Updates Commix v0.1b-385e11b : Automatic All-in-One OS Command Injection and Exploitation Tool.

Updates Commix v0.1b-385e11b : Automatic All-in-One OS Command Injection and Exploitation Tool.

Changelog v0.1b-385e11b:
+* Added new eval-based payload (str_replace filter bypass).
+* Added check for (GET) RESTful URL format.
+* Added new option “–base64”, that encodes the OS command to Base64 format.
+* Controlled.py ; Fast-forward

Commix-v0.1b-385e11b

Commix-v0.1b-385e11b

Commix (short for [com]mand [i]njection e[x]ploiter) has a simple environment and it can be used, from web developers, penetration testers or even security researchers to test web applications with the view to find bugs, errors or vulnerabilities related to command injection attacks. By using this tool, it is very easy to find and exploit a command injection vulnerability in a certain vulnerable parameter or string. Commix is written in Python programming language.

Example screenCapture Updates commix-v-0.1b : Automated All-in-One OS Command Injection and Exploitation Tool.

Example screenCapture Updates commix-v-0.1b : Automated All-in-One OS Command Injection and Exploitation Tool. Has been Tested on: Kali Sana, Windows 7/8.1/10, Debian, Ubuntu, Arch-Linux

Disclaimer :
The tool is only for testing and academic purposes and can only be used where strict consent has been given. Do not use it for illegal purposes!!

Usage

Options:

Target:

Request:

Injection:

Enumeration :

Download : Master.zip | Clone Url
Source : https://github.com/stasinopoulos/ | Our post Before