Readme

  • Test for vulnerabilities that could lead to MitM attacks, such as weak key exchange algorithms.

  • Attempt to intercept SSH traffic to gain unauthorized access or eavesdrop on connections.

Last updated