massExpConsole - Collection of Tools and Exploits with a CLI UI - KitPloit - PenTest Tools for your Security Arsenal ☣
2018-03-16 17:01:16 Author: www.kitploit.com(查看原文) 阅读量:102 收藏

Collection of Tools and Exploits with a CLI UI

What does it do?

  • an easy-to-use user interface (cli)
  • execute any adapted exploit with process-level concurrency
  • crawler for baidu and zoomeye
  • a simple webshell manager
  • some built-in exploits (automated)
  • more to come...


Requirements

  • GNU/Linux or MacOS, WSL (Windows Subsystem Linux), fully tested under Kali Linux (Rolling, 2017), Ubuntu Linux (16.04 LTS) and Fedora 25 (it will work on other distros too as long as you have dealt with all deps)
  • proxychains4 (in $PATH), used by exploiter, requires a working socks5 proxy (you can modify its config in mec.py)
  • Java is required when using Java deserialization exploits, you might want to install openjdk-8-jre if you haven't installed it yet
  • python packages (not complete, as some third-party scripts might need other deps as well):
    • requests
    • bs4
    • beautifulsoup4
    • html5lib
    • docopt
    • pip3 install on the go
  • note that you have to install all the deps of your exploits or tools as well

Usage

  • just run mec.py, if it complains about missing modules, install them
  • if you want to add your own exploit script (or binary file, whatever):
    • cd exploits, mkdir <yourExploitDir>
    • your exploit should take the last argument passed to it as its target, dig into mec.py to know more
    • chmod 755 <exploitBin> to make sure it can be executed by current user
    • use attack command then m to select your custom exploit
  • type help in the console to see all available features

massExpConsole - Collection of Tools and Exploits with a CLI UI massExpConsole - Collection of Tools and Exploits with a CLI UI Reviewed by Lydecker Black on 11:47 AM Rating: 5


文章来源: https://www.kitploit.com/2017/05/massexpconsole-collection-of-tools-and.html?utm_content=bufferbe531&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
如有侵权请联系:admin#unsafe.sh