kali Linux comes with some useful SSL/TLS scanners which can help determine misconfigurations and vulnerabilities.
Examples
# a simple sslscan of a host:
sslscan -h [host]
sslyze [host]
# scanning a specific port
sslyze [host:port]
Results
While sslscan does a great job of returning information on what TLS version and cyphers are accepted (highlighting in orange versions that are outdated), sslyze provides a bit more detail in regards to vulnerabilities. SSLSCAN does provide a note on heart bleed vulnerabilities, but SSLYZE goes a bit deeper.
Certificate information (including serial, dates, public key algorithm, signature) as well as vulnerabilities (OpenSSL CCS Injection, Heartbleed, Robot attack, session renegotiation). It completes with a summary if the TLS configuration is compliant with Mozilla and if not, what needs to be changed.
IDS Information
If your site is protected behind an IDS (Suricata, etc.) these scans should trigger a notice like the one below:
SURICATA TLS overflow heartbeat encountered, possible exploit attempt (heartbleed) 