Links

Readme

  • Assess the target SSH servers for known vulnerabilities.
  • Check for issues like weak ciphers, outdated software, or misconfigurations.
  • Determine if there are any unpatched vulnerabilities in the SSH server.