Version: 2.9.0
Web: https://github. com/jtesta/ssh-audit
Talking of SSH, the venerable tool that’s used by virtually all Linux users is a victim of its own success. These days, many distros set it up during installation to enable users to log into their machines remotely. This also makes it one of the most commonly attacked services on Linux.
Like all network services, SSH also needs to be configured properly to ensure it can’t be compromised by bad actors on the internet. No matter if you are a trained network admin or an average desktop user, the SSH-audit tool can help you secure your SSH instance, by thoroughly vetting your SSH connection.