massExploitConsole a collection of hacking tools with a CLI & UI for concurrent exploiting. Following are the features of MEC;
Also Read : Most Popular Hacking Tools in 2018
git clone https://github.com/jm33-m0/massExpConsole.git && cd massExpConsole && ./install.py
apt-get install libncurses5-dev
(for Debian-based distros) might be neededproxy
command to run a pre-configured Shadowsocks socks5 proxy in the background, vim ./data/ss.json
to edit proxy config. and, ss-proxy
exits with mec.py
proxychains4
(in $PATH
), used by exploiter, requires a working socks5 proxy (you can modify its config in mec.py
)openjdk-8-jre
if you haven’t installed it yet.Note: That you have to install all the deps of your exploits or tools as well.
mec.py
, if it complains about missing modules, install themcd exploits
, mkdir <your_exploit_dir>
mec.py
to know morechmod +x <exploit>
to make sure it can be executed by current userattack
command then m
to select your custom exploit help
in the console to see all available featureszoomeye
requires a valid user account config file zoomeye.conf
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…