SSH configuration scanners
Want to know how well your SSH configuration is secured or are you performing a pentest? These tools will help to uncover possible weaknesses in a running SSH instance.
The tools in this category are specifically focused on scanning the configuration of SSH. Most of them will be targetting the daemon or SSH server, while others may include the SSH client configuration. Typically they are used by system administrators to harden their SSH configuration or by penetration testers to find weaknesses.
SSH configuration scanners are typically used for configuration audit and security assessment.
Users for these tools include pentesters, security professionals, system administrators.
|Tool||Type||Description||Latest release||Release date||Score|
|Lynis||Security scanner and compliance auditing tool||Lynis is a security auditing tool for systems running Linux, macOS, or Unix. It can be used for security assessments and configuration audits.||2.6.6||July 6, 2018||100|
|ssh-audit||SSH auditing tool||The ssh-audit tool helps to perform a security assessment of SSH servers and their configuration. It can be used for security testing and penetration tests.||1.7.0||Oct. 26, 2016||60|
|ssh_scan||SSH configuration and policy scanner||The ssh_scan utility is a SSH configuration and policy scanner maintained by the Mozilla Foundation. It helps to secure Linux systems running the OpenSSH.||0.0.35||June 4, 2018||85|
|SSHsec||SSH configuration scanner||SSHsec scans a system running the SSH protocol and retrieves its configuration, host keys, and Diffie-Hellman groups.||1.4.0||July 8, 2017||60|