
Commix-Testbed
#Threat Defense#Vulnerability Management
A community effort to compile security advisories for Ruby libraries with a detailed directory structure.
A collection of real-world scenarios for command injection evaluation
This document presents a collection of real-world scenarios that are susceptible to command injection flaws. These scenarios are utilized to assess the detection and exploitation capabilities of commix.
- Regular injection scenarios.
- Cookie injection scenarios.
- User-Agent injection scenarios.
- Referer injection scenarios.
- Weak filters scenarios.
Hints: Screenshot
Installation Instructions for Commix-Testbed
To install commix-testbed, download it by cloning the official Git repository using the following command: git clone https://github.com/commixproject/commix-testbed.git commix-testbed. Alternatively, you can opt for the dockerized version of commix-testbed.
Bugs and Enhancements: If you encounter any bugs or have suggestions for enhancements related to commix-testbed, please open an issue in the repository.
Requirements: