-
-
Notifications
You must be signed in to change notification settings - Fork 154
How to Use
jm33-ng edited this page Apr 14, 2020
·
9 revisions
mec console uses python-prompt-toolkit for auto-complete and command history features.
Auto-complete automatically pops up as you type, you can press TAB
to trigger it as well.
Besides using arrow keys, you can use mouse to move cursor.
Type mec
in your terminal if you have mec installed
Type start
in mec console, you will need to answer a few questions before launching the exploit job
mec > start
[?] Do you wish to use proxychains? [y/N] n
[?] Do you wish to use
[1] built-in exploits
[2] or launch your own manually?
[=] Your choice: 1
[?] Choose a module from:
ssh_bruteforcer
weblogic_cve201710271
webmin_cve_2019_15107
witbe
[?] Choose your exploit module: ssh_bruteforcer
[*] Welcome to SSH bruteforcer
[*] Password list file to use (put them under ./data): /home/jm33/.mec/data/passwords_top20.txt
...
- If you have any issues, please report them to https://github.com/jm33-m0/mec/issues
- Open a pull request when you have fixed any bugs or added any features
- I would appreciate you adding your own adapted exploits to this repo