-
-
Notifications
You must be signed in to change notification settings - Fork 154
How to Use
jm33-ng edited this page Dec 26, 2019
·
9 revisions
mec > help
Command Description
------- -----------
clear (c) Clear screen
reset (x) Terminal reset
init (i) Return to mec root directory
help (?) Display this help info
quit (^C) Quit
attack (e) Start a mass-exploit job
masscan Run masscan to collect target hosts, requires root
info Current mec settings, and proxy status
target Change target list
init Return to mec root directory
baidu Search via m.baidu.com
proxy Start ss-proxy using ./data/ss.json config
google Fetch URLs from Google using custom dork
zoomeye Crawler for ZoomEye
censys Crawler for Censys.io
exploits List all usable exploits
help Display this help info
(others) Treated as shell commands
Follow the guide
mec > attack
[?] Do you wish to use proxychains? [y/n] n
[?] Do you wish to use
[a] built-in exploits
[m] or launch your own manually?
[=] Your choice: a
[?] Choose a module from:
ssh_bruteforcer
weblogic
s2_045
witbe
[?] Choose your exploit module: weblogic
[*] Welcome to Weblogic getshell exploit
[?] What's the port of Welogic server?
...
mec console uses readline
for basic completion and command history features.
Press TAB
to complete your input, arrow keys to move around
- If you have any issues, please report them to https://github.com/jm33-m0/mec/issues
- Open a pull request when you have fixed any bugs or added any features
- I would appreciate you adding your own adapted exploits to this repo