Is an Automated Commando Line Tool for pentesting and other fun stuff
Commi3 (short for [c]ryptoanalytic [o]ffensive [m]ultifunctional [m]icrostructure [i]njection  generation 3) is an Automated Commando Line Tool (ACLT) that can be used from web developers, penetration testers or even security researchers in order to test web-based applications with the view to find bugs, errors or vulnerabilities related to command injection attacks. By using this tool, it is very easy to find and exploit a command injection vulnerability in a certain vulnerable parameter or HTTP/HTTPS header.
With each commi3 run end users are obligated to agree with the following prelude message:
(!) Legal disclaimer: Usage of Commi3 for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.
Python version 3.6.x or 3.7.x is required for running this program.
Download commi3 by cloning the Git repository:
git clone https://github.com/VanirLab/commi3.git commi3
Commi3 comes packaged on the official repositories of the following Linux distributions, so you can use the package manager to install it!
Commi3 also comes as a plugin, on the following penetration testing frameworks:
- TrustedSec's Penetration Testers Framework (PTF)
- OWASP Offensive Web Testing Framework (OWTF)
- Aptive's Penetration Testing tools
- Homebrew Tap - Pen Test Tools
- Mac OS X
To get a list of all options and switches use:
python commi3.py -h & python3 commi3.py -h
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Hashes for Commi3-1.0.7-py2.py3-none-any.whl