Update README.md

This commit is contained in:
z0noxz
2017-01-12 22:31:18 +01:00
committed by GitHub
parent dd4feba364
commit 11a979d8a0

View File

@@ -1 +1,13 @@
# mando.me # mando.me
This tool is under development, but feel free to use it and improve it as you like. contribution is appreciated...
Since smplshllctrlr a lot has happened:
* Automated exploit-injection via POST or GET (eg. ./mando.me.py --cookie "security=low;PHPSESSID=DEADBEEFDEADBEEFDEADBEEFDEADBEEF" --url "http://metasploitable:2280/dvwa/vulnerabilities/exec/" --post "{'submit':'','ip':_INJECT_}")
* Encrypted agent communication
* Meterpreter/Reverse Shell Injection
* A more user friendly UI
* And much more...
## DISCLAIMER:
You shall not misuse this tool to gain unauthorized access. This tool should only be used to expand knowledge, and not for causing malicious or damaging attacks. Performing any attacks without written permission from the owner of the system is illegal.