Apache
tcp/80
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: medium
Fingerprint: 5f32cf5d6962f09cdc8bf8eddc8bf8ed846db9e6e21259ee145d3316c08110d7
Found 89 files trough .DS_Store spidering: /.git /.git/hooks /.git/info /.git/logs /.git/objects /.git/refs /css /css/animate.min.css /css/bootstrap.css /css/bootstrap.min.css /css/creative.css /drawings.html /font-awesome /font-awesome/css /font-awesome/fonts /font-awesome/less /font-awesome/scss /fonts /images /img /img/1.png /img/bg.jpg /img/drawings /img/header.jpg /img/imac.png /img/logo.png /img/paintings /img/paintings/A_Vision.jpg /img/paintings/Ascend_and_Protect.jpg /img/paintings/BB_King.jpg /img/paintings/Classical_Fruit.jpg /img/paintings/Clio_Brings_Light.jpg /img/paintings/Clio_Death_Card.jpg /img/paintings/Clio_the_Thinker.jpg /img/paintings/Clio_Thoughts.jpg /img/paintings/Collage_Painting_1.jpg /img/paintings/Colored_Women.jpg /img/paintings/Dreaming.jpg /img/paintings/Dupree_Commission.jpeg /img/paintings/Glass_Lions.jpg /img/paintings/Holy_Fruit.jpg /img/paintings/Isles_of_Jabez.jpg /img/paintings/KeyChe.jpg /img/paintings/Mohammed.jpg /img/paintings/New_Tribe_Mask.jpg /img/paintings/Remains_of_the_Day.jpg /img/paintings/Salute_to_the_Sun_with_Lis_Johnson.jpg /img/paintings/She.jpg /img/paintings/She_Remembers.jpg /img/paintings/Stained_Glass.jpg /img/paintings/Still_Reaching.jpg /img/paintings/Tired.jpg /img/paintings/Trees_Flat.jpg /img/paintings/Trompe_L'oeil_Brick.jpg /img/paintings/Trompe_L'oeil_Mirror.jpg /img/paintings/Trompe_L'oeil_Panel.jpg /img/paintings/Trompe_L'oeil_Wall.jpg /img/paintings/Untitled1.jpg /img/q.png /img/quote.png /img/scroll.png /img/sculptures /img/sculptures/Antique_Chair_Restoration.jpg /img/sculptures/HearSpeakSay_NO.jpg /img/sculptures/Mixed_Media_Swirlie.jpg /img/sculptures/Model_of_Design_by_Khalilah_Allah-Lee.jpg /img/sculptures/Model_of_Design_by_Khalilah_Allah-Lee_1.jpg /img/sculptures/NABI.jpg /img/sculptures/Plaster_Sculpture_Side_1.jpg /img/sculptures/Plaster_Sculpture_Side_2.jpg /img/sculptures/Scultpural_Painting.jpg /img/sculptures/See_No_Hear_No_Speak_No.jpg /img/sculptures/Styrofoam_Carving.jpg /img/sculptures/The_Chair_Project.jpg /img/sculptures/The_Gates_to_the_Universe.jpg /img/sculptures/Untitled_Scultpure.jpg /img/shape.png /img/status.gif /img/testimonial_bg.jpg /index.html /jQueryAssets /js /less /LICENSE /paintings.html /PoetFriendsMarkup_exported /README.md /sculptures.html /sounds
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c7c3d3e457c3d3e455648281e6564f2f65e9207cefcf78aae
Found 30 files trough .DS_Store spidering: /.git /.git/hooks /.git/info /.git/logs /.git/objects /.git/refs /css /css/animate.min.css /css/bootstrap.css /css/bootstrap.min.css /css/creative.css /drawings.html /font-awesome /font-awesome/css /font-awesome/fonts /font-awesome/less /font-awesome/scss /fonts /images /img /index.html /jQueryAssets /js /less /LICENSE /paintings.html /PoetFriendsMarkup_exported /README.md /sculptures.html /sounds
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522e3a9ade6
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true ignorecase = true precomposeunicode = true [remote "origin"] url = https://github.com/XenoEmblems/TrevyWeb.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522e3a9ade6
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true ignorecase = true precomposeunicode = true [remote "origin"] url = https://github.com/XenoEmblems/TrevyWeb.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master
Open service 50.6.43.204:80 · mail.trevaughnbynum.com
2026-01-23 02:43
HTTP/1.1 302 Found Date: Fri, 23 Jan 2026 02:43:53 GMT Server: Apache Upgrade: h2,h2c Connection: Upgrade, close Location: /404.html Cache-Control: no-cache, no-store, must-revalidate Pragma: no-cache Expires: 0 Content-Length: 0 Content-Type: text/html; charset=UTF-8