commix

Automated All-in-One OS command injection and exploitation tool.

General Information

Commix (short for [comm]and [i]njection e[x]ploiter) is an automated tool written by Anastasios Stasinopoulos (@ancst) that can be used from web developers, penetration testers or even security researchers in order to test web-based applications with the view to find bugs, errors or vulnerabilities related to command injection attacks. By using this tool, it is very easy to find and exploit a command injection vulnerability in a certain vulnerable parameter or HTTP header.

With each commix run end users are obligated to agree with the following prelude message:

(!) Legal disclaimer: Usage of commix for attacking targets without prior mutual consent is illegal. 
It is the end user's responsibility to obey all applicable local, state and federal laws. 
Developers assume no liability and are not responsible for any misuse or damage caused by this program.

Requirements

Python version 2.6, 2.7 or 3.x is required for running this program.

Installation

Download commix by cloning the Git repository:

git clone https://github.com/commixproject/commix.git commix

Commix comes packaged on the official repositories of the following Linux distributions, so you can use the package manager to install it!

Commix also comes as a plugin, on the following penetration testing frameworks:

Supported Platforms

  • Linux
  • Mac OS X
  • Windows (experimental)

Usage

To get a list of all options and switches use:

python commix.py -h

Q: Where can I check all the available options and switches?

A: Check the 'usage' wiki page.

Usage Examples

Q: Can I get some basic ideas on how to use commix?

A: Just go and check the 'usage examples' wiki page, where there are several test cases and attack scenarios.

Upload Shells

Q: How easily can I upload web-shells on a target host via commix?

A: Commix enables you to upload web-shells (e.g metasploit PHP meterpreter) easily on target host. For more, check the 'upload shells' wiki page.

Modules Development

Q: Do you want to increase the capabilities of the commix tool and/or to adapt it to our needs?

A: You can easily develop and import our own modules. For more, check the 'module development' wiki page.

Command Injection Testbeds

Q: How can I test or evaluate the exploitation abilities of commix?

A: Check the 'command injection testbeds' wiki page which includes a collection of pwnable web applications and/or VMs (that include web applications) vulnerable to command injection attacks.

Exploitation Demos

Q: Is there a place where I can check for demos of commix?

A: If you want to see a collection of demos, about the exploitation abilities of commix, take a look at the 'exploitation demos' wiki page.

Bugs and Enhancements

Q: I found a bug / I have to suggest a new feature! What can I do?

A: For bug reports or enhancements, please open an issue here.

Presentations and White Papers

Q: Is there a place where I can find presentations and/or white papers regarding commix?

A: For presentations and/or white papers published in conferences, check the 'presentations' wiki page.

Support and Donations

Q: Except for tech stuff (bug reports or enhancements) is there any other way that I can support the development of commix?

A: Sure! Commix is the outcome of many hours of work and total personal dedication. Feel free to 'donate' via PayPal to donations@commixproject.com and instantly prove your feelings for it! :).

主要指標

概覽
名稱與所有者commixproject/commix
主編程語言Python
編程語言Python (語言數: 1)
平台
許可證Other
所有者活动
創建於2015-03-20 08:38:26
推送於2025-06-10 04:09:04
最后一次提交2025-06-10 07:08:59
發布數42
最新版本名稱v4.0 (發布於 )
第一版名稱v0.3b-20151224 (發布於 )
用户参与
星數5.3k
關注者數157
派生數873
提交數2.2k
已啟用問題?
問題數965
打開的問題數5
拉請求數24
打開的拉請求數1
關閉的拉請求數21
项目设置
已啟用Wiki?
已存檔?
是復刻?
已鎖定?
是鏡像?
是私有?