https://github.com/michenriksen/nmap-scripts
A collection of Nmap NSE scripts that I made.
https://github.com/michenriksen/nmap-scripts
Last synced: 5 months ago
JSON representation
A collection of Nmap NSE scripts that I made.
- Host: GitHub
- URL: https://github.com/michenriksen/nmap-scripts
- Owner: michenriksen
- Created: 2013-01-14T16:04:46.000Z (almost 13 years ago)
- Default Branch: master
- Last Pushed: 2013-01-14T16:05:44.000Z (almost 13 years ago)
- Last Synced: 2025-07-15T13:33:35.849Z (6 months ago)
- Language: Lua
- Size: 95.7 KB
- Stars: 27
- Watchers: 3
- Forks: 16
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Nmap NSE Scripts
**A collection of [Nmap NSE scripts](http://nmap.org/nsedoc/) that I made.**
## Scripts:
### http-rails-xml-parser
This script sends a specially crafted XML body in a POST request to any detected web services to see if it is a Ruby on Rails server
that is vulnerable to the recently discovered [CVE-2013-0156](https://groups.google.com/forum/#!topic/rubyonrails-security/61bkgvnSGTQ/discussion) bug.
**Usage:**
$ nmap -sV --script http-rails-xml-parser
----
### http-apache-server-status
This script checks if a web server is serving the Apache Server Status page which might contain a lot of interesting information. Daniel Cid did some
research and found big sites having the server-status page wide open to the public. [Read more about it here](http://blog.sucuri.net/2012/10/popular-sites-with-apache-server-status-enabled.html).
**Usage:**
$ nmap -sV --script http-apache-server-status