Tool
Interactively check flags, fill in values, and assemble a ready-to-run command for popular security tools.
Audit SSH server configuration — checks key exchanges, encryption algorithms, MACs, and host keys for weaknesses
ssh-auditRequired
Options