There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Repository Details
Attacker machine scans the networks and use ssh brute-force to connect target servers, then loads a script on target servers that gathers security informations and post then to attacker's web server. Finaly you can see host informations in django implemented web server.