Latest version: v3.4.8
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
a library that is responsible of modeling objects to connect to another host via one or more intermediaries, offering a variety of modes (FOR and TOR) and options (TRANSFER and COMMAND)
<3.4.5
<3.4.5
<3.4.3
Has known vulnerabilities