mec - mass exploits console.

mec – mass exploits console.

disclaimer:
* please use this tool only on authorized systems, im not responsible for any damage caused by users who ignore my warning
* exploits are adapted from other sources, please refer to their author info

what does it do?
– an easy-to-use user interface (cli)
– execute any adapted exploit with process-level concurrency
– crawler for baidu and zoomeye
– simple webshell manager
– some built-in exploits (automated)
– more to come…

MEC

requirements:
+ GNU/Linux or MacOS, fully tested under Kali Linux (Rolling, 2017), Ubuntu Linux (16.04 LTS) and Fedora 25 (it will work on other distros too as long as you have dealt with all deps)
+ proxychains4 (in $PATH), used by exploiter, requires a working socks5 proxy (you can modify its config in mec.py)
+ python packages:
+-+ requests
+-+ bs4
+-+ pip3 install on the go

usage note:
– just run mec.py, if it complains about missing modules, install them
– if you want to add your own exploit script (or binary file, whatever):
++ cd exploits, mkdir <yourExploitDir>
++ your exploit should take sys.argv[2] as its target, dig into mec.py to know more
++ chmod 755 <exploitBin> to make sure it can be executed by current user
++ use attack command then m to select your custom exploit
– type help in the console to see all available features

Use:

Source: https://github.com/jm33-m0