shellshock CVE-2014-6271 CGI Exploit, Use like Openssh via CGICGIShell
========
* [shellshock](https://shellshocker.net/)
* CVE-2014-6271 CGI Exploit
* Use like OpenSSH via CGI Page
Use
===
`python cgishell.py 'http://www.google.com/cve-2014-6271/poc.cgi'`
Screenshot
==========

Dependence
==========
* Windows needed `pyreadline`
* It is not needed `chardet`
Future
======
* Add TestCase
* HTTP Login Support
* http transmission gzip compression
* chardet identify and decode
* any bug fix
Issues
======
* Windows Untest
[4.0K] /data/pocs/a64f8fbf262a6b0541efe184a82224898422a194
├── [1.3K] LICENSE
├── [ 518] README.md
├── [ 31] requirements.txt
└── [4.0K] src
└── [4.0K] cgishell.py
1 directory, 4 files