All Projects → jm33-m0 → mec-ng

jm33-m0 / mec-ng

Licence: GPL-3.0 license
pentest toolbox

Programming Languages

go
31211 projects - #10 most used programming language

Projects that are alternatives of or similar to mec-ng

H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+37225%)
Mutual labels:  penetration-testing, exploits, hacker
hsploit
An advanced command-line search engine for Exploit-DB
Stars: ✭ 16 (-42.86%)
Mutual labels:  penetration-testing, exploits
PXXTF
Framework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-17.86%)
Mutual labels:  penetration-testing, exploits
East
Exploits and Security Tools Framework 2.0.1
Stars: ✭ 283 (+910.71%)
Mutual labels:  penetration-testing, exploits
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (+157.14%)
Mutual labels:  exploits, hacker
ShonyDanza
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (+207.14%)
Mutual labels:  penetration-testing, exploits
Scanners Box
A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑
Stars: ✭ 5,590 (+19864.29%)
Mutual labels:  penetration-testing, hacker-tools
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+1592.86%)
Mutual labels:  penetration-testing, exploits
Brutal
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+2321.43%)
Mutual labels:  penetration-testing, hacker
Houndsploit
An advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (+189.29%)
Mutual labels:  penetration-testing, exploits
Icg Autoexploiterbot
Wordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (+764.29%)
Mutual labels:  penetration-testing, hacker
M3m0
M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (+342.86%)
Mutual labels:  penetration-testing, hacker
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+400%)
Mutual labels:  penetration-testing, exploits
CyberQueens
CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩‍💻👨‍💻
Stars: ✭ 30 (+7.14%)
Mutual labels:  hacker
NTU-Computer-Security
台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
Stars: ✭ 293 (+946.43%)
Mutual labels:  exploits
default-http-login-hunter
Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (+917.86%)
Mutual labels:  penetration-testing
vaf
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+950%)
Mutual labels:  penetration-testing
xmlrpc-bruteforcer
An XMLRPC brute forcer targeting Wordpress written in Python 3. (DISCONTINUED)
Stars: ✭ 62 (+121.43%)
Mutual labels:  penetration-testing
DevBrute-A Password Brute Forcer
DevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (+225%)
Mutual labels:  penetration-testing
Satana-Android-Debug-Bridge
Удаленное подключение к android устройству, по средствам adb подключений.
Stars: ✭ 27 (-3.57%)
Mutual labels:  hacker

mec-ng

A penetration test (pentest) toolbox

NOTE: This tool is under early-stage development. If anything goes wrong, please open an issue.

Features

  • ZoomEye crawler with multi-threading
  • Fast internet sweeping using MASSCAN
  • Executes custom exp with process-level concurrency
  • Shadowsocks proxy support (for anonymity)
  • Mass brute-force
  • Built-in exploit packs

Screenshot

screenshot

Disclaimer

  • Use this tool only on authorized systems. I am not responsible for any damage caused by users who ignore my warning.
  • I do not own the code of adapted exploits/tools as they are borrowed. Please refer to the appropriate authors.
  • Due to my limited programming experience, expect some silly bugs :)
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].