-
-
Notifications
You must be signed in to change notification settings - Fork 878
Third party references
Anastasios Stasinopoulos edited this page May 25, 2025
·
1 revision
Books
- Stasinopoulos, A., Ntantogian, C. & Xenakis, C. Int. J. Inf. Secur. (2018). (https://doi.org/10.1007/s10207-018-0399-z)
- Mastering Kali Linux for Web Penetration Testing (by Michael McPhee)
Third Party References
- Command and Shell Code Injection Scenarios with Commix and Shellter (by Nikos Danopoulos)
- Attacking Damn Vulnerable Web Services (by snoopy_security)
- Testing stateful web application workflows (by András Veres-Szentkirályi)
- Commix - An Automated Tool for Command Injection (by Srinivas)
- TrustedSec Security Podcast - Episode 6 (by TrustedSec)
- Commix Tool Tests Web Apps Against Command Injection Flaws (by softpedia)
- Commix - Command Injection Attack Tool (by Darknet.org.uk)
- Testing for Command Injection (OTG-INPVAL-013) (by OWASP)
- Exploit Command Injection Vulnearbility with Commix and Netcat (by Hacking Articles)
- Command Injection to Meterpreter using Commix (by Hacking Articles)
- The Tool Box - Episode 4 (by Pentester Academy)
- Bypassing Insufficient Blacklisting (by Obrela Labs)
- Introduction to OS Command Injections - Full Course (by Cybr)
- Automed Shell Injections with Commix and the Commix Testbed (by Cybr)
At the right side panel, you can find detailed information about Commix Project.
- Usage - Exhaustive breakdown of all options and switches together with examples
- Techniques - Techniques supported by commix
- Download and update - Keep it up-to-date
- Module development - Comprehensive guide for extending commix by developing custom modules
- Third party libraries - Breakdown of third-party components utilized in commix
- License - Copyright information
- Usage examples - Real-world examples of using commix across vulnerable applications
- Filters bypass examples - Payloads and techniques used to evade input filters
- Getting shells - Examples of using commix to gain shell
- Presentations - Conference talks, demos, and public presentations where commix has been featured or discussed.
- Screenshots - Visual examples of commix in action
- Third party references - References to commix in books, articles, research papers, blog posts, etc
- Command injection testbeds - A curated list of intentionally vulnerable web applications and platforms for safely testing commix