massExploitConsole
a collection of tools with a cli ui
https://github.com/jm33-m0/massExpConsole
screenshot
what does it do?
- an easy-to-use user interface (cli)
- execute any adapted exploit with process-level concurrency
- crawler for baidu and zoomeye
- a simple webshell manager
- some built-in exploits (automated)
- more to come...
requirements
- GNU/Linux or MacOS, fully tested under Kali Linux (Rolling, 2017), Ubuntu Linux (16.04 LTS) and Fedora 25 (it will work on other distros too as long as you have dealt with all deps)
proxychains4
(in$PATH
), used by exploiter, requires a working socks5 proxy (you can modify its config inmec.py
)- python packages:
requests
bs4
pip3 install
on the go
usage
- just run
mec.py
, if it complains about missing modules, install them - if you want to add your own exploit script (or binary file, whatever):
cd exploits
,mkdir <yourExploitDir>
- your exploit should take
sys.argv[2]
as its target, dig intomec.py
to know more chmod 755 <exploitBin>
to make sure it can be executed by current user- use
attack
command thenm
to select your custom exploit
- type
help
in the console to see all available features
disclaimer
- please use this tool only on authorized systems, im not responsible for any damage caused by users who ignore my warning
- exploits are adapted from other sources, please refer to their author info
Comments
comments powered by Disqus