You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- GNU/Linux or MacOS (not tested), fully tested under [Kali Linux (Rolling, 2017)](https://www.kali.org), Ubuntu Linux (16.04 LTS) and Fedora 25 (it will work on other distros too as long as you have dealt with all deps)
41
+
- GNU/Linux, WSL, MacOS (not tested), fully tested under [Arch Linux](https://www.archlinux.org), [Kali Linux (Rolling, 2018)](https://www.kali.org), Ubuntu Linux (16.04 LTS) and Fedora 25 (it will work on other distros too as long as you have dealt with all deps)
48
42
- Python 3.5 or later (or something might go wrong, [https://github.com/jm33-m0/massExpConsole/issues/7#issuecomment-305962655](https://github.com/jm33-m0/massExpConsole/issues/7#issuecomment-305962655))
49
43
-`proxychains4` (in `$PATH`), used by exploiter, requires a working socks5 proxy (you can modify its config in `mec.py`)
50
44
- Java is required when using Java deserialization exploits, you might want to install `openjdk-8-jre` if you haven't installed it yet
0 commit comments