• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Commix v3.1 - Automated All-in-One OS command injection and exploitation tool

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,623
Solutions
2
Reputation
32
Reaction score
100,455
Points
2,313
Credits
32,750
‎6 Years of Service‎
 
76%
commix.png


Commix (short for [comm]and njection e[x]ploiter) is an automated tool written by Anastasios Stasinopoulos (@ancst) that can be used from web developers, penetration testers or even security researchers in order to test web-based applications with the view to find bugs, errors or vulnerabilities related to command injection attacks. By using this tool, it is very easy to find and exploit a command injection vulnerability in a certain vulnerable parameter or HTTP header.



Changelog

Version 3.1




    Fixed: Multiple bug-fixes regarding several reported unhandled exceptions.

    Added: A script “setup.py” has been added (i.e. easier installation).


    Revised: Improvement regarding checking if the provided value has boundaries (e.g. ‘param=/value/’).


    Revised: Improvement regarding dynamic code evaluation technique’s heurstic checks.


    Revised: Improvement regarding identifying the indicated web-page charset.


    Revised: Minor improvement regarding verbose mode (i.e. debug messages).


    Fixed: Bug-fix regarding Basic HTTP authentication.


    Revised: Minor improvement regarding redirection mechanism.


    Fixed: Bug-fix regarding defining wildcard character “*” in nested JSON objects.


    Revised: Minor improvement regarding Flatten_json (third party) module.


    Revised: Minor improvement regarding parsing nested JSON objects.


    Added: New tamper script “doublequotes.py” that adds double-quotes (“”) between the characters of the generated payloads (for *nix targets).


    Fixed: Bug-fix regarding parsing raw HTTP headers from a file (i.e. -r option).


    Revised: Improvements regarding data in the detailed message about occurred unhandled exception.


    Revised: Minor bug-fixes and improvements regarding HTTP authentication dictionary-based cracker.




To see this hidden content, you must like this content.

 
Status
Not open for further replies.
Back
Top