massExploitConsole a collection of hacking tools with a CLI & UI for concurrent exploiting. Following are the features of MEC;
Also Read : Most Popular Hacking Tools in 2018
git clone https://github.com/jm33-m0/massExpConsole.git && cd massExpConsole && ./install.py
apt-get install libncurses5-dev (for Debian-based distros) might be neededproxy command to run a pre-configured Shadowsocks socks5 proxy in the background, vim ./data/ss.json to edit proxy config. and, ss-proxy exits with mec.pyproxychains4 (in $PATH), used by exploiter, requires a working socks5 proxy (you can modify its config in mec.py)openjdk-8-jre if you haven’t installed it yet.Note: That you have to install all the deps of your exploits or tools as well.
mec.py, if it complains about missing modules, install themcd exploits, mkdir <your_exploit_dir>mec.py to know morechmod +x <exploit> to make sure it can be executed by current userattack command then m to select your custom exploit help in the console to see all available featureszoomeye requires a valid user account config file zoomeye.confJava remains one of the most widely used programming platforms for servers, enterprise applications, Android…
Ubuntu users often download software directly from developer websites instead of using the default app…
Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…