{"id":13454536,"url":"https://github.com/commixproject/commix","last_synced_at":"2025-05-13T20:21:00.829Z","repository":{"id":29044902,"uuid":"32572504","full_name":"commixproject/commix","owner":"commixproject","description":"Automated All-in-One OS Command Injection Exploitation Tool.","archived":false,"fork":false,"pushed_at":"2025-04-23T06:38:22.000Z","size":7048,"stargazers_count":5245,"open_issues_count":8,"forks_count":872,"subscribers_count":157,"default_branch":"master","last_synced_at":"2025-04-23T07:31:23.764Z","etag":null,"topics":["bugbounty","command-injection","commix","detection","exploitation","open-source","pentesting","python","takeover","vulnerability-scanner"],"latest_commit_sha":null,"homepage":"https://commixproject.com","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/commixproject.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":".github/FUNDING.yml","license":"LICENSE.txt","code_of_conduct":".github/CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null},"funding":{"custom":"https://www.paypal.com/donate?hosted_button_id=UGBDUDJRW8U4E"}},"created_at":"2015-03-20T08:38:26.000Z","updated_at":"2025-04-23T06:38:27.000Z","dependencies_parsed_at":"2023-10-27T06:22:54.514Z","dependency_job_id":"542715c9-5ddd-4d1c-8102-94df93df999a","html_url":"https://github.com/commixproject/commix","commit_stats":null,"previous_names":[],"tags_count":42,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/commixproject%2Fcommix","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/commixproject%2Fcommix/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/commixproject%2Fcommix/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/commixproject%2Fcommix/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/commixproject","download_url":"https://codeload.github.com/commixproject/commix/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":251337982,"owners_count":21573479,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["bugbounty","command-injection","commix","detection","exploitation","open-source","pentesting","python","takeover","vulnerability-scanner"],"created_at":"2024-07-31T08:00:55.096Z","updated_at":"2025-04-28T15:28:23.137Z","avatar_url":"https://github.com/commixproject.png","language":"Python","readme":"\u003cp align=\"left\"\u003e\n  \u003cimg alt=\"CommixProject\" src=\"https://commixproject.com/images/logo.png\" height=\"120\" /\u003e\n  \u003cp align=\"left\"\u003e\n    \u003ca href=\"https://github.com/commixproject/commix/actions/workflows/builds.yml\"\u003e\u003cimg alt=\"Builds Tests\" src=\"https://github.com/commixproject/commix/actions/workflows/builds.yml/badge.svg\"\u003e\u003c/a\u003e\n    \u003ca href=\"http://www.python.org/download/\"\u003e\u003cimg alt=\"Python 2.6|2.7|3.x\" src=\"https://img.shields.io/badge/python-2.6|2.7|3.x-yellow.svg\"\u003e\u003c/a\u003e\n    \u003ca href=\"https://github.com/commixproject/commix/blob/master/LICENSE.txt\"\u003e\u003cimg alt=\"GPLv3 License\" src=\"https://img.shields.io/badge/license-GPLv3-red.svg\"\u003e\u003c/a\u003e\n    \u003ca href=\"https://github.com/commixproject/commix/issues?q=is%3Aissue+is%3Aclosed\"\u003e\u003cimg alt=\"GitHub closed issues\" src=\"https://img.shields.io/github/issues-closed-raw/commixproject/commix.svg?colorB=ff0000\"\u003e\u003c/a\u003e\n    \u003ca href=\"https://x.com/commixproject\"\u003e\u003cimg alt=\"X\" src=\"https://img.shields.io/badge/x-@commixproject-blue.svg\"\u003e\u003c/a\u003e\n  \u003c/p\u003e\n\u003c/p\u003e\n\n**Commix** (short for [**comm**]and [**i**]njection e[**x**]ploiter) is an open source penetration testing tool, written by **[Anastasios Stasinopoulos](https://github.com/stasinopoulos)** (**[@ancst](https://x.com/ancst)**), that automates the detection and exploitation of **[command injection](https://www.owasp.org/index.php/Command_Injection)** vulnerabilities.\n\n\n![Screenshot](https://commixproject.com/images/background.png)\nYou can visit the [collection of screenshots](https://github.com/commixproject/commix/wiki/Screenshots) demonstrating some of the features on the wiki.\n\n## Installation\n\nYou can download commix on any platform by cloning the official Git repository :\n\n    $ git clone https://github.com/commixproject/commix.git commix\n\nAlternatively, you can download the latest [tarball](https://github.com/commixproject/commix/tarball/master) or [zipball](https://github.com/commixproject/commix/zipball/master).\n\n*__Note:__ **[Python](http://www.python.org/download/)** (version **2.6**, **2.7** or **3.x**) is required for running commix.*\n\n\n## Usage\n\nTo get a list of all options and switches use:\n\n    $ python commix.py -h\n\nTo get an overview of commix available options, switches and/or basic ideas on how to use commix, check **[usage](https://github.com/commixproject/commix/wiki/Usage)**, **[usage examples](https://github.com/commixproject/commix/wiki/Usage-Examples)** and **[filters bypasses](https://github.com/commixproject/commix/wiki/Filters-Bypasses)** wiki pages.\n\n\n## Links\n\n* User's manual: https://github.com/commixproject/commix/wiki\n* Issues tracker: https://github.com/commixproject/commix/issues\n\n\n## Translations\n\n* [Farsi(Persian)](https://github.com/commixproject/commix/blob/master/doc/translations/README-fa-FA.md)\n* [Greek](https://github.com/commixproject/commix/blob/master/doc/translations/README-gr-GR.md)\n* [Indonesian](https://github.com/commixproject/commix/blob/master/doc/translations/README-idn-IDN.md)\n* [Turkish](https://github.com/commixproject/commix/blob/master/doc/translations/README-tr-TR.md)\n","funding_links":["https://www.paypal.com/donate?hosted_button_id=UGBDUDJRW8U4E"],"categories":["Python","Exploitation","Uncategorized","Tools","Web","\u003ca id=\"1233584261c0cd5224b6e90a98cc9a94\"\u003e\u003c/a\u003e渗透\u0026\u0026offensive\u0026\u0026渗透框架\u0026\u0026后渗透框架","Weapons","📚 Learning Resources","bugbounty","\u003ca id=\"3ed50213c2818f1455eff4e30372c542\"\u003e\u003c/a\u003e工具","Security Tools","漏洞库_漏洞靶场","Web Exploitation","BUG BOUNTY / SECURITY RESEARCH","Security","红队\u0026渗透测试","Tools:"],"sub_categories":["Command Injection","Uncategorized","\u003ca id=\"a9494547a9359c60f09aea89f96a2c83\"\u003e\u003c/a\u003e后渗透","Tools","A03:2021 – Injection","\u003ca id=\"12abc279c69d1fcf10692b9cb89bcdf7\"\u003e\u003c/a\u003e未分类-post-exp","Exploitation","资源传输下载","Web Exploitation","Web injection tools","Web Injection Tools","Web Security Testing","Penetration Testing Report Templates","Security tools"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcommixproject%2Fcommix","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcommixproject%2Fcommix","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcommixproject%2Fcommix/lists"}