CGI-Telnet 1.0, a cgi telnet script that runs on various Unix and NT webservers has vulnerabilities which can be manipulated into giving a user access. The password file is accessible in the web path and passwords are kept DES encrypted.
e0b5370c22e2597643e3465f2bbcd9a427ce709060d55d274bb546ca92480c8e
The x1b pack is a series of scripts written by the author as an exercise into socket programming with perl. Included are a port scanner with banner grabbing capabilities, a DNS service enumeration script with zonetransfer, some brute forcing utilities, a CGI web scanner, and a couple of other utilities.
61cf850f403581fc48dae6ef8c8254b82800133a5b5ac3d08085a0ec6d259413
Cgivti2.V2.pl uses a webserver host list provided by the user to scan for cgi, vti, msadc and several other vulnerabilities. Like cgivti.V2.pl, this script is easily configured to include other vulnerabilities.
8966b5fa7d151c0547e782abcc1f118f0e7298ccb898d0f31dd4ee49e5a02865
This scanner searches for vulnerable web servers for Common Gateway Interface and Vermeer Technology Incorporated services. Version 2 allows for Class C IP generation done "On The Fly" and a timeout scheme added thanks to MaB of Efnets #programmers.
77770362b50cb7fe074dde751149a9cfecd9db1fbc1b7b09fc46c9ec41d2715f
The CGI Debugger v1.0 (/cgi-bin/debug.pl) displays information that may be useful to an attacker including the document root and server version info when passed a bogus argument.
fb7ac98f8314c3a58ff56f24e2e1c29c135d75c2f619f967ff2229d80ec3171f
This scanner searches for vulnerable web servers for Common Gateway Interface and Vermeer Technology Incorporated services.
3178e91d7d1afb673055f6147eac68be504e83bb41b722d15eb3a98d6d9a3647
Null.pl is a Perl script which uses a dictionary file to launch a brute force attach against a remote host using a null session.
5268eddc91b7e3545bc81757d6e718c037e3ea66509d15890f601a10ba2092af
This is a perl script that checks for the whois_raw cgi vulnerability. Code ripped from Piffys issscan.pl.
79a982f5b7207a58334998ccd349d93b3fadbc457f773bd51bd09e4d6b8f8b1a