Readme

  • Assess the target SSH servers for known vulnerabilities.

  • Check for issues like weak ciphers, outdated software, or misconfigurations.

  • Determine if there are any unpatched vulnerabilities in the SSH server.

Last updated