-
-
Notifications
You must be signed in to change notification settings - Fork 154
How to Use
jm33-ng edited this page Dec 25, 2019
·
9 revisions
mec > help
Core Commands
=============
Command Description
------- -----------
clear (c) Clear screen
reset (x) Terminal reset
init (i) Return to init directory
help (?) Display this help info
quit (^C) Quit
attack (e) Start (guided)
exploits List all usable exploits
info Display current config
target <ip_list> Change target list,
proxy Start ss-proxy on port 1099
baidu <keyword> <page count> Search via m.baidu.com
google <dork> Fetch URLs from Google using custom dork
zoomeye (z) Crawler for ZoomEye
censys Crawler for Censys.io
masscan masscan port scanning
(others) Treated as shell command
Follow the guide
mec > attack
[?] Do you wish to use proxychains? [y/n] n
[?] Do you wish to use
[a] built-in exploits
[m] or launch your own manually?
[=] Your choice: a
[?] Choose a module from:
ssh_bruteforcer
weblogic
s2_045
witbe
[?] Choose your exploit module: weblogic
[*] Welcome to Weblogic getshell exploit
[?] What's the port of Welogic server?
...
mec console uses readline
for basic completion and command history features.
Press TAB
to complete your input, arrow keys to move around
- If you have any issues, please report them to https://github.com/jm33-m0/mec/issues
- Open a pull request when you have fixed any bugs or added any features
- I would appreciate you adding your own adapted exploits to this repo