SSHexec
Description
This exploit brute forces machines using credentials provided by the user (see "configuration" for instructions) and SSH keys gathered from infected systems.
Updated over 2 years ago
This exploit brute forces machines using credentials provided by the user (see "configuration" for instructions) and SSH keys gathered from infected systems.
Updated over 2 years ago