MEC v1.4.0 – Mass Exploit Console

0
12
MEC v1.4.0 - Mass Exploit Console

massExploitConsole
a group of hacking instruments with a cli ui.

Disclaimer

  • please use this device solely on licensed programs, im not chargeable for any harm brought on by customers who ignore my warning
  • exploits are tailored from different sources, please seek advice from their creator data
  • please notice, as a result of my restricted programming expertise (it is my first Python mission), you’ll be able to anticipate some foolish bugs

Features

Getting began

git clone https://github.com/jm33-m0/massExpConsole.git && cd massExpConsole && ./set up.py
  • when putting in pypi deps, apt-get set up libncurses5-dev (for Debian-based distros) is perhaps wanted
  • now you have to be good to go (if not, please report lacking deps here)
  • sort proxy command to run a pre-configured Shadowsocks socks5 proxy within the background, vim ./knowledge/ss.json to edit proxy config. and, ss-proxy exits with mec.py

Requirements

  • GNU/Linux, WSL, MacOS (not examined), totally examined beneath Arch Linux, Kali Linux (Rolling, 2018), Ubuntu Linux (16.04 LTS) and Fedora 25 (it would work on different distros too so long as you’ve got handled all deps)
  • Python 3.5 or later (or one thing may go mistaken, https://github.com/jm33-m0/massExpConsole/issues/7#issuecomment-305962655)
  • proxychains4 (in $PATH), utilized by exploiter, requires a working socks5 proxy (you’ll be able to modify its config in mec.py)
  • Java is required when utilizing Java deserialization exploits, you may wish to set up openjdk-8-jre if you have not put in it but
  • notice that you need to set up all the department of your exploits or instruments as properly

Usage

  • simply run mec.py, if it complains about lacking modules, set up them
  • if you wish to add your personal exploit script (or binary file, no matter):
    • cd exploits, mkdir <your_exploit_dir>
    • your exploit ought to take the final argument handed to it as its goal, dig into mec.py to know extra
    • chmod +x <exploit> to verify it may be executed by present consumer
    • use assault command then m to pick your customized exploit
  • sort assist within the console to see all obtainable options
  • zoomeye requires a legitimate consumer account config file zoomeye.conf

MoreTip.com

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.