You can ether scan for exploits one by one, or run through the whole list of 680. This will tell if CGI code was found and if you have access (i.e. Forbidden!). Even supports a simple form of OS and Server App. detection. This was ported from a couple of ...(description truncated)(ScreenShot)
My nonprogramming sites: The Real Estate Crowdfunding Review: Investing tools that cut through the clutter and the hype.
Real information and reviews. Real-time investment feeds. Real profitable. | Dollar candy: Play 60 second puzzles against three other people for real money! Legal in 36 states and overseas.