SSHCheck icon

Analyze Authentication Methods, Ciphers, Protocols & Banners

The SSHCheck tool on binsec.tools is a free, web-based tool designed to assess the security configuration of SSH servers. It analyzes the SSH version banner, authentication methods, and key exchange algorithms. The tool checks for known insecure protocols and algorithms, highlighting those that are deprecated or vulnerable. It also identifies ciphers recommended by the German Federal Office for Information Security (BSI). Additionally, SSHCheck allows scanning of SSH services running on non-standard ports. This tool is particularly useful for system administrators and security professionals aiming to identify and remediate SSH-related security issues.

Go to SSHCheck
SSHCheck icon

Penetration Testing
Tools

On binsec.tools, you’ll find free online tools for penetration testing – the same ones used by the binsec group in real-world pentests. The publicly available tools are primarily designed to gather information and enrich it with additional data. Check them out!

Manual Penetration Testing by Certified, In-House Senior Penetration Testers

binsec penetration testing

Who tests

For more than ten years, binsec has stood for technically rigorous, strictly manual penetration testing. All engagements are conducted exclusively by employed senior penetration testers. Freelancers or subcontractors are not involved. Our clients work directly with the responsible senior tester who personally performs and technically leads the assessment. Communication is conducted in German and English; international projects are a regular part of our work. Our experts hold recognized offensive security certifications such as OSCP, OSCE, CRTO, and BACPP.

What we test

Our project experience covers complex enterprise networks, modern web and API architectures, and hybrid infrastructures. We work with organizations in manufacturing and industry, financial services and insurance, healthcare, IT and software providers, as well as public institutions. Technical, regulatory, and organizational requirements are systematically taken into account.

How we work

Our tests are based on a structured and reproducible methodology. They align with established standards such as OWASP and OSSTMM and are adapted to the specific project scope. Each assessment follows clearly defined phases: structured reconnaissance, manual analysis, targeted exploitation, and validated impact assessment. Automated tools support the process; identification, verification, and evaluation of vulnerabilities are performed manually.

Where we operate and document

Assessments are not conducted from cloud infrastructures. We operate our own infrastructure in a data center in Frankfurt. From there, all engagements are centrally executed and documented within our internal system PTDoc. PTDoc serves as the central documentation platform for all project data, evidence, and evaluations. All findings are recorded in a structured manner, technically described, risk-assessed, and supported by reproducible proof-of-concept information.

What you receive

We identify technical vulnerabilities and assess their business impact. Findings are evaluated based on risk or CVSS. The result is a clearly structured report including an executive management summary and detailed technical documentation. Re-testing of identified vulnerabilities is an integral part of our service.

Pentest Knowledge and Tools

Free pentest tools for your security analysis.

Pentest Tools

Take a look at our wiki page about pentesting.

Pentest WIKI

Straight answers to common pentesting questions.

Pentest FAQ

News about pentesting and the binsec universe.

Pentest News

Company

binsec GmbH
Clemensstraße 6-8
60487 Frankfurt am Main
Germany

Legal notice

Director: Patrick Sauer
Authorised Officer: Florian Zavatzki, Dominik Sauer
Registration: Frankfurt am Main, HRB97277
Turnover Tax Identification No.: DE290966808

© 2026 All rights reserved by binsec GmbH.

© 2026 All rights reserved by binsec GmbH.