MEC v1.4.0 – Mass Exploit Console

MEC v1.4.0 - Mass Exploit Console

a group of hacking instruments with a cli ui.


  • please use this device solely on licensed programs, im not chargeable for any harm brought on by customers who ignore my warning
  • exploits are tailored from different sources, please seek advice from their creator data
  • please notice, as a result of my restricted programming expertise (it is my first Python mission), you’ll be able to anticipate some foolish bugs


Getting began

git clone && cd massExpConsole && ./set
  • when putting in pypi deps, apt-get set up libncurses5-dev (for Debian-based distros) is perhaps wanted
  • now you have to be good to go (if not, please report lacking deps here)
  • sort proxy command to run a pre-configured Shadowsocks socks5 proxy within the background, vim ./knowledge/ss.json to edit proxy config. and, ss-proxy exits with


  • GNU/Linux, WSL, MacOS (not examined), totally examined beneath Arch Linux, Kali Linux (Rolling, 2018), Ubuntu Linux (16.04 LTS) and Fedora 25 (it would work on different distros too so long as you’ve got handled all deps)
  • Python 3.5 or later (or one thing may go mistaken,
  • proxychains4 (in $PATH), utilized by exploiter, requires a working socks5 proxy (you’ll be able to modify its config in
  • Java is required when utilizing Java deserialization exploits, you may wish to set up openjdk-8-jre if you have not put in it but
  • notice that you need to set up all the department of your exploits or instruments as properly


  • simply run, if it complains about lacking modules, set up them
  • if you wish to add your personal exploit script (or binary file, no matter):
    • cd exploits, mkdir <your_exploit_dir>
    • your exploit ought to take the final argument handed to it as its goal, dig into to know extra
    • chmod +x <exploit> to verify it may be executed by present consumer
    • use assault command then m to pick your customized exploit
  • sort assist within the console to see all obtainable options
  • zoomeye requires a legitimate consumer account config file zoomeye.conf


Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.