LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.
-
Updated
Jun 12, 2024 - Python
LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.
A simple project that detects Local File Inclusion (LFI) Injection attacks on PHP-based web applications using the Go language.
Local File Inclusion discovery and exploitation tool
Scripts para automatizar tareas en CTFs
Oracle WebLogic Server (LFI)
Sonatype Nexus Repository Manager 3 (LFI)
A educational LFI exploit tool that works on severely misconfigured systems.
LFI Finder
Automated tool to bypass filtering systems and exploit Local File Inclusion, created for Bug Bounty tests and better optimization during the hack (and with special attention to CTFs)
Takes input wordlist in native path format to generate encoding evasion, path traversals, and null byte injections
Local file inclusion exploitation tool
A small and fast bash script to automate LFI vulnerability.
Script to brute force a potential LFI vulnerability
For Web Security
This repository is a Dockerized php application containing a LFI (Local File Inclusion) vulnerability which can lead to RCE (Remote Code Execution).
Dump files over Local File Inclusion vulnerability
Dépôt des challenges que j'ai réalisés pour l'évènement CTF Hacky'Nov à Aix-en-Provence 2022.
Local File inclusion (LFI), or simply File Inclusion, refers to an inclusion attack through which an attacker can trick the web application into including files on the web server
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
🎯 RFI/LFI Payload List
Add a description, image, and links to the lfi-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the lfi-exploitation topic, visit your repo's landing page and select "manage topics."