-
-
Notifications
You must be signed in to change notification settings - Fork 875
Presentations
Anastasios Stasinopoulos edited this page Jun 29, 2016
·
2 revisions
-
Commix: Detecting and Exploiting Command Injection Flaws.
- Presentation / White Paper at BlackHat Europe 2015 (Netherlands, Amsterdam 2015)
-
Perform effective command injection attacks like Mr.Robot.
- Presentation at BSides Athens 2016 (Greece, Athens 2016)
At the right side panel, you can find detailed information about Commix Project.
- Usage - Exhaustive breakdown of all options and switches together with examples
- Techniques - Techniques supported by commix
- Download and update - Keep it up-to-date
- Module development - Comprehensive guide for extending commix by developing custom modules
- Third party libraries - Breakdown of third-party components utilized in commix
- License - Copyright information
- Usage examples - Real-world examples of using commix across vulnerable applications
- Filters bypass examples - Payloads and techniques used to evade input filters
- Getting shells - Examples of using commix to gain shell
- Presentations - Conference talks, demos, and public presentations where commix has been featured or discussed.
- Screenshots - Visual examples of commix in action
- Third party references - References to commix in books, articles, research papers, blog posts, etc
- Command injection testbeds - A curated list of intentionally vulnerable web applications and platforms for safely testing commix