Pivot your way deeper into computer networks with SSH compromised machines.
Extra thanks to the people who left a star on the repo. Every one is very appreciated :)
Note this script is purley just a small enumeration script, and does not directly attack any found devices on …