By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.
Oops! Something went wrong while submitting the form.
If you haven't done so yet, the fastest way to get started is to sign up for a free plan at https://mayhem4api.forallsecure.com/signup. If you already have an account, then you are ready to go for the next steps!
Installation
The Mayhem for API CLI is available to download for various common platforms.
ℹ️ The CLI will automatically keep itself updated when used as we make fixes and bug improvements.
ThemapiCLI communicates with our API usingOAuth 2.0 Bearer Tokens. The token will be read by the environment variable,MAPI_TOKEN, if available.
To get a new token, visit the "Manage API Tokens page" to create a new token,<NEW_TOKEN>, and login:
$ mapi login <NEW_TOKEN>
Welcome to Mayhem for API! We have saved a new API token in
your local settings at '/Users/mapi_fuzzer/Library/Preferences/rs.mapi/mapi.toml':
3BzW...
Setting the displayed API Token to the environment variable,MAPI_TOKEN, will allow you to run the CLI on other computers, such as part of your Continuous Integration build.
Now you can try contacting the API. Let's get the list of targets to which you have access:
mapi target list
You should see an (empty) list of API targets. Let's add our first target so that list won't stay empty for long.
In this five minute tutorial, we'll use Mayhem to generate a Proof-of-Concept (POC) exploit for a buffer overflow using a tiny C program as our running example.
Read More
Mayhem Makers
Mayhem Makers: Josh Thorngren, VP Marketing and Product
“Mayhem Makers” is a Q&A series dedicated to our growing company. For this month’s profile, we talked with Josh Thorngren, VP Marketing and Product at Mayhem.
Read More
Code Security
5 Key Takeaways From the Cybersecurity White House Briefing
The recent Cybersecurity White House Briefing highlights the importance of proactive measures against emerging threats. Here are five key takeaways.