commix
Commix (short for [comm]and [i]njection e[x]ploiter) is an open-source penetration testing tool, written by Anastasios Stasinopoulos (@ancst), that automates the detection and exploitation of command injection vulnerabilities.
Name:commix
Category:Vulnerabilities
Publisher:trickest
Created:9/7/2021
Container:
quay.io/trickest/commix:fc5febe-patch-3
Output Type:
License:Unknown
Source:View Source
Parameters
--os
Force back-end operating system (e.g. 'Windows' or 'Unix').--all
Retrieve everything.--tor
Use the Tor network.
Target URL.--data
Data string to be sent through POST.--host
HTTP Host header.--skip
Skip testing for given parameter(s).
Scan multiple targets given in a textual file.--alert
Run host OS command(s) when injection point is found.--codec
Force codec for character encoding (e.g. 'ascii').--crawl
Crawl the website starting from the target URL--delay
Seconds to delay between each HTTP request.--level
Level of tests to perform (1-3, Default: 1).--proxy
Use a proxy to connect to the target URL.--purge
Safely remove all content from commix data directory.--smart
Perform thorough tests only if positive heuristic(s).--users
Retrieve system users.--cookie
HTTP Cookie header.--header
Extra header (e.g. 'X-Forwarded-For: 127.0.0.1').--maxlen
Set the max length of output for time-related--method
Force usage of given HTTP method (e.g. PUT)--mobile
Imitate smartphone through HTTP User-Agent header.--os-cmd
Execute a single operating system command.--prefix
Injection payload prefix string.--suffix
Injection payload suffix string.--tamper
Use given script(s) for tampering injection data.--answers
Set predefined answers (e.g. quit=N,follow=N)--charset
Time-related injection charset (e.g. 0123456789abcdef)--headers
Extra headers (e.g. 'Accept-Language: fr
ETag: 123').--is-root
Check if the current user have root privileges.--offline
Work in offline mode.--referer
HTTP Referer header.-r
Load HTTP request from a file.--retries
Retries when the connection timeouts (Default: 3).-s
Load session from a stored (.sqlite) file.-x
Parse target(s) from remote sitemap(.xml) file.--timeout
Seconds to wait before timeout connection (Default:--auth-url
Login panel URL.--hostname
Retrieve current hostname.--is-admin
Check if the current user have admin privileges.-l
Parse target from HTTP proxy log file.--skip-waf
Skip heuristic detection of WAF/IPS/IDS protection.--sys-info
Retrieve system information.--time-sec
Seconds to delay the OS response (Default: 1).--tmp-path
Set the absolute path of web server's temp directory.--tor-port
Set Tor proxy port (Default: 8118).--web-root
Set the web server document root directory (e.g. '/var/www').--auth-cred
HTTP authentication credentials (e.g. 'admin:admin').--auth-data
Login parameters and data.--auth-type
HTTP authentication type (Basic, Digest, Bearer).--file-dest
Host's absolute filepath to write and/or upload to.--file-read
Read a file from the target host.--force-ssl
Force usage of SSL/HTTPS.--param-del
Set character for splitting parameter values.-p
Testable parameter(s).--passwords
Retrieve system users password hashes.--skip-calc
Skip the mathematic calculation during the detection--technique
Specify injection technique(s) to use.--tor-check
Check to see if Tor is used properly.-v
Verbosity level (0-4, Default: 0).--cookie-del
Set character for splitting cookie values.--file-write
Write to a file on the target host.--no-logging
Disable logging to a file.--privileges
Retrieve system users privileges.--ps-version
Retrieve PowerShell's version number.--shellshock
The 'shellshock' injection module.--skip-empty
Skip testing the parameter(s) with empty value(s).--url-reload
Reload target URL after command execution.--user-agent
HTTP User-Agent header.--alter-shell
Use an alternative os-shell (e.g. 'Python').--file-upload
Upload a file on the target host.--ignore-code
Ignore (problematic) HTTP error code (e.g. 401).--current-user
Retrieve current user name.--failed-tries
Set a number of failed injection tries, in file-based--ignore-proxy
Ignore system default proxy settings.--list-tampers
Display list of available tamper scripts.--random-agent
Use a randomly selected HTTP User-Agent header.--crawl-exclude
Regexp to exclude pages from crawling (e.g. logout).--flush-session
Flush session files for current target.--check-internet
Check internet connection before assessing the target.--ignore-session
Ignore results stored in session file.--skip-technique
Specify injection technique(s) to skip.--drop-set-cookie
Ignore Set-Cookie header from response.--skip-heuristics
Skip heuristic detection for code injection.--ignore-redirects
Ignore redirection attempts.--ignore-dependencies
Ignore all required third-party library dependencies.