massExploitConsole
a collection of tools with a cli ui
https://github.com/jm33-m0/massExpConsole
screenshot

what does it do?
- an easy-to-use user interface (cli)
- execute any adapted exploit with process-level concurrency
- crawler for baidu and zoomeye
- a simple webshell manager
- some built-in exploits (automated)
- more to come...
requirements
- GNU/Linux or MacOS, fully tested under Kali Linux (Rolling, 2017), Ubuntu Linux (16.04 LTS) and Fedora 25 (it will work on other distros too as long as you have dealt with all deps)
proxychains4(in$PATH), used by exploiter, requires a working socks5 proxy (you can modify its config inmec.py)- python packages:
requestsbs4pip3 installon the go
usage
- just run
mec.py, if it complains about missing modules, install them - if you want to add your own exploit script (or binary file, whatever):
cd exploits,mkdir <yourExploitDir>- your exploit should take
sys.argv[2]as its target, dig intomec.pyto know more chmod 755 <exploitBin>to make sure it can be executed by current user- use
attackcommand thenmto select your custom exploit
- type
helpin the console to see all available features
disclaimer
- please use this tool only on authorized systems, im not responsible for any damage caused by users who ignore my warning
- exploits are adapted from other sources, please refer to their author info
Comments
comments powered by Disqus